Tell me and I may forget, teach me and I may remember, involve me and I learn. ~ Benjamin Franklin

Key Features:

1-      Live Classes:

The most effective learning possible happens in a live environment with a world-class instructor. TOIT’s classes run live allowing you to fully interact in the most engaging online learning experience available anywhere. And the short, 2-hour sessions allow you to easily digest the information & this can fit in your schedule very easily.

2-      Self-Pace Classes:

Being an IT person your schedule changes all the time & you need a flexible solution to continue your professional growth so you can stay current with the changes in technology. The Self-Pace classes option allows you to view the recordings of any Live class when it’s convenient for you. Stop, start, or speed up at your pace. And all the mentoring is still available for maximum flexibility.

3-      Guides for better Study:

These study guides give you a deep dive look at the material for all classes. this allows you to know what’s important and where to focus your attention for both the certification exam and real-world application. Think of this as the “Things you need to know” guide for success.

4-      Quizzes:

Confirm what you are learning through our online quizzes and challenges. This allows you to confirm you are learning at the right place and not falling behind. Constant checkpoint quizzes give you the confidence that you are retaining the information. And it allows you to review any areas using Replay and labs that you may have missed.

5-      Ask your Instructor:

Interact with absolute & most innovative teachers. like the “Navy Seal trainers” of IT training. Think about asking questions to the people who actually wrote the books. They will engage you in the classes like nothing you have experienced. Why not learn from the best of the best on the planet.

6-      1 on 1 Mentoring:

Like Self-pace learning anything new, you are certainly going to get stuck on something. Unlike traditional Online Learning, you aren’t on your own. You have access to the instructor from every class to ask questions. One of the most raged features of our offerings.

7-      Updated Courses/Fresh Content:

Unlike our competitors, we update our courses every month. You will be current on the absolute latest real-world security fixes, bug patches, and shortcuts. This allows you and your team to stay relevant & current in the ever-changing IT world.

8-      Completion Certificates:

Finish a course with pride. We provide completion certificates for every one of our courses for you to both demonstrate knowledge and proudly share your accomplishments. Take a picture with your completion certificate and post it on social media for all to see.

9-      Usage Reporting

Account admin access allows you to keep a close eye on your team’s progress. Team progress is clearly visible in an easy-to-use, interactive dashboard that exposes learner activity. And our Guided Learning program assists in onboarding. Tracking usage, status, and user stats are all at your fingertips. You can see when someone is logging in & logging out, how much time they are spending in system & doing training, what courses are taken & completed, what courses in progress, %age of completion of the courses in progress, etc. 

10-  Engaging Experience

You’ve never seen anything like our Learning Experience Platform. Gone old days. TOIT’s courses draw you in with a Netflix type platform making it super easy to view and launch the courses, labs, and books you need.

11-  Train Your Team

TOIT has a massive library of over 330 IT courses and thousands of class sessions covering everything from Cybersecurity, Cisco, Microsoft, AWS, Project Management to programming. Your entire team is covered with TOIT’s engaging courses. 

12-   Certified IT Courses by Certified Trainers:

All of the trainers are from IT Industry itself working as IT manager or director with 10 to 15 years of experience & certified trainers “You Get Trained by IT professionals”   

13-   PDF Workbooks:

Before taking courses, students can always download & print PDF workbooks & these workbooks, the student can use these books as practice book or reference to for later time even if your license is expired you still have something to refer back to.

14-   Ability to Repeat/Retake classes unlimited times:

The system does allow to repeat all courses UNLIMITED times, the feature helps the student to use our courses as a reference tool (check-in & check-out system) & take better knowledge.

15-   95% Success Rate:

Normally our students when they go for certification exams, our success ratio is 95% however in order to get this kind of success & percentage students are requested to follow the procedure (complete all modules, download PDF workbooks, get a course completion certificate, pass the course completion test and go to the exam with 30 to 90 days     

16-   Use your iPhone/iPad to take training:

Courses run on all Mobile devices you can use iPhone, Android, iPad, or tablet to take our IT courses. Take training on your go!  

