ONLY VIDEO BASE TRAINING (TALK SHOWS)

4000 Hrs + video based IT & Project Management Certification Courses

Select a Course Series title below to begin your training. To help you navigate, search or select a section to jump to your desired training below

CompTIA

  • OPERATING SYSTEMS
    Overview
    Computer Operating Systems
    Microsoft Windows
    Apple MacOS
    GNU Linux
    SOFTWARE AND APPLICATIONS
    Software Usage Requirements
    Business And Productivity Software
    Business And Productivity Software Part 2
    Collaboration Software
    Web Browser Settings
    Web Browser Settings Part 2
    SOFTWARE DEVELOPMENT
    Programming Concepts
    Programming Concepts Part 2
    Developing With Python
    COMPUTER HARDWARE
    Central Processing Unit (CPU)
    Common Hardware
    Common Hardware Part 2
    Peripheral Devices
    Peripheral Devices Part 2
    Display Hardware
    Storage Hardware
    NETWORKING
    Basic Networking Concepts
    Basic Networking Concepts Part 2
    Configuring A Wireless Router
    Configuring A Wireless Router Part 2
    Connection And Service Types
    Connection And Service Types Part 2
    DATABASES
    Database Concepts
    Querying A Database
    Table Design
    SECURITY
    Basic Security Principles
    Basic Security Principles Part 2
    Security Best Practices
    Security Best Practices Part 2
    Security Best Practices Part 3
    TROUBLESHOOTING
    Troubleshooting Methodology
    Troubleshooting Methodology Part 2
    Troubleshooting Example
  • STORAGE
    Overview
    Introduction To Storage
    Magnetic Storage: Characteristics
    Magnetic Storage: Standards
    Magnetic Storage: Performance
    Determining Magnetic Storage
    Electrical Storage – Characteristics
    Electrical Storage – Standards
    Determining Electrical Storage
    Optical Storage – Characteristics
    Optical Storage – Standards
    Determining Optical Storage
    Installing Storage Devices
    Configuring Storage
    Optimizing Storage
    Troubleshooting Storage
    MOTHERBOARDS
    Motherboard Form Factors
    Motherboard Connections
    Motherboard BIOS-UEFI Settings
    Troubleshooting Memory
    COOLING AND POWER
    Cooling Systems
    Power Supply Units
    Troubleshooting Cooling And Power Issues
    MEMORY
    CPUS
    CPUs – Features And Characteristics
    CPUs – Sockets And Types
    DISPLAY DEVICES
    Display Devices – Display Types
    Display Devices – Cables And Connections
    Display Devices – Features
    Troubleshooting Display Devices
    EXPANSION CARDS
    Expansion Cards
    COMPUTER CASES
    Computer Cases
    CUSTOM PCS
    Custom PCs
    PERIPHERALS
    Peripherals
    LAPTOPS AND MOBILE DEVICES
    Laptop Hardware And Features
    Troubleshooting Laptop Issues
    Mobile Devices – Types, Accessories And Ports
    Mobile Devices – Connectivity And App Support
    Mobiles Devices – Syncronization
    PRINTERS
    Printers: Print Processes And Maintenance
    Troubleshooting Printers
    VIRTUALIZATION & CLOUD
    Virtualization: Basics
    Virtualization: Requirements
    Cloud Computing: Models
    Cloud Computing: Features
    NETWORKING
    Network Services – Ports And Protocols
    Network Devices
    Wireless Standards
    Internet Connections
    Network Types
    Network Tools
  • NETWORKING CONCEPTS
    Overview
    Ports And Protocols
    Ports And Protocols Part 2
    OSI Model
    OSI Model Part 2
    Network Traffic Properties
    Network Traffic Properties Part 2
    Switching Technologies
    Routing Technologies
    Routing Technologies Part 2
    Network Performance Concepts
    IP Addressing
    IP Addressing Part 2
    IP Addressing Part 3
    IP Addressing Part 4
    Classless IPv4 Addressing
    Classless IPv4 Addressing Part 2
    Classless IPv4 Addressing Part 3
    Classless IPv4 Addressing Part 4
    IP Address Assignments
    IPv6 Addressing
    IPv6 Addressing Part 2
    Network Topologies
    Network Topologies Part 2
    Wireless Technologies
    Cloud Concepts
    Network Service Functions
    Network Service Functions Part 2
    Network Service Functions Part 3
    TCP/IP Model
    TCP/IP Model Part 2
    INFRASTRUCTURE
    Cabling Solutions-Copper
    Cabling Solutions-Copper Part 2
    Cabling Solutions-Copper Part 3
    Cabling Solutions-Fiber
    Cabling Solutions-Fiber Part 2
    Network Devices
    Advanced Networking Devices
    Advanced Networking Devices Part 2
    Virtualization And Network Storage
    Virtualization And Network Storage Part 2
    WAN Technologies
    WAN Technologies Part 2
    WAN Technologies Part 3
    NETWORK OPERATIONS
    Network Diagrams And Documentation
    Business Continuity And Disaster Recovery
    Business Continuity And Disaster Recovery Part 2
    Scanning, Monitoring And Patching
    Remote Access Methods
    Remote Access Methods Part 2
    Remote Access Methods Part 3
    Policies And Best Practices
    Policies And Best Practices Part 2
    NETWORK SECURITY
    Physical Security Devices
    Authentication And Access Control
    Authentication And Access Control Part 2
    Basic Wireless Network Security
    Common Networking Attacks
    Common Networking Attacks Part 2
    Network Device Hardening
    Network Device Hardening Part 2
    Common Mitigation Techniques
    Common Mitigation Techniques Part 2
    Common Mitigation Techniques Part 3
    NETWORK TROUBLESHOOTING AND TOOLS
    Network Troubleshooting Method
    Network Troubleshooting Tools
    Network Troubleshooting Tools Part 2
    Network Troubleshooting Tools Part 3
    Network Troubleshooting Tools Part 4
    Network Troubleshooting Tools Part 5
    Common Wired Network Issues
    Common Wireless Network Issues
    Common Network Service Issues
    Common Network Service Issues Part 2
    Common Network Service Issues Part 3
    SUBNETTING
    Subnetting Step-By-Step
    Subnetting Step-By-Step Part 2
    Subnetting Step-By-Step Part 3
    Subnetting Step-By-Step Part 4
    Subnetting Step-By-Step Part 5
    Subnetting Step-By-Step Part 6
    Subnetting Step-By-Step Part 7
    Subnetting Step-By-Step Part 8
    Subnetting Step-By-Step Part 9
    Subnetting Step-By-Step Part 10
  • NETWORKING CONCEPTS
    Overview
    Ports And Protocols
    OSI Model
    Network Traffic Properties
    Switching Technologies
    Routing Technologies
    Network Performance Concepts
    IPv4 Addressing
    IP Addressing Assignments
    IPv6 Addressing
    Network Topologies
    Wireless Technologies
    Cloud Concepts
    Network Service Functions
    TCP/IP Model
    INFRASTRUCTURE
    Cabling Solutions – Copper
    Cabling Solutions – Fiber
    Network Devices
    Virtualization And Network Storage
    WAN Technologies
    NETWORK OPERATIONS
    Network Diagrams And Documents
    Business Continuity And Disaster Recovery
    Policies And Best Practices
    Scanning, Monitoring And Patching
    Remote Access Methods
    NETWORK SECURITY
    Physical Security Devices
    Authentication And Access Control
    Basic Wireless Network Security
    Common Network Attacks
    Network Device Hardening
    Common Mitigation Techniques
    NETWORK TROUBLESHOOTING AND TOOLS
    Network Troubleshooting Method
    Network Troubleshooting Tools
    Network Troubleshooting Tools Part 2
    Common Network Issues
    Common Network Service Issues
    Common Network Service Issues Part 2
  • THREATS, ATTACKS AND VULNERABILITIES
    Overview
    Determining Types Of Malware
    Determining Types Of Malware Part 2
    Types Of Attacks
    Types Of Attacks Part 2
    Types Of Attacks Part 3
    Types Of Attacks Part 4
    Threat Vector Types And Attributes
    Penetration Testing Concepts
    Vulnerability Scanning Concepts
    Impact Of Various Vulnerabilities
    Impact Of Various Vulnerabilities Part 2
    TECHNOLOGIES AND TOOLS
    Hardware Software Organizational Security
    Hardware Software Organizational Security Part 2
    Hardware Software Organizational Security Part 3
    Hardware Software Organizational Security Part 4
    Security Posture Assessment
    Security Posture Assessment Part 2
    Security Posture Assessment Part 3
    Security Posture Assessment Part 4
    Troubleshoot Common Security Issues
    Troubleshoot Common Security Issues Part 2
    Analyze And Interpret Outputs
    Analyze And Interpret Outputs Part 2
    Deploy Mobile Security
    Implement Secure Protocols
    ARCHITECTURE AND DESIGN
    Best Practices And Secure Config Guides
    Secure Network Architecture Concepts
    Secure System Design
    Secure Staging Deployment Concepts
    Security Implications Of Embedded Systems
    Secure App Development And Deployment
    Cloud And Virtualization Concepts
    Cloud And Virtalization Concepts Part 2
    Resiliency And Automation To Reduce Risk
    Importance Of Physical Security
    Importance Of Physical Security Part 2
    IDENTITY AND ACCESS MANAGEMENT
    Identity And Access Management Concepts
    Identity And Access Services
    Identity And Access Management Controls
    Identity And Access Management Controls Part 2
    Account Management Practices
    Account Management Practices Part 2
    RISK MANAGEMENT
    Policies, Plans And Procedures
    Impact Business Analysis
    Risk Management Processes And Concepts
    Incident Response Procedures
    Basic Concepts Of Forensics
    Disaster Recovery And Business Continuity
    Disaster Recovery And Business Continuity Part 2
    Data Security And Privacy
    CRYPTOGRAPHY AND PKI
    Basic Concepts Of Cryptography
    Basic Concepts Of Cryptography Part 2
    Cryptography Algorithms Basics
    Cryptography Algorithms Basics Part 2
    Cryptography Algorithms Basics Part 3
    Wireless Security
    Public Key Infrastructure
    Public Key Infrastructure Part 2
    Public Key Infrastructure Part 3
    Public Key Infrastructure Part 4
  • THREATS, ATTACKS AND VULERABILITIES
    Overview
    Determining Types Of Malware
    Vulnerability Scanning And Pen Testing
    Impact Of Various Vulnerabilities
    TECHNOLOGIES AND TOOLS
    Supporting Organizational Security
    Supporting Organizational Security Part 2
    Security Posture Assessment
    Deploy Mobile Security
    Implement Secure Protocols
    ARCHITECTURE AND DESIGN
    Best Practices, Guides And Configuration
    Secure Network Architecture Concepts
    App Development And Deployment
    Cloud And Virtualization Concepts
    IDENTITY AND ACCESS MANAGEMENT
    Identity And Access Services
    IAM Controls
    Account Management Practices
    RISK MANANGEMENT
    Policies, Plans And Procedures
    Risk Management Processes And BIA
    IRP And Basic Forensics
    Disaster Recovery And Business Continuity
    Data Security And Privacy Practices
    CRYPTOGRAPHY AND PKI
    Cryptography Algorithms Basics
    Wireless Security
    Public Key Infrastructure
  • SUPPORTING IT GOVERNANCE AND RISK MANAGEMENT
    Overview
    So You Want To Setup A Lab
    Begin At The Beginning – Confidentiality
    Begin At The Beginning – Integrity
    Begin At The Beginning – Availability
    Governance And Risk Management: Overview
    Governance And Risk Management: Risk Vocabulary
    Governance And Risk Management: Risk Management
    Governance And Risk Management: Risk Analysis
    Assess Risks: What Is A Security Framework
    Assess Risks: ESA Framework Assessment Process
    Assess Risks: System Specific Risk Analysis
    Assess Risks: Risk Determination
    Assess Risks: Guidelines For Assessing Risk
    Risk Mitigation: What Is A Aggregate CIA Score
    Risk Mitigation: What Are The CVSS And CVE
    Risk Mitigation: Risk Responses
    Risk Management Documentation: Best Practices
    Risk Management Documentation: BCP
    Risk Management Documentation: What Is A BIA
    Risk Management Documentation: Downtime
    Risk Management Documentation: Documents
    I.T. Governance And Risk Management – Key Points
    LEVERAGING COLLABORATION TO SUPPORT SECURITY
    Collaboration: GRC And Controls
    Collaboration: What Is An SCA
    Collaboration: Solutions
    Leveraging Collaboration – Key Points
    USING RESEARCH AND ANALYSIS TO SECURE THE ENTERPRISE
    Research And Analysis: Industry Trends
    Research And Analysis: Artificial Intelligence
    Research And Analysis: Requirements For Contracts
    Analyze Scenarios To Secure The Enterprise
    Using Research And Analysis – Key Points
    INTEGRATING ADVANCED AUTHENTICATION AND AUTHORIZATION TECHNIQUES
    Authentication And Access Control
    Authentication Factors And Controls
    Authentication Types
    Centralized Remote Authentication Services
    Deep Dive: RADIUS
    Deep Dive: 802.1X
    What Is Authorization/OAuth2.0
    What Is XACML
    Trusts Models And Kerberos
    Trust Models And Kerberos Part 2
    Directory Services And LDAP
    Hands On: Establishing Peer Trusts
    Authentication And Authorization Review Questions
    Advanced Identity Concepts And Vocabulary
    Identity Federation Methods
    Advanced Identity Review Questions
    Authentication And Authorization: Key Points
    IMPLEMENTING CRYPTOGRAPHIC TECHNIQUES
    Encryption
    Hashing
    Digital Signatures
    Blockchain And Bitcoin
    Hands On: Configuring A Blockchain
    Public Key Infrastructure PKI – Design
    Public Key Infrastructure PKI – Concepts
    Cryptography Concepts
    Stream Vs. Block Ciphers
    Implement Cryptography
    Implementing Cryptographic Techniques – Key Points
    IMPLEMENTING SECURITY CONTROLS FOR HOSTS
    Host Concepts And Vocabulary
    Product Evaluation Models – TCSEC
    Product Evaluation Models – ITSEC
    Product Evaluation Models – Common Criteria
    What Is A Trusted OS
    Types Of Security Models
    Bell-LaPadula
    Biba
    Clark-Wilson And Others
    Access Control Concepts
    Role-Based Access Control (RBAC)
    Other Access Control Models
    Endpoint Security
    Host Review Questions
    Hardening Hosts Concepts And Vocabulary
    Peripherals
    Full Disk Encryption
    Hands-On: Hardening Windows Hosts, AppLocker
    Virtualization Concepts And Vocabulary
    Common VM Vulnerabilities
    Hands-On: Creating Securing VM Using Virtualbox
    Boot Loader Concepts And Vocabulary
    Hands-On: Protecting Boot Loaders
    Implementing Security Controls Hosts Key Points
    SECURITY CONTROLS FOR MOBILE DEVICES
    Mobile Deployment Models
    MDM Concepts And Vocabulary
    MDM Concepts And Vocabulary Part 2
    Storage
    Concepts And Vocabulary
    Concepts And Vocabulary Part 2
    Security Controls For Mobile Devices – Key Points
    IMPLEMENTING NETWORK SECURITY
    IDSs Vs IPSs Casp
    What Is A SIEM System
    Network Security Concepts And Vocabulary
    Hands-On Deploy Network Security Platform OPNsense
    SoC, BASs, ICS And SCADA
    Network-Enabled Devices Review Questions
    Remote Access And IPv6
    Network Authentication
    Network Topologies And SDN
    Optimizing Resource Placement
    Advanced Network Design Review Questions
    Network Security Controls Concepts Vocabulary
    VLANS And Network Data Flow
    DPI And HTTPS Inspection
    Network Device Configurations
    NAC And Alerting
    Hands On: Implementing Network Monitoring Ntopng
    Implementing Network Security – Key Points
    IMPLEMENTING SECURITY IN THE SYSTEMS AND SOFTWARE DEVELOPMENT LIFECYCLE
    What Is The Systems Development Life Cycle SDLC
    Development Methodologies
    What Are The SDLC Phases
    Security Requirements Traceability Matrix SRTM
    Common Software Development Approaches
    Common Software Development Methods
    What About Validation And Acceptance Testing
    SDLC Review Questions
    Secure Vs Insecure Direct Object References
    Error Exception Handling Try…Catch Statements
    What Is Privilege Escalation
    Overflows And Canaries
    Memory Leaks
    Races And Exhaustion
    What Is SQL Injection
    What Is Session…
    What Is A Cross-Site Scripting XSS Attack
    Cross-Site Request Forgery XSRF/CSRF Attack
    What About Clickjacking And Cookie Hijacking
    What Is Security By…
    Input Validation Fuzzing Application Sandboxing
    WS-Security DAM And Software Assurance Tech
    Implementing Security In The SDLC – Key Points
    INTEGRATING ASSETS IN A SECURE ENTERPRISE ARCHITECTURE
    Integrate Best Practices In Enterprise Security
    Technical Deployment Models: What Is A Model
    Technical Deployment Models: What Is Cloud
    Cloud Security Services In The Enterprise
    Secure Design: Vocabulary And Concepts
    Secure Design: Vocabulary And Concepts Part 2
    Secure Design: Review Questions
    Data Security: Owners, Processors And Sovereignty
    Data Security: Data Flow Security
    Data Security: Data Remanence
    Data Security: Provisioning And Deprovisioning
    Data Security: Review Questions
    Enterprise Applications: What Are They
    Enterprise Applications: Directory Svcs, DNS
    Enterprise Applications: Directory Svsc, DNS Pt.2
    Enterprise Applications: Hands On With DNS RRs
    DNSSEC, Zone Transfers And TSIGs
    DNSSEC, Zone Transfers And TSIG Part 2
    DNSSEC, Zone Transfers And TSIG Part 3
    Hands On With DNSSEC
    Enterprise Applications: Configuration Management
    Enterprise Applications: Review Questions
    Integrating Assets – Key Points
    CONDUCTING SECURITY ASSESSMENTS
    Security Assessments: Types
    Security Assessments: Application Code Review
    Going Deeper: Vulnerability Scanning
    Going Deeper: Testing Software
    Software Testing Types
    Software Testing Types Part 2
    Logs, Memory And Debugging
    Social Engineering
    OSINT, Self-Assessments And Teaming
    Security Assessments – Review Questions
    Vulnerability Scanner (Nikto)
    Port Scanner (Zenmap)
    Protocol Analyzer (Wireshark)
    Network Enumerator (Zenmap)
    Password Cracker (John The Ripper)
    Using A Fuzzer In Kali Linux
    HTTP Interceptor (Burp Suite)
    Exploitation Framework (Social-Engineer Toolkit)
    Log Analysis In Kali (Grep And Cut)
    OpenSCAP
    Reverse Engineering (Strace)
    Conducting Security Assessments – Key Points
    RESPONDING TO AND RECOVERING FROM INCIDENTS
    Concepts And Vocabulary
    Incident Response Facilitators
    Incident Response Facilitators Part 2
    E-Discovery
    Incident Response Review Questions
    What Is COOP
    CSIRTs And Common Tools
    Evidence Collection And Handling
    Types Of Evidence
    Five Rules Of Evidence 5 B’s
    Principles Of Criminalistics
    Investigation Process
    Forensic Analysis Of Compromised Systems
    What Is The Order Of Volatility
    Conducting Forensic Analysis With Autopsy
    Responding To Incidents – Key Points
  • THREAT MANAGEMENT
    Overview
    Reconnaissance: Tools
    Reconnaissance: Tools Part 2
    Reconnaissance: Tools Part 3
    Reconnaissance: Tools Part 4
    Reconnaissance: Techniques
    Reconnaissance: Techniques Part 2
    Reconnaissance: Techniques Part 3
    Reconnaissance: Techniques Part 4
    Data Correlation And Analytics
    Reconnaissance: Interpreting Results
    Countermeasures: Network Segmentation
    Countermeasures: Honeypots And Sinkholes
    Countermeasures: System Hardening And NAC
    Security Practices: Penetration Testing
    Security Practices: Reverse Engineering
    Security Practices: Training And Risk Evaluation
    VULNERABILITY MANAGEMENT
    Vulnerability Management Process
    Vulnerability Management: Scan Configuration
    Vulnerability Management CVSS
    Vulnerability Management: CVSS Part 2
    Vulnerability Management: Remediation
    Scan Results Verification
    Common Vulnerabilities
    Common Vulnerabilities Part 2
    Common Vulnerabilities Part 3
    Common Vulnerabilities Part 4
    Common Vulnerabilities Part 5
    CYBER INCIDENT RESPONSE
    Threat Classification
    Severity And Prioritization
    Forensics Toolkit
    Incident Response Plan
    Forensic Suites And Utilities
    Forensic Suites And Utilities Part 2
    Forensic Suites And Utilities Part 3
    Forensic Suites And Utilities Part 4
    CSIRT Roles And Communication
    Indicator Of Compromise: Network Symptoms
    Indicators Of Compromise: Host And App Symptoms
    Recovery And Post-Incident Response
    Recovery And Post-Incident Response Part 2
    SECURITY ARCHITECTURE AND TOOLSETS
    Cybersecurity Frameworks
    Cybersecurity Frameworks Part 2
    Policies, Controls And Procedures
    Policies, Controls And Procedures Part 2
    Identity And Access Managemnt
    Identity And Access Management Part 2
    Compensating Controls And Architecture
    Compensating Controls And Architecture Part 2
    Compensating Controls And Architecture Part 3
    Security Tools And Technologies
    Security Tools And Technologies Part 2
    Security Tools And Technologies Part 3
    Software Development Security
    Software Development Security Part 2
  • PLANNING AND SCOPING
    Overview
    Planning An Engagement
    Planning On Engagement Part 2
    Planning An Engagement Part 3
    Planning An Engagement Part 4
    Legal Concepts
    Scoping An Engagement
    Scoping An Engagement Part 2
    Compliance-Based Assessments
    INFORMATION GATHERING AND VULNERABILITY IDENTIFICATION
    Pentesting Tools: Use Cases
    Pentesting Tools: Use Cases Part 2
    Pentesting Tools: Scanners
    Pentesting Tools: Credential Testing
    Pentesting Tools: Credential Testing Part 2
    Pentesting Tools: Web Directory Enum
    Pentesting Tools: Debuggers
    Pentesting Tools: OSINT
    Pentesting Tools: Wireless
    Pentesting Tools: Web Proxies
    Pentesting Tools: Social Engineering
    Pentesting Tools: Remote Access
    Pentesting Tools: Networking
    Pentesting Tools: Misc
    Pentesting Tools: Mobile
    Nmap
    Common Pentest Objectives
    Analyze Scripts: Bash
    Analyze Scripts: Bash Part 2
    Analyze Scripts: Bash Part 3
    Analyze Scripts: Python
    Analyze Scripts: Python Part 2
    Analyze Scripts: Python Part 3
    Analyze Scripts: Ruby
    Analyze Scripts: Ruby Part 2
    Analyze Scripts: PowerShell
    Analyze Scripts: Powershell Part 2
    ATTACKS AND EXPLOITS
    Info Gathering Techniques
    Info Gathering Techniques Part 2
    Info Gathering Techniques Part 3
    Info Gathering Techniques Part 4
    Perform Vulnerability Scans
    Perform Vulnerability Scans Part 2
    Perform Vulnerability Scans Part 3
    Perform Vulnerability Scans Part 4
    Vulnerability Scan Results
    Exploration Preparation
    Exploration Preparation Part 2
    Weaknesses In Specialized Systems
    Weaknesses In Specialized Systems Part 2
    PENETRATION TESTING TOOLS
    Social Engineering
    Social Engineering Part 2
    Network Vulnerability: Name Resolution
    Network Vulnerability: SNMP, SMTP And FTP
    Network Vulnerability: Pass-The-Hash
    Network Vulnerabilities: MITM
    Network Vulnerability Denial Of Service
    Network Vulnerabilities: NAC Bypass, VLAN Hopping
    App Vulnerabilities Injection Attacks
    App Vulnerabilities Injection Attacks Part 2
    App Vulnerabilities: Injection Attacks Part 3
    App Vulnerabilities: File Inclusions
    App Vulnerabilities: File Inclusions Part 2
    App Vulnerabilities: XSS, CSRF, Clickjacking
    App Vulnerabilities: XSS, CSRF, Clickjacking Pt2
    App Vulnerabilities: Authentication, Authorization
    App Vulnerabilities: Insecure Coding
    App Vulnerabilities: Insecure Coding Part 2
    Wireless And RF Vulnerabilities
    Wireless And RF Vulnerabilities Part 2
    Host-Based Vulnerabilities
    Host Based Vulnerabilities Part 2
    Host Based Vulnerabilites Part 3
    Host-Based Vulnerabilities Part 4
    Host-Based Vulnerabilities Part 5
    Site Security
    Site Security Part 2
    Post-Exploitation
    Post-Exploitation Part 2
    REPORTING AND COMMUNICATION
    Reports
    Post Report Activities
    Vulnerability Mitigation Strategies
    Communication Importance
  • PROJECT BASICS
    Overview
    Comparing PK0-003 Vs PK0-004
    Explain Project Properties
    Understand Roles And Responsibilities
    Understand Roles And Responsibilities Part 2
    Distinguish Standard Project Phases Part 1
    Distinguish Standard Project Phases Part 2
    Distinguish Standard Project Phases Part 3
    Distinguish Standard Project Phases Part 4
    Identify Cost Control Basics
    Identify Team Organization Structures
    Execute And Develop A Project Schedule
    Execute And Develop A Project Schedule Part 2
    Execute And Develop A Project Schedule Part 3
    Identify Agile Methodology Basics
    Identify Agile Methodology Basics Part 2
    Explain Resource Management Roles
    Explain Resource Management Roles Part 2
    Explain Resource Management Roles Part 3
    Explain Resource Management Roles Part 4
    PROJECT CONSTRAINTS
    Predict Impact Of Constraints And Influences
    Predict Impact Of Contraints And Influences Part 2
    Explain Risk Strategies And Activities
    COMMUNICATION & CHANGE MANAGEMENT
    Use Appropriate Communication Methods
    Analyze Communication Factors
    Explain Communication Triggers
    Use Change Control Process
    Use Change Control Process Part 2
    Recognize Types Of Organizational Changes
    PROJECT TOOLS & DOCUMENTATION
    Compare Project Management Tools
    Compare Project Management Tools Part 2
    Compare Project Management Tools Part 3
    Analyze Project Documentation
    Identify Third Party Documents
  • SERVER ARCHITECTURE
    Overview
    Server Form Factors
    Server Components
    Server Components Part 2
    Power And Cooling
    Power And Cooling Part 2
    SERVER ADMINISTRATION
    Installing A Server OS
    Installing A Server OS Part 2
    Installing A Server OS Part 3
    Installing A Server OS Part 4
    Server Roles And Requirements
    Administering A Server
    Server Maintenance
    Server Maintenance Part 2
    Server Maintenance Part 3
    Server Maintenance Part 4
    Asset Management And Documentation
    Asset Management And Documentation Part 2
    Virtualization
    STORAGE
    Primary Storage Devices
    Configuring RAID
    Configuring RAID Part 2
    Storage Technologies
    Storage Capacity
    SECURITY
    Physical Security
    Server Hardening
    Network Security
    Network Security Part 2
    Secure Storage Disposal
    Logical Access Control
    Logical Access Control Part 2
    Environmental Controls
    Environmental Controls Part 2
    Environmental Controls Part 3
    NETWORKING
    IP Addressing And Services
    IP Addressing And Services Part 2
    Ports And Protocols
    Cable Management
    Cable Management Part 2
    DISASTER RECOVERY
    Disaster Recovery Principles
    Backup Techniques
    TROUBLESHOOTING
    Troubleshooting Methodologies
    Troubleshooting Hardware
    Troubleshooting Software
    Troubleshooting Software Part 2
    Troubleshooting Software Part 3
    Troubleshooting Networking
    Troubleshooting Networking Part 2
    Troubleshooting Networking Part 3
    Troubleshooting Storage
    Troubleshooting Security
    Troubleshooting Security Part 2
    Troubleshooting Security Part 3
  • CONFIGURATION AND DEPLOYMENT
    Overview
    Cloud Basics: Why And What
    Cloud Basics: Why And What Part 2
    Cloud Basics: Why And What Part 3
    Cloud Components: Interactions And Services
    Cloud Components: Interactions And Services Pt.2
    Cloud Deployment: Evaluate Readiness
    Cloud Deployment: Automation And Orchestration
    Cloud Deployment: Automation And Orchestration Pt2
    Cloud Deployment: Projectization
    SECURITY
    Cloud Project: Deployment Workflow
    Cloud Project: Deployment Workflow Part 2
    Cloud Project: Post Deployment Configuration
    Cloud Project: Post Deployment Configuration Pt2
    Cloud Project: Manage Changes
    MAINTENANCE
    Cloud Readiness: Quality Assurance
    Cloud Readiness: HA And LB
    Cloud Readiness: Deployment Load Testing
    MANAGEMENT
    Cloud Security: Security Infrastructure
    Cloud Security: Organizational Compliance
    Cloud Security: Virtual Networking Design
    Cloud Security: Virtual Networking Design Part 2
    Cloud Security: Network Security Options
    Cloud Security: Component Security
    Cloud Security: Component Security Part 2
    Cloud Security: Implement Security Technologies
    TROUBLESHOOTING
    Cloud Authorization: IAM Technologies
    Cloud Authorization: IAM Technologies Part 2
    Cloud Authorization: Account Mgmt Policies
    Cloud Authorization: Access Control
    Cloud Authorization: Account Provisioning
    CLOUD COMPUTE
    Cloud Compute: Compute CPUs
    Cloud Compute: Compute Memory
    Cloud Compute: Compute Storage
    Cloud Compute: Compute Storage Requirements
    Cloud Compute: Compute Storage Security
    CLOUD MIGRATION
    Cloud Migration: Deployment Types
    Cloud Migration: VMs And Containers
    Cloud Migration: Network, Storage And Data
    CLOUD SYSTEMS
    Cloud Systems: System Maintenance
    Cloud Systems: System Maintenance Automation
    CLOUD DATA PROTECTION
    Cloud Data Protection: Backup And Restore
    Cloud Data Protection: Backup And Restore Pt2
    Cloud Data Protection: Disaster Recovery Plans
    Cloud Data Protection: Business Continuity
    CLOUD SYSTEMS ANALYSIS
    Cloud Systems Analysis: Monitoring
    Cloud Systems Analysis: Monitoring Part 2
    Cloud Systems Analysis: Reporting
    CLOUD TROUBLESHOOTING
    Cloud Troubleshooting: Methodology
    Cloud Troubleshooting: Methodology Part 2
    Cloud Troubleshooting: Network Connectivity
    Cloud Troubleshooting: Network Connectivity Part 2
    Cloud Troubleshooting: Security Issues
  • PERFORMING BASIC LINUX TASKS
    Overview
    Introduction To Linux
    Linux Command Line
    MANAGING USERS AND GROUPS
    Super User Privileges
    Managing Users
    Managing Groups
    MANAGING PERMISSIONS AND OWNERSHIP
    Managing File Permissions
    Advanced Permissions
    MANAGING STORAGE
    Partitioning Disks
    Linux File System
    Logical Volume Manager (LVM)
    Filesystem Hierarchy Standard (FHS)
    MANAGING FILES AND DIRECTORIES
    Editing Files With Vi
    Editing Files With Vi Part 2
    Working With Files
    Locating Files
    Searching With Grep
    Manipulating Text
    MANAGING KERNEL MODULES
    Managing Kernal Modules
    MANAGING THE LINUX BOOT PROCESS
    Managing The Linux Boot Process
    MANAGING SYSTEM COMPONENTS
    Graphical User Interfaces
    Managing Services With Systemd
    Managing Services With SysVinit
    Troubleshooting Services
    Troubleshooting Services Part 2
    MANAGING DEVICES
    Configuring Hardware
    Supporting Printers
    MANAGING NETWORKING
    Understanding TCPIP
    Configure Networking
    Troubleshooting Network Connections
    MANAGING PACKAGES AND SOFTWARE
    Managing Software With Apt
    Managing Software With Yum/DNF
    Building From Source
    SECURING LINUX SYSTEMS
    Linux Security Best Practices
    Linux Security Best Practices Part 2
    Securing Apps With SELinux
    Securing Apps With AppArmor
    Filtering Traffic With Firewalld
    Filtering Traffic With Iptables
    Backup And Restore Data
    WORKING WITH BASH SCRIPTS
    Configuring Bash
    Writing A Bash Script
    AUTOMATING TASKS
    Scheduling Tasks
    Scheduling Tasks Part 2
    Version Control With Git
    INSTALLING LINUX
    Installing CentOS
    Installing CentOS Part 2
    Installing Ubuntu
  • GETTING STARTED WITH LINUX
    Getting Started With Linux
    Linux System Structure
    Working With The Command Line
    Understanding Shells
    Constructing Commands
    Command Substitution And History
    Command Paths
    File System Heirarchy
    File Specifics
    Creating Files
    Managing Files
    Archiving And Compressing Files
    Finding Files
    Managing Users And Groups
    Pipes And Redirection
    Working With Permissions
    Special Permissions
    Processing Text
    Intro To Debian
    Intro To RPM Package Management
    Configuring Name Resolution
    Editing Text
    Troubleshooting And Getting Help
  • COMPTIA CORE BLOCKCHAIN
    Why Blockchain Matters
    How We Work Today: The Internet Of Value
    Business Drivers And Disrupters
    Accelerating Trust: Cryptos And ICOs
    Using Blockchain In Your Business: Use Cases
    Blockchain And Cybersecurity
    How Blockchain Works
    Your Blockchain Project: DIY Tools
    Seven Steps To Success

MICROSOFT

  • UNDERSTANDING OPERATING SYSTEM CONFIGURATIONS
    Overview
    Configuring Control Panel
    Configuring Control Panel Part 2
    Configuring Control Panel Part 3
    Configuring Control Panel Part 4
    Configuring Desktop Settings
    Configuring Desktop Settings Part 2
    Configuring Native Applications And Tools
    Configuring Mobile Settings
    INSTALLING AND UPGRADING CLIENT SYSTEMS
    Identify Windows OS Editions
    Identify Installations And Architecture Types
    MANAGING APPLICATIONS
    Configuring Applications
    Configuring UAC And Antivirus
    Configuring UAC And Antivirus Part 2
    Configuring UAC And Antivirus Part 3
    MANAGING FILES AND FOLDERS
    Understanding File Systems
    Understanding Libraries
    MANAGING DEVICES
    Understanding Storage
    Understanding Storage Part 2
    Understanding Storage Part 3
    Understanding Storage Part 4
    Understanding Print Devices
    Understanding And Connecting Devices
    UNDERSTANDING OPERATING SYSTEM MAINTENANCE
    Understanding Backup And Recovery
    Understanding Backup And Recovery Part 2
    Understanding Backup And Recovery Part 3
    Maintenance And Management Tools
    Configuring Updates
    Configuring Updates Part 2
  • UNDERSTANDING NETWORK INFRASTRUCTURES
    Overview
    Understand The OSI Networking Model
    Understand The OSI Networking Model Part 2
    Understand The OSI Networking Model Part 3
    Understand Addressing: Binary
    Understand Addressing: MAC Address
    Understand Addressing: IPv4 Address
    Understand Addressing: IPv6 Address
    Understand Network Services
    Understand TCP/IP Tools
    UNDERSTANDING NETWORK HARDWARE
    Understand Switches: Hardware
    Understand Switches: Functionality
    Understand Routers: Functionality
    Understand Routers: Configure A Router
    Understand Network Media
    Understand Network Media Part 2
    Understand Network Media Part 3
    Understand Network Media Part 4
    UNDERSTANDING PROTOCOLS AND SERVICES
    Understand Technologies And Topologies
    Understand Technologies And Topologies Part 2
    Understand Technologies And Topologies Part 3
    Understand Infrastructure: LAN
    Understand Infrastructure: WAN
  • UNDERSTAND THE CLOUD
    Overview
    Cloud Principles And Delivery
    Cloud Principles And Delivery Part 2
    Cloud Security
    Cloud Security Part 2
    Using Cloud Services
    Cloud Updates And Availability
    ENABLE MICROSOFT CLOUD SERVICES
    Enable Cloud Services
    Enable Cloud Services Part 2
    Enable Cloud Services Part 3
    Enable Cloud Services Part 4
    ADMINISTER OFFICE 365 AND MICROSOFT INTUNE
    Administering Cloud Services
    Administering Cloud Services Part 2
    USE AND CONFIGURE MICROSOFT CLOUD SERVICES
    Configure Cloud Services
    Configure Cloud Services Part 2
    SUPPORT CLOUD USERS
    Support Cloud Users
    Support Cloud Users Part 2
    Support Cloud Users Part 3
    Support Exchange Online
    Support Exchange Online Part 2
    Support SharePoint Online
    Support Skype For Business
    Tools For Troubleshooting
  • DEPLOY WINDOWS
    Overview
    Configure Language Packs
    Migrate User Data
    Migrate User Data Part 2
    Perform A Clean Installation
    Perform An In-Place Upgrade
    Windows Editions And Activation
    Post-Installation Configuration
    MANAGE DEVICES AND DATA
    Manage Devices
    Manage Local Users And Groups
    Configure NTFS Permissions
    Configure NTFS Permissions Part 2
    Configure Shared Permissions
    Configure Shared Permissions Part 2
    Configure Devices Using Local Policies
    Configure Devices Using Local Policies Pt.2
    Manage Windows Security
    Manage Windows Security Part 2
    Manage Windows Security Part 3
    Manage Windows Security Part 4
    CONFIGURE CONNECTIVITY
    Configure Networking
    Configure Networking Part 2
    Configure Networking Part 3
    Configure Remote Connectivity
    Configure Remote Connectivity Part 2
    Configure Remote Connectivity Part 3
    MAINTAIN WINDOWS
    Perform File Recovery
    Recover Windows 10
    Recover Windows 10 Part 2
    Manage Updates
    Configure Event Logs
    Configure Event Logs Part 2
    Manage Performance
    Manage Performance Part 2
  • PLAN AND IMPLEMENT WINDOWS 10 BY USING DYNAMIC DEPLOYMENT
    Windows Dynamic Deployment
    Windows Dynamic Deployment Part 2
    Windows Autopilot
    Upgrade Windows 10
    Windows Analytics
    Windows Analytics Part 2
    Windows Analytics Part 3
    Migrate User Profiles
    Migrate User Profiles Part 2
    Manage Updates
    Manage Updates Part 2
    Manage Updates Part 3
    Manage Authentication Policies
    Manage Authentication Policies Part 2
    Manage Authentication Policies Part 3
    Manage Sign-On Options
    Manage Sign-On Options Part 2
    Perform Azure AD Join
    MANAGE POLICIES AND PROFILES
    Implement Co-Management
    Implement Co-Management Part 2
    Conditional Access
    Conditional Access Part 2
    Conditional Access Part 3
    Configure Device Profiles
    Configure Device Profiles Part 2
    Manage User Profiles
    Manage User Profiles Part 2
    Manage User Profiles Part 3
    MANAGE AND PROTECT DEVICES
    Windows Defender Application Guard
    Windows Defender Credential Guard
    Windows Defender Exploit Guard
    Windows Defender Exploit Guard Part 2
    Windows Defender Exploit Guard Part 3
    Windows Defender Application Control
    Windows Defender Application Control Part 2
    Windows Defender Antivirus
    Enable Device Enrollment
    Intune Terms And Conditions
    Intune Enrollment Restrictions
    Intune Device Categories
    Intune Corporate Identifiers
    Device Enrollment Manager
    Enroll Windows Devices
    Enroll Apple Devices
    Enroll Apple Devices Part 2
    Enroll Android Devices
    Device Inventory Reports
    Monitor Device Health
    Monitor Device Health Part 2
    MANAGE APPS AND DATA
    Deploy Microsoft Store Apps
    Deploy Google Play Store Apps
    Deploy Apple App Store Apps
    Microsoft Store For Business
    Deploy Office 365 ProPlus
    Deploy Office 365 ProPlus To MacOS
    Sideloading Apps
    Implement Assigned Access
    Configure IE Enterprise Mode
    Gather Office Readiness Data
    Implement And Manage MAM Policies
    Configure Windows Information Protection
    Configure Azure Information Protection
    Configure Azure Information Protection Part 2
    Configure Azure Information Protection Part 3
  • MANAGE AZURE SUBSCRIPTIONS AND RESOURCES
    Overview
    Manage Subscriptions
    Manage Subscriptions Part 2
    Manage Subscriptions Part 3
    Configure Diagnostic Setting On Resources
    Configure Diagnostic Settings On Resources Pt.2
    Working With Alerts
    Working With Alerts Part 2
    Working With Log Analytics
    Analyze Metrics Across Subscriptions
    Analyze Resource Utilization And Consumption
    Manage Resource Groups
    Manage Resource Groups Part 2
    Manage Resource Groups Part 3
    Role Based Access Control
    Role Based Access Control Part 2
    Custom Roles
    Troubleshooting RBAC And RBAC Policies
    IMPLEMENT AND MANAGE STORAGE
    Azure Storage Introduction
    Create And Configure Storage Accounts
    Azure Storage Replication
    Storage Access Options
    Storage Explorer
    Azure Data Box
    Azure Blob Storage
    Azure Blob Storage Part 2
    Configure CDN Endpoints
    Azure File Storage
    Create An Azure File Share
    Introduction To Azure File Sync
    Planning For Azure File Sync
    Configure Sync Service And Sync Agent
    Create And Configure Backup Policy
    Create Sync Groups And Endpoints
    Troubleshooting Azure File Sync
    Delete Storage Sync Services
    Introduction To Azure Backup
    Create Recovery Services Vault
    Perform Backup And Restoration Operations
    Configure And Review Backup Reports
    DEPLOY AND MANAGE VIRTUAL MACHINES (VMS)
    Create And Configure Azure VMs
    Create And Configure Azure VMs Part 2
    Configure High Availability
    Configure High Availability Part 2
    Deploy And Configure Scale Sets
    Deploy And Configure Scale Sets Part 2
    Understand ARM Templates
    Deploy Virtual Machines From ARM Templates
    Virtual Machines And VHD Templates
    Save A Deployment As An ARM Template
    Manage VM Sizes
    Move And Redeploy VMs
    Add Data Disks
    Add Network Interfaces
    DSC And Custom Script Extensions
    DSC And Custom Script Extensions Part 2
    Configure VM Backups
    Configure VM Backups Part 2
    Performing VM Restorations
    CONFIGURE AND MANAGE VIRTUAL NETWORKS
    Virtual Network Introduction
    Create An Azure Virtual Network
    Create And Configure VNET Peering
    Introduction To Virtual Network Gateways
    Create A Virtual Network Gateway
    Create And Configure VNET To VNET
    Network Routes
    Configure Azure DNS Zone: Public
    Configure Azure DNS Zone: Private
    Configure Azure DNS Zone: Private Part 2
    Introduction To Network Security Groups
    Introduction To Network Security Groups
    Create And Configure An NSG
    Create And Configure An NSG Part 2
    Evaluate Effective Security Rules
    Azure Load Balancers
    Create A Public Load Balancer
    Create Back-End Servers
    NSG Rules For Load Balancing
    Create A Back-End Address Pool
    Create A Health Probe
    Create A Load Balancer Rule
    Test The Pubic Load Balancer
    Configure Internal Load Balancer
    Create Internal Load Balancer Resources
    Troubleshoot Load Balancing
    Monitor On-Premises Connectivity
    Configure NPM
    Configure NPM Part 2
    Network Troubleshooting
    ExpressRoute
    Azure Gateways
    Configure A Site-To-Site VPN
    Configure A Site-To-Site VPN Part 2
    MANAGE IDENTITIES
    Add Custom Domains
    Configure Azure AD Identity Protection
    Configure Azure AD Identity Protection Part 2
    Configure Azure AD Join
    Configure Enterprise State Roaming
    Configure Self-Service Password Reset
    Implement Conditional Access Policies
    Manage Multiple Directories
    Perform An Access Review
    Azure AD Users
    Azure AD Groups
    Perform Bulk User Updates
    Azure AD Connect
    Azure AD Connect Sign-On Options
    Configure Multi-Factor Authentication
    Configure MFA Advanced Features
  • DESIGN AND IMPLEMENT MICROSOFT 365 SERVICES
    MS-100 Overview
    Evaluate Microsoft 365 For An Organization
    Plan And Create Microsoft 365 Tenant
    Configure Subscriptions
    Configure Tenant And Specialist Admin Roles
    Configure Additional Admin Roles
    Manage And Monitor Subscriptions
    Plan For Microsoft 365 On-Premises Infrastructure
    Plan Identity And Authentication Solution
    Identify Data For Migration
    Identify Users And Mailboxes For Migration
    Import PST Files
    Plan For On-Prem User And Group Migration
    Design Domain Name Configuration
    Configure Workloads For A New Domain
    Configure User Identities For A New Domain
    Manage Service Requests And Health Alerts
    Create Internal Service Health Response Plan
    Configure, Schedule And Review Reporting
    MANAGE USER IDENTITY AND ROLES
    Evaluate Identity Mgmt Requirements
    Evaluate Directory Synchronization Requirements
    Evaluate Authentication Requirements
    Design Directory Synchronization
    Implement Directory Synchronization
    Configure Directory Synchronization
    Monitor Azure AD Connect Health
    Manage Azure AD Connect Sync
    Implement Multi-Forest AD Connect Scenarios
    Plan Azure AD Identities
    Manage Azure AD Users And Groups
    Manage Azure AD Passwords
    Manage Product Licenses
    Perform Bulk Azure AD User Mgmt
    Plan For User And Security And Compliance Roles
    Manage Admin Rights And Roles
    Configure RBAC In Azure Active Directory
    Plan For PIM In Azure Active Directory
    Configure For PIM In Azure Active Directory
    MANAGE ACCESS AND AUTHENTICATION
    Design An Authentication Method For M365
    Configure Authentication In AzureAD
    Manage Authentication In AzureAD
    Design, Configure And Manage MFA For M365
    Configure Application Registration In Azure AD
    Plan For Azure AD Application Proxy
    Configure Azure AD Application Proxy
    Create B2B And Guest Accounts In M365
    Design Solutions For External Access
    PLAN OFFICE 365 WORKLOADS AND APPLICATIONS
    Identify Hybrid Req For Exchange
    Identify Hybrid Reqs For Other Workloads
    Plan Migration Strategy For Exchange
    Plan Migration Strategy For Other Workloads
    Manage And Plan For Office 365 ProPlus
    Plan For Deploying Office 365 ProPlus
  • IMPLEMENT MOBILE DEVICE MANAGEMENT (MDM)
    Overview
    So You Want To Build A Lab
    Plan For MDM – O365 Vs. Intune
    Plan For MDM Planning Infrastructure Requirements
    Configure MDM Integration With Azure AD – Overview
    Configure MDM Integration With Azure AD – SCCM
    Set An MDM Authority
    Set Device Enrollment Limit For Users
    MANAGE DEVICE COMPLIANCE
    Plan For Device Compliance
    Determine Use Cases For Device Compliance
    Design Conditional Access Policies
    Create Conditional Access Policies
    Configure Device Compliance Policy
    Manage Conditional Access Policies
    PLAN FOR DEVICES AND APPS
    Create And Configure Microsoft Store For Business
    Plan App Deployment
    Plan Device Co-Management
    Plan Device Monitoring
    Plan For Device Profiles
    Plan For Mobile Application Management
    Plan Mobile Device Security
    PLAN WINDOWS 10 DEPLOYMENT
    Plan For Windows As A Service (WaaS)
    Plan Win10 Ent. Deployment Method – Know
    Plan Win10 Ent. Deployment Method – Consider
    Plan Deployment Method – In-Place Upgrade SCCM
    Plan Deployment Method Modern Servicing Intune
    Plan Win10 Deployment Method Modern Servicing GPO
    Plan Deployment Method Modern Servicing SCCM
    Analyze Upgrade Readiness For Windows 10 – Know
    Analyze Upgrade Readiness For Windows 10 Do
    Evaluate Deploy Win10 Ent Security Features
    CONFIGURE CLOUD APP SECURITY (CAS)
    Cloud App Security Overview
    Configure Cloud App Security (CAS)
    Configure Cloud App Security (CAS) Policies
    Cloud App Security (CAS) Policies Activity Policy
    Cloud App Security – Anomaly Detection Policy
    Cloud App Security Policies App Discovery Policy
    Cloud App Security (CAS) Policies File Policy
    Cloud App Security (CAS) Policies OAuth App Policy
    Cloud App Security (CAS) Policies Session Policy
    Cloud App Security (CAS) Policies Access Policy
    Configure Connected Apps
    Manage Cloud App Security (CAS) Alerts
    Upload Cloud App Security (CAS) Traffic Logs
    IMPLEMENT THREAT MANAGEMENT
    Plan A Threat Management Solution
    Azure ATP Architecture, Components – Overview
    Azure ATP Architecture, Components – Prerequisites
    ATA Architecture And Components
    Design Azure Advanced Threat Protection Policies
    Design Microsoft 365 ATP Policies
    Configure Microsoft 365 ATP Policies
    Monitor Advanced Threat Analytics (ATA) Incidents
    IMPLEMENT WINDOWS DEFENDER ADVANCED THREAT PROTECTION (ATP)
    Plan Windows Defender ATP Solution
    Configure Preferences
    Implement Windows Defender ATP Policies
    Enable, Config Security Features, Windows 10 Ent
    MANAGE SECURITY REPORTS AND ALERTS
    Manage Service Assurance Dashboard
    Manage Azure AD Identity Protection
    Configure And Manage Microsoft 365 Security Alerts
    CONFIGURE DATA LOSS PREVENTION (DLP)
    What Is Data Loss Prevention, How Does It Work
    Configure DLP Policies – Overview
    Configure DLP Policies – PowerShell
    Configure DLP Policies – O365 Security Compliance
    Design Data Retention Policies In Microsoft 365
    Manage DLP Exceptions
    Monitor DLP Policy Matches
    Manage DLP Policy Matches
    IMPLEMENT AZURE INFORMATION PROTECTION (AIP)
    Plan AIP Solution
    Deploy On-Prem Rights Management Connector
    Plan For Windows Information Protection (WIP)
    Plan For Classification Labeling
    Information Rights Management (IRM) For Workloads
    Configure Super User
    Deploy AIP Clients
    Implement Azure Information Protection Policies
    Implement AIP Tenant Key
    MANAGE DATA GOVERNANCE
    Plan Information Retention Policies
    Configure Information Retention
    Plan For Microsoft 365 Backup
    Plan For Restoring Deleted Content
    MANAGE AUDITING
    Configuring Audit Logging
    Monitoring Unified Audit Logs
    MANAGE EDISCOVERY
    Search Content Security Compliance Center
    Search Content Security Compliance Center Roles
    Plan For In-Place And Legal Hold
    Configure EDiscovery
  • OVERVIEW OF MICROSOFT SQL SERVER 2012 (70-462)
    Intro To Microsoft SQL
    INSTALL AND CONFIGURE
    Install And Configure SQL
    MAINTAIN INSTANCES AND DATABASES
    Manage And Configure Databases
    Optimizing Database Files
    OPTIMIZE AND TROUBLESHOOT
    SQL Server Agent
    MANAGE DATA
    Backup And Restore Databases
    Import, Export, And Indexing Data
    IMPLEMENT SECURITY
    Implementing Security
    IMPLEMENT HIGH AVAILABILITY
    Clustering And Redundancy
    Monitoring SQL Server
  • CREATE DATABASE OBJECTS
    Overview
    SQL Server Basics
    SQL Server Basics Part 2
    SQL Querying Basics
    Create And Alter Tables
    Create And Alter Views
    Create And Alter Views Part 2
    Create And Alter Views Part 3
    Create And Modify Constraints
    Create And Modify Constraints Part 2
    Create And Alter DML Triggers
    WORK WITH DATA
    Basic SELECT Queries
    Basic SELECT Queries Part 2
    Query Using JOINS
    Query Using JOINS Part 2
    Implement Subqueries
    Implement Subqueries Part 2
    Implement Subqueries Part 3
    Implement Aggregate Queries
    Implement Aggregate Queries Part 2
    Implement Aggregate Queries Part 3
    Query Using Synonyms, Except And Intersect
    Understand Data Access Technologies
    Work With Conditions And Nulls
    Work With Table Constraints
    Query And Manage XML Data
    Query And Manage XML Data Part 2
    Implement Data Types
    Implement Data Types Part 2
    MODIFY DATA
    Create And Alter Stored Procedures
    INSERT, UPDATE And DELETE
    INSERT, UPDATE And DELETE Part 2
    Combine Datasets
    Work With Functions
    TROUBLESHOOT AND OPTIMIZE
    Optimize Queries
    Optimize Queries Part 2
    Optimize Queries Part 3
    Manage Transactions
    Evaluate Different Operations
    Implement Error Handling
  • EXCHANGE ONLINE SERVICE DESCRIPTION
    Overview
    Exchange Online Service Description
    EXCHANGE DEPLOYMENT OPTIONS
    Exchange Deployment Options
    Exchange Deployment Options Part 2
    THE EXCHANGE ADMIN CENTER
    The Exchange Admin Center Tour
    RECIPIENTS
    Creating Users, Mail Contacts, Mail Users
    Examining Users And Creating Groups
    Examining Resources And Sharing Mailboxes
    Setting Up PowerShell To Manage Exchange Online
    Control Access To PowerShell For Exchange Online
    PowerShell Basics For Managing Recipients
    PowerShell Basics For Managing Recipients Pt.2
    PowerShell Basics For Managing Recipients Pt.3
    ORGANIZATION
    Sharing And Add-Ins
    PUBLIC FOLDERS
    Public Folders
    MOBILE
    Exchange ActiveSync And Mailbox Policies
    Exchange ActiveSync And Mailbox Policies Pt.2
    Microsoft 365 Device Management With Intune
    Microsoft 365 Device Management With Intune Pt2
    Microsoft 365 Device Management With Intune Pt3
    ADDRESS BOOK POLICIES
    Deploying Address Book Policies Using PowerShell
    Deploying Address Book Policies W/ PowerShell Pt2
    PERMISSIONS
    Permissions In Exchange Online
    Permissions In Exchange Online Part 2
    Permissions In Exchange Online Part 3
    Permissions In Exchange Online Part 4
    ADVANCED THREATS
    Safe Attachments And Safe Links
    Safe Attachments And Safe Links Part 2
    Safe Attachments And Safe Links Part 3
    MAIL FLOW
    Rules
    Connectors
    Traces And Domains
    Traces And Domains Part 2
    Traces And Domains Part 3
    PROTECTION
    Malware Filter
    Spam Filter
    DKIM
    Quarantine And The Action Center
    COMPLIANCE MANAGEMENT
    Auditing
    Journal Rules
    Data Loss Prevention – EAC
    Data Loss Prevention – O365 Security
    Data Loss Prevention Document Fingerprinting
    Retention Tags And Policies
    Retention Tags And Policies Part 2
    In-Place EDiscovery And Hold
    In-Place EDiscovery And Hold Part 2
  • PROVISION OFFICE 365
    Overview
    Provision Office365 Tenants
    Provision Office365 Tenants Pt2
    Configure For New Features
    Add And Configure Custom Domain
    Add And Configure Custom Domain Part 2
    Pilot Users And Workloads
    Run Idfix
    Setup Email For Pilot User
    Engage Fasttrack Center For Office
    MANAGING USERS, GROUPS, AND LICENSES
    Enable Client Connectivity
    Administer Azure Rights Management
    Administer Azure Rights Management Pt2
    Administer Azure Rights Management Pt3
    Manage Office 365 Administrator Roles
    MANAGE CLOUD IDENTITIES
    Manage Passwords And Users
    Manage Passwords And Users Part 2
    Manage Passwords And Users Part 3
    Cloud Identities With PowerShell
    Azure Active Directory Cmdlets
    Azure Active Directory Cmdlets Part 2
    Create Security Groups
    MANAGE IDENTITIES WITH AZURE ACTIVE DIRECTORY CONNECT
    Prepare AD Synchronization To O365
    Prepare AD Synchronization To O365 Part 2
    Plan For Filtering Active Directory
    Plan For Filtering Active Directory Part 2
    Plan For Filtering Active Directory Part 3
    Set Up Azure AD Connect Tool
    Set Up Azure AD Connect Tool Part 2
    Set Up Azure AD Connect Tool Part 3
    Set Up Azure AD Connect Tool Part 4
    IMPLEMENT AND MANAGE FEDERATED IDENTITIES FOR SSO
    Plan AD FS Requirements
    Install And Manage AD FS Server
    Install Web Access Proxy
    Install Web Access Proxy Part 2
    Configure Web Access Proxy
    Customize ADFS Sign-In Page
    MONITOR AND TROUBLESHOOT OFFICE 365 AVAILABILITY AND USAGE
    Analyze Reports And Monitor Service Health
    Isolate Service Interruption
    Disabling AD Federation
    Disabling AD Federation Part 2
    Document And Email Protection
  • MANAGE CLIENTS AND END-USER DEVICES
    Overview
    Manage Clients Deployment
    Manage Clients Deployment Part 2
    Manage IT Office 365 Deployments
    Manage IT Office 365 Deployments Part 2
    Manage IT Office 365 Deployments Part 3
    Setup Telemetry And Reporting
    Setup Telemetry And Reporting Part 2
    Plan For Office Clients
    Plan For Office Clients Part 2
    Plan For Office Clients Part 3
    Create A Pilot Group For Testing Updates
    Create A Pilot Group For Testing Updates Part 2
    PROVISION SHAREPOINT ONLINE SITE COLLECTIONS
    Configure External SharePoint Users
    Configure External SharePoint Users Part 2
    Configure External SharePoint Users Part 3
    Create SharePoint Site Collection
    Plan A Collaboration Solution
    Plan A Collaboration Solution Part 2
    Plan A Collaboration Solution Part 3
    Plan A Collaboration Solution Part 4
    Plan A Collaboration Solution Part 5
    Configure EDiscovery
    Configure EDiscovery Part 2
    Configure EDiscovery Part 3
    Configure EDiscovery Part 4
    Configure EDiscovery Part 5
    CONFIGURE EXCHANGE ONLINE AND SKYPE FOR BUSINESS ONLINE FOR END USERS
    Configure Additional Email Addresses
    Configure Additional Email Addresses Part 2
    Configure Additional Email Addresses Part 3
    Configure Contacts And Resources
    Configure Contacts And Resources Part 2
    Configure Contacts And Resources Part 3
    Configure Personal Archive Policies
    Configure Personal Archive Policies Part 2
    Configure Skype End User Settings
    Configure Skype End User Settings Part 2
    Configure Skype End User Settings Part 3
    PLAN FOR EXCHANGE ONLINE AND SKYPE FOR BUSINESS ONLINE
    Anti-Malware And Anti-Spam Policies
    Anti-Malware And Anti-Spam Policies Part 2
    Mailbox Migration Strategy
    Mailbox Migration Strategy Part 2
    Plan For Exchange Online
    Plan For Exchange Online Part 2
    Manage Skype Global Settings
    Manage Skype Global Settings Addendum
    Manage Skype Global Settings Part 2
    Manage Skype Global Settings Part 3
    Configure Advanced Threat Protection
    Configure Advanced Threat Protection Part 2
    Customize Malware And Spam Protection
    Customize Connection Filters
    Customize Connection Filters Part 2
    Customize Content Filters
    Customize Content Filters Part 2
    Enable External Mail Flow Topologies
    Enable External Mail Flow Topologies Part 2
    ENABLING OFFICE 365 SERVICES
    Implement Microsoft Teams
    Implement Microsoft Teams Part 2
    Implement Microsoft Flow And PowerApps
    Implement Microsoft Flow And PowerApps Part 2
    Configure And Manage Microsoft StaffHub
    Configure Storage And Access Control
    Configure Storage And Access Control Part 2
    Configure Document Deletion Policies
    Manage And Migrate OneDrive For Business
    Manage And Migrate OneDrive For Business Part 2
    Configure EDiscovery And Advanced EDiscovery
    Configure Office 365 Security And Governance
    Configure Office 365 Security And Governance Pt.2
  • OVERVIEW OF MICROSOFT PROJECT 2013
    Microsoft Project
    INITIALIZE A PROJECT
    Create A New Project
    Calendars
    Custom Fields
    Settings Options
    CREATE A TASK-BASED SCHEDULE
    Set Up Project Information
    Creating Tasks
    Task Relationships
    Task Relationships Part 2
    Creating A Schedule
    Managing Multiple Projects
    MANAGE RESOURCES AND ASSIGNMENTS
    Resource Information
    Resource Assignments
    Team Planner
    Model Project Costs
    Model Material Resource Costs
    TRACK AND ANALYZE A PROJECT
    Setting Baselines
    Update Progress
    Baseline Variances
    Resolve Schedule Issues
    Display Critical Path
    COMMUNICATE PROJECT INFORMATION
    Applying Custom Views
    Sharing Project Data
    Reports And Dashboards
    Project Extensions
  • MICROSOFT DEPLOYMENT TOOLKIT
    In-Place Upgrade With MDT
  • INTRODUCTION TO MICROSOFT AZURE
    Overview
    Introduction To Microsoft Azure
    Introduction To Microsoft Azure Part 2
    Introduction To Microsoft Azure Part 3
    Introduction To Microsoft Azure Part 4
    Introduction To Microsoft Azure Part 5
    IMPLEMENT VIRTUAL NETWORKS
    Azure Virtual Network Overview
    Azure Virtual Network Overview Part 2
    Azure Virtual Network Overview Part 3
    Creating A VNet Part 2
    Creating A VNet
    Load Balancers
    Load Balancers Part 2
    Load Balancers Part 3
    Load Balancers Part 4
    Application Gateways
    Application Gateways Part 2
    Web Application Firewalls (WAF)
    Azure DNS
    User Defined Routes (UDR)
    User Defined Routes (UDR) Part 2
    User Defined Routes (UDR) Part 3
    Direct Server Return
    VNet Peering
    Configuration Management With Puppet
    Create Load Balancer And VNet In Azure CLI
    Create Load Balancer And VNet In Azure CLI Part 2
    VM CONFIGURATION
    Configure A VM With A Static Public IP
    Configure A VM With A Static Public IP Part 2
    Configure A VM With A Private IP
    VMs And Network Security Groups
    Virtual Machines And Application Gateways
    Virtual Machines And Application Gateways Part 2
    VPNS
    Point To Site VPN
    Point To Site VPN Part 2
    Site To Site VPN
    Forced Tunneling
    VNet-To-VNet VPN Gateway
    VNet-To-VNet VPN Gateway Part 2
    Configure ExpressRoute Connectivity
    CREATE AND MANAGE ARM VMS
    Identifying Worklods For Azure VMs
    Deploy And Run Workloads For Azure VMs
    Create And Connect To VMs
    Create And Connect To VMs Part 2
    Create And Connect To VMs Part 3
    Create And Connect To VMs Part 4
    Create And Connect To VMs Part 5
    Create And Connect To VMs Part 6
    Create And Connect To VMs Part 7
    Manage ARM VM Availability
    Manage ARM VM Availability Part 2
    Manage ARM VM Availability Part 3
    Plan Storage Capacity And Create VMs
    Plan Storage Capacity And Create VMs Part 2
    Plan Storage Capacity And Create VMs Part 3
    Disk Caching, Redundancy And Geo-Replication
    Disk Caching, Redundancy And Geo-Replication Pt.2
    Disk Caching, Redundancy And Geo-Replication Pt.3
    Shared Storage With Azure File Service
    Configure Azure File Share Snapshots
    Encrypt Disks
    Encrypt Disks Part 2
    Encrypt Disks Part 3
    Blob Level Tiering And Storage Encryption Keys
    Deploy Bring Your Own License (BYOL) Images
    Deploy Bring Your Own License (BYOL) Images Pt.2
    Create And Deploy ARM VM Scale Sets (VMSS)
    Create And Deploy ARM VM Scale Sets (VMSS) Pt.2
    Create And Deploy ARM VM Scale Sets (VMSS) Pt.3
    Perform Configuration Management
    Perform Configuration Management Part 2
    Perform Configuration Management Part 3
    Monitor ARM VMs
    Monitor ARM VMs Part 2
    Monitor ARM VMs Part 3
    Manage With Azure Container Services (ACS)
    Manage With Azure Container Services (ACS) Part 2
    Manage With Azure Container Services (ACS) Part 3
    Manage With Azure Container Services (ACS) Part 4
    Manage With Azure Container Services (ACS) Part 5
    Manage With Azure Container Services (ACS) Part 6
    Manage With Azure Container Services (ACS) Part 7
    Manage With Azure Container Services (ACS) Part 8
    DESIGN AND DEPLOY ARM TEMPLATES
    Implement ARM Templates
    Implement ARM Templates Part 2
    Implement ARM Templates Part 3
    Control Access
    Control Access Part 2
    Control Access Part 3
    Control Access Part 4
    Control Access Part 5
    Design Role-Based Access Control
    DESIGN AND IMPLEMENT A STORAGE STRATEGY
    Implement Storage Blobs And Files
    Implement Storage Blobs And Files Part 2
    Implement Storage Blobs And Files Part 3
    Implement Storage Blobs And Files Part 4
    Implement Storage Blobs And Files Part 5
    Implement Storage Blobs And Files Part 6
    Implement Storage Blobs And Files Part 7
    Diagnostics, Monitoring And Analytics
    Implement Azure StorSimple
    Implement Azure StorSimple Part 3
    Implement Azure StorSimple Part 2
    Implement Storage Encryption
    Implement Storage Encryption Part 2
    MANAGE AZURE SECURITY AND RECOVERY SERVICES
    Create And Import Encryption Keys With Key Vault
    Create And Import Encryption Keys With Key Vault 2
    Azure Security Center
    Manage Data Protection And Security Compliance
    Manage Data Protection And Security Compliance Pt2
    Implement Recovery Services
    Implement Recovery Services Part 2
    Implement Recovery Services Part 3
    Implement Recovery Services Part 4
    Implement Recovery Services Part 5
    Implement Recovery Services Part 6
    MANAGE AZURE OPERATIONS
    Enhance Cloud Management With Automation
    Enhance Cloud Management With Automation Part 2
    Enhance Cloud Management With Automation Part 3
    Enhance Cloud Management With Automation Part 4
    Enhance Cloud Management With Automation Part 5
    Enhance Cloud Management With Automation Part 6
    Enhance Cloud Management With Automation Part 7
    Enhance Cloud Management With Automation Part 8
    Working With Data In Cloud And On-Prem
    Working With Data In Cloud And On-Prem Part 2
    Working With Data In Cloud And On-Prem Part 3
    Working With Data In Cloud And On-Prem Part 4
    Working With Data In Cloud And On-Prem Part 5
    Working With Data In Cloud And On-Prem – ITSMC
    DESIGN AND IMPLEMENT AZURE APP SERVICE APPS
    Deploy And Configure Web Apps
    Deploy And Configure Web Apps Part 2
    Deploy And Configure Web Apps Part 3
    Define Deployment Slots
    Define And Use App Settings
    Web Apps And App Service Plans
    Web Apps And App Service Plans Part 2
    Web Apps And App Service Plans Part 3
    Select Appropriate Deployment Methods
    Authentication And Authorization For Web Apps
    When To Use App Service Environment
    When To Use App Service Environment Part 2
    Diagnostics, Monitoring And Analytics
    Diagnostics, Monitoring And Analytics Part 2
    Diagnostics, Monitoring And Analytics Part 3
    Diagnostics, Monitoring And Analytics Part 4
    Diagnostics, Monitoring And Analytics Part 5
    Diagnostics Monitoring And Analytics – OMS
    Configure Web Apps For Scale And Resilience
    Configure Web Apps For Scale And Resilience Pt.2
    MANAGE AZURE IDENTITIES
    Manage Azure Active Directory
    Manage Azure Active Directory Part 2
    Manage Azure Active Directory – AD Connect Tool
    Manage Azure Active Directory – AD Connect Tool 2
    Manage Azure Active Directory – AD Connect Tool 3
    Manage Azure Active Directory – AD Connect Tool 4
    Manage Azure Active Directory – ADDS
    Manage Azure Active Directory – ADDS 2
    Manage Azure Active Directory – Domain Join
    Manage Azure Active Directory – Graph API
    Manage Azure Active Directory – Linux Domain Join
    Manage Azure Active Directory – Password Reset
    Manage Azure Active Directory – AD B2B
    Manage Azure Active Directory – AD B2C
    Manage Azure Active Directory – AD B2C 2
    Manage Azure AD – Enterprise State Roaming
    Manage Azure AD – Managed Service Identity
    Manage Azure AD – Privileged Identity Management
    Manage Azure AD – Azure Identity Management
    Manage Azure AD – Azure Identity Management Pt.2
  • CLOUD DESIGN PATTERNS
    Overview
    Cloud Design Patterns – Availability
    Cloud Design Patterns – Availability Part 2
    Cloud Design Patterns – Data Management
    Cloud Design Patterns – Data Management Part 2
    Cloud Design Patterns – Data Management Part 3
    Cloud Design Patterns – Design And Implement
    Cloud Design Patterns – Design And Implement Pt2
    Cloud Design Patterns – Design And Implement Pt3
    Cloud Design Patterns – Design And Implement Pt4
    Cloud Design Patterns – Messaging
    Cloud Design Patterns – Messaging Part 2
    Cloud Design Patterns – Manage And Monitor
    Cloud Design Patterns – Perform And Scale
    Cloud Design Patterns – Resiliency
    Cloud Designs Patterns – Resiliency Part 2
    Cloud Design Patterns – Resiliency Part 3
    Cloud Design Patterns – Security
    DESIGN COMPUTE INFRASTRUCTURE
    Solutions Using VMs – Azure Batch And Batch AI
    Solutions Using VMs – Azure Batch And Batch AI Pt2
    Solutions Using VMs – Azure Batch And Batch AI Pt3
    Solutions Using VMs – Azure Batch And Batch AI Pt4
    Solutions Using VMs – Cloud Migration Strategy
    Solutions Using VMs – Cloud Migration Strategy Pt2
    Solutions Using VMs – Cloud Migration Strategy Pt3
    Solutions Using VMs – Backup And Site Recovery
    Solutions Using VMs – Backup And Site Recovery Pt2
    Solutions Using VMs – Backup And Site Recovery Pt3
    Solutions Using VMs – Backup And Site Recovery Pt4
    Solutions Using VMs – Backup And Site Recovery Pt5
    Solutions Using VMs – VM Scale Sets
    Solutions Using VMs – Availability Sets…
    Solutions Using VMs – Use Web App For Containers
    Solutions Using VMs – Using Reserved Instances
    Solutions Using VMs – Using Accelerated Networking
    Solutions Using VMs – Designing A DevTest Lab
    Solutions Using VMs – Designing A DevTest Lab Pt2
    Serverless Computing – Azure Container Instances
    Serverless Computing Azure Container Instances Pt2
    Serverless Computing – Azure Logic Apps
    Serverless Computing – Azure Logic Apps Pt2
    Serverless Computing – Azure Logic Apps Pt3
    Serverless Computing – API Management
    Serverless Computing – Event Driven Actions
    Serverless Computing – Event-Driven Actions Pt2
    Serverless Computing – Data Storage Solutions
    Serverless Computing – Event Grid And Bots
    Solutions Using Microservices – Container Based
    Solutions Using Microservices – Orchestration
    Solutions Using Microservices – ASF And API
    Solutions Using Microservices – ASF And API Pt2
    Solutions Using Microservices – Migrate Vs Deploy
    Create, Deploy An ASF Container Application
    Create, Deploy An ASF Container Application Pt2
    Create, Deploy An ASF Container Application Pt3
    Design Web Applications – App Service Web Apps
    Design Web Applications – App Service Web Apps 2
    Design Web Applications – Custom Web API
    Design Web Applications – Secure Web API
    Design Web Applications – Secure Web API Pt2
    Design Web Applicaitons – Scalability, Performance
    Design Web Applications – Multi-Region HA
    Design Web Applications – App Service Plans
    Design Web Applications – Business Continuity
    Design Web Applications – App Service Isolated
    Design Web Applications – API Apps
    Design Web Applications – Web Apps On Linux
    Design Web Applications – Use A CDN
    Design Web Applications – Azure Redis Cache
    Compute Intensive Applications
    Compute Intensive Applications Part 2
    Compute Intensive Applications Part 3
    Compute Intensive Applications Part 4
    Exam Resources
    DESIGN DATA IMPLEMENTATION
    Design For Azure Storage Solutions
    Design For Azure Storage Solutions Part 2
    Design For Azure Storage Solutions Part 3
    Design For Azure Storage Solutions Part 4
    Design For Azure Data Services
    Design For Azure Data Services Part 2
    Design For Azure Data Services Part 3
    Design For Azure Data Services Part 4
    Design For Azure Data Services Part 5
    Design For Azure Data Services Part 6
    Design For Relational Database Storage
    Design For Relational Database Storage Part 2
    Design For Relational Database Storage Part 3
    Design For Relational Database Storage Part 4
    Design For NoSQL Storage – Azure Redis Cache
    Design For NoSQL Storage – Azure Table Storage
    Design For NoSQL Storage – Azure Data Lake
    Design For NoSQL Storage – Azure Search
    Design For NoSQL Storage – Time Series Insights
    Design For NoSQL Storage – Recurring Jobs
    Design For CosmosDB Storage
    DESIGN NETWORKING IMPLEMENTATION
    Azure Virtual Networks – Networking Services
    Azure Virtual Networks – Networking Services Pt2
    Azure Virtual Networks – DNS, DHCP And IP
    Azure Virtual Networks – Load Balancing
    Azure Virtual Networks – Load Balancing Pt2
    Azure Virtual Networks – Load Balancing Pt3
    Azure Virtual Networks – Application Gateway
    Azure Virtual Networks – Application Gateway Pt2
    Azure Virtual Networks – VNet Service Endpoints
    Design External Connectivity
    Design External Connectivity Part 2
    Design External Connectivity Part 3
    Design External Connectivity Part 4
    Design External Connectivity Part 5
    Design External Connectivity Part 6
    Design Security Strategies
    Design Security Strategies Part 2
    Design Security Strategies Part 3
    Design Security Strategies Part 4
    Connectivity For Hybrid Applications
    Connectivity For Hybrid Applications Part 2
    Connectivity For Hybrid Application Part 3
    Connectivity For Hybrid Applications Part 4
    Connectivity For Hybrid Applications Part 5
    DESIGN SECURITY AND IDENTITY SOLUTIONS
    Design An Identity Solution
    Design An Identity Solution Part 2
    Design An Identity Solution Part 3
    Design An Identity Solution Part 4
    Design An Identity Solution Part 5
    Design An Identity Solution Part 6
    Design An Identity Solution Part 7
    Design An Identity Solution Part 8
    Secure Resources Using Identity Providers
    Secure Resources Using Identity Providers Part 2
    Secure Resources Using Identity Providers Part 3
    Design A Data Security Solution
    Design A Data Security Solution Part 2
    Design A Data Security Solution Part 3
    Design A Data Security Solution Part 4
    Design A Data Security Solution Part 5
    Design A Data Security Solution Part 6
    Design A Data Security Solution Part 7
    Design A Data Security Solution Part 8
    Design A Data Security Solution Part 9
    Design A Data Security Solution Part 10
    Design A Data Security Solution Part 11
    Design Governance And Policies For Resources
    Design Governance And Policies For Resources Pt.2
    Design Governance And Policies For Resources Pt.3
    Design Governance And Policies For Resources Pt.4
    Manage Security Risks
    Manage Security Risks Part 2
    Manage Security Risks Part 3
    Manage Security Risks – AD Identity Protection
    Manage Security Risks – Advanced Threat Detection
    Manage Security Risks – Endpoint Protection
    DESIGN SOLUTIONS USING PLATFORM SERVICES
    Artificial Intelligence Services
    Design For IoT
    Design For IoT Part 2
    Messaging Solution Architectures
    Media Service Solutions
    Media Service Solutions Part 2
    DESIGN FOR OPERATIONS
    Application Monitoring And Alerting Strategies
    Application Monitoring And Alerting Strategies Pt2
    Application Monitoring And Alerting Strategies Pt3
    Application Monitoring And Alerting Strategies Pt4
    Application Monitoring And Alerting Strategies Pt5
    Platform Monitoring And Alerting Strategies
    Platform Monitoring And Alerting Strategies Pt2
    Platform Monitoring And Alerting Strategies Pt3
    Platform Monitoring And Alerting Strategies Part 4
    Operations Automation Strategies
    Operations Automation Strategies Part 2
    Operations Automation Strategies Part 3
    Operations Automation Strategies Part 4
    Operations Automation Strategies Part 5
  • MICROSOFT DESKTOP OPTIMIZATION PACK
    Overview
    MBAM Components
    Preparing ADDS For MBAM
    Installing MBAM
    Deploying And Configuring MBAM
    Administering And Recovery
    Diagnostics And Recovery Toolset
    Diagnostics And Recovery Toolset Part 2
    Application Virtualization
    Application Virtualization Part 2
    User Experience Virtualization
    User Experience Virtualization Part 2
    User Experience Virtualization Part 3
  • INTRODUCTION
    Getting Started
    Basic Syntax And Help
    Basic Syntax And Help Part 2
    Command History And Aliases
    Command History And Aliases Part 2
    Piping And Formatting
    Piping And Formatting Part 2
    Script Execution Policy
    Script Execution Policy Part 2
    PowerShell Drives
    Profiles
    Profiles Part 2
    Basic Functions
    Basic Functions Part 2
    Module Basics
    Module Basics Part 2
  • VARIABLES
    Overview
    Working With Variables
    Working With Variables Part 2
    Arrays
    Hash Tables
    Arithmetic Operators
    Assignment Operators
    Comparison Operators
    Comparison Operators Part 2
    If Statements
    Switch Statements
    For Statements
    Foreach Statements
    Do Statements
    While Statements
    Writing A Script
    Writing A Script Part 2
    Writing Another Script
    Writing Another Script Part 2
    Writing Another Script Part 3
    Function Basics
    Function Basics Part 2
    Function Basics Part 3
  • WINDOWS AUTOPILOT
    Overview
    Requirements
    Scenarios And Capabilities
    Administering Windows Autopilot
    Administering Windows Autopilot Pt 2
  • WINDOWS HELLO FOR BUSINESS
    Concepts
    Planning The Deployment
    Preparing The Active Directory
    Preparing The PKI
    Preparing The PKI Part 2
    Preparing AD Federation Services
    Configuring AD FS And DRS
    Configuring The Registration Authority
    Configuring The Registration Authority Part 2
    Configuring The Registration Authority Part 3
    Prepare An Azure MFA Server
    Preparing The MFA User Portal
    Configuring The MFA Server
    Installing The User Portal
    Connecting The AD FS To The MFA Server
    Configuring Group Policy
    Deploying And Testing
  • SERVER FUNDAMENTALS
    Overview
    A Peek Into Windows
    A Peek Into Windows Part 2
    Introduction To Server Manager
    Get Started With PowerShell
    Get Started With PowerShell Part 2
    Adding Server Roles And Features
    NETWORKING COMPONENTS OF WINDOWS SERVER
    Networking Fundamentals
    Networking Fundamentals Part 2
    Managing A DHCP Server Role
    Managing A DHCP Server Role Part 2
    Managing Client Name Resolution
    Managing Client Name Resolution Part 2
    Managing The DNS Server Role
    Managing The DNS Server Role Part 2
    Working With DNS Zones
    Working With DNS Zones Part 2
    Troubleshooting Network Connections
    Troubleshooting Network Connections Part 2
    Troubleshooting Network Connections Part 3
    ACTIVE DIRECTORY DOMAIN SERVICES TASKS
    Active Directory Basic Administration
    Active Directory Basic Administration Part 2
    Create User Accounts
    Create User Accounts Part 2
    Managing User Accounts
    Manage AD Computer Accounts
    Managing AD Computer Accounts Part 2
    Managing Groups
    Managing Groups Part 2
    Working With Group Policy
    Working With Group Policy Part 2
    Securing Server With Group Policy
    Securing Server With Group Policy Part 2
    Securing Server With Group Policy Part 3
    SERVICES, STORAGE AND NTFS PERMISSIONS
    Managing Windows Services
    Managing Windows Services Part 2
    Working With Local Storage
    Working With Local Storage Part 2
    Working With Local Storage Part 3
    Managing NTFS Permissions
    Managing NTFS Permissions Part 2
    FILE SERVICES AND PRINT SERVICES
    Managing Shared Folders And Files
    Managing Shared Folders And Files Part 2
    Managing Print Services
    Managing Print Services Part 2