Artificial Intelligence

01. What is it?
02. Language Overview
03. Major Players in AI
04. Math at a glance
05. An overview of how it may change your position.. Read more

Aruba

01. Introduction to Aruba, a Hewlett Packard Enterprise Company
02. Switch CLI (Command Line Interface) Navigation
03. Protecting Management Access
04. Management of Software and Configurations
05. VLANS
06. Spanning Tree Protocol (STP)
07. Link Aggregation
08. IP Routing
09. Virtual Switching Framework (VSF)
10. Wireless for Small-to-Medium Businesses (SMBs)
11. Aruba AirWave.. Read more

01. WLAN Fundamentals
02. Mobile First Architecture
03. Mobility Master Mobility Controller Configuration
04. Secure WLAN configuration
05. AP Provisioning
06. WLAN Security
07. Firewall Roles and Policies
08. Dynamic RF Management
09. Guest Access
10. Network Monitoring and Troubleshooting.. Read More

Automation

01. Introduction
02. Setting up the Learning Environment
03. Jumping into Ansible
04. A Real-World Playbook
05. Loops, Blocks, Strategies, and Galaxies
06. Ansible in the Cloud
07. Templates.. Read More
01. Introduction
02. Puppet Concepts
03. Building a Lab
04. The Puppet Language
05. Resources and Types
06. Using Modules
07. Hiera
08. Advanced Puppet Language
09. Puppet at Scale
10. Common Puppet Problems
11. Puppet Enterprise.. Read More

AWS

01. Course Overview and the AWS Global Infrastructure
02. Compute
03. Databases
04. Networking
05. Storage and Migration
06. Application Integration and Customer Engagement
07. Security
08. Monitoring and Management.. Read More
01. Introduction to Amazon AWS Security
02. Associate Level Review
03. Services Review
04. Incident Response
05. Identity and Access Management
06. Infrastructure Security
07. Logging and Monitoring
08. Data Protection.. Read More
01. Course Overview and AWS Introduction
02. AWS Compute
03. AWS Databases
04. AWS Storage
05. AWS Networking
06. AWS Messaging, Migration, and Translation
07. Security
08. Monitoring and Maintenance.. Read More
01. Course Overview and the AWS Global Infrastructure
02. AWS Security
03. Networking and Compute
04. Databases
05. Simple Storage Service (S3)
06. Lambda, API Gateway, Step Functions
07. Messaging
08. Elastic Beanstalk and Kinesis
09. Developer Tools
10. Monitoring.. Read More
01. Course Overview and AWS Introduction
02. AWS Networking
03. AWS Compute
04. AWS Databases
05. AWS Storage
06. AWS Migration and Messaging
07. AWS Security
08. Monitoring, Maintenance, and Management.. Read More

Check Point

01. Next Generation Firewalls
02. In-line versus Host-based Firewalls
03. CP is based on a centrally managed architecture
04. Configuration
05. SMS-Gateway Communication
06. Configuration and Commands
07. Security Policies & Rulebase
08. Software Blades
09. Logging and Tracing
10. Imaging & Clustering
11. VIPs & VMACs
12. Manage & Settings.. Read More

Cisco

01. Introduction to Cisco Unified Communications Fundamentals and Network Terminology
02. Understanding CUCM Administrative and User Interfaces
03. Common Phone and User Configuration Settings
04. Basic Dial Plan Using NANP
05. Configuring Endpoint Phone Features
06. Basic Media Resource Configuration
07. Basic Cisco Unity Connection Architecture
08. Basic Call Detail Records (CDRs) and Disaster Recovery.. Read More
01. Network Fundamentals
02. LAN Switching Fundamentals
03. Routing Fundamentals
04. Infrastructure Services
05. Infrastructure Maintenance.. Read More
01. Module 1. Cisco Unified Communications Solutions
02. Module 2. Administrator and End-User Interfaces
03. Module 3. Call Flows in Cisco Call Control Platforms
04. Module 4. Endpoint and End-User Administration
05. Module 5. End User Telephony and Mobility Features
06. Module 6. Cisco Unity Connection and Cisco Unified Communications Manager IM and Presence Service
07. Module 7. Cisco Unified Communications Solutions Maintenance Providing End-User Support.. Read More
01. Unified Computing
02. Network Virtualization
03. Cisco Data Center Networking Technologies
04. Automation and Orchestration
05. Application Centric Infrastructure.. Read More
01. Module 1: Security Concepts
02. Module 2: Secure Network Devices
03. Module 3: Layer 2 Security
04. Module 4: Firewall
05. Module 5: VPN
06. Module 6: Advanced Topics.. Read More
01. Network Fundamentals
02. Switch Fundamentals
03. Routing Fundamentals
04. IPv4 Addressing and Subnetting
05. Cisco IOS
06. Advanced Routing
07. VLANs and Trunks
08. InterVlan Routing
09. Spanning Tree Protocol
10. EtherChannel
11. DHCP and NTP
12. CDP, LLDP, Syslog, and SNMP
13. QoS
14. Security
15. Port Security, DHCP Snooping, Dynamic ARP Inspection
16. ACLs
17. NAT
18. Wireless
19. Automation and Programmability
20. IPv6.. Read More
01. Module 1: Cisco Unity Connection
02. Module 2: Cisco Unity Express
03. Module 3: Cisco Unified IM and Presence Implementation
04. Module 4: Video Provisioning and Integration in a Unified Communications Deployment.. Read More
01. Cisco Unified Communications Manager Introduction
02. Dial Plan Introduction and Implementation of Single-Site On-Cluster Calling
03. Implementation of Single-Site Off-Cluster Calling
04. Media Resources
05. Audio and Video Conferencing
06. Quality of Service.. Read More
01. Module 1. Multisite Deployment Implementation
02. Module 2. Centralized Call-Processing Redundancy Implementation
03. Module 3. Bandwidth Management and CAC Implementation
04. Module 4. Implementation of Features and Applications for Multisite Deployments
05. Module 5. Cisco VCS and Cisco Expressway
06. Module 6. GDPR and CCD.. Read More
01. Overview of Infrastructure and Design
02. Overview of Cisco Collaborations
03. Voice Gateways & Trunks
04. Understanding & Configuring Call Routing
05. Cisco Unity Connection
06. Describe Cisco Unified IM & P Protocols and Deployment
07. Describe Problems That Can Lead to Poor Voice and Video Quality
08. Troubleshooting Cisco Collaboration.. Read More
01. Single Sign-On (SSO) for Collaboration Applications
02. Configuring Cisco Unified IM and Presence
03. Configuring Cisco Unity Connection and Cisco Unity Express
04. Application Clients.. Read More
01. Implementing Data Center Switching Protocols
02. Implementing First-Hop Redundancy Protocols
03. Implementing Routing in Data Center
04. Implementing Multicast in Data Center
05. Implementing Data Center Overlay Protocols
06. Implementing Network Infrastructure Security
07. Describing Cisco Application-Centric Infrastructure
08. Describing Cisco ACI Building Blocks and VMM Domain Integration
09. Describing Packet Flow in Data Center Network
10. Describing Cisco Cloud Service and Deployment Models
11. Describing Data Center Network Infrastructure Management, Maintenance, and Operations
12. Explaining Cisco Network Assurance Concepts
13. Implementing Fibre Channel Fabric
14. Implementing Storage Infrastructure Services
15. Implementing FCoE Unified Fabric
16. Implementing Storage Infrastructure Security
17. Describing Data Center Storage Infrastructure Maintenance and Operations
18. Describing Cisco UCS Server Form Factors
19. Implementing Cisco Unified Computing Network Connectivity
20. Implementing Cisco Unified Computing Server Abstraction
21. Implementing Cisco Unified Computing SAN Connectivity
22. Implementing Unified Computing Security
23. Introducing Cisco HyperFlex Systems
24. Describing Data Center Unified Computing Management, Maintenance, and Operations
25. Implementing Cisco Data Center Automation and Scripting Tools
26. Describing Cisco Integration with Automation and Orchestration Software Platforms
27. Describing Cisco Data Center Automation and Orchestration Technologies.. Read More
01. Routing Protocol Troubleshooting
02. Troubleshooting layer 2 connectivity on Nexus switches
03. Troubleshooting VXLAN, EVPN and OTV
04. Troubleshoot ACI