WINDOWS CONFIGURATION DESIGNER
Installing And Configuring WCD
Installing And Configuring WCD Part 2

  • MANAGE IDENTITY
    Overview
    Support Microsoft Store And Cloud Apps
    Support Microsoft Store And Cloud Apps Part 2
    Support Microsoft Store And Cloud Apps Part 3
    Support Microsoft Store And Cloud Apps Part 4
    Support Authentication And Authorization
    Support Authentication And Authorization Pt2
    Support Authentication And Authorization Pt3
    Support Authentication And Authorization Pt4
    Support Authentication And Authorization Pt5
    PLAN DESKTOP AND DEVICE DEPLOYMENT
    Migrate And Configure User Data
    Migrate And Configure User Data Part 2
    Migrate And Configure User Data Part 3
    Migrate And Configure User Data Part 4
    Configure Hyper-V
    Configure Hyper-V Part 2
    Configure Hyper-V Part 3
    Configure Hyper-V Part 4
    Configure Hyper-V Part 5
    Configure Hyper-V Part 6
    Configure Hyper-V Part 7
    Configure Mobility Options
    Configure Mobility Options Part 2
    Configure Mobility Options Part 3
    Configure Mobility Options Part 4
    Configure Mobile Device Security
    Configure Mobile Device Security Part 2
    PLAN AND IMPLEMENT A MICROSOFT INTUNE DEVICE MANAGEMENT SOLUTION
    Support Mobile Devices
    Support Mobile Devices Part 2
    Support Mobile Devices Part 3
    Support Mobile Devices Part 4
    Software Updates Using Microsoft Intune
    Manage Devices With Microsoft 365
    Configure Information Protection
    Configure Information Protection Part 2
    Configure Information Protection Part 3
    CONFIGURE NETWORKING
    Configure IP Settings
    Configure IP Settings Part 2
    Configure Network Settings
    Configure Network Security
    Configure Network Security Part 2
    Configure Network Security Part 3
    CONFIGURE STORAGE
    Support Data Storage
    Support Data Storage Part 2
    Support Data Security
    Support Data Security Part 2
    Support Data Security Part 3
    BitLocker And BitLocker To Go
    MANAGE DATA ACCESS AND PROTECTION
    Configure Shared Resources
    Configure Shared Resources Part 2
    Configure Shared Resources Part 3
    Configure Shared Resources Part 4
    Configure File And Folder Access
    Configure File And Folder Access Part 2
    Configure File And Folder Access Part 3
    Configure File And Folder Access Part 4
    Configure File Access Auditing
    Configure File Access Auditing Part 2
    MANAGE REMOTE ACCESS
    Configure Remote Connections
    Configure Remote Connections Part 2
    Configure Remote Connections Part 3
    Configure Remote Connections Part 4 2018
    Configure Remote Access
    Configure Remote Access Part 2
    Configure Mobility Options
    Configure Mobility Options Part 2
    Configure Mobility Options Part 3
    MANAGE APPS
    Deploy And Manage RemoteApp
    Deploy And Manage RemoteApp Part 2
    Support Desktop Apps
    Support Desktop Apps Part 2
    MANAGE UPDATES AND RECOVERY
    Configure System Recovery
    Configure System Recovery Part 2
    Configure System Recovery Part 3
    Configure File Recovery
    Configure And Manage Updates
  • IMPLEMENT WINDOWS
    Overview
    Preparing For Installation
    Preparing For Installation Part 2
    Preparing For Installation Part 3
    Install Windows
    Install Windows Part 2
    Install Windows Part 3
    Install Windows Part 4
    Install Windows Part 5
    Install Windows Part 6
    Configure Devices And Drivers
    Configure Devices And Drivers Part 2
    Customize The Desktop
    Customize The Desktop Part 2
    Action Center And Taskbar
    Action Center And Taskbar Part 2
    Accessibility Options And Cortana
    Internet Explorer And Edge
    Internet Explorer And Edge Part 2
    Configure Client Hyper-V
    Configure Client Hyper-V Part 2
    Configure Client Hyper-V Part 3
    Configure Client Hyper-V Part 4
    Configure Client Hyper-V Part 5
    Enterprise Implementations
    Enterprise Implementations Part 2
    Activation Options
    Activation Options Part 2
    CONFIGURE AND SUPPORT CORE SERVICES
    Configure Networking
    Configure Networking Part 2
    Configure Networking Part 3
    Configure Networking Part 4
    Configure Networking Part 5
    Configure Networking Part 6
    Configure Networking Part 7
    Configure Networking Part 8
    Network Troubleshooting
    Network Troubleshooting Part 2
    Network Troubleshooting Part 3
    Configure Disks And Volumes
    Configure Disks And Volumes Part 2
    Configure Disks And Volumes Part 3
    Configure Disks And Volumes Part 4
    Configure Disks And Volumes Part 5
    Configure Disks And Volumes Part 6
    Configure Storage Spaces
    Troubleshooting Storage
    Troubleshooting Storage Part 2
    Create And Configure VHDs
    Create And Configure VHDs Part 2
    Configure File System Permissions
    Configure File And Folder Sharing
    Configure File And Folder Sharing Part 2
    Configure OneDrive And Files On Demand
    Configure Apps
    Configure Apps Part 2
    Provision Packages
    Provision Packages Part 2
    Provision Packages Part 3
    Configure Remote Management
    Configure Remote Management Part 2
    Configure Remote Management Part 3
    MANAGE AND MAINTAIN WINDOWS
    Configure Updates
    Configure Updates Part 2
    Monitor Windows
    Monitor Windows: Performance/Resource Monitor
    Monitor Windows: Event Viewer
    Monitor Windows: Event Subscriptions
    Monitor Windows: Printers And Indexing
    Monitor Windows: Printers And Indexing Part 2
    Windows Defender Options
    System And Data Recovery
    System And Data Recovery Part 2
    System And Data Recovery Part 3
    Homegroups And Workgroups
    Domain Join Options
    Accounts And UAC
    Passport And Hello
    Credential And Device Guard
    Credential And Device Guard Part 2
    Device Registration And Health Attestation
    Configure Advanced Management Tools
    Configure Advanced Management Tools Pt.2
  • INSTALL AND CONFIGURE SERVERS
    Overview
    Planning A Server Installation
    Install And Configure Server With GUI
    Install And Configure Server Core
    Features And Roles
    Features And Roles Part 2
    Additional Installation Configurations
    Additional Installation Configurations Part 2
    Configuring Disks
    Configuring Disks Part 2
    Storage Spaces
    Storage Spaces Part 2
    Desired State Configuration
    Desired State Configuration Part 2
    Desired State Configuration Part 3
    NIC Teaming
    NIC Teaming Part 2
    CONFIGURE SERVER ROLES AND FEATURES
    Configure NTFS Permissions
    Configure NTFS Permissions Part 2
    Configure Share Permissions
    Configure Share Permissions Part 2
    Configure File And Share Access
    Configure File And Share Access Part 2
    Configure File And Share Access Part 3
    Configure File And Share Access Part 4
    Configure File And Share Access Part 5
    Configure File And Share Access Part 6
    Configure File And Share Access Part 7
    Configuring Printers
    Configuring Printers Part 2
    Configuring Printers Part 3
    Configure Servers For Remote Management
    Configure Servers For Remote Management Part 2
    Configure Servers For Remote Management Part 3
    CONFIGURE HYPER-V
    Understand, Create And Configure VMs
    Understand, Create And Configure VMs Part 2
    Understand, Create And Configure VM Part 3
    Configure Guest Integration Services
    Additional VM Configurations
    Additional VM Configurations Part 2
    Create And Configure VM Storage
    Working With VHDs In Powershell
    Additional Storage Configurations
    Hyper-V Networking
    Hyper-V Networking Part 2
    Hyper-V Networking Part 3
    Hyper-V Networking Part 4
    DEPLOY AND CONFIGURE CORE NETWORK SERVICES
    Deploy And Configure DHCP
    Deploy And Configure DHCP Part 2
    Deploy And Configure DHCP Part 3
    Deploy And Configure DHCP Part 4
    Install DNS
    Install DNS Part 2
    Install DNS Part 3
    Configure DNS
    Configure DNS Part 2
    Configure DNS Part 3
    IPv4 And IPv6 Interoperability
    IPv4 And IPv6 Interoperability Part 2
    Configure IPv4 And IPv6
    Configure IPv4 And IPv6 Part 2
    INSTALL AND ADMINISTER ACTIVE DIRECTORY
    Install Domain Controllers
    Install Domain Controllers Part 2
    Install Domain Controllers Part 3
    Install Domain Controllers Part 4
    Active Directory Users And Computers
    Active Directory Users And Computers Part 2
    Active Directory Users And Computers Part 3
    Create And Manage Groups And OUs
    Create And Manage Groups And OUs Part 2
    CREATE AND MANAGE GROUP POLICY
    Create Group Policy Objects (GPOs)
    Create Group Policy Objects (GPOs) Part 2
    Create Group Policy Objects (GPOs) Part 3
    Create Group Policy Objects (GPOs) Part 4
    Create Group Policy Objects (GPOs) Part 5
    Configure Security Policies
    Configure Security Policies Part 2
    Configure Application Restriction Policies
    Configure Application Restriction Policies Part 2
    Configure Windows Firewall
  • OVERVIEW OF MCSA WINDOWS SERVER 2012 R2 (70-411)
    Overview Of Windows Server 2012 R2
    DEPLOY, MANAGE, AND MAINTAIN SERVERS
    Deploy And Manage WDS
    Windows Deployment Services Part 2
    Configuring WSUS
    Configuring WSUS Part 2
    Monitoring Servers
    Driver Groups And Packages
    Patch Management In Mixed Environments
    Performance Monitor
    CONFIGURE FILE AND PRINT SERVICES
    Distributed File System
    File Server Resource Manager
    File Server Resource Manager Part 2
    File And Disk Encryption
    EFS And Audit Policies
    CONFIGURE NETWORK SERVICES AND ACCESS
    Configure DNS Zones
    Configure DNS Records
    Configure VPN And Routing
    Configuring DirectAccess
    CONFIGURE A NETWORK POLICY SERVER INFRASTRUCTURE
    NPS And NAP
    CONFIGURE AND MANAGE ACTIVE DIRECTORY
    Operation Master Roles
    Read Only Domain Controllers
    Configure Account Policies
    CONFIGURE AND MANAGE GROUP POLICY
    Group Policy Processing
    Group Policy Processing Part 2
    Group Policy Processing Part 3
    Group Policy Settings
    Group Policy Settings Part 2
    Group Policy Objects
    Group Policy Preferences
  • ADVANCED NETWORK SERVICES
    Overveiw
    Advanced Network Services
    Advanced Network Services Part 2
    Advanced Network Services Part 3
    Advanced Network Services Part 4
    Advanced Network Serivces Part 5
    Advanced Network Services Part 6
    Advanced Network Services Part 7
    Advanced Network Services Part 8
    Advanced Network Services Part 9
    Advanced Network Services Part 10
    ADVANCED FILE SERVICES
    Advanced File Services
    Advanced File Services Part 2
    Advanced File Services Part 3
    Advanced File Services Part 4
    Advanced File Services Part 5
    Advanced File Services Part 6
    IMPLEMENTING DYNAMIC ACCESS CONTROL
    Implementing Dynamic Access Control
    Implementing Dynamic Access Control Part 2
    Access Denied Assistance And Work Folders
    DISTRIBUTED AD DS DEPLOYMENTS
    Distributed AD DS Deployments
    Distributed AD DS Deployments Part 2
    Distributed AD DS Deployments Part 3
    AD DS SITES AND REPLICATION
    AD DS Sites And Replication
    AD DS Sites And Replication Part 2
    AD DS Sites And Replication Part 3
    AD DS Sites And Replication Part 4
    IMPLEMENTING AD CS
    Implementing AD CS
    Implementing AD CS Part 2
    Implementing AD CS Part 3
    Implementing AD CS Part 4
    Implementing AD CS Part 5
    Implementing AD CS Part 6
    IMPLEMENTING AD RMS
    Implementing AD RMS
    Implementing AD RMS Part 2
    Implementing AD RMS Part 3
    Implementing AD RMS Part 4
    Implementing AD RMS Part 5
    IMPLEMENTING AD FS
    Implementing AD FS
    Implementing AD FS Part 2
    Implementing AD FS Part 3
    Implementing AD FS Part 4
    Implementing AD FS Part 5
    Implementing AD FS Part 6
    Implementing AD FS Part 7
    IMPLEMENT NETWORK LOAD BALANCING
    Implement Network Load Balancing
    Implement Network Load Balancing Part 2
    Implement Network Load Balancing Part 3
    CONFIGURE FAILOVER CLUSTERING
    Configure Failover Clustering
    Configure Failover Clustering Part 2
    Configure Failover Clustering Part 3
    Configure Failover Clustering Part 4
    Configure Failover Clustering Part 5
    Manage Failover Clustering Role
    Manage Failover Clustering Role Part 2
    CONFIGURE AND MANAGE HIGH AVAILABILITY
    Manage VM Movement
    Manage VM Movement Part 2
    Manage VM Movement Part 3
    IMPLEMENT BC AND DR
    Implement BC And DR
    Implement BC And DR Part 2
    Implement BC And DR Part 3
    Configure Site-Level Fault Tolerance
    Configure Site-Level Fault Tolerance Part 2
  • INSTALL WINDOWS SERVERS IN HOST AND COMPUTE ENVIRONMENTS
    Overview
    Windows Server 2016 Editions
    Install With Desktop Experience
    Install And Manage Server Core
    Server Management Options
    Server Management Options Part 2
    Server Management Options Part 3
    Roles And Features
    Roles And Features Part 2
    Upgrade Servers
    Migrate Servers
    Migrate Servers Part 2
    Desired State Configuration
    Activation Models
    Activation Models Part 2
    Nano Server
    Nano Server Part 2
    Nano Server Part 3
    Nano Server Part 4
    Create, Manage And Maintain Images
    Create, Manage And Maintain Images Part 2
    Create, Manage And Maintain Images Part 3
    IMPLEMENT STORAGE SOLUTIONS
    Configure Disks And Volumes
    Configure Disks And Volumes Part 2
    File And Folder Permissions
    File And Folder Permissions Part 2
    Configure Shares
    Configure Shares Part 2
    Virtual Hard Disks
    Configure Storage Pools
    Configure Storage Pools Part 2
    Configure ISCSI Target And Initiator
    Configure ISCSI Target And Initiator Part 2
    Configure DCB And MPIO
    Configure Storage Replica
    Implement Data Deduplication
    IMPLEMENT HYPER-V
    Hyper-V
    Hyper-V Part 2
    Manage VMs With PowerShell Direct
    Configure VM Settings
    Configure VM Settings Part 2
    Configure VM Settings Part 3
    Linux And FreeBSD VMs
    Secure Boot And Network Isolation
    Implement Discrete Device Assignment
    Upgrading, Exporting And Importing VMs
    Configure Hyper-V Storage
    Configure Hyper-V Storage Part 2
    Create And Manage Checkpoints
    Configure Virtual Switches
    Configure Virtual NICs
    Configure Virtual NICs Part 2
    NIC Teaming
    IMPLEMENT WINDOWS CONTAINERS
    Introduction To Windows Containers
    Getting Started With Windows Containers
    Getting Started With Windows Containers Part 2
    Getting Started With Windows Containers Part 3
    Getting Started With Windows Containers Part 4
    Manage Windows Containers
    Manage Container Data Volumes
    Manage Container Networking
    Manage Container Images With Azure
    Manage Container Images With Azure Part 2
    IMPLEMENT HIGH AVAILABILITY
    High Availability Migration Options
    High Availability Migration Options Part 2
    Introduction To Failover Clustering
    Implement Failover Clustering
    Implement Failover Clustering Part 2
    Implement Scale-Out File Server
    Additional Cluster Storage Options
    Cluster-Aware Updating And OS Rolling Upgrades
    Implement Resiliency And Restoration
    Configure Cluster Networking
    Implement Storage Spaces Direct
    Manage Failover Clustering
    Manage VM Movement In Clustered Nodes
    Implement Network Load Balancing
    Implement Network Load Balancing Part 2
    MAINTAIN AND MONITOR SERVER ENVIRONMENTS
    Implement WSUS
    Implement WSUS Part 2
    Backup And Restore
    Backup And Restore Part 2
    Monitor Using Performance Monitor
    Monitor Using Performance Monitor Part 2
    Monitor Using Server Manager And WAC
    Monitor Using Event Viewer
  • IMPLEMENT DOMAIN NAME SYSTEM (DNS)
    Overview
    Install And Configure DNS Servers
    Install And Configure DNS Server Part 2
    Configure Advanced DNS Settings
    Configure Advanced DNS Settings Part 2
    Configure Advanced DNS Settings Part 3
    Administering DNS
    Create And Configure DNS Zones
    Create And Configure DNS Zones Part 2
    Create And Configure DNS Zones Part 3
    Create And Configure DNS Zones Part 4
    Create And Configure DNS Records
    Create And Configure DNS Records Part 2
    Create And Configure DNS Records Part 3
    Configure DNS Scopes
    Monitor DNS
    IMPLEMENT DHCP AND IPAM
    Install And Configure DHCP
    Install And Configure DHCP Part 2
    DHCP Scopes And Options
    DHCP Scopes And Options Part 2
    DHCP Scopes And Options Part 3
    DHCP Advanced Configuration
    DHCP Advanced Configuration Part 2
    DHCP Advanced Configuration Part 3
    DHCP Advanced Configuration Part 4
    Manage And Maintain DHCP
    Manage And Maintain DHCP Part 2
    Manage And Maintain DHCP Part 3
    IP Address Management (IPAM)
    IP Address Management (IPAM) Part 2
    IP Address Management (IPAM) Part 3
    IP Address Management (IPAM) Part 4
    Manage DNS And DHCP Using IPAM
    IMPLEMENT REMOTE ACCESS SOLUTIONS
    Network Connectivity Solutions
    Implement Virtual Private Networks
    Implement Virtual Private Networks Part 2
    Implement Virtual Private Networks Part 3
    Implement Virtual Private Networks Part 4
    Implement DirectAccess
    Implement DirectAccess Part 2
    Implement DirectAccess Part 3
    IMPLEMENT CORE AND DISTRIBUTED NETWORK SOLUTIONS
    IPv4 And IPv6 Addressing
    IPv4 And IPv6 Addressing Part 2
    IPv4 And IPv6 Addressing Part 3
    Implement Distributed File System (DFS)
    Implement Distributed File System (DFS) Pt2
    Implement Distributed File System (DFS) Pt3
    Implement BranchCache
    Implement BranchCache Part 2
    Implement BranchCache Part 3
    IMPLEMENT AN ADVANCED NETWORK INFRASTRUCTURE
    High Performance Network Solutions
    High Performance Network Solutions Part 2
    Software Defined Networking
    Software Defined Networking Part 2
  • INSTALL AND CONFIGURE ACTIVE DIRECTORY DOMAIN SERVICES
    Overview
    Install And Configure Domain Controllers
    Install And Configure Domain Controllers Part 2
    Install And Configure Domain Controllers Part 3
    Install And Configure Domain Controllers Part 4
    FSMO Roles
    Read-Only Domain Controllers
    Domain Controller Cloning
    Create And Manage AD Users And Computers
    Create And Manage AD Users And Computers Part 2
    Create And Manage AD Users And Computers Part 3
    Create And Manage AD User And Computers Part 4
    AD Groups And Organizational Units
    AD Groups And Organizational Units Part 2
    AD Groups And Organizational Units Part 3
    MANAGE AND MAINTAIN AD DS
    Service Authentication And Account Policies
    Service Authentication And Account Policies Part 2
    Service Authentication And Account Policies Part 3
    Service Authentication And Account Policies Part 4
    Maintain Active Directory
    Maintain Active Directory Part 2
    Maintain Active Directory Part 3
    Maintain Active Directory Part 4
    Maintain Active Directory Part 5
    AD Replication And RODCs
    AD Replication And RODCs Part 2
    AD Replication And RODC Part 3
    Configure A Complex AD Environment
    Configure A Complex AD Environment Part 2
    Active Directory Trusts
    Active Directory Trusts Part 2
    Active Directory Trusts Part 3
    Active Directory Sites
    Active Directory Sites Part 2
    Active Directory Sites Part 3
    CREATE AND MANAGE GROUP POLICY
    Create And Manage Group Policy Objects
    Create And Manage Group Policy Objects Part 2
    Create And Manage Group Policy Objects Part 3
    Create And Manage Group Policy Objects Part 4
    Configure Group Policy Processing
    Configure Group Policy Processing Part 2
    Configure Group Policy Processing Part 3
    Configure Group Policy Processing Part 4
    Configure Group Policy Settings
    Configure Group Policy Settings Part 2
    Configure Group Policy Settings Part 3
    Configure Group Policy Settings Part 4
    Configure Group Policy Preferences
    Configure Group Policy Preferences Part 2
    IMPLEMENT ACTIVE DIRECTORY CERTIFICATE SERVICES
    Install And Configure Certificate Services
    Install And Configure Certificate Services Part 2
    Install And Configure Certificate Services Part 3
    Install And Configure Certificate Services Part 4
    Install And Configure Certificate Services Part 5
    Manage Certificates
    Manage Certificates Part 2
    Manage Certificates Part 3
    Manage Certificates Part 4
    Manage Certificates Part 5
    IMPLEMENT IDENTITY FEDERATION AND ACCESS SOLUTIONS
    Install And Configure AD Federation Services
    Install And Configure AD Federation Services Pt.2
    Install And Configure AD Federation Services Pt.3
    Implement Web Application Proxy (WAP)
    Implement Web Application Proxy (WAP) Part 2
    Configure AD Rights Management Services
    Configure AD Rights Management Services Pt.2
    Configure AD Rights Management Services Pt.3
  • OVERVIEW FOR MCSE WINDOWS SERVER 2012 R2 (70-413)
    Overview Of MCSE Windows Server 2012 (70-413)
    PLAN AND DEPLOY A SERVER INFRASTRUCTURE
    Designing A Server Infrastructure
    Planning Server Deployments
    Server Migration And VM Roles
    Planning For Storage
    DESIGN AND IMPLEMENT NETWORK INFRASTRUCTURE SERVICES
    Network Infrastructure
    DESIGN AND IMPLEMENT NETWORK ACCESS SERVICES
    Planning Network Access
    Planning Network Access Part 2
    Planning Network Access Part 3
    DESIGN AND IMPLEMENT AN ACTIVE DIRECTORY INFRASTRUCTURE (LOGICAL)
    Planning For AD (Logical)
    Planning For AD (Logical) Part 2
    DESIGN AND IMPLEMENT AN ACTIVE DIRECTORY INFRASTRUCTURE (PHYSICAL)
    Planning For AD (Physical)
    Planning For AD (Physical) Part 2
  • OVERVIEW OF MCSE WINDOWS SERVER 2012 (70-414)
    Overview Of MCSE Windows Server 2012 (70-414)
    MANAGE AND MAINTAIN A SERVER INFRASTRUCTURE
    Manage And Maintain Server Infrastructure
    Design An Admin Model
    Design A Monitoring Strategy
    Automated Remediation
    PLAN AND IMPLEMENT A HIGHLY AVAILABLE ENTERPRISE INFRASTRUCTURE
    Highly Available Infrastructure
    Failover Clustering
    Failover Clustering Part 2
    HA With Network Services
    HA Storage Solutions
    BC And DR Solutions
    PLAN AND IMPLEMENT A SERVER VIRTUALIZATION INFRASTRUCTURE
    Virtualization Infrastructure
    Virtualization Hosts
    Plan And Implement VMs
    Virtualization Storage
    Virtual Machine Movement
    Plan Virtualization Networking
    Maintain VM Infrastructure
    DESIGN AND IMPLEMENT IDENTITY AND ACCESS SOLUTIONS
    Identity And Access Solutions
    Design A CA Infrastructure
    Design A CA Infrastructure Part 2
    Design A CA Infrastructure Part 3
    Design A CA Infrastructure Part 4
    Implement And Manage Certificates
    Implement And Manage Certificates Part 2
    Implement And Manage Certificates Part 3
    Implementing Federated Identity
    Implementing Federated Identity Part 2
    Implementing Federated Identity Part 3
    Implementing Federated Identity Part 4
    Implementing Federated Identity Part 5
    Dynamic Access Control
    Implementing Rights Management
    Implementing Rights Management Part 2
    Implementing Rights Management Part 3
    Implementing Rights Management Part 4
    Configuring AD-RMS
    Configuring AD-RMS Part 2
    Configuring AD-RMS Part 3
    Configuring AD-RMS Part 4
  • SECURITY OVERVIEW
    Overview
    Security Overview
    Security Overview Part 2
    Configure Disk And File Encryption – EFS
    Configure Disk And File Encryption – EFS Pt.2
    Configure Disk And File Encryption – Bitlocker
    Configure Disk And File Encryption – Bitlocker Pt2
    Configure Disk And File Encryption – BitLocker Pt3
    Configure Disk And File Encryption – BitLocker Pt4
    Configure Disk And File Encryption – BitLocker CSV
    Configure Disk And File Encryption: BitLocker VTPM
    Antimalware Protection W/ Windows Defender
    Antimalware Protection W/ Windows Defender Pt2
    Antimalware Protection W/ Windows Defender Pt3
    Antimalware Protection W/ Windows Defender Pt4
    Windows Defender, WSUS And Windows Update
    AppLocker
    Device Guard And Control Flow Guard
    Device Guard And Control Flow Guard Part 2
    Protect Credentials
    Protect Credentials Part 2
    Create Security Baselines
    Create Security Baselines Part 2
    SECURE A VIRTUALIZATION INFRASTRUCTURE
    Guarded Fabric – Host Guardian Service Overview
    Guarded Fabric – HGS Install And Configuration
    Guarded Fabric – HGS Install And Configuration Pt2
    Guarded Fabric – Admin Trusted Attestation
    Guarded Fabric – Admin Trusted Attestation Part 2
    Guarded Fabric – TPM Trusted Attestation
    Guarded Fabric – TPM Trusted Attestation Part 2
    Guarded Fabric – TPM Trusted Attestation Part 3
    Guarded Fabric – Troubleshooting Guarded Hosts
    Implement Shielded And Encryption-Supported VMs
    Troubleshoot Shielded And Encryption-Supported VMs
    SECURING NETWORK INFRASTRUCTURE
    What Is A Firewall
    Configuring The Windows Firewall – Basics
    Configuring The Windows Firewall – Basics Pt2
    Configuring The Windows Firewall – IPSec
    Configuring The Windows Firewall – IPSec Pt2
    Configuring The Windows Firewall – IPSec Pt3
    Configuring The Windows Firewall – Advanced
    Configuring The Windows Firewall – Advanced Pt2
    Configuring The Windows Firewall – Advanced Pt3
    Software Defined Datacenter Firewall – Overview
    Software Defined Datacenter Firewall – On Azure
    Software Defined Datacenter Firewall – With WAC
    Secure Network Traffic – DNS Cache Locking
    Secure Network Traffic – DNS Socket Pool
    Secure Network Traffic – DNSSEC
    Secure Network Traffic – DNSSEC Part 2
    Secure Network Traffic – DNS RRL And DANE
    Secure Network Traffic – MSFT Message Analyzer
    Secure Network Traffic – SMB Protocol Security
    MANAGE PRIVILEGED IDENTITIES
    Just In Time Administration – Overview
    Just In Time Administration – Demo Setup
    Just In Time Administration – Hands-On
    Just In Time Administration – Hands-On Part 2
    Implement Just Enough Administration
    Implement Just Enough Administration Pt.2
    Implement Just Enough Administration Pt.3
    Implement Just Enough Administration Pt.4
    Implement Just Enough Administration Pt.5
    Implement Just Enough Administration Pt.6
    Implement A PAWS Solution
    Implement User Rights Assignments
    Implement User Rights Assignments Part 2
    Implement User Rights Assignments Part 3
    Delegation Of Control Wizard
    Authentication Policies And Policy Silos
    Account Types And Security
    Remote Credential Guard
    Enhanced Security Administrative Environment
    Local Administrator Password Solution (LAPS)
    Local Administrator Password Solution (LAPS) Pt2
    Local Administrator Password Solution (LAPS) Pt3
    IMPLEMENT THREAT DETECTION SOLUTIONS
    Configure Advanced Audit Policies
    Configure Advanced Audit Policies Part 2
    Configure Advanced Audit Policies Part 3
    Microsoft Advanced Threat Analytics
    Microsoft Advanced Threat Analytics Part 2
    Microsoft Advanced Threat Analytics Part 3
    Determine Threat Detection Solutions Using OMS
    IMPLEMENT WORKLOAD-SPECIFIC SECURITY
    Secure Development And Workload Infrastructure
    Implement Secure File Services Infrastructure
    Implement Secure File Services Infrastructure Pt2
    Implement Secure File Services Infrastructure Pt3
    Implement Secure File Services Infrastructure Pt4
    Work Folders And File Access Auditing
    Implement Dynamic Access Control (DAC)
    Implement Dynamic Access Control (DAC) Pt2
    Implement Dynamic Access Control (DAC) Pt3
  • QUERYING DATA WITH T-SQL
    Overview
    Introduction To Transact-SQL
    Introduction To Transact-SQL Part 2
    Retrieving Data With SELECT
    Retrieving Data With SELECT Part 2
    Combining Results With JOIN
    Combining Results With JOIN Part 2
    Combining Results With JOIN Part 3
    MODIFYING DATA WITH T-SQL
    Adding Data With INSERT
    Changing Data With UPDATE
    Removing Data With DELETE
    Recording Changes With OUTPUT
    WORKING WITH FUNCTIONS
    Querying Data With Functions
    Querying Data With Functions Part 2
    Aggregating Data
    Performing Arithmetic
    Working With Dates
    System Functions
    WORKING WITH DATA TYPES
    Data Types
    Data Types Part 2
    Custom Data Types
    Converting Data Types
    Converting Data Types Part 2
    Conditions And Nulls
    PROGRAMMING DATABASES WITH T-SQL
    User Defined Functions
    Stored Procedures
    Creating Views
    Transactions
    Transactions Part 2
    Error Handling
    Error Handling Part 2
    ADVANCED TRANSACT-SQL
    Subqueries
    Subqueries Part 2
    Grouping Sets And Cubes
    Grouping Sets And Cubes Part 2
    Ranking Data With Window Functions
    Ranking Data With Window Functions Part 2
    Pivot And Unpivot Data
    Table Expressions And Apply
    WORKING WITH JSON AND XML
    Working With XML
    Working With JSON

CISCO

  • NETWORKING FUNDAMENTALS
    Overview
    Networking Components: Overview
    Networking Components: Routers And Switches
    Networking Components: NGFW And NGIPS
    Networking Components: Cisco DNA Center
    Networking Components: WLCs And Access Points
    Networking Components: Servers And Endpoints
    Networking Topology Architectures: Overview
    Network Topology Architectures: Data Center
    Networking Topology Architectures: WAN
    Networking Topology Architecture: Cloud
    Networking Topology Architectures: SOHO
    Layer 1: Interfaces And Cabling
    Layer 1: Interfaces And Cabling Part 2
    Layer 1: Interfaces And Cabling Part 3
    Identifying Layer 1 Issues
    Identifying Layer 1 Issues Part 2
    Networking Protocols
    Networking Protocols Part 2
    IP Addressing: Overview
    IP Addressing: IPv4 Basics
    IP Addressing: IPv4 Configuration
    IP Addressing: IPv4 Subnetting Review
    IP Addressing: IPv4 Subnetting Class C
    IP Address: IPv4 Subnetting Class B
    IP Addressing: IPv4 Subnetting Class A
    IP Addressing: VLSM
    IP Addressing: IPv6 Basics And Address Types
    IP Addressing: IPv6 Basics And Address Types Pt.2
    IP Addressing: IPv6 Configuration
    IP Addressing: Client OS
    Virtualization Fundamentals
    Virtualization Fundamentals Part 2
    NETWORK ACCESS
    Network Access Overview
    Cisco Switching: Basic Concepts
    Cisco Switching: VLAN Configurations
    Cisco Switch: VLAN Configurations Part 2
    Cisco Switching: Interswitch Connectivity
    Cisco Switching: Interswitch Connectivity Part 2
    Cisco Switching: L2 Discovery Protocols
    Cisco Switching: L2 Discovery Protocols Part 2
    Cisco Switching: L2 Etherchannel Configuration
    Cisco Switching: L2 Etherchannel Config Pt.2
    Cisco Switching: L3 Etherchannel Configuration
    Cisco Switching: Spanning Tree Protocol Basics
    Cisco Switching: STP Operations
    Cisco Switching: STP Configuring RPVSTplus
    Cisco Switching: STP Portfast And BPDUguard
    Cisco Wireless Basics
    Cisco Wireless Architecture
    Cisco WLAN Components
    Cisco WLC Configuration
    Cisco Wireless Management Access
    IP CONNECTIVITY
    IP Connectivity: Overview
    IP Connectivity: Routing Basics
    IP Connectivity: IPv4 Static Default, Net Routes
    IP Connectivity: IPv4 Static Host, Floating Routes
    IP Connectivity: IPv6 Static Default, Net Routes
    IP Connectivity: IPv6 Static Host, Floating Routes
    IP Connectivity: Dynamic Routing Basics
    IP Connectivity: Single Area OSPFv2
    IP Connectivity: Single Area OSPFv2 Part 2
    IP Connectivity: First Hop Redundancy Protocols
    IP Connectivity: First Hop Redundancy Proto Pt2
    IP SERVICES
    IP Services Overview
    IP Services: Configuring, Verifying NAT
    IP Services: Configuring, Verifying NAT Pt.2
    IP Services: Configuring NTP
    IP Services: DNS And DHCP
    IP Services: DNS And DHCP Part 2
    IP Services: Configuring SNMP
    IP Services: Understanding Syslog
    IP Services: Understanding PHB For QoS
    IP Services: Configuring SSH
    IP Services: Using FTP And TFTP
    SECURITY FUNDAMENTALS
    Security Fundamentals Overview
    Key Security Concepts
    Security Program Components
    Security Password Policy Components
    Intro To AAA Security
    Understanding VPN Types
    Configuring And Verifying Standard ACLs
    Configuring And Verifying Extended ACLs
    Configuring And Verifying Named ACLs
    Configuring Port Security-Static
    Configuring Port Security-Sticky
    Configuring DHCP Snooping And DAI
    AUTOMATION AND PROGRAMMABILITY
    Automation And Programmability Overview
    Intro To Network Programmability
    Intro To SDN Architectures
    Intro To API Concepts
    Intro To REST-Based APIs
    Intro To Cisco DNA Center
    Intro To Config Management Utilities
    Interpret JSON Encoded Data
  • NETWORK FUNDAMENTALS
    Overview
    What Is Networking?
    Understand And Apply The OSI Model
    Understand And Apply The OSI Model Part 2
    Understand And Apply The OSI Model Part 3
    Understand And Apply TCP/IP Model
    Compare And Contrast TCP And UDP
    Describe Enterprise Infrastructure Components
    Compare And Contrast Network Topologies
    Describe Enterprise Networking Architecture
    Select Appropriate Cabling
    Understand And Apply IPv4 Addressing
    Understand And Apply IPv4 Addressing Part 2
    Understand And Apply IPv4 Addressing Part 3
    Understand And Apply IPv4 Addressing Part 4
    Understand And Apply Subnetting
    Understand And Apply Subnetting Part 2
    Understand Class B Subnetting
    Understand Class B Subnetting Part 2
    Understand Class B Subnetting Part 3
    Identify IPv6 Addressing Scheme
    Identify IPv6 Addressing Scheme Part 2
    Identify IPv6 Addressing Scheme Part 3
    Perform Initial Device Configuration
    Perform Initial Device Configuration Part 2
    Perform Initial Device Configuration Part 3
    Configure IPv4 Addressing
    Configure IPv4 Addressing Part 2
    Configure IPv4 Addressing Part 3
    Configure IPv6 Addressing
    Configure IPv6 Addressing Part 2
    Apply Troubleshooting Methodologies
    Apply Troubleshooting Methodologies Part 2
    Apply Troubleshooting Methodologies Part 3
    Interact With Cisco Devices
    Interact With Cisco Devices Part 2
    LAN SWITCHING FUNDAMENTALS
    Describe And Verify Switching Concepts
    Describe And Verify Switching Concepts Part 2
    Describe And Verify Switching Concepts Part 3
    Interpret Ethernet Frame Format
    Interpret Ethernet Frame Format Part 2
    Troubleshoot Interfaces And Cables
    Troubleshoot Interfaces And Cables Part 2
    Configure And Verify VLANs
    Configure And Verify VLANs Part 2
    Configure And Verify VLANs Part 3
    Configure Multiple Switches
    Configure Multiple Switches Part 2
    Configure Multiple Switches Part 3
    Configure And Verify Layer 2 Protocols
    Configure And Verify Port Security
    Configure And Verify Port Security Part 2
    ROUTING FUNDAMENTALS
    Describe Routing Concepts
    Describe Routing Tables
    Describe Routing Tables Part 2
    Configure InterVLAN Routing
    Configure InterVLAN Routing Part 2
    Configure Static Routing IPv4
    Configure Static Routing IPv6
    Configure RIPv2 For IPv4
    Configure RIPv2 For IPv4 Part 2
    Configure RIPv2 For IPv4 Part 3
    INFRASTRUCTURE SERVICES
    Describe And Configure DNS On A Router
    Describe And Configure DNS On A Router Part 2
    Configure DHCP On A Router
    Configure DHCP On A Router Part 2
    Configure And Verify NTP
    Configure And Verify NTP Part 2
    Configure Standard Access Lists
    Configure Standard Access Lists Part 2
    Configure Standard Access Lists Part 3
    Configure Standard Access Lists Part 4
    Configure NAT
    Configure NAT Part 2
    Configure NAT Part 3
    INFRASTRUCTURE MAINTENANCE
    Implement Device Monitoring
    Configure Device Management
    Implement Initial Device Hardening
    Implement Initial Device Hardening Part 2
    Perform Device Management
    SUBNETTING
    Subnetting Practice
    Subnetting Practice Part 2
  • LAN SWITCHING TECHNOLOGIES
    Overview
    Configure VLANs
    Configure VLANs Part 2
    Configure Trunking
    Configure Trunking Part 2
    Configure Trunking Part 3
    Configure Trunking Part 4
    Understand And Configure STP
    Understand And Configure STP Part 2
    Understand And Configure STP Part 3
    Understand And Configure STP Part 4
    Understand And Configure STP Part 5
    Configure PortFast And BPDU Guard
    Configure Etherchannel
    Configure Etherchannel Part 2
    Configure Etherchannel Part 3
    Describe Switch Aggregation Benefits
    Describe Switch Threat And Mitigation
    ROUTING TECHNOLOGIES
    Configure InterVLAN Routing
    Configure InterVLAN Routing Part 2
    Compare And Contrast IGPs
    Compare And Contrast IGPs Part 2
    Compare And Contrast IGPs Part 3
    Configure Single Area OSPFv2
    Configure Single Area OSPF Part 2
    Configure Single Area OSPFv2 Part 3
    Configure Single Area OSPFv2 Part 4
    Configure Multiarea OSPFv2
    Configure Multiarea OSPFv2 Part 2
    Configure Multiarea OSPFv2 Part 3
    Configure Single-Area OSPFv3
    Configure Multiarea OSPFv3
    Understand EIGRP Concepts And Operations
    Understand EIGRP Concepts And Operations Part 2
    Understand EIGRP Concepts And Operations Part 3
    Configure EIGRP For IPv4 Ccna2018
    Configure EIGRP For IPv4 Part 2
    Configure EIGRP For IPv6
    WAN TECHNOLOGIES
    Configure PPP And MLPPP
    Configure PPP And MLPPP Part 2
    Configure Client-Side PPPoE
    Configure GRE Tunnel Connectivity
    Describe WAN Topology Options
    Describe WAN Access Connectivity
    Configure Single-Homed Branch – EBGP IPv4
    INFRASTRUCTURE SERVICES
    Configure Basic HSRP
    Describe Cloud Resource Impact On Enterprise
    Describe Basic QoS Concepts
    Configure Access-Lists For Filtering
    Configure Access-Lists For Filtering Part 2
    Use APIC-EM Path Trace
    INFRASTRUCTURE MAINTENANCE
    Configure SNMP For Device Monitoring
    Troubleshoot Connectivity With IP SLA
    Troubleshoot Problems With SPAN
    Describe Device Mgmt Using AAA
    Describe Network Programmability
    Troubleshoot End-To-End Connectivity
  • SECURITY CONCEPTS
    Overview
    Describe CIA Triad And SIEM Technology
    Describe CIA Triad And SIEM Technology Pt2
    Identify Common Security Terms
    Describe Common Network Attacks
    Describe Common Network Attacks Part 2
    Describe Common Network Attacks Part 3
    Identify Common Malware Types
    Classify Data Loss Vectors
    Describe Encryption Methods
    Describe Encryption Methods Part 2
    Describe Crypto Key Exchange
    Describe Crypto Key Exchange Part 2
    Describe Network Topologies
    Describe Network Topologies Part 2
    SECURE ACCESS
    Compare In-Band And Out-Of-Band Mgmt
    Configure And Verify Secure Mgmt
    Configure And Verify Secure Mgmt Part 2
    Secure Management Plane Access
    Secure Management Plane Access Part 2
    Configure And Verify SNMPv3
    Configure And Verify NTP Security
    Configure And Verify NTP Security Part 2
    Describe AAA Technologies
    Configure Access Using TACACSplus
    Configure Access Using TACACSplus Part 2
    Use SCP For File Transfer
    Explain AD Integration With AAA
    Describe Using Cisco ACS And ISE
    Identify 802.1x Components And Functions
    Describe BYOD Framework And MDM
    VPN
    Describe IPsec Protocols And Modes
    Describe VPN Implementations
    Setup Clientless SSL VPN Using ASDM
    Setup AnyConnect VPN Using ASDM
    Setup AnyConnect VPN Using ASDM Part 2
    Setup IPsec Site-To-Site VPN With PSK
    Setup IPsec Site-To-Site VPN With PSK Part 2
    SECURE ROUTING AND SWITCHING
    Secure CLI Access And IOS
    Secure CLI Access And IOS Part 2
    Setup OSPF Authentication With MD5
    Setup EIGRP Authentication With MD5
    Setup L2 Attack Mitigation
    Setup L2 Attack Mitigation Part 2
    Setup L2 Attack Mitigation Part 3
    Explain Control Plane Policing
    Setup PVLANs For L2 Security
    Describe Native VLAN Security Issues
    CISCO FIREWALL TECHNOLOGIES
    Describe Different Firewall Technologies
    Implement NAT On Cisco ASA 9.X
    Implement NAT On Cisco ASA 9.X Part 2
    Setup Zone Based Firewall: Zone To Zone
    Setup Zone Based Firewall: Self Zone
    Configure ASA: Access Management
    Configure ASA: Security Access Policies
    Configure ASA: Modular Policy Framework
    Describe Firewall Features
    IPS
    Describe IPS Deployment Considerations
    Configure Cisco IOS IPS
    Configure Cisco IOS IPS Part 2
    Configure IPS Policy On Cisco FMC
    CONTENT AND ENDPOINT SECURITY
    Describe Threat Mitigation For Email
    Describe Threat Mitigation For Web
    Describe Threat Mitigation For Endpoints
  • NETWORK CONCEPTS
    Overview
    Describe Network Models
    Describe Network Models Part 2
    Describe Network Models Part 3
    Describe Basic Networking Protocols
    Describe Basic Networking Protocols Part 2
    Describe Basic Networking Services
    Describe Basic Networking Services Part 2
    Describe Networking Devices Operations
    Describe Networking Devices Operations Part 2
    Describe Network Security Systems
    Describe Basic Network Addressing
    Describe Basic Network Addressing Part 2
    Describe VLANS And Data Visability
    Describe ACL Usage On Interfaces
    Describe ACL Usage On Interfaces Part 2
    Compare Different Filtering Methods
    Compare Packet Capture Methods
    Compare Packet Analysis Output
    Compare Packet Analysis Output Part 2
    Identify Traffic Loss From Packet Analysis
    SECURITY CONCEPTS
    Describe Defense In Depth Principles
    Define Security Concepts And Terms
    Define Security Concepts And Terms Part 2
    Understand Access Control Models
    Compare Security Admin Terms
    Describe Security Management Concepts
    CRYPTOGRAPHY
    Describe Crypto Algorithm Usage
    Describe Crypto Algorithm Usage Part 2
    Describe Digital Signature Creation
    Describe PKI Operations
    Describe Key Exchange Security
    Describe SSL TLS Components
    Describe SSL TLS Components Part 2
    Describe Hashing Algorithms
    Encryption Algorithms And Protocols
    Encryption Algorithms And Protocols Part 2
    HOST-BASE ANALYSIS
    Define Windows Terms
    Define Linux Terms
    Define Linux Terms Part 2
    Describe Endpoint Security Monitoring
    Interpret OS Log Data
    Interpret OS Log Data Part 2
    SECURITY MONITORING
    Identify Data Types
    Identify Data Types Part 2
    Identify Data Types Part 3
    Describe NSM Data
    Describe Monitoring Context
    Describe Monitoring Context Part 2
    Describe NGIPS Events
    Monitor Protocols
    Monitor Protocols Part 2
    ATTACK METHODS
    Describe Security Attack Concepts
    Describe Network And Web App Attacks
    Describe Network And Web App Attacks Part 2
    Describe Attacks And Evasion Methods
    Describe Attacks And Evasion Methods Part 2
  • ENDPOINT THREAT ANALYSIS AND COMPUTER FORENSICS
    Overview
    Read Analysis Reports
    Read Analysis Reports Part 2
    Read Analysis Reports Part 3
    Describe CVSS 3.0
    Describe CVSS 3.0 Part 2
    Describe CVSS 3.0 Part 3
    Understand Windows File Systems
    Understand Windows File Systems Part 2
    Understand Linux File Systems
    Identify Forensic Evidence
    Identify Forensic Evidence Part 2
    NETWORK INTRUSION ANALYSIS
    Interpret Basic Regular Expressions
    Interpret Basic Regular Expressions Part 2
    Describe Protocol Headers
    Describe Protocol Headers Part 2
    Describe Protocol Headers Part 3
    Describe IP Headers
    Describe IP Headers Part 2
    Describe IP Headers Part 3
    Describe ICMP Intrusion
    Describe ICMP Intrusion Part 2
    Describe ICMP Intrusion Part 3
    Describe ICMP Intrusion Part 4
    Describe Transport Layer Headers
    Describe Transport Layer Headers Part 2
    Describe Transport Layer Headers Part 3
    Describe HTTP Headers
    Describe HTTP Headers Part 2
    Describe HTTP Headers Part 3
    Identify Netflow V5 Records
    Identify Netflow V5 Records Part 2
    Examine Intrusion Events
    Intrusion Event Technologies
    Intrusion Event Technologies Part 2
    Intrusion Event Technologies Part 3
    Intrusion Impact Analysis
    Intrusion Impact Analysis Part 2
    INCIDENT RESPONSE
    Incident Response Elements
    Incident Response Elements Part 2
    Describe CSIRT Goals
    Identify Cybersec Elements And Frameworks
    DATA AND EVENT ANALYSIS
    Describe Data Normalization
    Describe 5 Tuple Correlation
    FirePower Management Console
    Compare And Contrast Analysis Methods
    INCIDENT HANDLING
    Classify And Categorize Intrusions
    Classify And Categorize Intrusions Part 2
    Classify And Categorize Intrusions Part 3
    Apply NIST.SP800-61 R2 To Events
    NIST SP800-86 Evidence Handling
    Apply VERIS Schema Categories
  • NETWORK PRINCIPLES
    Overview
    Cisco Express Forwarding
    General Network Challenges
    IP Operations
    IP Operations Part 2
    Explain TCP Operations
    Describe UDP Operations
    Understanding Network Changes
    LAYER 2 TECHNOLOGIES
    Point-To-Point Protocol (PPP)
    Point-To-Point Protocol (PPP) Part 2
    Explain Frame Relay Operations
    Explain Frame Relay Operations Part 2
    Explain Frame Relay Operations Part 3
    LAYER 3 TECHNOLOGIES
    IPv4 Addressing
    IPv4 Addressing Part 2
    IPv4 Addressing Part 3
    IPv4 Addressing Part 4
    IPv6 Addressing
    IPv6 Addressing Part 2
    IPv6 Addressing Part 3
    Static Routing
    Static Routing Part 2
    Default Routing
    Routing Protocol Types
    Routing Protocol Types Part 2
    Administrative Distance
    Administrative Distance
    Passive Interfaces
    VRF Lite
    VRF Lite Part 2
    Filtering Routes
    Filtering Routes Part 2
    Filtering Routes Part 3
    Route Redistribution
    Route Redistribution Part 2
    Route Redistribution Part 3
    Route Summarization
    Route Summarization Part 2
    Route Summarization Part 3
    Policy Based Routing
    Route Maps
    Loop Prevention
    Loop Prevention Part 2
    Loop Prevention Part 3
    RIPv2 Configuration
    Describe RIPng
    EIGRP Fundamentals
    EIGRP Packet Types
    EIGRP Neighbors
    EIGRP Neighbors Part 2
    EIGRP Authentication
    EIGRP Stubs
    EIGRP Stubs Part 2
    EIGRP Load Balancing
    EIGRP Metrics
    EIGRP Over IPv6
    OSPF Packet Types
    Basic OSPF Configuration
    Basic OSPF Configuration Part 2
    OSPF Network Types
    OSPF LSA Types
    OSPF Route Types
    OSPF Area Types
    OSPF Area Types Part 2
    OSPF Virtual Links
    Manipulating OSPF Paths
    IPv6 Routing With OSPF
    Introduction To BGP
    Configuring BGP
    Configuring BGP Part 2
    Configuring BGP Part 3
    Configuring BGP Part 4
    BGP Attributes
    BGP Attributes Part 2
    VPN TECHNOLOGIES
    GRE Tunnels
    GRE Tunnels Part 2
    Describe DMVPN
    Easy Virtual Networking
    IPsec Tunnels
    INFRASTRUCTURE SECURITY
    AAA Configuration
    Device Access Control
    Device Access Control Part 2
    Router Security Features
    Router Security Features Part 2
    INFRASTRUCTURE SERVICES
    Device Management
    Device Management Part 2
    SNMPv2 And SNMPv3
    Configure And Verify NTP
    Debugging And Logging
    Debugging And Logging
    Debugging And Logging Part 2
    Debugging And Logging Part 2
    Configure And Verify DHCP
    Configure And Verify DHCP Part 2
    Configure And Verify DHCP Part 3
    Network Address Translation
    Network Address Translation Part 2
    Configuring IP SLAs
    Tracking Objects
    Netflow
  • LAYER 2 TECHNOLOGIES
    Overview
    Switch Administration
    Switch Administration Part 2
    Layer 2 Protocols
    VLANs: Fundamentals
    VLANs: VLAN Types
    Trunking: Dynamic Trunking Protocol
    Trunking: Dot1q And ISL
    Trunking: VTP Fundamentals
    Trunking: VTP Versions
    Trunking: VTP Pruning
    Trunking: VTP Pruning Part 2
    EtherChannel Fundamentals
    EtherChannel Protocol
    EtherChannel Advanced Config
    STP And PVST
    STP And PVST Part 2
    STP And PVST Part 3
    RSTP And RPVST
    Multiple Spanning Tree
    Cisco STP Enhancements
    Cisco STP Enhancements Part 2
    SPAN And RSPAN
    Clustering With StackWise
    INFRASTRUCTURE SECURITY
    Switch Security: L2 Attacks
    Switch Security: Port Security
    Switch Security: DHCP Snooping
    Switch Security: IPSG And DAI
    Switch Security: VLAN ACLs
    Switch Security: Private VLANs
    Switch Security: Storm Control
    Port-Based Authentication
    INFRASTRUCTURE SERVICES
    Layer 3 Switching
    Layer 3 Switching Part 2
    Hot Standby Router Protocol (HSRP)
    Hot Standby Router Protocol (HSRP) Part 2
    Virtual Router Redundancy Protocol (VRRP)
    Gateway Load Balancing Protocol (GLBP)
  • INTRODUCTION
    Overview
    Troubleshooting Methodology
    Manipulating Command Output
    Debug Logging
    Path Verification
    Response Automation
    Backing Up Data
    Viewing Network Traffic
    Reporting And Monitoring
    Troubleshooting Example
    LAYER 2 ISSUES
    Layer 2 Example #1
    Layer 2 Example #2
    Layer 2 Example #3
    Layer 2 Example #4
    Layer 2 Example #5
    Layer 2 Example #6
    Layer 2 Example #7
    Layer 2 Example #8
    Layer 2 Example #9
    Layer 2 Example #10
    Layer 2 Example #11
    Layer 2 Example #12
    Layer 2 Example #13
    Layer 2 Example #14
    ETHERCHANNEL ISSUES
    EtherChannel Example #1
    EtherChannel Example #2
    SPANNING TREE ISSUES
    Spanning Tree Example #1
    Spanning Tree Example #2
    FIRST HOP REDUNDANCY ISSUES
    HSRP Example #1
    HSRP Example #2
    HSRP Example #3
    HSRP Example #4
    VRRP Example #1
    GENERAL LAYER 3 ISSUES
    Layer 3 Example #1
    Layer 3 Example #2
    Layer 3 Example #3
    Layer 3 Example #4
    Layer 3 Example #5
    GENERAL ROUTING ISSUES
    Routing Example #1
    Routing Example #2
    Routing Example #3
    Routing Example #4
    OSPF ISSUES
    OSPF Example #1
    OSPF Example #2
    OSPF Example #3
    OSPF Example #4
    OSPF Example #5
    OSPF Example #6
    OSPF Example #7
    OSPF Example #8
    OSPF Example #9
    OSPF Example #10
    EIGRP ISSUES
    EIGRP Example #1
    EIGRP Example #2
    EIGRP Example #3
    EIGRP Example #4
    EIGRP Example #5
    EIGRP Example #6
    EIGRP Example #7
    EIGRP Example #8
    EIGRP Example #9
    EIGRP Example #10
    EIGRP Example #11
    EIGRP IPv6 Example #1
    EIGRP IPv6 Example #2
    EIGRP IPv6 Example #3
    BGP ISSUES
    BGP Example #1
    BGP Example #2
    BGP Example #3
    BGP Example #4
    BGP Example #5
    BGP Example #6
    BGP Example #7
    BGP IPv6 Example #1
    BGP IPv6 Example #2
    BGP IPv6 Example #3
    MISCELLANEOUS ISSUES
    Miscellaneous Example #1
    Miscellaneous Example #2
    Miscellaneous Example #3
    Miscellaneous Example #4
  • HARDENING IOS DEVICES
    Overview
    Initial IOS Configuration
    Initial IOS Configuration Part 2
    IOS Role Based Access Control
    CONFIGURING AN IOS FIREWALL
    IOS Zone Based Firewalls
    IOS Zone Based Firewalls Part 2
    Special Zones
    HARDENING ASA DEVICES
    Initial ASA Configuration
    Initial ASA Configuration Part 2
    ASA Role Based Access Control
    CONFIGURING AN ASA FIREWALL
    Configuring Twice NAT
    Network Object Translation
    ASA Firewall ACLs
    ASA Firewall ACLs Part 2
    Supporting IPv6
    ASA ADVANCED FEATURES
    Traffic Inspection
    Transparent Firewalls
    Security Contexts
    High Availability
    IMPLEMENT LAYER 2 SECURITY
    DHCP Snooping
    IP Source Guard
    Private VLANs
    Storm Control
    Port Security
    MONITORING SECURITY
    Monitoring Traffic With NetFlow
    Monitoring Devices With SNMPv3
    Centralized Logging With Syslog
    Centralized Device Management
  • CLOUD CHARACTERISTICS AND MODELS
    Overview
    Cloud Characteristics: Introduction
    Cloud Characteristics: 5 Characteristics
    Cloud Service Models: Service Vs. Cloud Providers
    Cloud Service Models: IaaS
    Cloud Service Models: PaaS
    Cloud Service Models: SaaS
    CLOUD DEPLOYMENT
    Cloud Deployment Models: Public Cloud
    Cloud Deployment Models: Private Cloud
    Cloud Deployment Models: Community Cloud
    Cloud Deployment Models: Hybrid Cloud
    Cisco CloudCenter: Introduction
    Cisco CloudCenter: Components
    Cisco CloudCenter: Components Part 2
    BASIC KNOWLEDGE OF CLOUD COMPUTE
    Cloud Compute: Cisco UCS Introduction
    Cloud Compute: Cisco UCS Management
    Cloud Compute: Server Virtualization
    BASIC KNOWLEDGE OF CLOUD NETWORKING
    Cloud Networking: Infrastructure Virtualization
    Cloud Networking: Cisco Nexus 1000V
    Cloud Networking: Virtual Networking Services
    Cloud Networking: Virtual Networking Services Pt.2
    Cloud Networking: VLANs And VXLANs
    Cloud Networking: VLANs And VXLANs Part 2
    Cloud Networking: Virtual Application Containers
    Cloud Networking: Cisco Unified Fabric
    Cloud Networking: Cisco Unified Fabric Part 2
    Cloud Networking: SDN Basics
    Cloud Networking: ACI Basics
    Cloud Networking: ACI Basics Part 2
    BASIC KNOWLEDGE OF CLOUD STORAGE
    Cloud Storage: Storage Provisioning
    Cloud Storage: Storage Provisioning Part 2
    Cloud Storage: Storage Access Technologies
    Cloud Storage: Block Storage Access
    Cloud Storage: Block Storage Access Part 2
    Cloud Storage: File Storage Access
    Cloud Storage: SAN And NAS Concepts
    Cloud Storage: Cisco Storage Network Devices
    Cloud Storage: Integrated Infrastructure
    APPENDICES
    Appendix-A: Cisco InterCloud Fabric
    Appendix-B: Miscellaneous Tips
  • DESIGN METHODOLOGIES
    Overview
    Cisco Architecture For Enterprise
    Cisco Architecture For Enterprise Part 2
    Cisco Design: Lifecycle
    Cisco Design: Lifecycle Part 2
    Cisco Design: Methodology
    Cisco Design: Methodology Part 2
    Characterize Network: Information Gathering
    Characterize Network: Auditing Tools
    Characterize Network: Auditing Tools Part 2
    Implement A Network Design
    DESIGN OBJECTIVES
    Design Modularity
    Design Modularity Part 2
    Design Hierarchy
    Design Hierarchy Part 2
    Design Scalability
    Design Scalability Part 2
    Design Resiliency
    Design Resiliency Part 2
    Design Fault Domains
    ADDRESSING AND ROUTING PROTOCOLS IN AN EXISTING NETWORK
    Scalable Addressing
    IP Addressing Scheme
    Routing Protocol Scalability
    Routing Protocol Scalability Part 2
    Design A Routing Protocol Expansion
    Design A Routing Protocol Expansion Part 2
    Design A Routing Protocol Expansion Part 3
    Design A Routing Protocol Expansion EGP
    ENTERPRISE NETWORK DESIGN
    Basic Campus Design Overview
    Basic Campus Design Overview Part 2
    Basic Campus Design Overview Part 3
    Basic Campus Design Overview Part 4
    Enterprise Network: WAN And Edge
    Enterprise Network: WAN And Edge Part 2
    Branch Network Design
    Branch Network Design Part 2
    Branch Network Design Part 3
    CONSIDERATIONS FOR EXPANDING AN EXISTING NETWORK
    Wireless LAN Design
    Wireless LAN Design Part 2
    Wireless LAN Design Part 3
    Wireless LAN Requirements
    Wireless LAN Requirements Part 2
    Wireless LAN Requirements Part 3
    Security Control Considerations
    Voice And Video Considerations
    Voice And Video Considerations Part 2
    Virtualization In Network Design
    Network Programmability Design
    Data Center Component Design