05. Troubleshooting Cisco UCS
06. Implementing security for Cisco UCS
07. Troubleshooting SANs
08. Automation in the Data Center
09. Working with Data Center Management and Operations Management and Operations
10. Implementing AAA and RBAC
11. Working with firmware upgrades, packages, and interoperability
12. Troubleshooting network security.. Read More
01. Course Overview
02. EIGRPv4, EIGRPv6 and Named EIGRP
03. OSPFv2, OSPFv3, OSPF Address-Families
04. Multi-Protocol BGPv4
05. Redistribution and Advanced Routing Control
06. VPNs
07. Management Protocol and Services
08. Device Security.. Read More
01. Course Overview
02. Campus Architecture and Device Fundamentals
03. Access and Distribution Layer Features and Services
04. Routing
05. VPNs
06. Management Protocols and Services
07. Security
08. Next Generation Campus Networks.. Read More
01. Routed Protocols – Addressing
02. Routing Protocols – Secure and scale (create design)
03. Enterprise Campus Networks (design)
04. WAN
05. QoS
06. Multicast
07. Automation.. Read More
01. Securing and Troubleshooting the Wireless Network Infrastructure including
02. Implementing and Troubleshooting Secure Client Connectivity including
03. Implementing and Troubleshooting QoS in Wireless Networks including
04. Implementing and Troubleshooting Advanced Wireless Network Services including.. Read More
01. Module 1. Basic Concepts and Network Design
02. Module 2. Campus Network Architecture
03. Module 3. Spanning Tree Implementation
04. Module 4. Configuring Inter-VLAN Routing
05. Module 5. Implementing High Availability Networks
06. Module 6. First Hop Redundancy Implementation
07. Module 7. Campus Network Security.. Read More
01. Module 1. Tools and Methodologies of Troubleshooting
02. Module 2. Troubleshooting at SECHNIK Networking Ltd.
03. Module 3. Troubleshooting at TINC Garbage Disposal Ltd.
04. Module 4. Troubleshooting at PILE Forensic Accounting Ltd.
05. Module 5. Troubleshooting at Bank of POLONA Ltd.
06. Module 6. Troubleshooting at RADULKO Transport Ltd… Read More
01. Security Foundations
02. Implementing Security
03. Cloud Concepts and Security
04. Application-Specific Security Tools
05. Securing Endpoints
06. Network Access Control and Visibility.. Read More
01. Cisco Secure Design Principles
02. Deploying Cisco Network Infrastructure Protection Solutions
03. Deploying NAT on Cisco IOS and Cisco Adaptive Security Appliance (ASA) Firewalls
04. Deploying Threat Controls on Cisco ASA Firewalls
05. Deploying Threat Controls on Cisco IOS Software.. Read More
01. Fundamentals of VPN Technologies and Cryptography
02. Deploying Secure Site-to-Site Connectivity Solutions
03. Deploying Cisco IOS Site-to-Site FlexVPN Solutions
04. Deploying Client-less SSL VPN -Deploying AnyConnect VPN for Remote Access
05. Deploying Endpoint Security and Dynamic Access Policies
06. Endpoint Security and Dynamic Access Policies.. Read More
01. Threat Mitigation through Identity Services
02. Cisco ISE Fundamentals
03. Advance Access Control
04. Web Authentication and Guest Access
05. Endpoint Access Control
06. Troubleshooting Network Access Control.. Read More
01. Introducing Cisco ISE Architecture and Deployment
02. Cisco ISE Policy Enforcement
03. Web Authentication and Guest Services
04. Cisco ISE Profiler
05. Cisco ISE BYOD
06. Cisco ISE Endpoint Compliance Services
07. Working with Network Access Devices.. Read More
01. Content Security
02. Network Threat Defense
03. Cisco Fire Next-Generation IPS (NGIPS)
04. Cisco ASA with FirePOWER Services
05. Security Architectures
06. Troubleshooting, Monitoring, and Reporting Tools.. Read More
01. Introduction to VPN Technologies
02. VPN Configuration
03. Remote Access VPN Configuration.. Read More
01. Service Provider Architectures
02. Cisco Operating Systems
03. Interior Routing
04. SP Exterior Routing (v4/v6)
05. HA Protocols
06. Multi-Protocol Label Switching (MPLS)
07. MPLS-TE
08. Segment Routing / Source Packet Routing in Networking
09. SP QoS Architectures (v4/v6)
10. Security
11. L2VPN / Carrier Ethernet
12. L3VPN
13. IPv6 Transition Mechanisms
14. Multicast (v4/v6)
15. Automation and Assurance
16. SP Virtualization.. Read More
01. Introduction
02. Platform Architecture
03. Deployments
04. Call Routing Basics
05. Configuration Manager
06. Finesse Installation
07. Finesse
08. IP Phone Agents
09. UCCM Portal
10. Installing CUIC
11. Reporting CUIC
12. Basic Scripting
13. Outbound Dialing
14. Optional Components
15. UCCE Databases in Brief
16. Troubleshooting.. Read More
01. Overview of traditional networks
02. What is SDN?
03. Southbound Communication
04. The Role Applications Play
05. Northbound Communication
06. Cisco SDN Vision
07. Cisco SDN for the DC
08. Cisco ACI Devices
09. Cisco SDN for the Enterprise
10. Cisco SDN Controllers
11. Accessing the APIC
12. Controllers Demonstration
13. Why
ACI?
14. Policies
15. Do I need to Learn Programming?
16. Programming Demo..