Security Skills

  • COMPTIA CORE BLOCKCHAIN
    Why Blockchain Matters
    How We Work Today: The Internet Of Value
    Business Drivers And Disrupters
    Accelerating Trust: Cryptos And ICOs
    Using Blockchain In Your Business: Use Cases
    Blockchain And Cybersecurity
    How Blockchain Works
    Your Blockchain Project: DIY Tools
    Seven Steps To Success
  • UNDERSTAND SECURITY LAYERS
    Overview
    Core Security Principles
    Physical Security
    Internet Browser Security
    Internet Browser Security Part 2
    Wireless Security
    Wireless Security Part 2
    UNDERSTAND OPERATING SYSTEM SECURITY
    User Authentication
    User Authentication Part 2
    Permissions
    Permissions Part 2
    Permissions Part 3
    Password Policies
    Audit Policies
    Encryption
    Encryption Part 2
    Digital Certificates
    Malware
    Malware Part 2
    UNDERSTAND NETWORK SECURITY
    Dedicated Firewalls
    Network Isolation
    Protocol Security
    UNDERSTAND SECURITY SOFTWARE
    Client Protection
    Email Protection
    Server Protection
  • SECURITY CONCEPTS
    Overview
    Describe CIA Triad And SIEM Technology
    Describe CIA Triad And SIEM Technology Pt2
    Identify Common Security Terms
    Describe Common Network Attacks
    Describe Common Network Attacks Part 2
    Describe Common Network Attacks Part 3
    Identify Common Malware Types
    Classify Data Loss Vectors
    Describe Encryption Methods
    Describe Encryption Methods Part 2
    Describe Crypto Key Exchange
    Describe Crypto Key Exchange Part 2
    Describe Network Topologies
    Describe Network Topologies Part 2
    SECURE ACCESS
    Compare In-Band And Out-Of-Band Mgmt
    Configure And Verify Secure Mgmt
    Configure And Verify Secure Mgmt Part 2
    Secure Management Plane Access
    Secure Management Plane Access Part 2
    Configure And Verify SNMPv3
    Configure And Verify NTP Security
    Configure And Verify NTP Security Part 2
    Describe AAA Technologies
    Configure Access Using TACACSplus
    Configure Access Using TACACSplus Part 2
    Use SCP For File Transfer
    Explain AD Integration With AAA
    Describe Using Cisco ACS And ISE
    Identify 802.1x Components And Functions
    Describe BYOD Framework And MDM
    VPN
    Describe IPsec Protocols And Modes
    Describe VPN Implementations
    Setup Clientless SSL VPN Using ASDM
    Setup AnyConnect VPN Using ASDM
    Setup AnyConnect VPN Using ASDM Part 2
    Setup IPsec Site-To-Site VPN With PSK
    Setup IPsec Site-To-Site VPN With PSK Part 2
    SECURE ROUTING AND SWITCHING
    Secure CLI Access And IOS
    Secure CLI Access And IOS Part 2
    Setup OSPF Authentication With MD5
    Setup EIGRP Authentication With MD5
    Setup L2 Attack Mitigation
    Setup L2 Attack Mitigation Part 2
    Setup L2 Attack Mitigation Part 3
    Explain Control Plane Policing
    Setup PVLANs For L2 Security
    Describe Native VLAN Security Issues
    CISCO FIREWALL TECHNOLOGIES
    Describe Different Firewall Technologies
    Implement NAT On Cisco ASA 9.X
    Implement NAT On Cisco ASA 9.X Part 2
    Setup Zone Based Firewall: Zone To Zone
    Setup Zone Based Firewall: Self Zone
    Configure ASA: Access Management
    Configure ASA: Security Access Policies
    Configure ASA: Modular Policy Framework
    Describe Firewall Features
    IPS
    Describe IPS Deployment Considerations
    Configure Cisco IOS IPS
    Configure Cisco IOS IPS Part 2
    Configure IPS Policy On Cisco FMC
    CONTENT AND ENDPOINT SECURITY
    Describe Threat Mitigation For Email
    Describe Threat Mitigation For Web
    Describe Threat Mitigation For Endpoints
  • NETWORK CONCEPTS
    Overview
    Describe Network Models
    Describe Network Models Part 2
    Describe Network Models Part 3
    Describe Basic Networking Protocols
    Describe Basic Networking Protocols Part 2
    Describe Basic Networking Services
    Describe Basic Networking Services Part 2
    Describe Networking Devices Operations
    Describe Networking Devices Operations Part 2
    Describe Network Security Systems
    Describe Basic Network Addressing
    Describe Basic Network Addressing Part 2
    Describe VLANS And Data Visability
    Describe ACL Usage On Interfaces
    Describe ACL Usage On Interfaces Part 2
    Compare Different Filtering Methods
    Compare Packet Capture Methods
    Compare Packet Analysis Output
    Compare Packet Analysis Output Part 2
    Identify Traffic Loss From Packet Analysis
    SECURITY CONCEPTS
    Describe Defense In Depth Principles
    Define Security Concepts And Terms
    Define Security Concepts And Terms Part 2
    Understand Access Control Models
    Compare Security Admin Terms
    Describe Security Management Concepts
    CRYPTOGRAPHY
    Describe Crypto Algorithm Usage
    Describe Crypto Algorithm Usage Part 2
    Describe Digital Signature Creation
    Describe PKI Operations
    Describe Key Exchange Security
    Describe SSL TLS Components
    Describe SSL TLS Components Part 2
    Describe Hashing Algorithms
    Encryption Algorithms And Protocols
    Encryption Algorithms And Protocols Part 2
    HOST-BASE ANALYSIS
    Define Windows Terms
    Define Linux Terms
    Define Linux Terms Part 2
    Describe Endpoint Security Monitoring
    Interpret OS Log Data
    Interpret OS Log Data Part 2
    SECURITY MONITORING
    Identify Data Types
    Identify Data Types Part 2
    Identify Data Types Part 3
    Describe NSM Data
    Describe Monitoring Context
    Describe Monitoring Context Part 2
    Describe NGIPS Events
    Monitor Protocols
    Monitor Protocols Part 2
    ATTACK METHODS
    Describe Security Attack Concepts
    Describe Network And Web App Attacks
    Describe Network And Web App Attacks Part 2
    Describe Attacks And Evasion Methods
    Describe Attacks And Evasion Methods Part 2
  • ENDPOINT THREAT ANALYSIS AND COMPUTER FORENSICS
    Overview
    Read Analysis Reports
    Read Analysis Reports Part 2
    Read Analysis Reports Part 3
    Describe CVSS 3.0
    Describe CVSS 3.0 Part 2
    Describe CVSS 3.0 Part 3
    Understand Windows File Systems
    Understand Windows File Systems Part 2
    Understand Linux File Systems
    Identify Forensic Evidence
    Identify Forensic Evidence Part 2
    NETWORK INTRUSION ANALYSIS
    Interpret Basic Regular Expressions
    Interpret Basic Regular Expressions Part 2
    Describe Protocol Headers
    Describe Protocol Headers Part 2
    Describe Protocol Headers Part 3
    Describe IP Headers
    Describe IP Headers Part 2
    Describe IP Headers Part 3
    Describe ICMP Intrusion
    Describe ICMP Intrusion Part 2
    Describe ICMP Intrusion Part 3
    Describe ICMP Intrusion Part 4
    Describe Transport Layer Headers
    Describe Transport Layer Headers Part 2
    Describe Transport Layer Headers Part 3
    Describe HTTP Headers
    Describe HTTP Headers Part 2
    Describe HTTP Headers Part 3
    Identify Netflow V5 Records
    Identify Netflow V5 Records Part 2
    Examine Intrusion Events
    Intrusion Event Technologies
    Intrusion Event Technologies Part 2
    Intrusion Event Technologies Part 3
    Intrusion Impact Analysis
    Intrusion Impact Analysis Part 2
    INCIDENT RESPONSE
    Incident Response Elements
    Incident Response Elements Part 2
    Describe CSIRT Goals
    Identify Cybersec Elements And Frameworks
    DATA AND EVENT ANALYSIS
    Describe Data Normalization
    Describe 5 Tuple Correlation
    FirePower Management Console
    Compare And Contrast Analysis Methods
    INCIDENT HANDLING
    Classify And Categorize Intrusions
    Classify And Categorize Intrusions Part 2
    Classify And Categorize Intrusions Part 3
    Apply NIST.SP800-61 R2 To Events
    NIST SP800-86 Evidence Handling
    Apply VERIS Schema Categories
  • BUSINESS CONTINUITY AND DISASTER RECOVERY
    Overview
    Getting Started
    Business Impact Analysis
    Creating A BIA
    BIA Math
    Risk Assessment
    BCP Planning
    BCP Planning Part 2
    BCP Roles And Responsibilities
    BCP Communications
    Creating A BCP
    Creating A BCP Part 2
    Creating A BCP Part 3
    BCP And The Cloud
    BCDR KRIs And KPIs
    ITDR Planning
    IT DR Testing
    DR Procedures
    BCP Testing
  • INTRODUCTION TO CYBERPATRIOT AND CYBERSECURITY
    Program Overview
    CyberPatriot And Cybersecurity
    The Competition
    Introduction To Cybersecurity
    INTRODUCTION TO ONLINE SAFETY
    Online Safety
    Online Safety Part 2
    CYBER ETHICS
    Cyber Ethics
    Current Event 1
    Current Event 2
    Current Event 3
    Scenario 1
    Scenario 2
    Scenario 3
    Scenario 4
    Scenario 5
    Scenario 6
    PRINCIPLES OF CYBERSECURITY
    Principles Of Cybersecurity
    CIA Triad
    Threats And Vulnerabilities
    Cyber Threats And Countermeasures
    Cyber Threats And Countermeasures Part 2
    Basic Cybersecurity Techniques
    Basic Cybersecurity Techniques Part 2
    COMPUTER BASICS AND VIRTUALIZATION
    Computer Basics And Virtualization
    How Computers Work
    How Computers Work Part 2
    Virtual Machines
    Networking Basics
    MICROSOFT WINDOWS BASIC AND MSDN
    Microsoft Windows Basics And MSDN
    Windows Version History
    Windows Basics
    What Is MSDN
    How To Use MSDN For Training
    MICROSOFT WINDOWS SECURITY TOOLS
    Microsoft Windows Security Tools
    Basic Security Policies And Tools
    Basic Security Policies And Tools Part 2
    Basic Security Policies And Tools Part 3
    Account Management
    Account Management Part 2
    MICROSOFT WINDOWS SECURITY CONFIGURATION
    Microsoft Windows Security Configuration
    Windows File Protections
    Windows Auditing
    Performance Monitoring
    INTRODUCTION TO LINUX AND UBUNTU
    Introduction To LInux And Ubuntu
    What Is Linux
    Ubuntu Terminology And Concepts
    Introduction To Ubuntu Command Lines
    Introduction To Ubuntu Command Line Part 2
    UBUNTU SECURITY CONFIGURATION
    Ubuntu Security
    Basic GUI Security
    Basic Command Line Security
    Advanced Ubuntu Security
  • THREATS, ATTACKS AND VULNERABILITIES
    Overview
    Determining Types Of Malware
    Determining Types Of Malware Part 2
    Types Of Attacks
    Types Of Attacks Part 2
    Types Of Attacks Part 3
    Types Of Attacks Part 4
    Threat Vector Types And Attributes
    Penetration Testing Concepts
    Vulnerability Scanning Concepts
    Impact Of Various Vulnerabilities
    Impact Of Various Vulnerabilities Part 2
    TECHNOLOGIES AND TOOLS
    Hardware Software Organizational Security
    Hardware Software Organizational Security Part 2
    Hardware Software Organizational Security Part 3
    Hardware Software Organizational Security Part 4
    Security Posture Assessment
    Security Posture Assessment Part 2
    Security Posture Assessment Part 3
    Security Posture Assessment Part 4
    Troubleshoot Common Security Issues
    Troubleshoot Common Security Issues Part 2
    Analyze And Interpret Outputs
    Analyze And Interpret Outputs Part 2
    Deploy Mobile Security
    Implement Secure Protocols
    ARCHITECTURE AND DESIGN
    Best Practices And Secure Config Guides
    Secure Network Architecture Concepts
    Secure System Design
    Secure Staging Deployment Concepts
    Security Implications Of Embedded Systems
    Secure App Development And Deployment
    Cloud And Virtualization Concepts
    Cloud And Virtalization Concepts Part 2
    Resiliency And Automation To Reduce Risk
    Importance Of Physical Security
    Importance Of Physical Security Part 2
    IDENTITY AND ACCESS MANAGEMENT
    Identity And Access Management Concepts
    Identity And Access Services
    Identity And Access Management Controls
    Identity And Access Management Controls Part 2
    Account Management Practices
    Account Management Practices Part 2
    RISK MANAGEMENT
    Policies, Plans And Procedures
    Impact Business Analysis
    Risk Management Processes And Concepts
    Incident Response Procedures
    Basic Concepts Of Forensics
    Disaster Recovery And Business Continuity
    Disaster Recovery And Business Continuity Part 2
    Data Security And Privacy
    CRYPTOGRAPHY AND PKI
    Basic Concepts Of Cryptography
    Basic Concepts Of Cryptography Part 2
    Cryptography Algorithms Basics
    Cryptography Algorithms Basics Part 2
    Cryptography Algorithms Basics Part 3
    Wireless Security
    Public Key Infrastructure
    Public Key Infrastructure Part 2
    Public Key Infrastructure Part 3
    Public Key Infrastructure Part 4
  • THREATS, ATTACKS AND VULERABILITIES
    Overview
    Determining Types Of Malware
    Vulnerability Scanning And Pen Testing
    Impact Of Various Vulnerabilities
    TECHNOLOGIES AND TOOLS
    Supporting Organizational Security
    Supporting Organizational Security Part 2
    Security Posture Assessment
    Deploy Mobile Security
    Implement Secure Protocols
    ARCHITECTURE AND DESIGN
    Best Practices, Guides And Configuration
    Secure Network Architecture Concepts
    App Development And Deployment
    Cloud And Virtualization Concepts
    IDENTITY AND ACCESS MANAGEMENT
    Identity And Access Services
    IAM Controls
    Account Management Practices
    RISK MANANGEMENT
    Policies, Plans And Procedures
    Risk Management Processes And BIA
    IRP And Basic Forensics
    Disaster Recovery And Business Continuity
    Data Security And Privacy Practices
    CRYPTOGRAPHY AND PKI
    Cryptography Algorithms Basics
    Wireless Security
    Public Key Infrastructure
  • ELIMINATING MALWARE
    Identify, Quarantine And Remediate
    Updating, Scheduling And Monitoring
  • SECURITY IN SOFTWARE
    Overview
    Prior Knowledge And Expectations
    Gather Software Requirements
    Assignment: Identity Requirments
    Activity: Identify Requirements
    Factors That Undermine Software Security
    Software Vulnerabilities And Attack Phases
    Attack Patterns
    Assignment: Find Vulnerabilities
    Activity: Find Vulnerabilities
    Assignment: New Password Requirements
    Activity: New Password Requirements
    Assignment: Hashing Passwords
    Activity: Hashing Passwords
    Vulnerability Intelligence
    Assignment: Vulnerability Search
    Activity: Vulnerability Search
    HANDLING VULNERABILITIES
    Bugs In Software
    External Libraries And Services
    Handling Errors Securely
    Human-Related Security
    Security Requirements And Design
    Security Through The Software Lifecycle
    Assignment: Exploring Leftover Artifacts
    Activity: Exploring Leftover Artifacts
    DESIGNING FOR SECURITY
    Principles Of Secure Design
    Avoid Common Mistakes
    Assignment: Common Security Design Flaws
    Activity: Common Security Design Flaws
    Understand Risk And Threats
    Risk Response Strategies
    Exploit Countermeasures
    DEVELOPING SECURE CODE
    Guidelines For Secure Coding
    Buffer Overflows And Prevention
    Race Conditions
    Assignment Using Locks Remediate Race Condition
    Activity Using Locks To Remediate Race Condition
    OWASP Top Ten Platform Vulnerabilities
    Web Application Vulnerabilities Deep Dive
    Mobile Application Vulnerabilities Deep Dive
    IoT Vulnerabilities Deep Dive
    Desktop Vulnerabilities Deep Dive
    Privacy Vulnerability Defects
    IMPLEMENTING COMMON PROTECTIONS
    Secure Session Management
    Users, Protections And Passwords
    Encryption And Data Protections
    Error Handling And Protections
    TESTING AND MAINTAINING SOFTWARE SECURITY
    Testing Software For Security
    Monitoring And Logging Of Production Applications
  • Overview
    Reconnaissance: Tools
    Reconnaissance: Tools Part 2
    Reconnaissance: Tools Part 3
    Reconnaissance: Tools Part 4
    Reconnaissance: Techniques
    Reconnaissance: Techniques Part 2
    Reconnaissance: Techniques Part 3
    Reconnaissance: Techniques Part 4
    Data Correlation And Analytics
    Reconnaissance: Interpreting Results
    Countermeasures: Network Segmentation
    Countermeasures: Honeypots And Sinkholes
    Countermeasures: System Hardening And NAC
    Security Practices: Penetration Testing
    Security Practices: Reverse Engineering
    Security Practices: Training And Risk Evaluation
    VULNERABILITY MANAGEMENT
    Vulnerability Management Process
    Vulnerability Management: Scan Configuration
    Vulnerability Management CVSS
    Vulnerability Management: CVSS Part 2
    Vulnerability Management: Remediation
    Scan Results Verification
    Common Vulnerabilities
    Common Vulnerabilities Part 2
    Common Vulnerabilities Part 3
    Common Vulnerabilities Part 4
    Common Vulnerabilities Part 5
    CYBER INCIDENT RESPONSE
    Threat Classification
    Severity And Prioritization
    Forensics Toolkit
    Incident Response Plan
    Forensic Suites And Utilities
    Forensic Suites And Utilities Part 2
    Forensic Suites And Utilities Part 3
    Forensic Suites And Utilities Part 4
    CSIRT Roles And Communication
    Indicator Of Compromise: Network Symptoms
    Indicators Of Compromise: Host And App Symptoms
    Recovery And Post-Incident Response
    Recovery And Post-Incident Response Part 2
    SECURITY ARCHITECTURE AND TOOLSETS
    Cybersecurity Frameworks
    Cybersecurity Frameworks Part 2
    Policies, Controls And Procedures
    Policies, Controls And Procedures Part 2
    Identity And Access Managemnt
    Identity And Access Management Part 2
    Compensating Controls And Architecture
    Compensating Controls And Architecture Part 2
    Compensating Controls And Architecture Part 3
    Security Tools And Technologies
    Security Tools And Technologies Part 2
    Security Tools And Technologies Part 3
    Software Development Security
    Software Development Security Part 2
  • THREATS AND ATTACKS
    Overview
    Threat Targets
    Threat Actors
    Threat Motives
    Threat Intentions
    Attack Phases
    Attack Vectors
    Technique Criteria
    Impact Of Attacks
    Footprinting
    Network And Port Scanning
    Vulnerability Scanning
    Penetration Testing
    Web App Scanning
    Enumeration
    GAINING ACCESS
    Exploitation Frameworks
    Client-Side Attacks
    Server-Side Attacks
    Mobile Threats
    Web Attacks
    Password Attack
    Wireless Attacks
    Social Engineering
    Man-In-The-Middle
    Malware
    Out-Of-Band Attacks
    Denial Of Service
    POST-EXPLOITATION
    Command And Control
    Data Exfiltration
    Pivoting
    Lateral Movement
    Persistence
    Keylogging
    Anti-Forensics
    Covering Your Tracks
    THREAT RESEARCH AND INCIDENT PREP
    Threat Research And Incident Prep
    DATA COLLECTION AND ANALYSIS
    Network Data Collection And Analysis
    Host Data Collection And Analysis
    Anomaly Detection
    Indicators Of Compromise
    Log Analysis Tools
    INCIDENT RESPONSE TECHNIQUES
    Containment
    Asset Discovery
    Windows Incident Response Tools
    Linux Incident Response Tools
    Incident Response Process
    Incident Response Preparation
    Compliance And Standards
    Frameworks And Best-Practices
    Forensic Concepts
    VULNERABILITY ASSESSMENTS
    Common Vulnerable Areas
    Vulnerability Assessments
  • EMAIL ENCRYPTION
    Email Encryption Overview
    OpenPGP With Windows
  • PLANNING AND SCOPING
    Overview
    Planning An Engagement
    Planning On Engagement Part 2
    Planning An Engagement Part 3
    Planning An Engagement Part 4
    Legal Concepts
    Scoping An Engagement
    Scoping An Engagement Part 2
    Compliance-Based Assessments
    INFORMATION GATHERING AND VULNERABILITY IDENTIFICATION
    Pentesting Tools: Use Cases
    Pentesting Tools: Use Cases Part 2
    Pentesting Tools: Scanners
    Pentesting Tools: Credential Testing
    Pentesting Tools: Credential Testing Part 2
    Pentesting Tools: Web Directory Enum
    Pentesting Tools: Debuggers
    Pentesting Tools: OSINT
    Pentesting Tools: Wireless
    Pentesting Tools: Web Proxies
    Pentesting Tools: Social Engineering
    Pentesting Tools: Remote Access
    Pentesting Tools: Networking
    Pentesting Tools: Misc
    Pentesting Tools: Mobile
    Nmap
    Common Pentest Objectives
    Analyze Scripts: Bash
    Analyze Scripts: Bash Part 2
    Analyze Scripts: Bash Part 3
    Analyze Scripts: Python
    Analyze Scripts: Python Part 2
    Analyze Scripts: Python Part 3
    Analyze Scripts: Ruby
    Analyze Scripts: Ruby Part 2
    Analyze Scripts: PowerShell
    Analyze Scripts: Powershell Part 2
    ATTACKS AND EXPLOITS
    Info Gathering Techniques
    Info Gathering Techniques Part 2
    Info Gathering Techniques Part 3
    Info Gathering Techniques Part 4
    Perform Vulnerability Scans
    Perform Vulnerability Scans Part 2
    Perform Vulnerability Scans Part 3
    Perform Vulnerability Scans Part 4
    Vulnerability Scan Results
    Exploration Preparation
    Exploration Preparation Part 2
    Weaknesses In Specialized Systems
    Weaknesses In Specialized Systems Part 2
    PENETRATION TESTING TOOLS
    Social Engineering
    Social Engineering Part 2
    Network Vulnerability: Name Resolution
    Network Vulnerability: SNMP, SMTP And FTP
    Network Vulnerability: Pass-The-Hash
    Network Vulnerabilities: MITM
    Network Vulnerability Denial Of Service
    Network Vulnerabilities: NAC Bypass, VLAN Hopping
    App Vulnerabilities Injection Attacks
    App Vulnerabilities Injection Attacks Part 2
    App Vulnerabilities: Injection Attacks Part 3
    App Vulnerabilities: File Inclusions
    App Vulnerabilities: File Inclusions Part 2
    App Vulnerabilities: XSS, CSRF, Clickjacking
    App Vulnerabilities: XSS, CSRF, Clickjacking Pt2
    App Vulnerabilities: Authentication, Authorization
    App Vulnerabilities: Insecure Coding
    App Vulnerabilities: Insecure Coding Part 2
    Wireless And RF Vulnerabilities
    Wireless And RF Vulnerabilities Part 2
    Host-Based Vulnerabilities
    Host Based Vulnerabilities Part 2
    Host Based Vulnerabilites Part 3
    Host-Based Vulnerabilities Part 4
    Host-Based Vulnerabilities Part 5
    Site Security
    Site Security Part 2
    Post-Exploitation
    Post-Exploitation Part 2
    REPORTING AND COMMUNICATION
    Reports
    Post Report Activities
    Vulnerability Mitigation Strategies
    Communication Importance
  • GENERAL CONCEPTS
    Overview
    Cryptography Basics
    Cryptographic Algorithms
    VPN Types
    SITE-TO-SITE
    IPSec Using IKEv1
    IPSec Using IKEv1 Part 2
    IPSec Using IKEv2
    IPSec With Mixed Hardware
    Using IPv6 With IPSec
    Tunneling IPv6 Over IPv4
    Tunneling IPv6 Over IPv4 Part 2
    DMVPN Hub And Spoke
    DMVPN Hub And Spoke Part 2
    DMVPN Spoke To Spoke
    Group Encrypted Transport VPN
    Group Encrypted Transport VPN Part 2
    REMOTE ACCESS VPNS
    AnyConnect SSLVPN For ASAs
    AnyConnect SSLVPN On IOS
    Clientless SSLVPN
    HYBRID VPNS
    FlexVPN Components
    FlexVPN Site-To-Site
    FlexVPN Hub And Spoke
    FlexVPN With Redundant Hubs
    FlexVPN L2L With IPv6
    FlexVPN Remote Access VPN
  • END USER SECURITY AWARENESS
    Password Security
    Social Engineering
    Physical Security
    Data Disposal
    Safe Networks
    Malicious Software
  • OVERVIEW
    Overview
    Overview Of The GDPR
    Overview Of The GDPR Part 2
    Overview Of The GDPR Part 3
    Overview Of The GDPR Part 4
    Overview Of The GDPR Part 5
    PRINCIPLES
    Principles
    SPECIAL TOPICS TO FOCUS ON
    Special Topics To Focus On
    Special Topics To Focus On Part 2
    THE INDIVIDUAL RIGHTS
    Individual Rights
    The Right To Be Informed
    The Right Of Access
    The Right To Rectification
    The Right To Erasure
    The Right To Restrict Processing
    The Right To Data Portability
    The Right To Object
    Automated Decision Making And Profiling
    ACCOUNTABILITY AND GOVERNANCE
    Accountability And Governance
    TRANSFERS OF PERSONAL DATA
    Transfers Of Personal Data
    BREACH NOTIFICATION
    Breach Notification
    NATIONAL DEROGATIONS
    National Derogations
  • ISO/IEC 27,001 FOUNDATION
    Overview
    The ISO/IEC 27,001 Foundation Exam
    The ISO/IEC 27,000 Family
    Data Vs Information
    Value Of Information
    Fundamental Principles Of Security
    Fundamental Principles Of Security Part 2
    Threats, Risks, Vulnerabilities And Exposure
    Types Of Damage And Risk Management
    Countermeasures
    The Security Organisation
    The Security Organisation Part 2
    The Security Organisation Part 3
    Access Control
    Cryptography
    Incident Management
    Incident Management Part 2
    Importance Of Measures
    Physical Security Measures
    Technical Security Measures
    Organisational Measures
    Organisational Measures Part 2
    Legislation And Regulation
    Legislation And Regulation Part 2
    Sample Paper Iso27001
    Sample Paper Part 2
  • MOBILE SECURITY
    Exposure From Unmanaged Mobile Device
    Exposure From Unmanaged Mobile Device Part 2
    Securing Devices With MDM
    Man In The Middle Attacks
    Performing An Impersonation Attack
    Executing A Remote Exploit
    Trojan Horse Exploit
  • OWASP TOP 10 – 2017
    Overview
    A1 Injection: Exploit
    A1 Injection: Mitigate
    A1 Injection: Breakdown
    A2 Broken Auth: Exploit
    A2 Broken Auth: Mitigate
    A2 Broken Auth: Breakdown
    A3 Sensitive Data Exposure: Exploit
    A3 Sensitive Data Exposure: Mitigate
    A3 Sensitive Data Exposure: Breakdown
    A4 XML External Entities: Exploit
    A4 XML External Entities: Mitigate
    A4 XML External Entities: Breakdown
    A5 Broken Access Control: Exploit
    A5 Broken Access Control: Mitigate
    A5 Broken Access Control: Breakdown
    A6 Security Misconfiguration: Exploit
    A6 Security Misconfiguration: Mitigate
    A6 Security Misconfiguration: Breakdown
    A7 Cross-Site Scripting (XSS): Exploit
    A7 Cross-Site Scripting (XSS): Mitigate
    A7 Cross-Site Scripting: Breakdown
    A8 Insecure Deserialization: Exploit
    A8 Insecure Deserialization: Mitigate
    A8 Insecure Deserialization: Breakdown
    A9 Components W/ Known Vulnerabilities: Exploit
    A9 Components W/ Known Vulnerabilities: Mitigate
    A9 Using Components Known Vulnerability Breakdown
    A10 Insufficient Logging And Monitoring
  • PENETRATION TESTING
    Overview
    Platforms And Basic Skills
    Remote Shells
    Scanning And Enumeration
    Buffer Overflows
    Buffer Overflows Part 2
    Buffer Overflows Part 3
    Buffer Overflows Part 4
    Web Apps Cross Site Scripting
    Web Apps Remote File Inclusion (RFI)
    Web Apps Local File Inclusion (LFI)
    File Transfer Fun
    Windows Privilege Escalation
    Linux Privilege Escalation
    SQL Injection
    SQL Injection Part 2
    Password Cracking And Attacks
    Password Cracking And Attacks Part 2
    Port Redirection
  • GENERAL INFORMATION
    Overview
    Introuce PfSense: History And Use
    Introduce PfSense: Hardware Choices
    Introduce PfSense: Hardware Choices Part 2
    PREPARE AND INSTALL PFSENSE
    Prepare And Install PfSense: Installation
    Prepare And Install PfSense: Installation Pt.2
    Prepare And Install PfSense: Menu Options
    Prepare And Install PfSense: Initial Config
    Prepare And Install PfSense: System Security
    Prepare And Install PfSense: System Security Pt. 2
    PFSENSE FEATURES AND SERVICES
    Setup PfSense: Configure Firewall Rules
    Setup PfSense: Configure Firewall Rules Part 2
    Setup PfSense: Configure Schedules And Virtual IPs
    Setup PfSense: Understand Traffic Shaper
    Setup PfSense: Configure NAT Basics
    Setup PfSense: Configure NAT Basics Part 2
    Setup PfSense: Configure Services
    Setup PfSense: Configure Services Part 2
    Setup PfSense: Configure VPN Services
    Setup PfSense: Configure VPN Services Part 2
    Setup PfSense: Configure VPN Services Part 3
    Setup PfSense: Configure VPN Services Part 4
    PFSENSE ADVANCED FEATURES
    PfSense Advanced: Multi-WAN Support
    PfSense Advanced: Multi-WAN Support Part 2
    PfSense Advanced: Configure VLANs
    PfSense Advanced: Configure VLANs
    PfSense Advanced: Configure High Availability
    PfSense Advanced: Configure High Availability Pt.2
    PfSense Advanced: Configure Bridging
    PfSense Advanced: Configure Captive Portal
    PfSense Advanced: Monitoring And Packages
    MANAGING AND MAINTAINING
    Manage And Maintain: Backups And Restores
    Manage And Maintain: Reporting, Upgrading
  • MANAGEMENT OF RISK® FOUNDATION
    Overview
    The MoR® Foundation Exam
    MoR® Terms And Definitions
    MoR® Terms And Definitions Part 2
    MoR® Terms And Definitions Part 3
    MoR® Terms And Definitions Part 4
    What Is Management Of Risk®
    Benefits Of MoR®
    Barriers To Success
    Overcoming Barriers To Success
    Corporate Governance
    Corporate Governance Part 2
    What Are MoR® Principles
    MoR® Principle: Aligns With Objectives
    MoR® Principle: Fits The Context
    MoR® Principle: Engages Stakeholder
    MoR® Principle: Provides Clear Guidance
    MoR® Principle: Informs Decision Making
    MoR® Principle: Facilitates Continual Improvement
    MoR® Principle: Creates A Supportive Culture
    MoR® Principle: Achieves Measurable Value
    Reporting On MoR® Principles
    Supporting Factors To MoR® Principles
    MoR® Successive Principles
    The MoR® Approach And MoR® Products
    The Risk Management Policy
    The Risk Management Process Guide
    Risk Management Strategies Mor
    The Risk Register
    The Issue Log
    MOR PROCESSES
    The Management Of Risk® Process
    Benefits, Success Factors For The MoR® Process
    Barriers To The MoR® Process, Communication
    MoR® Process Definitions
    Defining A Process Activity
    Communication In The MoR® Process
    MoR® Process Activity: Identify
    Identify Activity: Context
    Context Techniques: SWOT
    Context Techniques: PESTLE Analysis
    Context Techniques: RACI
    Context Techniques: Stakeholder Mapping
    Context Techniques: Horizon Scanning
    MoR® Process Activity: Identify The Risks
    Risk Identification Technique: Checklists, Prompts
    Risk Identification Technique: Ishikawa, Analyses
    Risk Identification Technique: Group Techniques
    Outputs From Identify The Risk Activity
    MoR® Process Activity: Assess
    MoR® Prcess Activity: Estimate Assessments
    MoR® Process Activity: Evaluate
    MoR® Process: Plan
    Risk Responses: Threat Responses
    Risk Responses: Opportunity Responses
    MoR® Process: Implement
    Planning Roles And Techniques
    Implement Techniques
    EMBED AND REVIEW
    Goals And Success Factors Of Embed And Review
    The Health Check Process
    The Maturity Model
    Building Awareness Of MoR®
    MOR PERSPECTIVES
    Introduction To Management Of Risk® Perspectives
    The Strategic Perspective
    The Programme Perspective
    The Project Perspective
    The Operational Perspective
    Risk Responsibilities
    COMMON TERMS AND TECHNIQUES
    Common Terms And Risk Responses
    Techniques: PESTLE, SWOT, Horizon Scanning
    Stakeholder Analysis, Influence And RACI Matrix
    Probability Impact Grid, Summary Risk Profile
    RISK SPECIALISMS
    MoR® Risk Specialisms
    SAMPLE EXAM
    MoR® Foundation Sample Paper
    MoR® Foundation Sample Paper Part 2
    MoR® Foundation Sample Paper Part 3
    Book Your Exam
  • PRACTICAL IT SECURITY
    Multi-Factor Authentication
    Multi-Factor Authentication Part 2
    Multi-Factor Authentication Part 3
    Multi-Factor Authentication Part 4
    Multi-Factor Authentication Part 5
    Patch Management
    Patch Management Part 2
    Patch Management Part 3
    Patch Management Part 4
    Password Hygiene
    Password Hygiene Part 2
    Social Engineering
    MacOS Hardening
    MacOS Hardening Part 2
    MacOS Hardening Part 3
    MacOS Hardening Part 4
    MacOS Hardening Part 5
    Encryption
    Encryption Part 2
    Browser Security
    Browser Security Part 2
    Mobile Device Security
    Mobile Device Security Part 2
    Mobile Device Security Part 3
    Basic Cisco Device Security
    Basic Cisco Device Security Part 2
    Basic Cisco Device Security Part 3
  • PRACTICAL PENTESTING: FEATURING BRAD STINE
    Overview
    Pentesters – The Good, Bad And Ugly
    Pre-Engagement
    Pre-Engagement Part 2
    Data Security Agreements
    Statement Of Work (SOW)
    Statement Of Work (SOW) Part 2
    Statement Of Work (SOW) Part 3
    Final Authorization
    Personal Engagement Toolkit
    Pentesting Platforms
    Stages Of Assessment: Validate Scope
    Stages Of Assessment: Recon
    Stages Of Assessment: Vulnerability Scan
    Stages Of Assessment: Vulnerability Scan Part 2
    Stages Of Assessment: Documenting
    Stages Of Assessment: Exploitation
    Stages Of Assessment: Maintaining Access
    Stages Of Assessment: Covering Tracks
    Stages Of Assessment: Deliverables
    Blue Team Pentesting
  • SECURITY TECH SKILLS
    Host Discovery
    Port Scanning
    OpenVAS
    MBSA
    Nikto
    This Is Sparta
    Burp Suite
    OWASP Zap
    SQL Injection
    Sqlmap
    Password Cracking Basics
    Hashcat
  • WIRESHARK 2.2.4
    Overview
    What Is Wireshark
    Install Wireshark
    Perform Data Capture
    Use Wireshark Interface
    Use Filters
    Capture Unicast Data
    Use Advanced Features
    Use Advanced Features Part 2
    Use Stats And Reporting
  • WORKING WITH SSH
    Working With SSH
    Enabling SSH
    Using Certificates With SSH
    Hardening SSH
  • SUPPORTING IT GOVERNANCE AND RISK MANAGEMENT
    Overview
    So You Want To Setup A Lab
    Begin At The Beginning – Confidentiality
    Begin At The Beginning – Integrity
    Begin At The Beginning – Availability
    Governance And Risk Management: Overview
    Governance And Risk Management: Risk Vocabulary
    Governance And Risk Management: Risk Management
    Governance And Risk Management: Risk Analysis
    Assess Risks: What Is A Security Framework
    Assess Risks: ESA Framework Assessment Process
    Assess Risks: System Specific Risk Analysis
    Assess Risks: Risk Determination
    Assess Risks: Guidelines For Assessing Risk
    Risk Mitigation: What Is A Aggregate CIA Score
    Risk Mitigation: What Are The CVSS And CVE
    Risk Mitigation: Risk Responses
    Risk Management Documentation: Best Practices
    Risk Management Documentation: BCP
    Risk Management Documentation: What Is A BIA
    Risk Management Documentation: Downtime
    Risk Management Documentation: Documents
    I.T. Governance And Risk Management – Key Points
    LEVERAGING COLLABORATION TO SUPPORT SECURITY
    Collaboration: GRC And Controls
    Collaboration: What Is An SCA
    Collaboration: Solutions
    Leveraging Collaboration – Key Points
    USING RESEARCH AND ANALYSIS TO SECURE THE ENTERPRISE
    Research And Analysis: Industry Trends
    Research And Analysis: Artificial Intelligence
    Research And Analysis: Requirements For Contracts
    Analyze Scenarios To Secure The Enterprise
    Using Research And Analysis – Key Points
    INTEGRATING ADVANCED AUTHENTICATION AND AUTHORIZATION TECHNIQUES
    Authentication And Access Control
    Authentication Factors And Controls
    Authentication Types
    Centralized Remote Authentication Services
    Deep Dive: RADIUS
    Deep Dive: 802.1X
    What Is Authorization/OAuth2.0
    What Is XACML
    Trusts Models And Kerberos
    Trust Models And Kerberos Part 2
    Directory Services And LDAP
    Hands On: Establishing Peer Trusts
    Authentication And Authorization Review Questions
    Advanced Identity Concepts And Vocabulary
    Identity Federation Methods
    Advanced Identity Review Questions
    Authentication And Authorization: Key Points
    IMPLEMENTING CRYPTOGRAPHIC TECHNIQUES
    Encryption
    Hashing
    Digital Signatures
    Blockchain And Bitcoin
    Hands On: Configuring A Blockchain
    Public Key Infrastructure PKI – Design
    Public Key Infrastructure PKI – Concepts
    Cryptography Concepts
    Stream Vs. Block Ciphers
    Implement Cryptography
    Implementing Cryptographic Techniques – Key Points
    IMPLEMENTING SECURITY CONTROLS FOR HOSTS
    Host Concepts And Vocabulary
    Product Evaluation Models – TCSEC
    Product Evaluation Models – ITSEC
    Product Evaluation Models – Common Criteria
    What Is A Trusted OS
    Types Of Security Models
    Bell-LaPadula
    Biba
    Clark-Wilson And Others
    Access Control Concepts
    Role-Based Access Control (RBAC)
    Other Access Control Models
    Endpoint Security
    Host Review Questions
    Hardening Hosts Concepts And Vocabulary
    Peripherals
    Full Disk Encryption
    Hands-On: Hardening Windows Hosts, AppLocker
    Virtualization Concepts And Vocabulary
    Common VM Vulnerabilities
    Hands-On: Creating Securing VM Using Virtualbox
    Boot Loader Concepts And Vocabulary
    Hands-On: Protecting Boot Loaders
    Implementing Security Controls Hosts Key Points
    SECURITY CONTROLS FOR MOBILE DEVICES
    Mobile Deployment Models
    MDM Concepts And Vocabulary
    MDM Concepts And Vocabulary Part 2
    Storage
    Concepts And Vocabulary
    Concepts And Vocabulary Part 2
    Security Controls For Mobile Devices – Key Points
    IMPLEMENTING NETWORK SECURITY
    IDSs Vs IPSs Casp
    What Is A SIEM System
    Network Security Concepts And Vocabulary
    Hands-On Deploy Network Security Platform OPNsense
    SoC, BASs, ICS And SCADA
    Network-Enabled Devices Review Questions
    Remote Access And IPv6
    Network Authentication
    Network Topologies And SDN
    Optimizing Resource Placement
    Advanced Network Design Review Questions
    Network Security Controls Concepts Vocabulary
    VLANS And Network Data Flow
    DPI And HTTPS Inspection
    Network Device Configurations
    NAC And Alerting
    Hands On: Implementing Network Monitoring Ntopng
    Implementing Network Security – Key Points
    IMPLEMENTING SECURITY IN THE SYSTEMS AND SOFTWARE DEVELOPMENT LIFECYCLE
    What Is The Systems Development Life Cycle SDLC
    Development Methodologies
    What Are The SDLC Phases
    Security Requirements Traceability Matrix SRTM
    Common Software Development Approaches
    Common Software Development Methods
    What About Validation And Acceptance Testing
    SDLC Review Questions
    Secure Vs Insecure Direct Object References
    Error Exception Handling Try…Catch Statements
    What Is Privilege Escalation
    Overflows And Canaries
    Memory Leaks
    Races And Exhaustion
    What Is SQL Injection
    What Is Session…
    What Is A Cross-Site Scripting XSS Attack
    Cross-Site Request Forgery XSRF/CSRF Attack
    What About Clickjacking And Cookie Hijacking
    What Is Security By…
    Input Validation Fuzzing Application Sandboxing
    WS-Security DAM And Software Assurance Tech
    Implementing Security In The SDLC – Key Points
    INTEGRATING ASSETS IN A SECURE ENTERPRISE ARCHITECTURE
    Integrate Best Practices In Enterprise Security
    Technical Deployment Models: What Is A Model
    Technical Deployment Models: What Is Cloud
    Cloud Security Services In The Enterprise
    Secure Design: Vocabulary And Concepts
    Secure Design: Vocabulary And Concepts Part 2
    Secure Design: Review Questions
    Data Security: Owners, Processors And Sovereignty
    Data Security: Data Flow Security
    Data Security: Data Remanence
    Data Security: Provisioning And Deprovisioning
    Data Security: Review Questions
    Enterprise Applications: What Are They
    Enterprise Applications: Directory Svcs, DNS
    Enterprise Applications: Directory Svsc, DNS Pt.2
    Enterprise Applications: Hands On With DNS RRs
    DNSSEC, Zone Transfers And TSIGs
    DNSSEC, Zone Transfers And TSIG Part 2
    DNSSEC, Zone Transfers And TSIG Part 3
    Hands On With DNSSEC
    Enterprise Applications: Configuration Management
    Enterprise Applications: Review Questions
    Integrating Assets – Key Points
    CONDUCTING SECURITY ASSESSMENTS
    Security Assessments: Types
    Security Assessments: Application Code Review
    Going Deeper: Vulnerability Scanning
    Going Deeper: Testing Software
    Software Testing Types
    Software Testing Types Part 2
    Logs, Memory And Debugging
    Social Engineering
    OSINT, Self-Assessments And Teaming
    Security Assessments – Review Questions
    Vulnerability Scanner (Nikto)
    Port Scanner (Zenmap)
    Protocol Analyzer (Wireshark)
    Network Enumerator (Zenmap)
    Password Cracker (John The Ripper)
    Using A Fuzzer In Kali Linux
    HTTP Interceptor (Burp Suite)
    Exploitation Framework (Social-Engineer Toolkit)
    Log Analysis In Kali (Grep And Cut)
    OpenSCAP
    Reverse Engineering (Strace)
    Conducting Security Assessments – Key Points
    RESPONDING TO AND RECOVERING FROM INCIDENTS
    Concepts And Vocabulary
    Incident Response Facilitators
    Incident Response Facilitators Part 2
    E-Discovery
    Incident Response Review Questions
    What Is COOP
    CSIRTs And Common Tools
    Evidence Collection And Handling
    Types Of Evidence
    Five Rules Of Evidence 5 B’s
    Principles Of Criminalistics
    Investigation Process
    Forensic Analysis Of Compromised Systems
    What Is The Order Of Volatility
    Conducting Forensic Analysis With Autopsy
    Responding To Incidents – Key Points

Linux

  • USING THE SHELL
    Overview
    Terminals And Shells
    Terminals And Shells Part 2
    Executing Commands
    Executing Commands Part 2
    Executing Commands Part 3
    Getting Help
    MOVING AROUND THE FILESYSTEM
    Filesystem Hierarchy
    Filesytem Commands
    Filesystem Commands Part 2
    Filesystem Permissions
    Moving Files
    WORKING WITH TEXT FILES
    Editing Files With Vi
    Editing Files With Vi Part 2
    Finding Files
    MANAGING RUNNING PROCESSES
    Managing Processes
    Managing Processes Part 2
    WRITING SIMPLE SHELL SCRIPTS
    Executing Scripts
    Programming Constructs
    Programming Constructs Part 2
  • UNDERSTANDING SERVER ADMINISTRATION
    Overview
    Installing Linux As A Server
    Installing Linux As A Server Part 2
    Hardening A Linux Server
    Configuring SSH
    Configuring System Logging
    Monitoring Performance
    ADMINISTERING NETWORKING
    Configure Networking
    Advanced Networking
    STARTING AND STOPPING SERVICES
    SysV Init And Upstart
    Systemd
    CONFIGURING A DNS SERVER
    Installing BIND
    Configuring Zones And Records
    Configuring Zones And Records Part 2
    CONFIGURING A DHCP SERVER
    Installing Dhcpd
    CONFIGURING AN APACHE WEB SERVER
    Installing Httpd
    Installing Httpd Part 2
    Configuring SSL
    CONFIGURING A MARIADB DATABASE SERVER
    Installing MariaDB
    Installing MariaDB Part 2
    Working With Data
    Working With Data Part 2
    CONFIGURING A SAMBA FILE SERVER
    Installing Samba
    Installing Samba Part 2
    CONFIGURING AN NFS FILE SERVER
    Installing NFS
    CONFIGURING A FTP SERVER
    Configuring An FTP Server
    Configuring An SFTP Server
  • LEARNING SYSTEM ADMINISTRATION
    Overview
    Graphical Administration Tools
    The Root User Account
    Administrative Commands
    Administrative Commands Part 2
    Configuring Hardware
    Configuring Hardware Part 2
    INSTALLING LINUX
    Installing Ubuntu
    Installing Ubuntu Part 2
    Installing Ubuntu Part 3
    Installing Fedora
    Installing Fedora Part 2
    Installing Fedora Part 3
    Enterprise Installations
    Dual Booting
    Dual Booting Part 2
    GETTING AND MANAGING SOFTWARE
    Managing Software With Apt
    Managing Software With YUM/DNF
    MANAGING USER ACCOUNTS
    Creating User Accounts
    Understanding Group Accounts
    Advanced Permissions
    MANAGING DISKS AND FILESYSTEMS
    Partitioning Disks
    Formatting And Mounting Disks
    Using LVM
  • GETTING STARTED WITH LINUX
    Getting Started With Linux
    Linux System Structure
    Working With The Command Line
    Understanding Shells
    Constructing Commands
    Command Substitution And History
    Command Paths
    File System Heirarchy
    File Specifics
    Creating Files
    Managing Files
    Archiving And Compressing Files
    Finding Files
    Managing Users And Groups
    Pipes And Redirection
    Working With Permissions
    Special Permissions
    Processing Text
    Intro To Debian
    Intro To RPM Package Management
    Configuring Name Resolution
    Editing Text
    Troubleshooting And Getting Help
  • PERFORMING BASIC LINUX TASKS
    Overview
    Introduction To Linux
    Linux Command Line
    MANAGING USERS AND GROUPS
    Super User Privileges
    Managing Users
    Managing Groups
    MANAGING PERMISSIONS AND OWNERSHIP
    Managing File Permissions
    Advanced Permissions
    MANAGING STORAGE
    Partitioning Disks
    Linux File System
    Logical Volume Manager (LVM)
    Filesystem Hierarchy Standard (FHS)
    MANAGING FILES AND DIRECTORIES
    Editing Files With Vi
    Editing Files With Vi Part 2
    Working With Files
    Locating Files
    Searching With Grep
    Manipulating Text
    MANAGING KERNEL MODULES
    Managing Kernal Modules
    MANAGING THE LINUX BOOT PROCESS
    Managing The Linux Boot Process
    MANAGING SYSTEM COMPONENTS
    Graphical User Interfaces
    Managing Services With Systemd
    Managing Services With SysVinit
    Troubleshooting Services
    Troubleshooting Services Part 2
    MANAGING DEVICES
    Configuring Hardware
    Supporting Printers
    MANAGING NETWORKING
    Understanding TCPIP
    Configure Networking
    Troubleshooting Network Connections
    MANAGING PACKAGES AND SOFTWARE
    Managing Software With Apt
    Managing Software With Yum/DNF
    Building From Source
    SECURING LINUX SYSTEMS
    Linux Security Best Practices
    Linux Security Best Practices Part 2
    Securing Apps With SELinux
    Securing Apps With AppArmor
    Filtering Traffic With Firewalld
    Filtering Traffic With Iptables
    Backup And Restore Data
    WORKING WITH BASH SCRIPTS
    Configuring Bash
    Writing A Bash Script
    AUTOMATING TASKS
    Scheduling Tasks
    Scheduling Tasks Part 2
    Version Control With Git
    INSTALLING LINUX
    Installing CentOS
    Installing CentOS Part 2
    Installing Ubuntu
  • LINUX FOR BEGINNERS
    Overview
    What Is Linux
    Choosing A Distribution
    Choosing A Desktop
    Installing Software
  • GETTING STARTED WITH THE CLI
    Terminals And Shells
    Terminals And Shells Part 2
    Getting Help
    BASIC SHELL COMMANDS
    Navigating The Filesystem
    Working With Files
    Working With Files Part 2
    ADVANCED SHELL COMMANDS
    Managing Processes
    Managing Storage
    Finding Files
    Other Useful Commands
    SHELL ENVIRONMENTS
    Environment Variables
    Environment Variables Part 2
    File Permissions
    File Systems
    INSTALLING SOFTWARE
    Debian Package Management
    Redhat Package Management
    Installing From Source
    EDITING FILES
    Vi And Vim
    Vi And Vim Part 2
    GNU Nano
  • KVM VIRTUAL MACHINES
    Overview
    Linux As A KVM Host
    Linux As A KVM Host Part 2
    Linux As A KVM Guest
    AMAZON AWS EC2 INSTANCES
    Creating An EC2 Instance
    Creating An EC2 Instance Part 2
    Configuring An EC2 Instance
    MICROSOFT AZURE COMPUTE
    Creating An Azure VM
    Creating An Azure VM Part 2
    Configuring An Azure VM
    DOCKER CONTAINERS
    Linux As A Docker Host
    Linux As A Docker Container
    Linux As A Docker Container Part 2
  • MONITORING AND AUDITING SECURITY
    Overview
    Managing Logs With Syslog
    Managing Logs With Journald
    Auditing User Passwords
    Auditing User Passwords Part 2
    Auditing The Filesystem
    Auditing SUID And SGID
    Auditing Logins With Fail2ban
    DATA SECURITY
    LUKS Disk Encryption
    Data Encryption With GPG
    MD5 And SHA Checksums
    Data Encryption With SSH
    SECURING SERVICES
    Securing Services With SELinux
    Securing Services With SELinux Part 2
    Chroot Jails
    LXC Containers
    SECURING NETWORKS
    TCP Wrappers
    Network Security With Iptables
    Network Security With Firewalld
    SECURITY TESTING
    Verifying Firewall Configurations
    Verifying Network Data Encryption
    Verifying Network Data Encryption Part 2
  • BASIC SCRIPT BUILDING
    Overview
    Basic Script Building
    USING VARIABLES
    Using Variables
    PERFORMING MATH
    Redirection
    Performing Arithmetic
    EXITING SCRIPTS
    Conditional Statements
    Conditional Statements Part 2
    Conditional Statements Part 3
    STRUCTURED COMMANDS
    Loops
    Loops Part 2
    Loops Part 3
    HANDLING USER INPUT
    User Input Positional Parameters
    User Input Positional Parameters Pt 2
    User Input Options
    User Input Options Part 2
    User Input Read
    PRESENTING DATA
    Presenting Data File Descriptors
    SCRIPT CONTROL
    Script Control
    Script Control Part 2
  • FUNCTIONS AND LIBRARIES
    Overview
    Functions
    SED AND AWK
    Intro To Sed
    Intro To Sed Part 2
    Intro To Sed Part 3
    Intro To Awk
    REGEX
    Regular Expressions
    Regular Expressions Part 2
    GUI SCRIPTING
    Writing Graphical Scripts
    Writing Graphical Scripts Pt2
    ADVANCED SED
    Advanced Sed: Multi-Line Commands
    Advanced Sed: Multi-Line Commands Part 2
    Advanced Sed: Hold Space For Negation
    ADVANCED GAWK
    Advanced Gawk: Variables
    Advanced Gawk: Arrays
    Advanced Gawk: Structured Commands
    Advanced Gawk: Formatted Printing And Functions
  • INTRODUCTION TO RHEL
    Overview
    Installing RHEL7
    Using The RHEL7 Console
    Software Updates
    Software Updates Part 2
    Deploying With Kickstart
    Deploying With Kickstart Part 2
    Systemd
    Creating USB Install Media
    NETWORKING
    Network Configuration
    Network Configuration Part 2
    Network Time Protocol (NTP)
    Network File System (NFS)
    Samba And SMB
    Samba And SMB Part 2
    STORAGE
    File System Hierarchy
    Managing File Systems
    Logical Volume Manager
    File System Snapshots
    System Storage Manager (SSM)
    Choosing A File System
    Migrating A File System
    Working With XFS
    SECURITY
    LUKS Disk Encryption
    Managing SELinux
    Configuring Firewalld
    Securing SSH
    Security Updates
    TROUBLESHOOTING
    Automatic Bug Reporting Tool (ABRT)
    SOS Reports
    Monitoring System Performance
    Monitoring System Logs
    VIRTUALIZATION
    Using QEMU And KVM

(ISC)²

  • ACCESS CONTROLS
    Control Access To Assets
    Manage Identification And Authentication
    Manage Identification And Authentication Pt.2
    Manage Identification And Authentication Pt.3
    Integrate Identity As A Third Party Service
    Authorization Mechanisms
    Authorization Mechanisms Part 2
    Authorization Mechanisms Part 3
    Authorization Mechanisms Part 4
    The Identity And Access Provisioning Lifecycle
    Access Control Attacks
    Access Controls – Key Points
    SECURITY OPERATIONS & ADMINISTRATION
    The ISC2 Code Of Professional Ethics
    Identify And Classify Assets
    Asset Ownership And Privacy Protection
    Establish Asset Handling Requirements
    Secure Provisioning And Resource Protection
    Databases And Data Warehouses
    Databases And Data Warehouses Part 2
    Foundational Security Operations Concepts
    Determine Data Security Controls
    Assessment, Test And Audit Strategies
    Control Selection And System Requirments
    Control Selection And System Requirements Part 2
    Participate In Change Management
    Implement Recovery Strategies
    Implement Recovery Strategies Part 2
    Implement Recovery Strategies Part 3
    Implement Physical Security
    Implement Physical Security Part 2
    Personnel Safety And Security Concerns
    Patch And Vulnerability Management
    Security In The SDLC
    Security In The SDLC Part 2
    Security Controls In Development Environments
    Security Operations, Administration – Key Points
    RISK IDENTIFICATION, MONITORING AND ANALYSIS
    Review Of Confidentiality, Integrity, Availability
    Evaluate And Apply Security Governance Principles
    Determine Compliance Requirements
    Information Security In A Global Context
    Risk Management Concepts
    Risk Management Concepts Part 2
    Risk Management Concepts Part 3
    Threat Modeling Concepts
    Risk In The Supply Chain
    Assessment And Testing
    Assessment And Testing Part 2
    Assessment And Testing Part 3
    Logging And Monitoring
    Logging And Monitoring Part 2
    Risk Identification, Monitoring, Analysis Key Pnts
    INCIDENT RESPONSE AND RECOVERY
    Supporting Forensic Investigations
    Supporting Forensic Investigations Part 2
    Conduct Incident Management
    Business Continuity And Disaster Recovery
    Business Continuity And Disaster Recovery Pt.2
    Incident Response And Recovery – Key Points
    CRYPTOGRAPHY
    Cryptography… Just What Is It Anyway
    Applied Cryptography
    Applied Cryptography Part 2
    Applied Cryptography Part 3
    Applied Cryptography Part 4
    Applied Cryptography Part 5
    Applied Cryptography Part 6
    Applied Cryptography Part 7
    Applied Cryptography Part 8
    Applied Cryptography Part 9
    Cryptography – Key Points
    NETWORK AND COMMUNICATIONS SECURITY
    Design Principles In Network Architecture
    Design Principles In Network Architecture Part 2
    Design Principles In Network Architecture Part 3
    Design Principles In Network Architecture Part 4
    Design Principles In Network Architecture Part 5
    Design Principles In Network Architecture Part 6
    Design Principles In Network Architecture Part 7
    Design Principles In Network Architecture Part 8
    Design Principles In Network Architecture Part 9
    Secure Network Components
    Secure Network Components Part 2
    Secure Network Components Part 3
    Implement Secure Communication Channels
    Implement Secure Communication Channels Pt.2
    Implement Secure Communication Channels Pt.3
    Implement Secure Communication Channels Pt.4
    Implement Secure Communication Channels Pt.5
    Network And Communication Security – Key Points
    SYSTEMS AND APPLICATION SECURITY
    Identify And Analyze Malicious Code
    Identify And Analyze Malicious Code Part 2
    Identify And Analyze Malicious Code Part 3
    Endpoint Device Security
    Endpoint Device Security Part 2
    Cloud Computing
    Operate And Secure Virtual Environments
    Systems And Application Security – Key Points
  • SECURITY AND RISK MANAGEMENT
    Overview
    Confidentiality, Integrity, Availability (CIA)
    Confidentiality, Integrity, Availability (CIA) Pt2
    Evaluate, Apply Security Governance Principles
    Evaluate, Apply Security Goverance Principles Pt2
    Determine Compliance Requirements
    Determine Compliance Requirements Part 2
    Determine Compliance Requirements Part 3
    Understand Legal And Regulatory Issues
    Understand Legal And Regulatory Issues Part 2
    Understand, Adhere To And Promote Ethics
    Policy, Standards, Procedures And Guidelines
    Understand Business Continuity Requirements
    Understand Business Continuity Requirements Part 2
    Understand Business Continuity Requirements Part 3
    Personnel, Security Policies And Procedures
    Understand/Apply Risk Management Concepts
    Understand/Apply Risk Management Concepts Part 2
    Understand/Apply Risk Management Concepts Part 3
    Understand/Apply Risk Management Concepts Part 4
    Understand/Apply Risk Management Concepts Part 5
    Understanding/Apply Threat Modeling Concepts
    Apply Risk Management To The Supply Chain
    Security Awareness/Education And Training
    Security And Risk Management – Key Points
    CIA Deep Dive
    Organizational Roles And Responsibilities
    Risk Terminology And Concepts
    ASSET SECURITY
    Identify And Classify Information And Assets
    Determine And Maintain Information/Asset Ownership
    Protect Privacy
    Protect Privacy Part 2
    Ensure Appropriate Asset Retention
    Determine Data Security Controls
    Determine Data Security Controls Part 2
    Determine Data Security Controls Part 3
    Establish Asset Handling Requirements
    Asset Security – Key Points
    SECURITY ARCHITECTURE AND ENGINEERING
    Implement And Manage Engineering Processes
    Fundamental Concepts Of Systems And Security
    Fundamental Concepts Of Systems And Security Pt.2
    Fundamental Concepts Of Systems And Security Pt.3
    Fundamental Concepts Of Systems And Security Pt.4
    Fundamental Concepts Of Systems And Security Pt.5
    Controls Based On Security Requirements
    Controls Based On Security Requirements Part 2
    Vulnerabilities Of Security Architecture
    Vulnerabilities Of Security Architecture Part 2
    Vulnerabilities Of Security Architecture Part 3
    Vulnerabilities Of Security Architectures Part 4
    Vulnerabilities In Web-Based Systems
    Vulnerabilities In Web-Based Systems Part 2
    Vulnerabilities In Mobile Systems
    Vulnerabilities In Embedded Devices
    Apply Cryptography
    Apply Cryptography Part 2
    Apply Cryptography Part 3
    Apply Cryptography Part 4
    Apply Cryptography Part 5
    Apply Cryptography Part 6
    Apply Cryptography Part 7
    Apply Cryptography Part 8
    Apply Cryptography Part 9
    Apply Cryptography Part 10
    Apply Cryptography Part 11
    Apply Cryptography Part 12
    Apply Cryptography Part 13
    Site/Facility Design And Security
    Site/Facility Design And Security Part 2
    Site/Facility Design And Security Part 3
    Site/Facility Design And Security Part 4
    Security Architecture And Engineering – Key Points
    COMMUNICATION AND NETWORK SECURITY
    Secure Design Principles In Networks
    Secure Design Principles In Networks Part 2
    Secure Design Principles In Networks Part 3
    Secure Design Principles In Networks Part 4
    Secure Design Principles In Networks Part 5
    Secure Design Principles In Networks Part 6
    Secure Design Principles In Networks Part 7
    Secure Design Principles In Networks Part 8
    Secure Design Principles In Networks Part 9
    Secure Design Principles In Networks Part 10
    Secure Design Principles In Networks Part 11
    Secure Design Principles In Networks Part 12
    Secure Network Components
    Secure Network Components Part 2
    Secure Network Components Part 3
    Secure Network Components Part 4
    Secure Network Components Part 5
    Implement Secure Communication Channels
    Implement Secure Communication Channels Part 2
    Implement Secure Communication Channels Part 3
    Implement Secure Communication Channels Part 4
    Implement Secure Communication Channels Part 5
    Implement Secure Communication Channels Part 6
    Communication And Network Security – Key Points
    IDENTITY AND ACCESS MANAGEMENT (IAM)
    Control Physical And Logical Access To Assets
    Control Physical And Logical Access To Assets Pt 2
    Manage Identification And Authentication
    Manage Identification And Authentication Part 2
    Manage Identification And Authentication Part 3
    Integrate Identity As A Third-Party Service
    Implement/Manage Authorization Mechanisms
    Implement/Manage Authorization Mechanisms Pt.2
    Manage Identity And Access Provisioning Lifecycle
    Access Control Attacks
    Access Control Attacks Part 2
    Identity And Access Management – Key Points
    SECURITY ASSESSMENT AND TESTING
    Assessment, Test And Audit
    Assessment, Test And Audit Part 2
    Conduct Security Control Testing
    Conduct Security Control Testing Part 2
    Conduct Security Control Testing Part 3
    Collect Security Process Data
    Security Assessment And Testing – Key Points
    SECURITY OPERATIONS
    Understand And Support Investigations
    Conduct Logging And Monitoring Activities
    Provisioning And Protecting Resources
    Provisioning And Protecting Resources Part 2
    Apply Foundational Security Operation Concepts
    Conduct Incident Management
    Detective And Preventative Measures
    Detective And Preventative Measures Part 2
    Patch And Vulnerability Management
    Understand Change Management
    Implement Recovery Strategies
    Implement Recovery Strategies Part 2
    Implement Recovery Strategies Part 3
    Implement Recovery Strategies Part 4
    Implement Recovery Strategies Part 5
    Implement And Test BCDR
    Implement And Test BCDR Part 2
    Implement And Test BCDR Part 3
    Implement And Manage Physical Security
    Implement And Manage Physical Security Part 2
    Personnel Safety And Security Concerns
    Security Operations – Key Points
    SOFTWARE DEVELOPMENT SECURITY
    Security In The SDLC
    Security In The SDLC Part 2
    Security In The SDLC Part 3
    Security In The SDLC Part 4
    Security In The SDLC Part 5
    Security In The SDLC Part 6
    Security Controls In Dev Environments
    Security Controls In Dev Environments Part 2
    Security Controls In Dev Environments Part 3
    Security Controls In Dev Environments Part 4
    Security Controls In Dev Environments Part 5
    Security Controls In Dev Environments Part 6
    Security Controls In Dev Environments Part 7
    Security Controls In Dev Environments Part 8
    Security Controls In Dev Environments Part 9
    Assess Effectiveness Of Software Security
    Assess Security Impact Of Acquired Software
    Secure Coding Guidelines And Standards
    Databases And Data Warehouses
    Databases And Data Warehouses Part 2
    Types Of Storage
    Knowledge-Based Systems
    Software Development Security – Key Points
  • SECURITY AND RISK MANAGEMENT
    Overview
    Security And Risk Management
    Security And Risk Management Part 2
    Security And Risk Management Part 3
    Security And Risk Management Part 4
    Security And Risk Management Part 5
    Security And Risk Management Part 6
    Security And Risk Management – Key Points
    ASSET SECURITY
    Asset Security
    Asset Security Part 2
    Asset Security – Key Points
    SECURITY ARCHITECTURE AND ENGINEERING
    Security Architecture And Engineering
    Security Architecture And Engineering Part 2
    Security Architecture And Engineering Part 3
    Security Architecture And Engineering Part 4
    Security Architecture And Engineering Part 5
    Security Architecture And Engineering Part 6
    Security Architecture And Engineering Part 7
    Security Architecture And Engineering Part 8
    Security Architecture And Engineering Part 9
    Security Architecture And Engineering Part 10
    Security Architecture And Engineering Part 11
    Security Architecture And Engineering Part 12
    Security Architecture And Engineering Part 13
    Security Architecture And Engineering Part 14
    Security Architecture And Engineering Part 15
    Security Architecture And Engineering Part 16
    Security Architecture And Engineering Part 17
    Security Architecture, Engineering Key Points
    COMMUNICATION AND NETWORK SECURITY
    Communication And Network Security
    Communication And Network Security Part 2
    Communication And Network Security Part 3
    Communication And Network Security Part 4
    Communication And Network Security Part 5
    Communication And Network Security Part 6
    Communication And Network Security Part 7
    Communication And Network Security Part 8
    Communication And Network Security Part 9
    Communication And Network Security – Key Points
    IDENTITY AND ACCESS MANAGEMENT (IAM)
    Identity And Access Management (IAM)
    Identity And Access Management (IAM) Part 2
    Identity And Access Management (IAM) Part 3
    Identity And Access Management (IAM) Part 4
    Identity And Access Management (IAM) Part 5
    Identity And Access Management (IAM) – Key Points
    SECURITY ASSESSMENT AND TESTING
    Security Assessment And Testing
    Security Assessment And Testing Part 2
    Security Assessment And Testing Part 3
    Security Assessment And Testing Part 4
    Security Assessment And Testing – Key Points
    SECURITY OPERATIONS
    Security Operations
    Security Operations Part 2
    Security Operations Part 3
    Security Operations Part 4
    Security Operations Part 5
    Security Operations Part 6
    Security Operations Part 7
    Security Operations Part 8
    Security Operations Part 9
    Security Operations Part 10
    Security Operations Part 11
    Security Operations Part 12
    Security Operations Part 13
    Security Operations – Key Points
    SOFTWARE DEVELOPMENT SECURITY
    Software Development Security
    Software Development Security Part 2
    Software Development Security Part 3
    Software Development Security Part 4
    Software Development Security Part 5
    Software Development Security Part 6
    Software Development Security Part 7
    Software Development Security – Key Points
  • ARCHITECTURAL CONCEPTS AND DESIGN REQUIREMENTS
    Overview
    Cloud Computing Concepts
    Describe Cloud Reference Architecture
    Describe Cloud Reference Architecture Part 2
    Cloud Security Concepts
    Cloud Security Concepts Part 2
    Secure Cloud Design Principles
    CLOUD DATA SECURITY
    Cloud Data Security
    Cloud Data Storage Architectures
    Cloud Data Security Strategies
    Cloud Data Security Strategies Part 2
    Cloud Data Security Strategies Part 3
    Cloud Data Discovery And Classification
    Designing Appropriate Data Protection
    Data Rights Mgmt Retention And Data Events
    CLOUD PLATFORM AND INFRASTRUCTURE SECURITY
    Cloud Infrastructure Components
    Cloud Infrastructure Risks
    Design And Plan Security Controls
    Design And Plan Security Controls Part 2
    Disaster, Recovery, And Business Continuity
    Disaster, Recovery And Business Continuity Part 2
    CLOUD APPLICATION SECURITY
    Cloud Application Security And The SDLC
    Identity And Access Management Solutions
    Cloud Software Assurance And Validation
    Cloud Software Assurance And Validation Part 2
    OPERATIONS
    Implement And Build Physical Infrastructure
    Running Physical Infrastructure
    Managing Physical Infrastructure
    Ensure Compliance
    Ensure Compliance Part 2
    Planning Data Center Design
    Risk Assessment
    Collection And Preservation Of Digital Evidence
    LEGAL AND COMPLIANCE
    Legal Requirements And Privacy
    Legal Requirements And Privacy Part 2
    Cloud Audit Processes
    Cloud Audit Processes Part 2
    Risk Management And Outsourcing

EC Council

  • INTRODUCTION
    Overview
    Intro To Ethical Hacking: Threats
    Intro To Ethical Hacking: Threats Part 2
    Intro To Ethical Hacking: Hacking Concepts
    Intro To Ethical Hacking: Hacking Concepts Part 2
    Intro To Ethical Hacking: Security Controls
    Intro To Ethical Hacking: Security Controls Part 2
    Intro To Ethical Hacking: Security Controls Part 3
    Intro To Ethical Hacking: Security Controls Part 4
    Intro To Ethical Hacking: Security Controls Part 5
    Intro To Ethical Hacking: Pentesting
    Intro To Ethical Hacking: Laws And Standards
    INFORMATION GATHERING AND VULNERABILITY IDENTIFICATION
    Footprinting
    Footprinting Part 2
    Footprinting Part 3
    ATTACKS AND EXPLOITS
    Host Discovery
    Scanning With Nmap
    Scanning With Nmap Part 2
    ProxyChains
    ENUMERATION
    Enumeration
    VULNERABILITY ANALYSIS
    Vulnerability Analysis Concepts
    Vulnerability Analysis Tools
    SYSTEM HACKING
    Password Attacks
    Password Attacks Part 2
    Password Attacks Part 3
    Password Attacks Part 4
    Password Attacks Part 5
    Privilege Escalation
    Privilege Escalation Part 2
    Privilege Escalation Part 3
    Covert Data Gathering
    Hidden Files
    Covering Tracks
    MALWARE THREATS
    Malware Threats Cehv10
    Malware Threats Part 2
    Malware Threats Part 3
    SNIFFING
    Network Sniffing
    Network Sniffing Part 2
    SOCIAL ENGINEERING
    Social Engineering
    Social Engineering Part 2
    Social Engineering Part 3
    DENIAL OF SERVICE
    Denial Of Service
    Denial Of Service Part 2
    Denial Of Service Part 3
    SESSION HIJACKING
    Session Hijacking
    Session Hijacking Part 2
    Session Hijacking Part 3
    EVADING IDS, FIREWALLS, AND HONEYPOTS
    Evading IDS, Firewalls And Honeypots
    Evading IDS, Firewall And Honeypots Part 2
    Evading IDS, Firewall And Honeypots Part 3
    Evading IDS, Firewall And Honeypots Part 4
    Evading IDS, Firewall And Honeypots Part 5
    HACKING WEB SERVERS
    Hacking Web Servers
    HACKING WEB APPLICATIONS
    Common Web App Threats
    Common Web App Threats Part 2
    Common Web Apps Threats Part 3
    Common Web App Threats Part 4
    Practical Web App Hacking
    Practical Web App Hacking Part 2
    Practical Web App Hacking Part 3
    SQL INJECTION
    SQL Concepts
    SQL Injection Types
    Other SQLi And Tools
    HACKING WIRELESS NETWORKS
    Wireless Hacking Concepts
    Wireless Hacking: Tools
    Wireless Hacking: Tools Part 2
    Wireless Hacking: Common Threats
    Wireless Hacking: Common Threats Part 2
    Wireless Hacking: Cracking WEP
    Wireless Hacking: Cracking WPA/WPA2
    HACKING MOBILE PLATFORMS
    Mobile Hacking
    IOT HACKING
    IoT Concepts
    IoT Concepts Part 2
    IoT Attacks
    IoT Attacks Part 2
    IoT Attacks Part 3
    CLOUD COMPUTING
    Cloud Computing Concepts
    Cloud Computing Concepts Part 2
    Cloud Computing Attacks
    Cloud Computing Attacks Part 2
    CRYPTOGRAPHY
    Cryptography Concepts
    Cryptography Concepts Part 2
    Cryptography Concepts Part 3
    Cryptography Concepts Part 4
    Cryptography Concepts Part 5
    Cryptography Concepts Part 6
    Cryptography Attacks
  • COMPUTER FORENSICS IN TODAY’S WORLD
    Overview
    Computer Forensics In Todays World
    Computer Forensics In Todays World Part 2
    Computer Forensics In Todays World Part 3
    Computer Forensics In Todays World Part 4
    Computer Forensics In Todays World Part 5
    COMPUTER FORENSICS INVESTIGATION PROCESS
    The Investigation Process
    The Investigation Process Part 2
    The Investigation Process Part 3
    The Investigation Process Part 4
    The Investigation Process Part 5
    The Investigation Process Part 6
    The Investigation Process Part 7
    Investigative Tools Demonstration
    UNDERSTANDING HARD DISKS AND FILE SYSTEMS
    Hard Disks And File Systems
    Hard Disks And File Systems Part 2
    Hard Disks And File Systems Part 3
    Hard Disks And File Systems Part 4
    Forensic File System Tools Demonstration
    DATA ACQUISITION AND DUPLICATION
    Data Acquisition And Duplication
    Data Acquisition And Duplication Part 2
    Data Acquisition And Duplication Part 3
    Data Acquisition Tools Demonstration
    DEFEATING ANTI-FORENSICS TECHNIQUES
    Defeating Anti-Forensic Techniques
    Defeating Anti-Forensic Techniques Part 2
    Defeating Anti-Forensic Techniques Part 3
    Defeating Anti-Forensic Techniques Part 4
    Anti-Forensics Tools Demonstration
    OPERATING SYSTEM FORENSICS
    Operating System Forensics
    Operating System Forensics Part 2
    Operating System Forensics Part 3
    Operating System Forensics Part 4
    Operating System Forensics Part 5
    Operating System Forensics Part 6
    NETWORK FORENSICS
    Network Forensics
    Network Forensics Part 2
    Network Forensics Part 3
    Network Forensics Part 4
    INVESTIGATING WEB ATTACKS
    Investigating Web Attacks
    Investigating Web Attacks Part 2
    Investigating Web Attacks Part 3
    Investigating Web Attacks Part 4
    Investigating Web Attacks Part 5
    Investigating Web Attacks Part 6
    DATABASE FORENSICS
    Database Forensics
    Database Forensics Part 2
    CLOUD FORENSICS
    Cloud Forensics
    Cloud Forensics Part 2
    Cloud Forensics Part 3
    Cloud Forensics Part 4
    MALWARE FORENSICS
    Malware Forensics
    Malware Forensics Part 2
    INVESTIGATING EMAIL CRIMES
    Investigating Email Crimes
    Investigating Email Crimes Part 2
    Investigating Email Crimes Part 3
    MOBILE FORENSICS
    Mobile Forensics
    Mobile Forensics Part 2
    Mobile Forensics Part 3
    INVESTIGATIVE REPORTS
    Forensics Report Writing And Presentation
  • INTRODUCTION TO INCIDENT RESPONSE AND HANDLING
    Overview
    Intro To Incident Response
    Intro To Incident Response Part 2
    Intro To Incident Response Part 3
    Intro To Incident Response Part 4
    RISK ASSESSMENT
    Risk
    Risk Part 2
    Risk Part 3
    Risk Part 4
    INCIDENT RESPONSE AND HANDLING STEPS
    Incident Response Steps
    Incident Response Steps Part 2
    Incident Response Steps Part 3
    Incident Response Steps Part 4
    CSIRT
    CSIRT
    CSIRT Part 2
    CSIRT Part 3
    HANDLING NETWORK SECURITY INCIDENTS
    Network Security Incidents
    Network Security Incidents Part 2
    Network Security Incidents Part 3
    HANDLING MALICIOUS CODE INCIDENTS
    Malicious Code Incidents
    HANDLING INSIDER THREATS
    Insider Threats
    Insider Threats Part 2
    FORENSIC ANALYSIS AND INCIDENT RESPONSE
    Forensic Analysis And Incident Response
    Forensic Analysis And Incident Response Part 2
    INCIDENT REPORTING
    Incident Reporting
    INCIDENT RECOVERY
    Incident Recovery
    SECURITY POLICIES AND LAWS
    Security Policy And Law
    Security Policy And Law Part 2
  • INTRODUCTION AND HISTORY OF CRYPTOGRAPHY
    Overview
    History Of Cryptography
    History Of Cryptography Part 2
    History Of Cryptography Part 3
    Crypto Definitions
    Crypto Definitions Part 2
    Crypto Definitions Part 3
    SYMMETRIC CRYPTOGRAPHY & HASHES
    Symmetric Cryptography And Hashes
    Symmetric Cryptography And Hashes Part 2
    Symmetric Cryptography And Hashes Part 3
    Symmetric Cryptography And Hashes Part 4
    Symmetric Cryptography And Hashes Part 5
    Symmetric Cryptography And Hashes Part 6
    Symmetric Cryptography And Hashes Part 7
    NUMBER THEORY AND ASYMMETRIC CRYPTOGRAPHY
    Asymmetric Cryptography
    Asymmetric Cryptography Part 2
    Asymmetric Cryptography Part 3
    APPLICATIONS OF CRYPTOGRAPHY
    Applications Of Cryptography
    Applications Of Cryptography Part 2
    Applications Of Cryptography Part 3
    Applications Of Cryptography Part 4
    Applications Of Cryptography Part 5
    Applications Of Cryptography Part 6
    Cryptanalysis
    Cryptanalysis Part 2

Apple

  • Overview
    Installation Images
    Building NetInstall Images
    Building NetRestore Images
    DEPLOYING IMAGES
    Deploying Via USB
    Deploying Via Network
    MANAGING MAC COMPUTERS WITH APPLE REMOTE DESKTOP
    Apple Remote Desktop
    MANAGING OS X DEVICES WITH PROFILE MANAGER
    Open Directory
    Profile Manager
    Profile Manager Part 2
    MANAGING SOFTWARE UPDATES
    Managing Updates
    CACHING SOFTWARE DOWNLOADS
    Caching Downloads
  • DIRECTORY SERVICES
    Overview
    Directory Services
    FILE SHARING
    File Sharing
    EMAIL, CONTACTS AND CALENDARS
    Collaboration Software
    SECURITY
    Security Features
    Security Features Part 2
    Security Features Part 3
    Security Features Part 4
    PRINTING
    Printing
    MOVING AND BACKING UP CONTENT
    Moving Content
    Time Machine
    RUNNING WINDOWS ON A MAC
    Running Windows Applications
    Boot Camp
    Boot Camp Part 2
  • INSTALLATION AND CONFIGURATION
    Overview
    Getting Prepared
    Installing MacOS High Sierra
    OS Recovery
    Initial Configuration
    Initial Configuration Part 2
    USER ACCOUNTS
    Managing User Accounts
    Managing User Accounts Part 2
    Multiple User Accounts
    User Account Security
    FILE SYSTEMS
    File Storage
    File Storage Part 2
    Securing Data
    Securing Data Part 2
    File Permissions
    File Permissions Part 2
    File Permissions Part 3
    DATA MANAGEMENT
    Managing Files
    Managing Files Part 2
    Archives And Images
    Time Machine
    APPLICATIONS AND PROCESSES
    Managing Applications
    Application Data
    Application Data Part 2
    Application Support
    Application Support Part 2
    Application Support Part 3
    NETWORK CONFIGURATION
    Network Configuration
    Network Configuration Part 2
    Network Configuation Part 3
    Advanced Network Configuration
    NETWORK SERVICES
    Sharing Resources
    Sharing Resources Part 2
    Using ICloud
    SYSTEM MANAGEMENT
    Peripheral Devices
    Supporting Printers
    System Troubleshooting
    System Troubleshooting Part 2
    System Troubleshooting Part 3
  • CONFIGURING AND MONITORING OS X SERVER
    Overview
    Installing OS X Server
    Installing OS X Server Part 2
    Domain Name System
    Remote Management
    Certificates
    Monitoring
    OS X Maintenance
    CONFIGURING ACCOUNTS
    User Authentication
    Open Directory
    User Accounts
    User Accounts Part 2
    MANAGING DEVICES WITH CONFIGURATION PROFILES
    Configuration Profiles
    Configuration Profiles Part 2
    Configuration Profiles Part 3
    SHARING FILES
    Sharing Files
    IMPLEMENTING DEPLOYMENT SOLUTIONS
    Caching Server
    Software Update
    Deployment With NetInstall
    Deployment With NetRestore
    Deploying An Image
    PROVIDING NETWORK SERVICES
    Time Machine
    DHCP
    Virtual Private Networks
    Basic Web Server
    Advanced Web Server
    USING COLLABORATIVE SERVICES
    Wiki Websites
    Mail Server
    Mail Server Part 2
    Calendar Server
    Contacts Service
    Messages Service
  • INSTALLATION AND CONFIGURATION
    Getting Prepared
    Installing MacOS Mojave
    OS Recovery
    OS Recovery Part 2
    Initial Configuration
    Initial Configuration Part 2
    USER ACCOUNTS
    Managing User Accounts
    Managing User Accounts Part 2
    Multiple User Accounts
    User Account Security
    FILE SYSTEMS
    File Storage
    File Storage Part 2
    Securing Data
    Controlling File Permissions
    UNIX Style Permissions
    Default File Permissions
    DATA MANAGEMENT
    Managing Files
    Managing Files Part 2
    Archives And Images
    Time Machine
    APPLICATIONS AND PROCESSES
    Managing Applications
    Application Data
    Application Data Part 2
    Application Support
    Application Support Part 2
    Application Support Part 3
    NETWORK CONFIGURATION
    Network Types And Addressing
    Configuring Network Adapters
    Configuring Wireless Networking
    Network Locations
    NETWORK SERVICES
    Sharing Resources
    Sharing Resources Part 2
    Administering ICloud
    SYSTEM MANAGEMENT
    Peripheral Devices
    Supporting Printers
    Understanding The MacOS Boot Process
    System Troubleshooting
  • INTRODUCTION
    Overview
    What’s New In MacOS Server 5.6
    Installing MacOS Server
    Remote Management
    Monitoring Performance
    Managing Software With Brew
    Managing Software With Brew Part 2
    SERVICES THAT STAYED
    Open Directory
    Profile Manager
    Profile Manager Part 2
    Profile Manager Part 3
    SERVICES THAT MOVED
    File Server
    Time Machine Server
    Caching Server
    SERVICES THAT ARE GONE
    Replacing DNS With ISC-BIND
    Replacing DNS With ISC-BIND Part 2
    Replacing DHCP With ISC-DHCP
    Replacing Websites With Apache
    Replacing Websites With Apache Part 2
    Replacing Websites With Apache Part 3
    Replacing Websites With Apache Part 4
    Replacing Mail Server

AWS

  • CLOUD CONCEPTS
    Overview
    What Is Cloud Computing
    Global Infrastructure And The AWS Advantage
    Sign Up For AWS
    SECURITY
    IAM: Access Management In AWS
    S3: Durable And Available Storage
    S3: Create A Static Website
    EC2: VMs In The Cloud
    EC2: Create And Manage Instances
    EC2: Use A Load Balancer
    Lambda: Serverless Compute
    Elastic Beanstalk And CloudFormation
    Databases In AWS
    Create An RDS Database
    Route53: DNS With Options
    CloudWatch And CloudTrail
    TECHNOLOGY
    Compliance And The Shared Responsibility Model
    Protection Services
    BILLING AND PRICING
    Consolidated Billing And Organizations
  • INTRODUCTION TO AWS
    Overview
    Introduction To AWS
    Introduction To AWS Part 2
    AMAZON S3 AND GLACIER STORAGE
    Amazon S3 Basics
    Amazon S3 Basics Part 2
    Amazon S3 Advanced Features
    Amazon S3 Advanced Features Part 2
    Amazon Glacier
    AMAZON EC2 AND EBS
    Amazon EC2 Basics
    Amazon EC2 Basics Part 2
    Amazon EC2 Basics Part 3
    Amazon EC2 Basics Part 4
    AMAZON VIRTUAL PRIVATE CLOUD
    Virtual Private Cloud
    Virtual Private Cloud Part 2
    ELB, CLOUDWATCH AND AUTO SCALING
    ELB And Auto Scaling
    Load Balancing And Auto Scaling
    Load Balancing And Auto Scaling Part 2
    Load Balancing And Auto Scaling Part 3
    AWS IDENTITY AND ACCESS MANAGEMENT
    Identity And Access Management
    Identity And Access Management Part 2
    DATABASES AND AWS
    Amazon Relational Database Service
    Amazon Relational Database Service Part 2
    Amazon Redshift
    Amazon Dynamodb
    SQS, SWF, AND SNS
    Amazon Simple Queue Service
    Amazon Simple Workflow Service
    Amazon Simple Notification Service
    DNS AND AMAZON ROUTE 53
    DNS And Route 53
    AMAZON ELASTICACHE
    Amazon ElastiCache
    ADDITIONAL KEY SERVICES
    Storage Services
    Security Services
    Analytics Services
    DevOps Services
    SECURITY ON AWS
    Security On AWS
    Account Security
    Cloud Service Specific Security
    Cloud Service Specific Security Part 2
    Cloud Service Specific Security Part 3
    AWS RISK AND COMPLIANCE
    AWS Risk And Compliance
    ARCHITECTURE BEST PRACTICES
    Architecture Best Practices
  • IDENTITY & ACCESS MANAGEMENT
    AWS Security
    IAM Components
    IAM Authentication
    IAM Groups And Roles
    IAM Security Policies
    IAM Security Policies Part 2
    Additional Security Tools
    VIRTUAL PRIVATE CLOUD
    Managing VPCs
    Managing VPCs Part 2
    ELASTIC COMPUTE CLOUD
    EC2 Disk Storage
    EC2 Disk Storage Part 2
    Monitoring EC2 Performance
    EC2 Custom Metrics
    HIGH AVAILABILITY
    Supporting High Availability
    Supporting High Availability Part 2
    APPLICATION LOAD BALANCER
    Application Load Balancers
    Application Load Balancers Part 2
    ROUTE 53
    Supporting Route 53
    Redundancy With Route 53
    Redundancy With Route 53 Part 2
    RELATIONAL DATABASE SERVICE
    RDS Availability
    RDS Performance
    ORCHESTRATION
    Automation And Orchestration
    BACKUP AND RECOVERY
    Service Backup And Recovery
    Service Backup And Recovery Part 2
    Service Backup And Recovery Part 3
    Backup And Recovery Scenarios
    Backup And Recovery Scenarios Part 2
    BILLING AND COST MANAGEMENT
    Managing AWS Costs
    Managing AWS Costs Part 2
  • IDENTITY AND ACCESS MANAGEMENT (IAM)
    Overview
    Security In AWS
    Set Up Roles, Groups And Users
    Set Up Roles, Groups And Users Part 2
    Security Policies
    Security Policies Part 2
    ELASTIC COMPUTE CLOUD (EC2)
    EC2 Fundamentals
    Storage In EC2
    EC2 Up And Running
    Project: Simple Web Server
    Set Up AWS CLI
    Project: Simple Web Server Using The CLI
    SIMPLE STORAGE SERVICE (S3)
    S3 Fundamentals
    Security In S3
    Project: Static Website
    Project: Static Website With CORS
    Accessing S3 From EC2 With Roles
    Developing For S3 And CloudFront
    Project: Create A CloudFront Distribution
    RELATIONAL DATABASE SERVICE (RDS)
    RDS Fundamentals
    RDS: Up And Running
    RDS: Multi-AZ And Read Replicas
    ElastiCache Fundamentals
    AUTOMATION AND DEPLOYMENT
    CloudFormation Fundamentals
    Project: Simple Web Server With CloudFormation
    Elastic Beanstalk Fundamentals
    Deploying With Elastic Beanstalk CLI
    SERVERLESS
    What Is Serverless Computing
    Use AWS Lambda
    Use API Gateway
    Step Functions And X-Ray
    DYNAMODB
    DynamoDB Fundamentals
    DynamoDB: Indexes, Acceleration And Queries
    ENCRYPTION
    KMS Fundamentals
    SCALING SOFTWARE
    Simple Queue Service Fundamentals
    Simple Notification Service Fundamentals
    Kinesis Fundamentals
    DEVELOPER SERVICES
    Continuous Integration And Delivery
    CodeCommit: Git And AWS
    CodeBuild: Test, Build And Save
    CodeDeploy Fundamentals
    CodeDeploy Fundamentals Part 2
    CodePipeline Fundamentals
    AUTHENTICATION AND AUTHORIZATION
    Web Identity Federation And Cognito
  • APPLICATION LIFECYCLE MANAGEMENT
    Overview
    Continuous Integration And Delivery
    Use CodeCommit
    CodeBuild: Foudations
    CodeBuild: Use The AWS CLI
    CodeDeploy: Foundations
    CodeDeploy: Work With Local Instances
    CodePipeline: Foundations
    CodePipeline: Actions And Transitions
    CodeStar: Bring It All Together
    AUTOMATION
    Elastic Beanstalk: Foundations
    Elastic Beanstalk: Environments And Deployments
    Elastic Beanstalk: Work With Docker
    Elastic Beanstalk: Multiple Containers
    Elastic Beanstalk: Advanced Configuration
    ECS Foundations
    ECS: Use Tasks And Services
    CloudFormation Foundations
    CloudFormation: Deployments And Updates
    CloudFormation: Use Nested Stacks
    Managing Apps With OpsWorks
    Managing Apps With OpsWorks Part 2
    Managing Apps With OpsWorks Part 3
    SERVERLESS DEVELOPMENT
    Lambda Foundations
    Lambda: Advanced Usage
    Lambda: Advanced Usage Part 2
    Step Functions Foundations
    MONITORING AND LOGGING
    Monitoring Performance With CloudWatch
    Monitoring Logs With CloudWatch
    CloudWatch Alarms
    CloudWatch Events
    CloudWatch And CloudTrail
    COMPLIANCE
    AWS Config
    AWS Systems Manager
    AWS Secrets Manager And Service Catalog
  • COLLECTION
    Overview
    Kinesis Stream Essentials
    Firehose Collection
    Collect Data With Kinesis Agent
    IoT Essentials
    Rules And The Rule Engine
    Collect Sensor Data
    SQS Essentials
    STORAGE
    S3 Essentials
    Permissions And Encryption
    Storage Classes, Lifecycles, And Performance
    DynamoDB Essentials
    Read And Write Operations
    DynamoDB Indexes
    Global Tables And Conditional Writes
    Streams
    PROCESSING
    EMR Essentials
    Use Hue And Hive With EMR
    Spark And EMR
    SageMaker Essentials
    Training With SageMaker Notebooks
    AWS Lambda Essentials
    Processing Data With Lambda
    Data Pipeline Essentials
    Database Migration Essentials
    Glue Essentials
    ANALYSIS
    Elasticsearch Essentials
    Elasticsearch And Kibana
    Athena Essentials
    Redshift Essentials
    Loading And Unloading Data In Redshift
    Kinesis Analytics Essentials
    VISUALIZATION
    QuickSight Essentials
    JavaScript Visualization From S3
    SECURITY
    IAM Basics For Big Data
    CloudTrail Essentials
    Database And Storage Encryption