Read More

01. LAN Switching Technologies
02. Routing Technologies
03. WAN Technologies
04. Infrastructure Services
05. Infrastructure Maintenance.. Read More
01. Introduction to managing Cisco UCS hardware
02. Managing UCS through the management interfaces
03. Administering RBAC for granular permissions
04. Maintaining the UCS
05. UCS architecture options
06. Configuring UCS options
07. Understand UCS options for interfacing with Fibre Channel
08. Using UCS pools.. Read More
01. Introduction to GNS3
02. Windows Installation
03. MacOS Installation
04. Tour of GNS3 Interface
05. Acquiring Cisco IOS Binaries
06. Emulating Cisco IOS Binaries
07. Juniper Devices
08. Integrating Docker Containers
09. Using Cisco VIRL Images
10. Attaching Virtual Machines to GNS3 Topologies
11. Client-Server Setup
12. Connecting to Physical Networks.. Read More
01. Module 1. Basic Network and Routing Concepts
02. Module 2. EIGRP Implementation
03. Module 3. OSPF Implementation
04. Module 4. Configuration of Redistribution
05. Module 5. Path Control Implementation
06. Module 6. Enterprise Internet Connectivity
07. Module 7. Routers and Routing Protocol Hardening.. Read More

Citrix

Coding and Development

01. Introduction to Angular
02. Angular Architecture
03. Angular Forms
04. Angular Tables
05. Angular NG Graphs
06. Angular Restful Services
07. Application Templates.. Read More
01. Introduction to Visual Studio
02. An introduction to .NET development options
03. C# Syntax
04. Reference Types and Value Types
05. Generics
06. More on Types
07. All About Strings
08. Object Orientation
09. Events and Delegates
10. Controlling Execution Flow
11. Handling Exceptions
12. Performance Tips.. Read More
01. Environment setup
02. What is CSS?
03. Part I
04. Part II
05. Part III
06. Part IV.. Read More
01. Environment setup
02. What is HTML?
03. HTML Foundations I
04. HTML Foundations II
05. HTML Foundations III
06. HTML Foundations IV.. Read More
01. Module 1 – Introduction to JavaScript
02. Module 2 – JavaScript Operation
03. Module 3 – Working with JavaScript
04. Module 4 – JavaScript Constructs
05. Module 5 – Modern JavaScript
06. Module 6 – Object-oriented JavaScript.. Read More
01. Introduction
02. Installing and Configuring Python
03. Hello World!
04. Variables
05. Data Types
06. Checking Datatypes
07. Strings
08. Lists
09. Tuples
10. Sets
11. Basic Operators
12. Conditional Flow
13. Loops
14. Control Statements
15. Exercises
16. Dictionaries
17. Functions
18. Modules
19. Date and Time
20. Input Output
21. Exceptions
22. Classes and Objects
23. GUI
24. Capstone Project: Building a Complete App.. Read More
01. Introduction
02. Components
03. JSX
04. Events
05. Forms
06. State.. Read More

CompTIA

01. Mobile Devices
02. Networking
03. Hardware
04. Virtualization and the Cloud
05. Troubleshooting hardware and networks.. Read More
01. Operating Systems
02. Security
03. Troubleshooting
04. Operational Procedures.. Read More
01. Introduction
02. Threat and Vulnerability Management
03. Software and Systems Security
04. Security Operations and Monitoring
05. Incident Response
06. Compliance and Assessment
07. Demos.. Read More
01. Security Concepts and Attacks
02. Implementing Security Controls and Technologies
03. Policies, Procedures, Practices, and Regulations.. Read More

Containerization

01. Introduction
02. Installation
03. Configuration
04. Networking
05. Storage and Volumes
06. Image Creation, Management, and Registry
07. Orchestration
08. Security.. Read More
01. Course Introduction
02. Core Concepts
03. Installation, Configuration, & Validation
04. Scheduling
05. Networking
06. Storage
07. Security
08. Logging and Monitoring
09. Extending the API
10. Troubleshooting.. Read More
01. Containers, Kubernetes, and OpenShift
02. Containerized Services
03. Managing containers
04. Managing Container images
05. Creating Custom Container Images
06. Deploying Containerized Applications on OpenShift
07. Deploying Multi-container applications
08. Troubleshooting Containerized Applications.. Read More

CWNP

01. Background of Wi-FI Technology including
02. Radio Frequency (RF) Technologies including
03. Wireless Local Area Network (WLAN) Regulations and Standards including
04. WLAN Protocols and Devices including
05. WLAN Network Architecture
06. WLAN Security
07. RF Validation
08. WLAN Troubleshooting.. Read More