Agile

  • WHAT IS AGILE?
    Overview
    What Is Agile?
    The Agile Manifesto
    The Agile Manifesto Part 2
    The Agile Life Cycle
    Agile Roles
    AGILE METHODOLOGIES
    Agile Methodologies: Scrum And XP
    Agile Methodologies: Kanban And Lean
    STARTING THE PROJECT
    Vision And Scope
    Vision And Scope Part 2
    Identifying Stakeholders
    Identifying Stakeholders Part 2 – Users
    Building An Agile Team
    Users Stories
    User Stories Part 2
    User Stories Part 3
    PROGRESSING THE PROJECT
    Iteration Planning
    Risk Management
    Planning Communication
    Planning Iteration Capacity
    Concluding Iterations
    PROJECT RELEASE AND CLOSE-OUT
    Additions And Impediments
    3rd Party Interfaces
    Delivering The Release
    Project Close-Out
    DIY
    Test Prep
    Sample Paper Review Agile Foundation
  • AGILE ROLES – PRODUCT OWNER
    Introduction
    The Role Of The Product Owner
    User Personas And Stories
    User Personas And Stories Part 2
    5 Levels Of Planning: Vision And Roadmap
    5 Levels Of Planning: Release
    5 Levels Of Planning: Iteration
    5 Levels Of Planning: Iteration Part 2
    Agile Metrics
    Leadership Behaviours
  • AGILE SCRUM MASTER
    Overview
    Overview Of The 2019 Syllabus Updates
    Agile Way Of Thinking
    The Agile Manifesto
    The Agile Principles
    Waterfall Or Agile
    Agile Methodologies
    Agile Methodologies Part 2
    Agile Methodologies Part 3
    Agile Methodologies Part 4
    Agile Methodologies 2019 Update
    The Scrum Team
    Developing The Scrum Team
    Common Team Problems: Resistance
    Common Team Problems: Resistance Part 2
    Common Team Problems: Interactions
    Scrum Team Roles
    Intro To Scrum Planning
    Scrum Planning: User Stories
    Scrum Planning: User Stories, The Backlog
    Scrum Planning: Layers
    Sprint Planning: Why Plan
    Sprint Planning: Why Plan Part 2
    Sprint Planning: Velocity, Capacity And Estimation
    Sprint Planning: Estimation Continued
    Sprint Planning: Return On Investment
    Sprint Progress
    Closing The Sprint
    Adapting To Agile
    Exam Preparation
    Exam Preparation Part 2
  • DEVOPS PROFESSIONAL
    Introduction To DevOps Professional
    The DevOps Professional Exam
    What Is DevOps
    DevOps Adoption
    Methodologies: Lean
    Methodologies: Continuous Delivery
    Methodologies: Agile
    Methodologies: Kata
    The Three Ways Of DevOps
    Flow
    Feedback
    Continual Learning And Experimentation
    DevOps Transformation
    DevOps Transformation Part 2
    DevOps Transformation Part 3
    DevOps Transformation Part 4
    1st Way: Deployment Pipeline
    1st Way: Deployment Pipeline Part 2
    1st Way: Automated Testing
    1st Way: Continuous Integration
    1st Way: Low-Risk Releases
    2nd Way: Telemetry
    2nd Way: Telemetry Part 2
    2nd Way: Deployment Feedback
    2nd Way: Hypothesis Driven Development
    2nd Way: Review And Co-Ordination
    3rd Way: Continual Learning
    3rd Way: Discoveries
    Information Security
    Change Management
    Exam Overview
    Exam Overview Part 2
    Exam Overview Part 3
  • AGILE TESTING
    Overview
    Intro To Agile
    Intro To Agile Part 2
    Agile Testing Quadrants
    Development For Testing
    Testing For Story-Telling
    Responsibilities And Test Planning
    Iteration Delivery
  • LEAN AGILE PROJECT MANAGEMENT
    Overview
    Introduction
    Session 1
    Session 2
    Session 3
    Session 4
    Session 5
    Session 6
    Session 7
    Session 8
    Session 9
  • AGILESHIFT
    Overview
    Introduction To AgileSHIFT
    Value And VUCA
    TechSHIFT And Disrupters
    The Delta
    Enterprise Agility
    Enterprise Agility Part 2
    Why AgileSHIFT
    The AgileSHIFT Framework
    The AgileSHIFT Framework Part 2
    The AgileSHIFT Framework Part 3
    AgileSHIFT Principles
    AgileSHIFT Principles Part 2
    AgileSHIFT Principles Part 3
    AgileSHIFT Practices
    AgileSHIFT Practices Part 2
    AgileSHIFT Roles
    The AgileSHIFT Workflow
    The AgileSHIFT Workflow Part 2
    The AgileSHIFT Workflow Part 3
    The AgileSHIFT Workflow Part 4
    The AgileSHIFT Examination
    The AgileSHIFT Examination Part 2
  • DEVOPS FOUNDATION
    Introduction To DevOps Foundation
    The DevOps Foundation Exam
    Origins Of DevOps
    Origins Of DevOps Part 2
    Origins Of DevOps Part 3
    Definition And Justification For DevOps
    Misconceptions Of DevOps
    Lean
    Agile
    DevOps Principles
    DevOps Principles Part 2
    DevOps Key Practices: Inherent Challenges
    DevOps Key Practices: Inherent Challenges Part 2
    DevOps Key Practices: Working Efficiently
    DevOps Key Practices: Working Efficiently Part 2
    Applicability And Limitations Of DevOps
    Evolving Architecture And Organizational Models
    Sample Exam Part 1
    Sample Exam Part 2

CertNexus

  • SECURITY IN SOFTWARE
    Overview
    Prior Knowledge And Expectations
    Gather Software Requirements
    Assignment: Identity Requirments
    Activity: Identify Requirements
    Factors That Undermine Software Security
    Software Vulnerabilities And Attack Phases
    Attack Patterns
    Assignment: Find Vulnerabilities
    Activity: Find Vulnerabilities
    Assignment: New Password Requirements
    Activity: New Password Requirements
    Assignment: Hashing Passwords
    Activity: Hashing Passwords
    Vulnerability Intelligence
    Assignment: Vulnerability Search
    Activity: Vulnerability Search
    HANDLING VULNERABILITIES
    Bugs In Software
    External Libraries And Services
    Handling Errors Securely
    Human-Related Security
    Security Requirements And Design
    Security Through The Software Lifecycle
    Assignment: Exploring Leftover Artifacts
    Activity: Exploring Leftover Artifacts
    DESIGNING FOR SECURITY
    Principles Of Secure Design
    Avoid Common Mistakes
    Assignment: Common Security Design Flaws
    Activity: Common Security Design Flaws
    Understand Risk And Threats
    Risk Response Strategies
    Exploit Countermeasures
    DEVELOPING SECURE CODE
    Guidelines For Secure Coding
    Buffer Overflows And Prevention
    Race Conditions
    Assignment Using Locks Remediate Race Condition
    Activity Using Locks To Remediate Race Condition
    OWASP Top Ten Platform Vulnerabilities
    Web Application Vulnerabilities Deep Dive
    Mobile Application Vulnerabilities Deep Dive
    IoT Vulnerabilities Deep Dive
    Desktop Vulnerabilities Deep Dive
    Privacy Vulnerability Defects
    IMPLEMENTING COMMON PROTECTIONS
    Secure Session Management
    Users, Protections And Passwords
    Encryption And Data Protections
    Error Handling And Protections
    TESTING AND MAINTAINING SOFTWARE SECURITY
    Testing Software For Security
    Monitoring And Logging Of Production Applications
  • THREATS AND ATTACKS
    Overview
    Threat Targets
    Threat Actors
    Threat Motives
    Threat Intentions
    Attack Phases
    Attack Vectors
    Technique Criteria
    Impact Of Attacks
    Footprinting
    Network And Port Scanning
    Vulnerability Scanning
    Penetration Testing
    Web App Scanning
    Enumeration
    GAINING ACCESS
    Exploitation Frameworks
    Client-Side Attacks
    Server-Side Attacks
    Mobile Threats
    Web Attacks
    Password Attack
    Wireless Attacks
    Social Engineering
    Man-In-The-Middle
    Malware
    Out-Of-Band Attacks
    Denial Of Service
    POST-EXPLOITATION
    Command And Control
    Data Exfiltration
    Pivoting
    Lateral Movement
    Persistence
    Keylogging
    Anti-Forensics
    Covering Your Tracks
    THREAT RESEARCH AND INCIDENT PREP
    Threat Research And Incident Prep
    DATA COLLECTION AND ANALYSIS
    Network Data Collection And Analysis
    Host Data Collection And Analysis
    Anomaly Detection
    Indicators Of Compromise
    Log Analysis Tools
    INCIDENT RESPONSE TECHNIQUES
    Containment
    Asset Discovery
    Windows Incident Response Tools
    Linux Incident Response Tools
    Incident Response Process
    Incident Response Preparation
    Compliance And Standards
    Frameworks And Best-Practices
    Forensic Concepts
    VULNERABILITY ASSESSMENTS
    Common Vulnerable Areas
    Vulnerability Assessments

Service Management

  • SIAM FOUNDATION
    Overview
    Introduction To SIAM
    Introduction To SIAM Part 2
    SIAM Eco-System And Terminology
    SIAM Practices
    SIAM Practices – Process Forums
    SIAM Drivers – Service Satisfaction
    SIAM Drivers – Source Landscape
    SIAM Drivers – Operational Efficiencies
    SIAM Drivers – External And Commercial
    The Business Case For SIAM
    SIAM Implementation Roadmap
    Service Integrators – External Service Integrator
    Service Integrators – Internal Service Integrator
    Service Integrators – Hybrid Service Integrator
    Service Integrators – Lead Supplier
    SIAM Practices
    Roles And Responsibilities
    Roles And Responsibilities Part 2
    SIAM Processes – Introduction
    SIAM Processes – Audit And Control And BRM
    SIAM Processes – Change Mgmt. And Release Mgmt.
    SIAM Processes – Contract Mgmt. And CSI
    SIAM Processes – Event Mgmt. And Financial Mgmt.
    SIAM Processes – Sec Mgmt. And Knowledge Mgmt.
    SIAM Processes – Incident Mgmt.
    SIAM Processes – Problem Mgmt.
    SIAM Processes – SLM And Supplier Mgmt.
    SIAM Processes – SLM And Supplier Mgmt. Part 2
    SIAM Processes – Configuration Mgmt.
    SIAM Processes – SPM And SCM
    SIAM Processes – Project Mgmt And Toolset Mgmt
    SIAM And Other Frameworks: ITIL
    SIAM And Other Frameworks: ITIL Part 2
    SIAM And Other Frameworks: ISO/IEC 20000
    SIAM And Other Frameworks: Lean And COBIT
    SIAM And Other Frameworks: DevOps And Projects
    Cultural Considerations
    Challenges And Risks
    Challenges And Risks Part 2
    Challenges And Risks Part 3
    Examination Preparation
    Exam Review
    Exam Review Part 2
  • VERISM FOUNDATION
    Introduction To VeriSM
    The VeriSM Qualification
    Organisational Context
    Organisational Context Part 2
    Organisational Context Part 3
    Organisational Governance
    Digital Transformation
    Service Culture
    Organisational Structure
    Service Management Challenges
    Service Management Challenges Part 2
    The VeriSM Model
    The VeriSM Model Part 2
    The Management Mesh
    VeriSM Stages: Define
    VeriSM Stages: Produce
    VeriSM Stages: Provide
    VeriSM Stages: Respond
    Adapting The VeriSM Model
    Progressive Management Practices: Agile
    Progressive Management Practices: Agile Part 2
    Progressive Management Practices: DevOps
    Progressive Management Practices: SIAM
    Progressive Management Practices: Lean
    Progressive Management Practices: Shift Left
    Progressive Management Practices: CX / UX
    Progressive Practice: Continous Delivey
    Innovative Technologies
    Technologies: Cloud And Virtualisation
    Technologies: Automating, Big Data And IoT
    Technologies: Mobile Computing
    Getting Started With VeriSM
    Exam Review
    Exam Review Part 2
  • PROJECT MANAGEMENT VS SERVICE MANAGEMENT
    Project Management VS Service Management
  • ISO/IEC 20,000 FOUNDATION
    Overview
    The Foundation Exam
    Concepts Of Service Management
    Concepts Of ISO/IEC 20,000
    What Is A Service Management System
    SMS: Context Of The Organization
    SMS: Leadership And Risk Management
    SMS: 3rd Parties, Documentation, Resource Mgmt
    Scope, Plan And Support The SMS
    SMS: Performance Evaluation And Improvement
    Service Design And Transition
    Service Catalog, Service Asset, Configuration Mgmt
    BRM, SLM, Supplier Management
    Budgeting, Accounting, Demand, Capacity Mgmt
    Change Mgmt, Release And Deployment
    Service Request, Incident, Problem Mgmt
    Availability, Continuity, Security Mgmt
    August 2019 Update
    Exam Preparation
    Sample Paper
    Sample Paper Part 2
  • DEVOPS FOUNDATION
    Introduction To DevOps Foundation
    The DevOps Foundation Exam
    Origins Of DevOps
    Origins Of DevOps Part 2
    Origins Of DevOps Part 3
    Definition And Justification For DevOps
    Misconceptions Of DevOps
    Lean
    Agile
    DevOps Principles
    DevOps Principles Part 2
    DevOps Key Practices: Inherent Challenges
    DevOps Key Practices: Inherent Challenges Part 2
    DevOps Key Practices: Working Efficiently
    DevOps Key Practices: Working Efficiently Part 2
    Applicability And Limitations Of DevOps
    Evolving Architecture And Organizational Models
    Sample Exam Part 1
    Sample Exam Part 2
  • DEVOPS PROFESSIONAL
    Introduction To DevOps Professional
    The DevOps Professional Exam
    What Is DevOps
    DevOps Adoption
    Methodologies: Lean
    Methodologies: Continuous Delivery
    Methodologies: Agile
    Methodologies: Kata
    The Three Ways Of DevOps
    Flow
    Feedback
    Continual Learning And Experimentation
    DevOps Transformation
    DevOps Transformation Part 2
    DevOps Transformation Part 3
    DevOps Transformation Part 4
    1st Way: Deployment Pipeline
    1st Way: Deployment Pipeline Part 2
    1st Way: Automated Testing
    1st Way: Continuous Integration
    1st Way: Low-Risk Releases
    2nd Way: Telemetry
    2nd Way: Telemetry Part 2
    2nd Way: Deployment Feedback
    2nd Way: Hypothesis Driven Development
    2nd Way: Review And Co-Ordination
    3rd Way: Continual Learning
    3rd Way: Discoveries
    Information Security
    Change Management
    Exam Overview
    Exam Overview Part 2
    Exam Overview Part 3

PMI®

  • INTRO TO SERIES
    Overview
    INTRO TO PMI / PMP
    What Is PMP
    INTRO TO PROJECTS
    What Is A Project
    What Is A Project Part 2
    INTRO TO PMI PROJECT GROUPS
    PMBok Project Processes
    PMBok Project Processes Part 2
    PMBok Project Processes Part 3
    PMBok Project Processes Part 4
    PMBok Project Processes Part 5
    THE PROJECT ENVIRONMENT
    The Project Environment
    The Project Environment Part 2
    The Project Environment Part 3
    PROJECT ROLES
    The Project Manager
    PROJECT PROCESSES: PROJECT INTEGRATION
    Project Processes: Project Integration Management
    Project Processes: Project Integration Mgmt Part 2
    Integration Processes: Develop Project Charter
    Integration Processes: Develop Project Plan
    Integration Processes: Develop Project Plan Part 2
    Integration Processes: Develop Project Plan Part 3
    Integration Processes: Direct Project Work
    Integration Processes: Manage Project Knowledge
    Integration Processes: Control Project Work
    Integration Processes: Integrated Change Control
    Integration Processes: Close Project Or Phase
    PROJECT PROCESSES: PROJECT SCOPE
    Project Processes: Project Scope Management
    Project Processes: Project Scope Management Part 2
    Project Processes: Project Scope Management Part 3
    Scope Processes: Plan Scope Management
    Scope Processes: Collect Requirements
    Scope Processes: Collect Requirements Part 2
    Scope Processes: Collect Requirements Part 3
    Scope Processes: Define Scope
    Scope Processes: Create WBS
    Scope Processes: Validate Scope
    Scope Processes: Control Scope
    PROJECT PROCESSES: PROJECT SCHEDULE
    Project Processes: Project Schedule Management
    Schedule Processes: Plan Schedule Management
    Schedule Processes: Define Activities
    Schedule Processes: Sequence Activities
    Schedule Processes: Estimate Activity Duration
    Schedule Processes: Estimate Activity Duration Pt2
    Schedule Processes: Estimate Activity Duration Pt3
    Schedule Processes: Develop Schedule
    Schedule Processes: Control Schedule
    PROJECT PROCESSES: PROJECT COST
    Project Processes: Project Cost Management
    Project Processes: Project Cost Management Part 2
    Cost Processes: Plan Cost Management
    Cost Processes: Estimate Costs
    Cost Processes: Estimate Costs Part 2
    Cost Processes: Determine Budget
    Cost Processes: Control Costs
    PROJECT PROCESSES: PROJECT QUALITY
    Project Processes: Project Quality Management
    Project Processes: Project Quality Management Pt.2
    Project Processes: Project Quality Management Pt.3
    Project Quality Mgmt: Plan Quality Management
    Project Quality Mgmt: Manage Quality
    Quality Mgmt Processes: Control Quality
    PROJECT PROCESSES: PROJECT RESOURCES
    Project Processes: Project Resource Management
    Project Processes: Project Resource Mgmt Part 2
    Project Resource Mgmt: Plan Resources
    Resource Processes: Estimate Activity Resources
    Resource Processes: Acquire Resources
    Project Processes: Develop Team
    Project Processes: Develop Team Part 2
    Project Processes: Develop Team Part 3
    Project Processes: Develop Team Part 4
    Resource Processes: Manage Team
    Resource Processes: Manage Team Part 2
    Resource Processes: Control Resources
    PROJECT PROCESSES: PROJECT COMMUNICATIONS
    Project Processes: Communications Mgmt
    Project Processes: Communications Mgmt Part 2
    Communications Processes: Plan Comms Mgmt
    Communications Processes: Plan Comms Mgmt Part 2
    Communications Processes: Plan Comms Mgmt Part 3
    Communications Processes: Manage Comms
    Communication Processes: Monitor Comms.
    PROJECT PROCESSES: PROJECT RISK
    Project Processes: Project Risk Management
    Project Processes: Project Risk Management Part 2
    Risk Processes: Plan Risk Management
    Risk Processes: Identify Risks
    Risk Processes: Perform Qualitative Risk Analysis
    Risk Processes: Perform Quantitative Risk Analysis
    Risk Processes: Plan Risks Responses
    Risk Processes: Implement Risk Responses
    Risk Processes: Monitor Risk
    PROJECT PROCESSES: PROCUREMENT MANAGEMENT
    Project Processes: Project Procurement Mgmt
    Project Processes: Project Procurement Mgmt Pt2
    Procurement Processes: Plan Procurement Mgmt
    Procurement Processes: Plan Procurement Mgmt 2
    Procurement Processes: Conduct Procurements
    Procurement Processes: Control Procurements
    PROJECT PROCESSES: STAKEHOLDER MANAGEMENT
    Project Processes: Project Stakeholder Mgmt
    Stakeholder Processes: Identify Stakeholders
    Stakeholder Processes: Identify Stakeholders Pt2
    Stakeholder Processes: Stakeholder Engagement 2
    Stakeholder Processes: Manage Stakeholders
    Stakeholder Processes: Monitor Stakeholders
    PMBOK REVIEW
    The Project Management Body Of Knowledge
    SAMPLE TEST QUESTIONS
    Exam Preparation Pmp
    Exam Preparation Part 2 Pmp
  • ORGANIZATIONAL CHANGE MANAGEMENT
    Overview
    What Is Change?
    Role And Activities
    Change Categories
    Corporate Culture
    Strategic Change
    Barriers To Change
    Overcoming Challenges
    Portfolio Change Mangement
    Program Change Management
    Program Change Management Part 2
    Project Change Management
    Performing The Change
    Performing The Change Part 2

Vmware

  • VSPHERE AND THE SOFTWARE-DEFINED DATA CENTER
    Overview
    Introduction To VSphere
    Introduction To VSphere Part 2
    Introduction To VSphere Part 3
    Introduction To VSphere Part 4
    Introduction To VSphere Part 5
    Introduction To VSphere Part 6
    CONFIGURE & ADMINISTER VSPHERE SECURITY
    Role Based Access Control
    Role Based Access Control Part 2
    Role Based Access Control Part 3
    Role Based Access Control Part 4
    Role Based Access Control Part 5
    Role Based Access Control Part 6
    Secure ESXi And VCenter Server
    Secure ESXi And VCenter Server Part 2
    Secure ESXi And VCenter Server Part 3
    Secure ESXi And VCenter Server Part 4
    Secure ESXi And VCenter Server Part 5
    Secure ESXi And VCenter Server Part 6
    Configure And Enable SSO And Identity Sources
    Configure And Enable SSO And Identity Sources Pt2
    Configure And Enable SSO And Identity Sources Pt3
    Configure And Enable SSO And Identity Sources Pt4
    Configure And Enable SSO And Identity Sources Pt5
    Configure And Enable SSO And Identity Sources Pt6
    Configure And Enable SSO And Identity Sources Pt7
    Secure VSphere Virtual Machines
    Secure VSphere Virtual Machines Part 2
    CONFIGURE AND ADMINISTER VSPHERE 6.X NETWORKING
    Configure And Verify VSphere Networking
    Configure And Verify VSphere Networking Part 2
    Configure And Verify VSphere Networking Part 3
    Configure And Verify VSphere Networking Part 4
    Configure And Verify VSphere Networking Part 5
    Configure And Verify VSphere Networking Part 6
    Configure And Verify VSphere Networking Part 7
    Configure And Verify VSphere Networking Part 8
    Configure And Verify VSphere Networking Part 9
    Configure And Verify VSphere Networking Part 10
    Configure And Verify VSphere Networking Part 11
    Configure And Verify VSphere Networking Part 12
    Configure And Verify VSphere Networking Part 13
    Configure And Verify VSphere Networking Part 14
    Configure And Verify VSphere Networking Part 15
    Configure Network I/O Control (NIOC)
    CONFIGURE AND ADMINISTER VSPHERE 6.X STORAGE
    VSphere Integration With Physical Storage
    VSphere Integration With Physical Storage Part 2
    VSphere Integration With Physical Storage Part 3
    VSphere Integration With Physical Storage Part 4
    VSphere Integration With Physical Storage Part 5
    VSphere Integration With Physical Storage Part 6
    VSphere Integration With Physical Storage Part 7
    VSphere Integration With Physical Storage Part 8
    VSphere Integration With Physical Storage Part 9
    VSphere Integration With Physical Storage Part 10
    Configure Software Defined Storage
    Configure Software Defined Storage Part 2
    Configure Software Defined Storage Part 3
    Configure Software Defined Storage Part 4
    Configure Software Defined Storage Part 5
    Configure Software Defined Storage Part 6
    Configure Software Defined Storage Part 7
    Configure Storage Multipathing And Failover
    Configure Storage Multipathing And Failover Pt2
    Configure Storage Multipathing And Failover Pt3
    VMFS And NFS Configurations And Upgrades
    VMFS And NFS Configurations And Upgrades Pt2
    VMFS And NFS Configurations And Upgrades Pt3
    VMFS And NFS Configurations And Upgrades Pt4
    Set Up And Configure Storage I/O Control
    Set Up And Configure Storage I/O Control Pt.2
    UPGRADE A VSPHERE DEPLOYMENT TO 6.X
    ESXi And Virtual Machine Upgrades
    ESXi And Virtual Machine Upgrades Part 2
    ESXi And Virtual Machine Upgrades Part 3
    ESXi And Virtual Machine Upgrades Part 4
    ESXi And Virtual Machine Upgrades Part 5
    ESXi And Virtual Machine Upgrades Part 6
    Windows VCenter Server Upgrades
    Windows VCenter Server Upgrades Part 2
    VCenter Server Migration To VCSA
    RESOURCE POOLS
    Configure Multilevel Resource Pools
    Configure Multilevel Resource Pools Part 2
    Configure Multilevel Resource Pools Part 3
    Configure DRS And Storage DRS Clusters
    Configure DRS And Storage DRS Clusters Pt.2
    Configure DRS And Storage DRS Clusters Pt.3
    Configure DRS And Storage DRS Clusters Pt.4
    Configure DRS And Storage DRS Clusters Pt.5
    BACK UP AND RECOVER A VSPHERE DEPLOYMENT
    Configure VCenter Appliance Backup And Restore
    VCenter Data Protection
    VCenter Data Protection Part 2
    VCenter Data Protection Part 3
    VCenter Data Protection Part 4
    Configure VSphere Replication
    Configure VSphere Replication Part 2
    Configure VSphere Replication Part 3
    Configure VSphere Replication Part 4
    Configure VSphere Replication Part 5
    Configure VSphere Replication Part 6
    TROUBLESHOOT A VSPHERE DEPLOYMENT
    Troubleshoot VCenter And ESXi
    Troubleshoot VCenter And ESXi Part 2
    Troubleshoot VCenter And ESXi Part 3
    Troubleshoot VCenter And ESXi Part 4
    Troubleshoot VCenter And ESXi Part 5
    Troubleshooting Storage And Networking
    Troubleshooting Storage And Networking Part 2
    Troubleshoot Storage And Networking Part 3
    Troubleshoot VSphere Upgrades And Migrations
    Troubleshoot VSphere Upgrades And Migrations Pt.2
    Troubleshoot Virtual Machines
    Troubleshoot Virtual Machines Part 2
    Troubleshoot HA, DRS, Fault Tolerance
    Troubleshoot HA, DRS And Fault Tolerance Pt.2
    Troubeshoot HA, DRS And Fault Tolerance Pt.3
    DEPLOY AND CUSTOMIZE ESXI HOSTS
    Configure Auto Deploy And Host Profiles
    Configure Auto Deploy And Host Profiles Part 2
    Configure Auto Deploy And Host Profiles Part 3
    Configure Auto Deploy And Host Profiles Part 4
    Configure Auto Deploy And Host Profiles Part 5
    Configure Auto Deploy And Host Profiles Part 6
    Configure Auto Deploy And Host Profiles Part 7
    Configure Auto Deploy And Host Profiles Part 8
    Configure Auto Deploy And Host Profiles Part 9
    CONFIGURE & ADMINISTER VSPHERE & VCENTER AVAILABILITY SOLUTIONS
    Configure VSphere HA Cluster Features
    Configure VSphere HA Cluster Features Pt.2
    Configure VSphere HA Cluster Features Pt.3
    Configure VSphere HA Cluster Features Pt.4
    Configure VSphere HA Cluster Features Pt.5
    Configure VSphere HA Cluster Features Pt.6
    Configure VSphere HA Cluster Features Pt.7
    Configure VCenter Server Appliance HA
    ADMINISTER AND MANAGE VSPHERE VIRTUAL MACHINES
    Create And Manage VMs And Templates
    Create And Manage VMs And Templates Part 2
    Create And Manage VMs And Templates Part 3
    Create And Manage VMs And Templates Part 4
    Create And Manage A Content Library
    Using VMware VCenter Converter
    VSPHERE ESXI 6.7 HOST INSTALLATION
    VSphere ESXi 6.7 Host Installation
    VSphere ESXi 6.7 Host Installation Part 2
    SPOTLIGHT ON VCENTER
    Spotlight On VCenter
    Spotlight On VCenter Part 2
    Spotlight On VCenter Part 3
    SPOTLIGHT ON SECURITY AND CERTIFICATES
    Spotlight On Security And Certificates
    SPOTLIGHT ON NFS WITH KERBEROS
    Spotlight On NFS With Kerberos Authentication
    SPOTLIGHT ON DATASTORE CLUSTERS
    Spotlight On Datastore Clusters With SIOC
    SPOTLIGHT ON VMOTION & STORAGE VMOTION
    Spotlight On VMotion And Storage VMotion
    Spotlight On VMotion And Storage VMotion Part 2
    SPOTLIGHT ON VCENTER ALARMS
    Spotlight On VCenter Alarms
    SPOTLIGHT ON VIRTUAL MACHINES
    Spotlight On Virtual Machines

Six Sigma

  • INTRODUCTION TO LEAN SIX SIGMA
    Overview
    Introduction To LSS
    LSS History
    Waste And Defects
    Waste And Defects Part 2
    Project Management
    THE PDCA PROCESS
    Plan-Do-Check-Act
    THE DMAIC PROCESS
    Define Phase
    Define Phase Part 2
    Define Phase Part 3
    Measure Phase
    Measure Phase Part 2
    Analyze Phase
    Improvement Phase
    Control Phase
    IN CLOSING
    Achieving Buy-In
    Next Step
  • LEAN SIX SIGMA GREEN BELT
    Overview
    Introduction
    Process Improvement Basics
    Process Improvement Basics Part 2
    LSS Metric Basics
    Core Concepts And Terms
    Models Methodologies
    Seven Tools Of Quality
    Seven Tools Of Quality Part 2
    Seven Tools Of Quality Part 3
    Waste, Voices And CTQs
    Waste, Voices And CTQs Part 2
    Suppliers Inputs Process Outputs Customers
    Important Graphs And Charts
    DMAIC Model – Define Phase
    DMAIC Model – Define Phase Part 2
    DMAIC Model – Measure Phase
    DMAIC Model – Analyze Phase
    DMAIC Model – Improve Phase
    DMAIC Model – Control Phase
    DMAIC Model – Review

Automation

  • USER ACCOUNT MANAGER
    Overview
    User Account Manager Main Menu
    User Account Manager Main Menu Pt2
    User Account Manager Add/Remove Users
    User Account Manager Add/Remove Users Pt2
    User Account Manager Add/Remove Users Pt3
    User Account Manager Add/Remove Users Pt4
    User Account Manager Default Shell
    User Account Manager Default Shell Part 2
    User Account Manager Password Reset
    User Account Manager Account Lock
    User Account Manager Account Lock Part 2
    User Account Manager Account Lock Part 3
    User Account Manager Change Username
    User Account Manager Change Username Part 2
    BACKUP UTILITY
    Backup Utility
    Backup Utility Part 2
  • WINDOWS AUTOPILOT
    Overview
    Requirements
    Scenarios And Capabilities
    Administering Windows Autopilot
    Administering Windows Autopilot Pt 2

Networking Skills

  • DNS UTILITIES
    Nslookup
    Dig
    Dnswalk And Dnsrecon
    CONFIGURING HOST RECORDS
    Host Records
    SRV Records
    CONFIGURING EMAIL SERVICES
    Configuring MX Records
    Configuring SPF Records
    PUBLIC DOMAINS
    Purchasing A Domain
    Changing Name Servers
    Transferring A Domain
    CONFIGURING ZONES
    Configuring DNSSEC With NSD
    Configuring DNSSEC With NSD Part 2
    ZONE REPLICATION
    Installing NSD
    Configuring Zones In NSD
    Configuring Replication In NSD
    Configuring Replication In NSD Part 2
    MICROSOFT DNS SERVER
    Installing Microsoft DNS
    Configuring Zones In Microsoft DNS
    Configuring Replication In Microsoft DNS
    BIND DNS SERVER
    Installing BIND
    Configuring Zones And Records
    Configuring Zones And Records Part 2
    Configuring Replication
    UNBOUND DNS SERVER
    Installing Unbound
    Configuring Zones And Records
    Blocking Ads With Unbound
    Using Unbound With BIND
    Using Unbound With NSD
  • CONFIGURE GNS3
    What Is GNS3?
    Installing GNS3
    GNS3 Initial Setup
    Launching Your First Router
    Virtual Switches
    Cabling Your Equipment
    Connecting To Your Routers
    Capturing Traffic In GNS3
    Documenting Your Network
    Saving Your Configuration
  • HOME ROUTER CONFIGURATION
    Setting Up A Home Router
    Port Forwarding
  • NETWORKING TROUBLESHOOTING
    Troubleshooting With CMD
    Troubleshooting With CMD Part 2
    Setting IP Information
    Setting IP Information Part 2
  • NMAP
    Installing Nmap
    Nmap Basics
    Nmap Basics Part 2
    Host Discovery
    Host Discovery Part 2
    Host Discovery Part 3
    Port States
    Port Scanning
    Port Scanning Part 2
    Port Scanning Part 3
    Advanced Port Scanning IP ID Idle Scan
    Advanced Port Scanning FTP Bounce

IT Foundation Skills

  • BUILDING A PC
    Component Selection
    Component Selection Part 2
    PC Assembly
    BIOS Configuration
    BIOS Configuration Part 2
  • CUSTOMER SERVICE SKILLS FOR TECHIES
    Overview
    Introduction
    Communication Principles
    Communication Principles Part 2
    Communication Principles Part 3
    Communication Principles Part 4
    Communication Skills
    Communication Skills Part 2
    Emotional Intelligence
    How To Disagree
    Listening Skills
    Stress Management
    Electronic Communication
    Incident Vs Problem
    Service Desk Basics: Computing
    Service Desk Basics: Computing Part 2
    Service Desk Basics: Computing Part 3
    Service Desk Basics: Data
    Service Desk Basics: Data Part 2
    Service Desk Basics: Data Part 3
    Service Desk Basics: Computers
    Service Desk Basics: Computers Part 2
    Service Desk Basics: Networks
  • IC3-I CHOOSE LIFE
    Overview
    Computing Basics
    The System Unit
    Input, Output And Storage
    Input, Output And Storage Part 2
    Operating System Basics
    Introduction To Windows 7
    Windows 7 Administration And Maintenance
    Understanding Application Software
    Introduction To Microsoft Office 2010
    Introduction To Microsoft Office Part 2
    Introduction To Microsoft Word 2010
    Introduction To Microsoft Word Part 2
    Introduction To Microsoft Excel 2010
    Introduction To Microsoft Excel 2010 Part 2
    Introduction To Microsoft Access
    Introduction To Microsoft Access Part 2
    Introduction To Microsoft Access Part 3
    Introduction To Microsoft PowerPoint
    Introduction To Microsoft PowerPoint Part 2
    Network And Internet Basics
    Online Communication
    Web Basics
    Network Internet Privacy And Security
    Legal, Health, Environment And Ethical Issues
  • IC3-I CHOOSE LIFE
    Overview
    Computing Basics
    The System Unit
    Input, Output And Storage
    Input, Output And Storage Part 2
    Operating System Basics
    Introduction To Windows 7
    Windows 7 Administration And Maintenance
    Understanding Application Software
    Introduction To Microsoft Office 2010
    Introduction To Microsoft Office Part 2
    Introduction To Microsoft Word 2010
    Introduction To Microsoft Word Part 2
    Introduction To Microsoft Excel 2010
    Introduction To Microsoft Excel 2010 Part 2
    Introduction To Microsoft Access
    Introduction To Microsoft Access Part 2
    Introduction To Microsoft Access Part 3
    Introduction To Microsoft PowerPoint
    Introduction To Microsoft PowerPoint Part 2
    Network And Internet Basics
    Online Communication
    Web Basics
    Network Internet Privacy And Security
    Legal, Health, Environment And Ethical Issues
  • Overview
    Internet, Navigation And Web Browsing
    Licensing
    Email Clients
    Calendaring And Social Media
    Digital Principles And Ethics
    Communications, Conferencing And Streaming
  • PC MAINTENANCE
    HDD Replacement And Installation
    Post OS Installation And Configuration
    Using Windows File History
    Backing Up With Windows Backup And Restore
    Restoring Windows Backup And Restore

Adobe

  • ILLUSTRATOR CC 2017
    Introduction To Illustrator
    Design 101
    Navigating In Illustrator
    File New
    Basic Selections
    Basic Shapes And Formatting
    Basic Shapes And Formatting Part 2
    Basic Text
    Swatches
    Working With Multiple Paths
    Freehand Drawing
    Freehand Drawing Part 2
    Artboards
    Object Transformation
    Images
    Gradients
    Text Effects
    Pathfinder And Compound Path
    Path Editing Tools
    The Pen Tool
    The Curvature Tool
    Aligning Objects
    Aligning Objects Part 2
    Working With Effects
    Graphic Styles
    Working With Masks
    Mesh And Recolor
    Advanced Swatches
    Pattern Swatches
    Sharing Swatches
    Blend Tool
    Symbols
    Advanced Text
    Bullets And Numbering
    Knife Eraser Sissors
    Shaper And Shape Builder
    Path Transformations
    Path Transformations Part 2
    Image Trace And Live Paint
    Perpective Grid
    Saving And Exporting
  • START WITH SIMPLE
    Read Me
    Getting Started In Premiere Pro
    Project Organization
    Even More Project Organization
    The Source Monitor
    Our First Story
    Navigating The Timeline
    Simple Titles
    Simple Export
    ADD SOME FLAIR
    Adding Transitions
    Simple Trimming
    Adding Effects
    Working With Stills
    Speed Effects
    Color Correction
    Even More Color Correction
    Essential Sound Editing
    Make It Pop
    Mulitcamera Editing
    EXTRAS AND APPS
    360 Degree Video
    Timelapse
    Step Up Your Input And Output
    Outside Help

MS Office Courses

  • INTRODUCTION
    Overview
    Introduction To Access
    What Is A Database
    Database Terminology
    Database Terminology Part 2
    Getting Started In Access
    Access Interface And Navigation
    Planning And Database Design
    Planning And Database Design Part 2
    CREATING ACCESS TABLES
    Creating Tables: Manual Data Entry
    Creating Tables: Importing External Data
    Creating Tables: Importing External Data Part 2
    Creating Table Relationships
    Creating Table Relationships Part 2
    CREATING QUERIES FOR TESTING DESIGN
    Creating Queries For Testing Desgin
    Creating Queries For Testing Design Part 2
    Creating Queries For Testing Design Part 3
    Creating Queries For Testing Design Part 4
    Creating Queries For Testing Design Part 5
    CREATING BASIC FORMS
    Creating Basic Forms
    Creating Basic Forms Part 2
    Creating Basic Forms Part 3
    Creating Basic Forms Part 4
    REPORTING DATA
    Creating Basic Reports
    Creating Basic Reports Part 2
    Creating Basic Reports Part 3
    Creating Basic Reports Part 4
    Creating Basic Reports Part 5
  • INTRODUCTION
    Overview
    Introduction To Excel
    Excel Basics
    Excel Interface
    Navigate A Workbook
    Select Cells
    Insert Data
    Fill Series And Flash Fill
    Export And File Types
    FORMAT WORKBOOKS
    Modify A Worksheet
    Format A Worksheet
    Format A Worksheet Part 2
    Number Formats: Introduction
    Number Formats: Common Number Formats
    Number Formats: Text, Special, Custom
    Number Formats: Date And Time
    Proof, Print And Page Layout
    Proof, Print And Page Layout Part 2
    Manage Sheets And Workbooks
  • Introduction
    Overview
    Introduction to Excel
    Excel Basics
    Excel Interface
    Navigate a Workbook
    Select Cells
    Insert Data
    Cut, Copy, Paste
    Fill Series
    Fill Series: Custom Lists
    Export and File Types
    Format Workbooks
    Modify a Worksheet
    Format a Worksheet
    Styles and Themes
    Number Formats: Introduction
    Number Formats: Common Number Formats
    Number Formats: Text, Special, Custom
    Number Formats: Date and Time
    Proof, Print and Page Layout
    Proof, Print and Page Layout Part 2
    Manage Worksheets and Workbooks
  • Analyze Data
    Overview
    Sort and Filter
    Conditional Formatting
    Outline and Subtotals
    Tables
    Data Tables
    Consolidate Data
    Scenarios
    Goal Seek
    Remove Duplicates
    Advanced Filter
    Graphical Elements
    Image: Basics
    Images: Format
    Shapes: Add and Format
    Shapes: Multiple Shapes and Icons
    Smart Art
    Create an Invitation
    Collaboration and Security
    Shared Workbooks
    Track Changes
    Data Validation
    Workbook Security
    Document Properties
    Additional Topics
    Customize Interface
  • Introduction
    Overview
    Introduction to Excel
    Excel Basics
    Excel Interface
    Navigate a Workbook
    Select Cells
    Insert Data
    Cut, Copy, Paste
    Fill Series
    Fill Series: Custom Lists
    Export and File Types
    Format Workbooks
    Modify a Worksheet
    Format a Worksheet
    Styles and Themes
    Number Formats: Introduction
    Number Formats: Common Number Formats
    Number Formats: Text, Special, Custom
    Number Formats: Date and Time
    Proof, Print and Page Layout
    Proof, Print and Page Layout Part 2
    Manage Worksheets and Workbooks
  • Introduction to Charts
    Insert and Format Basic Charts
    Create Charts from Noncontiguous Data
    Create a Pie Chart
    Sparklines and Timelines
    Filled Map Charts
    Pivot Tables and Pivot Charts
    Create a Basic Pivot Table
    Create a Basic Pivot Chart
  • Essentials
    Introduction to Excel Function
    Basic Formulas
    Basic Functions
    Basic Functions Part 2
    Functions in Mac
    Keyboard Shortcuts for Functions
    Advanced
    Named Ranges
    3D Cell Reference
    Formula Auditing
    Function Library
    SUM
    SUMIF
    SUMIFS
    COUNT, COUNTA, COUNTBLANK
    COUNTIF, COUNTIFS
    AVERAGE, AVERAGEA
    AVERAGEIF, AVERAGEIFS
    MIN, MAX, SMALL, LARGE
    MINIFS, MAXIFS
    RAND, RANDBETWEEN
    TODAY, NOW
    MONTH, DAY, YEAR, TEXT
    CONCAT, TEXTJOIN
    LEFT, RIGHT, MID
    UPPER, LOWER, PROPER
    TRIM, CLEAN
    CHAR, CODE, UNICHAR, UNICODE
    REPLACE, SUBSTITUTE
    FIND, SEARCH
    LEN
    IF
    AND, OR
    NOT
    MATCH
    INDEX
    VLOOKUP
    HLOOKUP
    LOOKUP
    CHOOSE
  • Relational Database Basics
    Overview
    History, Terms and Definitions
    History, Terms and Definitions Part 2
    Data Normalization
    Data Normalization Part 2
    Data Normalization Part 3
    Designing the Database
    Designing a Database
    Designing a Database Part 2
    Designing a Database Part 3
    Creating Models
    Creating Database Models
    Creating Database Models Part 2
    Finalizing the Model
    Data Integrity
    Entity Integrity
    Referential Integrity
    Referential Integrity Part 2
    Domain Integrity
    Domain Integrity Part 2
    Domain Integrity Part 3
    Domain Integrity Part 4
    Query Basics
    Getting Started with Queries
    Getting Started with Queries Part 2
    Getting Started with Queries Part 3
    Querying Multiple Tables
    Querying Multiple Tables Part 2
    Querying Multiple Tables Part 3
  • Introduction
    Overview
    Introduction to PowerPoint
    PowerPoint Basics
    PowerPoint Interface
    Navigate a Presentation and Views
    Create a Presentation
    Add Content
    Add Text
    Slides from Outline and Reuse Slides
    Format Text: Basics
    Format Text: Bullets and Spacing
    Images: Basics
    Images: Insert
    Images: Format
    Images: Format Part 2
    Shapes: Add and Format
    Shapes: Multiple Shapes
    Icons and 3D Models
    Tables: Introduction
    Tables: Create and Format
    Charts: Introduction
    Charts: Create
    Charts: Format
    Charts: Pie Charts
    SmartArt
    SmartArt: Organization Chart
    Enhance a Presentation
    Design Themes
    Designer
    Transitions
    Animations
    Photo Album
    Prepare and Present
    Proof
    Prepare and Print
    Present a Slide Show
  • Rehearse and Record
    Custom Shows
    Zoom
    Draw
    File Properties and Interface
    Advanced File Properties
    Customize Interface
    Additional Topics
    Photo Slideshow with Sound
    PowerPoint Best Practices
    Advanced Content
    Overview
    Slide Master
    Slide Master Part 2
    Slide Master: Troubleshooting
    Audio and Video: Introduction
    Audio and Video
    Audio and Video Part 2
    Link and Embed External Content: Introduction
    LInk and Embed External Content
    Collaborate
    Comment and Compare
    OneDrive and PowerPoint
    Collaborate: As Owner
    Collaborate: As Recipient
  • Introduction
    Overview
    Introduction to PowerPoint
    PowerPoint Basics
    PowerPoint Interface
    Navigate a Presentation and Views
    Create a Presentation
    Add Content
    Add Text
    Slides from Outline and Reuse Slides
    Format Text: Basics
    Format Text: Bullets and Spacing
    Images: Basics
    Images: Insert
    Images: Format
    Images: Format Part 2
    Shapes: Add and Format
    Shapes: Multiple Shapes
    Draw, Icons and 3D Models
    Tables: Introduction and Create
    Tables: Format
    Charts: Introduction
    Charts: Create
    Charts: Format
    Charts: Pie Charts
    SmartArt
    SmartArt: Organizational Chart
    Enhance a Presentation
    Design Themes
    Designer
    Transitions
    Animations
    Prepare and Present
    Proof
    Prepare and Print
    Present a Slide Show
  • Overview
    Slide Master
    Slide Master: Troubleshooting
    Audio and Video
    Audio and Video Part 2
    OneDrive and PowerPoint
    OneDrive and PowerPoint Part 2
    Comments and Collaborate
    Comments and Collaborate Part 2
    Rehearse and Record
    Custom Shows
    Advanced File Properties
    Customize Interface
    PowerPoint Best Practices
  • Introduction
    Overview
    Introduction to OneNote 2016
    Understanding OneNote Files
    Open and Close Notebooks
    OneNote Interface and Notebook Navigation
    Create a Notebook
    Create Pages and Templates
    Noteworth OneNote Options
    Add Content
    Text and Tables
    Images
    Copy from Web to Web Clipper
    Draw Content
    Quick Notes
    Linked Notes
    Links
    Attachments and Printouts
    Audio and Video
    Organize and Manage
    Tags
    Search
    Organize and Manage
    History and Backups
    Proof and Review
    Print and Export
    Collaboration and Security
    Share Notebooks
    OneNote with Outlook
    OneNote with Outlook Part 2
    OneNote with Skype for Business
    Password Protect
    OneNote on other Platforms
    OneNote for Windows 10
    OneNote Online
    OneNote for Mac
    OneNote for iPad
    OneNote for iPhone
    OneNote for Android
  • Introduction
    Overview
    Introduction to OneNote
    Getting Started with OneNote
    OneNote Interface and Notebook Navigation
    Create a Notebook
    Troubleshooting OneNote
    Add Content
    Text and Tables
    Images
    Copy from Web and Web Clipper
    Draw
    Links
    Attachments and Printouts
    Audio and Video
    Organize and Manage
    Tags and Search
    Organize and Manage
    History, Proof and Print
    Immersive Reader
    Collaboration and Security
    Share Notebooks
    Password Protect
    OneNote with Email and Meetings
  • Introduction
    Overview
    Introduction to Outlook
    Email Terminology
    Setup Email Account
    Outlook Interface
    Email
    Email Interface
    Focused Inbox
    Email Basics
    Email Basics Part 2
    Email Basics Part 3
    Format Message Body
    Format Message Body Part 2
    Advanced Email Features
    Advanced Email Features Part 2
    Advanced Email Features Part 3
    Signatures
    Organize, Customize and Search
    Organize, Customize and Search Part 2
    Rules and Automation
    Junk Mail
    Setup Mailbox Archiving
    Share and Manage Multiple Accounts
    Contacts
    Create and Manage Contacts
    Share and Transfer Contacts
    Calendar
    Calendar Interface
    Create and Manage Appointments
    Create and Manage Meetings
    Share and Transfer Calendars
    Share and Transfer Calendars Part 2
    Tasks and Notes
    Tasks and Notes
    Groups
    Groups
  • Introduction
    Overview
    Introduction to Outlook on the Web
    Email Terminology
    Setup Email Account
    Outlook on the Web Interface
    Mail
    Mail Interface
    Mail Basics
    Mail Basics Part 2
    Mail Basics Part 3
    Format Message Body
    Format Message Body Part 2
    Format Message Body Part 3
    Advanced Mail Features
    Advanced Mail Features Part 2
    Signatures
    Organize, Customize and Search
    Organize, Customize and Search Part 2
    Junk Mail
    Rules and Automation
    Archive Messages
    Share and Manage Multiple Mailboxes
    People
    People Interface
    Create and Manage Contacts
    Calendar
    Calendar Interface
    Create and Manage Appointments
    Create and Manage Meetings
    Share Calendars
    Share Calendars Part 2
    Tasks and Notes
    Tasks and Notes
    Groups
  • Introduction
    Overview
    Introduction to Word
    Word Basics
    Word Interface
    Document Views and Zoom
    Navigate a Document
    Select Text
    Input Text and Special Characters
    AutoCorrect Options
    Cut, Copy and Paste
    Find and Replace
    Proof and Print
    Text Formatting
    Character Formatting
    Paragraph Formatting
    Format Painter
    Lists
    Tabs
    Styles: Introduction
    Styles: Apply
    Style Sets and Themes
    Page Layout
    Keep Options, Breaks and Columns
    Keep Options, Breaks and Columns Part 2
    Margins, Headers and Footers
    Margins, Headers and Footers Part 2
    Orientation and Decoration
  • Overview
    Images Basics
    Images: Format
    Images: Format Part 2
    Shapes: Add and Format
    Multiple Shapes and Icons
    Smart Art
    Tables: Introduction
    Tables: Create and Layout
    Tables: Create and Layout Part 2
    Tables: Format and Design
    Charts
    Charts Part 2
    Graphical Text Objects
    Automation
    Templates
    Quick Parts
    Macros
    Linked Objects
    Mail Merge
    Labels and Envelopes
  • Overview
    Bookmarks and Cross References
    Table of Contents
    Create Index
    Citations and Bibliography
    Footnotes and Endnotes
    Captions and Table of Figures
    Master Document
    Collaborate
    Track Changes
    Compare and Combine Documents
    Collaborate Online
    Security and Document Properties
    Document Security
    Document Security Part 2
    Document Security Part 3
    Document Properties
    Additional Topics
    Forms
    Customize Interface
  • Overview
    Introduction to Mail Merge
    Data Sources: Existing List
    Data Sources: Troubleshooting
    Data Sources: Troubleshooting Part 2
    Data Sources: Mail Contacts
    Data Sources: New List
    Letters
    Labels: Mail Merge
    Labels: Single and Full Page
    Labels: Add Image
    Envelopes
    Envelopes: Add Image
    Email
    Filter, Sort, Find
    Rules
    Rules: If Then Else
    Rules: Ask and Fill-in
  • Introduction
    Overview
    Introduction to Word
    Word Basics
    Word Interface
    Document Views and Zoom
    Navigate a Document
    Select Text
    Input Text and Special Characters
    Autocorrect Options
    Cut Copy Paste
    Find and Replace
    Proof and Print
    Text Formatting
    Character Formatting
    Paragraph Formatting
    Format Painter
    Lists
    Tabs
    Styles: Introduction
    Styles: Apply
    Styles: Apply Part 2
    Style Sets and Themes
    Page Layout
    Keep Options, Breaks and Columns
    Blank Page and Cover Page
    Margins, Headers and Footers
    Add and Format Page Numbers
    Orientation and Decoration
  • Overview
    Images: Basic
    Images: Add
    Images: Format
    Images: Format Part 2
    Shapes: Add and Format
    Shapes: Align, Arrange and Group
    Smart Art
    Tables: Introduction
    Tables: Create and Layout
    Tables: Create and Layout Part 2
    Tables: Format and Design
    Charts: Introduction
    Charts: Create and Layout
    Charts: Design and Format
    Graphical Text Objects
    Automation
    Templates
    Macros
    Linked Objects
    Mail Merge
    Labels and Envelopes
  • Overview
    Bookmarks and Cross References
    Table of Contents
    Index
    Citations and Bibliography
    Footnotes and Endnotes
    Captions and Table of Figures
    Master Document
    Master Document Part 2
    CollaborateTrack Changes
    Compare and Combine Documents
    Collaborate Online
    Security and Document Properties
    Document Security
    Document Properties and Accessibility
    Additional Topics
    Customize Interface
    Forms
  • Overview
    Introduction to Mail Merge
    Data Sources: Existing List
    Data Sources: Existing List Part 2
    Data Sources: Existing List Part 3
    Data Sources: Mail Contacts
    Data Sources: New List
    Letters: Mail Merge
    Labels: Mail Merge
    Labels: Single and Full Page
    Labels: Add Image
    Envelopes
    Envelopes: Add Image
    Email
    Filter, Sort, Find
    Rules
    Rules: If Then Else
    Rules: Ask and Fill-in
  • Initialize a Project
    Create a New Project
    Calendars
    Custom Fields
    Settings Options
    Create a task-based schedule
    Set Up Project Information
    Creating Tasks
    Task Relationships
    Task Relationships Part 2
    Creating a Schedule
    Managing Multiple Projects
    Manage Resources and Assignments
    Resource Information
    Resource Assignments
    Team Planner
    Model Project Costs
    Model Material Resource Costs
    Track and analyze a project
    Setting Baselines
    Update Progress
    Baseline Variances
    Resolve Schedule Issues
    Display Critical Path
    Communicate project information
    Applying Custom Views
    Sharing Project Data
    Reports and Dashboards
    Project Extensions
  • Overview
    Introduction to Microsoft Office Specialist
    Prepare for an Exam
    Register for an Exam
    Take the Exam
    Show Off Your Success
  • Password Security
    Social Engineering
    Physical Security
    Data Disposal
    Safe Networks
    Malicious Software
  • IT Security Best Practices
  • Introduction
    Overview
    Introduction to Skype for Business
    Install Skype for Business
    Sign-in and Interface
    Setup and Troubleshoot Audio and Video Devices
    Contacts
    Add and Organize Contacts
    Status and Options
    Contact Cards and Privacy Relationships
    Conversations
    Instant Message: Basics
    Manage Multiple Instant Messages
    Manage Instant Message Conversations
    Understand Audio Calls
    Manage Skype Calls
    Manage Phone Calls
    Manage Phone Settings
    Video Calls
    Meetings
    Introduction to Meetings
    Schedule a Meeting
    Manage Participants
    Join a Meeting
    Start an Impromptu Meeting
    Record a Meeting
    Collaborate
    Share Your Desktop or Window
    Use the Whiteboard
    Share PowerPoint Files
    Conduct a Poll
    Conduct a Q and A Session
    Co-Author Office Document
    Collaborate with OneNote
    Manage Content
    Share a Video

Software Development

  • Overview
    What is a Function
    Creating a Function
    Functions without Arguments
    Functions with a Single Positional Argument
    Functions with a Single Keyword Argument
    Functions w/ Multiple Positional Arguments
    Functions w/ Multiple Keyword Arguments
    Fuctions w/ Mixed Arguments
  • Overview
    Approaching a Problem
    Find the Maximum: Planning
    Find the Maximum: Coding
    Reversing a String: Planning
    Reversing a String: Coding
    Detect Palindromes: Planning
    Detect Palindromes: Coding
    Creating a Title: Planning
    Creating a Title: Coding
    Caesar Cipher: Planning
    Caesar Cipher: Coding
  • Overview guessthenumber
    Plan the Project
    Set Up the Project
    Take a Guess
    Add User Instructions
    Refactor to Functions
    Limit the Guesses
    Determine Win or Lose
  • Hangman v1
    Overview
    Plan The Project
    Set Up The Project
    Take Guesses
    Determine Correct Guesses
    Add Presentation
    Refactor to Functions
    Refactor to Functions
    Hangman v3
    Add a Scoreboard
    Determine Win or Lose
    Print Banners
  • Chat App with React and Firebase
    Overview
    Setting Up a React App
    Building the Signup Component
    Building the Login Component
    Setting Up Firebase
    Signing Up with Firebase
    Logging In with Firebase
    Adding Some Style
    Adding Some Style Part 2
    Building the Sidebar Component
    Building the RoomList Component
    Building the RoomList Component Part 2
    Building the RoomList Component Part 3
    Persisting the Login
    Building the Chat Panel
    Building the Chat Panel Part 2
    Building the Chat Panel Part 3
    Toggling the Startup and Login Components
    Add a Room
    Add a Room Part 2
    Add a Room Part 3
    Deploying to Firebase
  • CSV
    Overview
    What is CSV
    Explore CSV Files
    Use csv Module
    Use csv Module Part 2
    Use the pandas Package
    Use the tablib Package
    JSON
    What is JSON
    Explore JSON Files
    JSON: Use the json Module
    JSON: Use the pandas Package
    Use the simplejson and ujson Packages
    JSON: Use the tablib Package
    YAML
    What is YAML
    Explore YAML Files
    Use the PyYAML Package
    YAML: Use the tablib Package
    XML and HTML
    What is XML
    Explore XML Files
    What is HTML
    Explore HTML Files
    Use the xml Module
    Use the lxml Package
    Use the xmltodict Package
    Use the BeautifulSoup Package
  • Dive into the Python Standard Library
    the glob Module
    The itertools Module: Infinite Iterations
    The itertools Module: Combinatorics
    The itertools Module: Shortest Input
    The collections Module: namedtuple
    The collections Module: defaultdict
    The collections Module: Counter
    the functools Module: Iru_cache
    The functools Module: total_ordering
    The functools Module: partial
    The functools Module: reduce
    The json Module: Reading & Writing
    The json Module: Function Encode & Decode
    The json Module: Class Encode & Decode
    The csv Module: CSV Reading & Writing
    The csv Module: DictReader and DictWriter
    The os.path Module
    The socket Module: TCP Server
    The socket Module: TCP Client
    The socket Module: UDP Server
    The socket Module: UDP Client
    datetime strftime
    datetime strptime
    concurrent.futures ThreadPoolExecutor submit
    concurrent.futures ProcessPoolExecutor submit
  • Terminal
    Overview
    What is the Terminal?
    Opening the Terminal
    Navigating in the Terminal
    Making Folders and Files
  • HTML, CSS and Bootstrap
    Overview
    Introduction to HTML
    CSS
    CSS Part 2
    Responsive Web Design
    Building a Bootstrap Page
    Glyphs and Forms
    Font Awesome
  • Overview
    Introduction to the Canvas Element
    Drawing Lines and Rectangles
    Drawing Lines and Rectangles Part 2
    Drawing Curves and Arcs
    Drawing Curves and Arcs Part 2
    Drawing Curves and Arcs Part 3
    Creating Other Shapes
    Creating Other Shapes Part 2
    Drawing Styles and Colors
    Drawing Styles and Colors Part 2
    Drawing Text
    Drawing Gradients
    Drawing Gradients Part 2
    Using Images
    Using Images Part 2
    Using Images: Grayscale Filter
    Using Transformations
    Using Transformations Part 2
    Clipping and Composites
    Clipping and Composites Part 2
    More About Animations
    More About Animations Part 2
    Lets Build It: Particles Everwhere
    Lets Build It: Particles Everywhere Part 2
    Responding to Events
  • Overview
    Project Planning and Setup
    Creating the Ball
    Creating the Paddle
    Creating the Human Player Paddle
    Creating the Computer Player Paddle
    Creating the Computer Player Paddle Part 2
    Refactoring into a Game Object
    Refactoring into a Game Object Part 2
    Refactoring into a Game Object Part 3
    Creating the Scoreboard
    Detecting Collisions
    Image Editor
    Designing an Image Editor
    Setting up the Interface
    Accessing the Image
    Building Image Manipulation Functions
    Building Image Manipulation Functions Part 2
    Saving the Image
    AtmoAttack
    Planning the Project
    Creating a Basic Fighter
    Creating a Basic Attacker
    Creating the Pellets
    Creating the Pellets Part 2
    Cleaning Up and Refactoring
    Creating a Swarm
    Creating a Swarm Part 2
    Adding Sprites
    Adding Sprites Part 2
    Adding Sounds
    Adding Sounds Part 2
    Ending the Game
    DevPaint
    Planning The Devpaint Project
    Planning The Devpaint Project
    Creating A Pencil Drawing
    Creating a Pencil Drawing Pt2
    Creating a Pencil Drawing Pt3
    Adding Color Selections
    Adding Size Choices
    Saving the Image
  • Overview
    What is AngularJS
    Our First Angular Application
    Controllers and Scope
    Controllers and Scope Part 2
    Data Binding
    Overview of Built-in Directives
    Dynamic Styles and CSS
    Rendering Lists
    Handling Events
    Filters
    Filters Part 2
    Forms
    AJAX with AngularJS
    AJAX with Angular Resource
    Services and Factories
    Services and Factories Part 2
    Custom Directives
    Custom Directives Part 2
    Custom Components
    Custom Components Part 2
    Client Routing with Angular Router
    Client Routing with Angular Router Part 2
    Client Routing with Angular Router Part 3
    Client Router with Angular UI Router
    Client Router with Angular UI Router Part 2
  • Fundamentals
    Overview
    Creating the Environment
    Setting Up Ansible
    Simple Commands Using Ansible
    Installing Packages
    Installing Packages Part 2
    Managing Users
    Managing Services
    Running Commands
    Hosts
    Tasks
    Variables
    Variables Part 2
    Handlers
    Templating
    Templating Part 2
    Loops
    Control Flow
    Getting Started with Roles
    Roles and Tasks
    Roles and Handlers
    Roles and Control Flow
    Roles and Templating
    Roles and Files
    Requirements for Static Site Deployment
    Setting Up NGINX
    Templating the NGINX Configuration
    Creating a Static Site Role
    Planning the NFS Architecture
    Setting up the NFS Server
    Setting up the NFS Clients
    Restructuring to Roles: Server
    Restructuring to Roles: Clients
  • Overview
    What is Docker
    Installing Docker
    Installing Docker Part 2
    Running Your First Docker Container
    Managing Containers
    Inspecting Docker Images and Containers
    Docker and Data
    Docker and Data Use Case
    Building our First Docker Image
    Building our First Docker Image Part 2
    Storing Our Custom Docker Images
    Storing Our Custom Docker Images Part 2
    Building an Application with Docker
    Building an Application with Docker Part 2
    Multi-container Apps with Docker
    Multi Container Apps with Docker Part 2
    What is Docker Compose
    Multi Container Apps with Docker Compose
    What is Docker Machine
    Using Docker Machine with Digital Ocean
    What is Docker Swarm
    Docker Swarm with Digital Ocean
    Creating a Docker Swarm Application
    Creating a Docker Swarm Application Part 2
  • Overview
    What is Git
    Installing Git
    Getting a Git Repository
    Making Changes to a Git Repository
    Oh No Fixing Mistake with Git
    Connecting to a Remote Repository
    Branching out with Git
    Merging with Git
    Remote and Branches
    Simple GitHub Collaboration
  • INTRO TO NODE.JS
    Overview
    Installing NodeJS
    What Is NodeJS
    Modules In NodeJS
    Event Production And Consumption
    Event Production And Consumption Part 2
    Execution With Timers
    Read And Write Files
    Read And Write Files Part 2
    External Processes
    Streams
    Streams Part 2
    Node By Example: TCP Module
    Node By Example: TCP Module Part 2
    Node By Example: TCP Module Part 3
    Node By Example: TCP Module Part 4
    Node By Example: TCP Module Part 5
    Node By Example: HTTP Simple Server
    Node By Example: Static File Server
    Node By Example: Server With Routes
    Node By Example: Make HTTP Requests
    Node By Example: Make HTTP Requests Part 2
    Lets Build It: Twitter CLI
    Lets Build It: Twitter CLI Part 2
    Lets Build It: Twitter CLI Part 3
    Lets Build It: Click Capture
    Let’s Build It: Click Capture Part 2
    Let’s Build It: Click Capture Part 3
  • NUMPY
    Overview
    Scientific Python And Setup
    Review Of Python Basics With Jupyter
    Introducing NumPy Arrays
    NumPy Array And Data Types
    Graphing And Visualization
    Indexing And Slicing Arrays
    Copies And Views
    Elementwise And Broadcasting Operations
    Reduction Operations
    Shape And Sort Operations
    Data Types: Casting, Size, And Structure
    Structured Arrays
    Let’s Try It: Time Series Analysis
  • PHP OVERVIEW AND GETTING STARTED
    PHP Overview And Getting Started
    Numbers, Strings And Operators
    Conditionals
    Arrays
    Arrays Part 2
    Loops
    Functions
    Classes And Objects
    Dependency Management With Composer
    Basic Error Handling
  • INTRO TO REACT
    Overview
    The First Leap
    Plunging Into The Build
    Plunging Into The Build Part 2
    Taking A Breath Of ES2015
    Diving Into React
    Powering Up With State
    Streamlining With Properties
  • REDUX
    Overview
    Why Redux
    Principles
    Lists Are Different
    Wrapping Up
  • INTRO TO RUBY ON RAILS
    Overview
    What Is Ruby On Rails?
    Installing Ruby On Rails
    Intro To Web Apps
    Intro To Rails Views
    Intro To Rails Models
    Intro To Rails Models Part 2
    Intro To REST
    Intro To REST Part 2
    Intro To Validations
    Intro To Model Relationships
    Adding A Comments Resource
    Adding Static Assets
    Adding Pictures
    Authentication Using Devise
    Authentication Using Devise Part 2
    Intro To Rails Testing
    Intro To Rails Testing Part 2
  • INTRO TO VUE.JS
    Overview
    Our First Application
    Data Binding And Dev Tools
    Adding Methods
    Handling Events
    Handling Events Part 2
    Computed Properties
    Basic Directives And Binding
    Let’s Build It: Caesar Cipher
    Let’s Build It: Caesar Cipher Part 2
    Handling Data Collections
    Conditional Rendering
    Reactive Styling
    Filtering Data
    Our First Component
    Our First Component Part 2
    Our First Component Part 3
    Components With Props
    Components With Custom Events
    Components With Custom Events Part 2
    Components With Content
    Component Lifecycle Hooks
    Let’s Build It: Star Wars Search
    Let’s Build It: Star Wars Search Part 2
    Let’s Build It: Star Wars Search Part 3
    Let’s Build It: Star Wars Search Part 4
  • INTRO TO WEB DEVELOPMENT
    Overview
    Web APIs For JavaScript
    Web APIs For JavaScript Part 2
    The Document Object Model
    The Document Object Model Part 2
    Working With Events
    Data Storage In The Browser
    Data Storage In The Browser Part 2
    Lets Build It Counter
    Lets Build It Counter Part 2
    Lets Build It Timer
    Lets Build It Timer Part 2
    Lets Build It Timer Part 3
    Lets Build It Hangman
    Lets Build It Hangman Part 2
    Lets Build It Hangman Part 3
    Lets Build It Piano
    Lets Build It Piano Part 2
    Lets Build It Piano Part 3
  • INTRO TO WEBPACK
    Overview
    Laying The First Lines
    The Big Idea
    A Big Word, Transpilation
    Production Builds
    Development Builds
    Leaving With Style
  • FUNDAMENTALS
    Overview And Getting Started
    Hooks And Filters
    Shortcodes
    Creating And Modifying Posts
    The “Loop”
    Custom Post Types
    Taxonomies
    Creating A Settings Page
    Options And Transients
    Settings Sections And Fields
    Security Essentials
    Widgets
    Remote URLs
    Coding Standards
    Users
    User Meta
    Post Meta
    Enqueue Scripts And Styles
    Dashboard Widgets
    WPDB
    Customize The Login Page
    WordPress And AJAX
    WordPress Cron Jobs
    Customizing The Admin Area
    The Template Hierarchy
    Child Themes
    Themes: Header, Footer And Index
    Using The Loop Inside Our Theme
    Creating The Site’s Navigation
    Creating Page Templates
    Setting Up Our Widget Areas
    Activation And Deactivation Functions
    Internationalization
    CREATING OUR FIRST PLUGIN
    Creating Our First Plugin
    Creating Our First Plugin Part 2
    CREATING A WORDPRESS SITE
    Creating A WordPress Site
    Creating A WordPress Site Part 2
    Creating A WordPress Site Part 3
    Creating A WordPress Site Part 4
    Creating A WordPress Site Part 5
    Adding Custom Post Types
    Creating Theme Options
    Extending The Customizer
  • PERFORM OPERATIONS USING DATA TYPES AND OPERATORS
    Overview
    Working With Primitive Data Types
    Working With Multiple Assignment Statements
    Converting Types In Python
    Creating Lists
    Modifying Lists
    Sorting And Reversing Lists
    Slicing Lists
    Working With Operators
    Determining Operator Precedence
    Working With If Statements
    Using Compound Conditional Expressions
    Working With For Loops
    Working With While Loops
    Nesting For Loops
    Reading Files
    Copying Files
    Merging Mails
    Reading Console Inputs And Formatting Outputs
    Reading Command Line Arguments
    Defining Functions
    Using Default Arguments
    Using Keyword And Positional Arguments
    Handling Exceptions
    Using Math And Random Modules
    Display Datetime Working Directory File Metadata
  • FUNDAMENTALS
    Overview
    Writing Markdown
    TEXT
    Italicizing Text
    Bolding Text
    Striking Through Text
    Adding An External Link
    Creating Headings
    Creating A Blockquote
    Creating A Heading With Underline
    Adding An Internal Link
    LISTS
    Creating Lists
    IMAGES
    Adding An Image
    Creating An Image With A Link
    TABLES
    Creating A Table
    CODE
    Inlining Code
    Creating A Code Block
    ABOVE AND BEYOND
    Creating A Task List
  • NEW FEATURES IN ES6
    Overview
    Changes To Variables
    Enhanced Object Literals
    Classes Come To JavaScript
    Classes Come To JavaScript Part 2
    Changes To Functions
    Changes To Strings
    Changes To Strings Part 2
    Changes To Arrays
    Changes To Arrays Part 2
    Destructing Data
    Spread And Rest
    Iterators And The For…Of Loop
    Promises And Fetch
    Promises And Fetch Part 2
    Generators
    Generators Part 2
    Proxies
    Sets And WeakSets
    Maps And WeakMaps
  • OBJECT ORIENTED JAVA
    Installation And Setup Java
    Language Basics
    Control And Program Flow: If
    Control And Program Flow: Else
    Control And Program Flow: Switch
    Java Primitive Types
    Arrays And ArrayLists
    Loops
    Strings
    Math Library
    Static Methods
    IO Scanner
    IO Streams
    JUnit Testing
    Basic Guessing Game
    Debugging Techniques In Eclipse
    Handling Exceptions
    Deploying And Publishing
    Object-Oriented Concepts
    Object-Oriented Implementation
    Object-Oriented Implementation Part 2
    Object-Oriented Inheritance And Hierarchy
    Abstract Classes And Interfaces
    Abstract Classes And Interfaces Part 2
    Abstract Classes And Interfaces Part 3
    Abstract Classes And Interfaces Part 4
    2d Graphics And Sprites
    2d Graphics And Sprites Part 2
    Keyboard Controls With GLFW
    Saving The Game
    Java HTTP Server
    Java Collections API
    Security And Cryptography
  • OBJECT ORIENTED PYTHON
    Overview
    Installation And Setup
    What Is Object Oriented Programming
    Creating Classes And Objects In Python
    Extending Classes
    Extending Classes Part 2
    Lets Build It MonsterSlash V.1
    Lets Build It MonsterSlash V.1 Part 2
    MonsterSlash V.1 Game Refactor
    MonsterSlash V.1 Actor Refactor
    MonsterSlash V.2 Enemies Attack
    MonsterSlash V.2 Enemies Attack Part 2
  • FUNDAMENTALS
    Overview
    Setting Up The Environment
    Exploring The REPL
    Variables And Values
    Expressions And Statements
    BASIC DATA TYPES
    Basic Data Types
    Basic Data Types: Numbers
    Basic Data Types: Strings
    Basic Data Types: Booleans
    COMPARISONS, CONDITIONS AND CONTROL
    Compare Data
    Logic Control
    If Statements
    If-Else Statements
    If-Elif-Else Statements
    COLLECTION TYPES
    Lists
    Lists Part 2
    Tuples
    Dictionaries
    Dictionaries Part 2
    Sets
    ITERATION
    What Is Interation
    For Loops
    While Loops
    List Comprehensions
    Dictionary Comprehensions
    Iteration Helpers
  • BASICS
    Overview
    Creating And Initializing An Instance
    Representing An Instance: Str And Repr
    Representing An Instance: Format
    Representing An Instance: Bytes
    Deleting An Instance
    CONTAINERS
    Objects As Iterables
    Getting Items
    Setting And Deleting Items
    COMPARABLES
    Obtaining The Boolean Representation
    Equality And Inequality
    Greater And Less
    Hashing And Slots
    NUMBERS
    Adding
    Subtracting
    Multiplying
    Dividing
    Modulo And Powers
    Bit Shifting Operations
    Bitwise Logical Operations
    Negative And Positive
    Absolute Value And Inverse
    Integers And Floats
    Rounding
    Floor And Ceiling
    Truncation And Indexing
    Complex Number
    ATTRIBUTES
    Getting Attributes
    Setting And Deleting Attributes
    Descriptors: Property Decorators
    Descriptors: Creating A Custom Descriptor
    FUNCTIONS
    Making An Object Callable
    CONTEXT MANAGERS
    Clean Up With Context Managers
    SERIALIZATION
    Copying Objects
    Pickling: Get And Set State
  • PYTHON FOR SECURITY
    Overview
    Create A Socket Connection
    Create A Port Scanner
    Banner Reading From Open Ports
    Brute Forcing An SSH Connection
    Brute Forcing An SSH Connection Part 2
    Packet Sniffing With Python
    Packet Capture Output
    Ethernet Frames From RAW Packets
    IP Headers From Ethernet Frames
    TCP Segments
    UDP Segments
    Creating A TCP Server
    Forwarding Packet Sniffer
  • PYTHON PROGRAMMING
    Overview
    Setting Up Python
    Using Python For Simple Tasks
    Decision Making In Python
    Functions
    Iterations
    Strings And More Iteration
    Lists
    Dictionaries
    Tuples
    Manipulating Files
    Standard Library Functions
    Putting It All Together
  • Overview
    Open And Close A File
    Read A File
    Write A File
    Use A Context Manager
    Loop Through Multiple Files
    Loop Through A File: Fileinput
    Loop Through Multiple Files: Fileinput
  • Overview
    What Is RESTful API
    Building A Simple Express Application
    Our First Middleware
    Our First Middleware Part 2
    Building Our Routes
    Building Our Routes Part 2
    Data Modeling
    Data And Routes
    Data Persistence
    Data Persistence Part 2
    Adding Locations
    Adding Locations Part 2
    Refactor Models
  • Overview
    What Is The Standard Library
    Access The Standard Library
    Use The Os Module
    Use The Os.Path Module
    Use The Os.Path Module Part 2
    Use The Datetime Module: Getting Started
    Use The Datetime Module: Timedeltas And Arithmetic
    Use The Datetime Module: Comparisons
    Use The Datetime Module: Parsing And Timezones
    Use The Math Module
    Use The Sys Module: Interpreter Settings
    Use The Sys Module: Runtime Environment
    Use The Sys Module: Modules And Imports
    Use The Random Module
  • Overview
    What Is Version Control
    Set Up Git
    Set Up Git: Windows
    Our First Repository
    Our First GitHub Repository
    Connect Remote And Local Repos
    Branch In A Repository
    Branch In A Repository Part 2
    Create A Pull Request
    Create A Tagged Release
    Collaborate With Collaborators
    Collaborate With Collaborators Part 2
    Our First Fork
    Collaborate With Forks
    Collaborate With Forks Part 2
    Project: Python With Git
    Keeping Things Clean: .Gitignore
  • Overview
    Setup And Introduction
    Building The Proxy
    Building The Proxy Part 2
    Up And Going With Webpack
    Building The App Component
    Building The App Component Part 2
    Building Our Weather Service
    Building The Search Component
    Building The Search Component Part 2
    Current Weather Component
    Hourly And Minutely Weather Component
    Adding Google Location Search
    Adding Google Location Search Part 2
    Updating The Search Component
    Geolocation Service
    Geolocation Service Part 2
    Adding Location Lookup To Proxy
    Deploying Our Proxy On Heroku
    Deploying Our Angular App On GitHub Pages
    Adding Some Style
    Scrollable Hourly Component
    Minutely Component Chart
  • Overview
    Community Code: What Is That
    Install Pip
    Install System Packages
    Virtual Environments: Create
    Virtual Environment: Manage
    Virtual Environment: Install Packages
    Project: Resizing Images
    Install Pipenv
    Create Pipenv Environments
    Manage Pipenv Environments
    Use Pipenv Environments
    Project: Image Links On A Page
    Another One? Why Conda?
    Install Conda
    Install Conda: Windows
    Create Conda Environments
    Manage Conda Environments
    Manage Conda Environments: Reproduce
    Manage Conda Environments: Clone
    Project: Analyze Population Data
    Uninstall Conda
    Uninstall Conda: Windows

Business Professional Courses

  • Episode 1
    Episode 2
    Episode 3
    Episode 4
    Episode 5
    Episode 6
    Episode 7
  • Low-Cost Resources For Small Business
    Blockchain Basics
    Cat Picture Resiliency
    Entrepreneur’s Rollercoaster
    How Not To Be A CEO
    When Not To Join A Start-Up
    Zero Knowledge Doesn’t Mean Zero Ethics
    Business Paperwork
    Advisors
    Funding
    Keeping Track Of Your Expenses
  • Overview
    The Technology Is Only Worth 5 Percent
    Product Creation
    Operational Status
    Business Development
    Sales Management
    Exit Strategies
  • Exploring Your Career
    Creating Your Career Network
    Planning Your Career Developme
  • Introduction
    Section One: The Right Mindset
    Section Two: How To Be The Best In The World
    Section Three: Tools Of The Trade
    Section Four: More Key Sales Skills
  • Introduction To The STREET Process
    STREET Process Example
  • Launching A Successful Team
    Establishing Guidelines, Roles And Goals
    Developing A Team And Its Culture
    Building Trust And Commitment On Your Team
    Team Communication And Collaboration
    Motivating And Optimizing Team Performance
    Managing Virtual Teams
  • Overview
    Introduction
    Directness – Red Trait
    Extroversion – Green Trait
    Pace – Blue Trait
    Structure – Yellow Trait
    Create Your Profile Report
  • NIST 800-171 Basics
    HIPAA Basics
    Compliance Project Scoping
    Compliance Gap Analysis
    Compliance Remediation And Negotiation
    Compliance Audit/Assessment
  • Introduction To Meeting Starters
    How To Build And Sustain A High Performance Team
    Key Characteristics Of A Highly Effective Leader
    The Formula For Business Excellence
    Moments Of Truth
  • Participation Was Enough
    Music
    Instant Gratification
    Helicopter Parents
    Optimistic
    Experiences Vs Possessions
    Entrepreneurism Is Sexy
    Personal And Work Life Intertwined
    Extremely Tech Dependent
    Give My Work Meaning And Value
    Acknowledge My Strengths And Successes
    Provide Mentorship And Training
    Collaborative Work Environments
    Let Me Have Fun
    Provide Leadership Not Management
    Encourage An Entrepreneurial Spirit
  • Advanced Communications
    The Essentials Of Accountability
    Achieving Business Excellence
    Leader Of The Future
    How To Be A Trusted Advisor
    The Fundamentals Of Negotiation
    Conflict Resolution
    Key Ideas For Career Development
    Delegating Down Managing Up
  • Overview
    Self Management
    Self Management Part 2
    Interviewing
    Interviewing Part 2
    Interviewing Part 3
    Lean Meetings
    Lean Strategic Planning
    Your First 45 Days
    Your First 45 Days Part 2
    Your First 45 Days Part 3
    Lean Negotiations
    Lean Negotiations Part 2
  • Virtual Team Structure
    Common Myths Of Virtual Teams
  • Highly Effective Leaders
  • Get Your Head In The Game
    The Buck Stops Here
    Can You Hear Me Now?
    Got Freedom?
    Show Me The Money
    Business2
    The Attraction Multiplier
    And The Winner Is …
  • Capitalism Isn’t A Dirty Word
    The Value Crisis
    Hitting The Trust Accelerator
    Can I Please Talk To A Person
    Change: I Can’t Keep Up
    The Art Of Thinking Independently Together
    Our Way Is Better Than My Way Or Your Way
    Practice Makes Processes
    Built To Last
    The One Thing

Trusted by Aspiring IT Professionals, Corporations and
Government agencies
for more than a Decade

Get unlimited online access learn anywhere, anytime using your computer or mobile device!