Enterprise Linux

01. Be able to perform all tasks expected of a Red Hat Certified System Administrator
02. Understand core components of Ansible
03. Install and configure an Ansible control node
04. Configure Ansible managed nodes
05. Script administration tasks
06. Create Ansible plays and playbooks
07. Use Ansible modules for system administration tasks that work with:
08. Work with roles
09. Use advanced Ansible features.. Read More
01. Understand and use essential tools
02. Operate running systems
03. Configure local storage
04. Create and configure file systems
05. Deploy, configure, and maintain systems
06. Manage basic networking
07. Manage users and groups
08. Manage security.. Read More
01. Discovering hosts via Ping Scan
02. TCP Scanning:
03. UDP Scanning:
04. Searchsploit (Searches exploitdb)
05. Some common ports and what to do:
06. SSH
07. Telnet
08. SMTP
09. DNS
10. FINGER
11. WEB
12. SNMP
13. LDAP
14. SMB.. Read More

Cyber Security

01. Identity and Access
02. Platform Protection
03. Security Operations
04. Data and applications.. Read More
01. Domain 1: Information Security Governance
02. Domain 2: Information Risk Management
03. Domain 3: Information Security Program Development & Management
04. Domain 4: Information Security Incident Management.. Read More
01. Module 1 – The Process of Auditing Information Systems
02. Module 2 – Goverance and Management of IT
03. Module 3 – Information Systems Acquisition, Development, and Implementation
04. Module 4 – Information Systems Operation, Maintenance, and Support
05. Module 5 – Protection and Information Assets.. Read More
01. CISSP and the Exam
02. Security and Risk Management
03. Security Controls
04. Security Architecture and Engineering
05. Identity and Access Management
06. Authorization and Access Management Vulnerabilities Intro
07. Cryptography
08. Computer Architecture and Application Development Intro
09. Communication and Network Security
10. Physical Security
11. Security Operations.. Read More
01. Next Generation Firewalls
02. In-line versus Host-based Firewalls
03. CP is based on a centrally managed architecture
04. Configuration
05. SMS-Gateway Communication
06. Configuration and Commands
07. Security Policies & Rulebase
08. Software Blades
09. Logging and Tracing
10. Imaging & Clustering
11. VIPs & VMACs
12. Manage & Settings.. Read More
01. Security Foundations
02. Implementing Security
03. Cloud Concepts and Security
04. Application-Specific Security Tools
05. Securing Endpoints
06. Network Access Control and Visibility.. Read More
01. Introducing Cisco ISE Architecture and Deployment
02. Cisco ISE Policy Enforcement
03. Web Authentication and Guest Services
04. Cisco ISE Profiler
05. Cisco ISE BYOD
06. Cisco ISE Endpoint Compliance Services
07. Working with Network Access Devices.. Read More
01. Introduction to VPN Technologies
02. VPN Configuration
03. Remote Access VPN Configuration.. Read More
01. Introduction
02. Threat and Vulnerability Management
03. Software and Systems Security
04. Security Operations and Monitoring
05. Incident Response
06. Compliance and Assessment
07. Demos.. Read More
01. Security Concepts and Attacks
02. Implementing Security Controls and Technologies
03. Policies, Procedures, Practices, and Regulations.. Read More
01. Introduction to Hacking
02. IT Infrastructure
03. Security Standards and Governance
04. Encryption Methodologies
05. Ethical Hacking
06. Exploits and Cracking
07. Recon, Scanning, and Social Engineering.. Read More
01. Initial Security Steps
02. Manage Directory Synchronization
03. Identity Access Management and RBAC
04. Microsoft 365: Threats & Mitigation
05. Microsoft 365 Exchange Online and ATP
06. Mitigating Threats via Microsoft Threat Management
07. RM services & Encryption
08. How to mitigate Data loss
09. INFOSEC
10. Security in the Cloud
11. Archiving data related to Retention
12. Data Governance
13. Utilizing eDiscovery to search data
14. Mobile Device Management.. Read More
01. Introduction and Installation
02. Basic Wireshark Usage
03. Filtering
04. Dissecting Layer 2 and 3 Protocols
05. Dissecting Higher Level Protocols
06. Statistical Tools, Troubleshooting, and Additional Resources.. Read More
01. Course Overview
02. Panorama (PN) Overview
03. Plan
04. Deploy and Configure
05. Demonstrations.. Read More
01. Discovering hosts via Ping Scan
02. TCP Scanning:
03. UDP Scanning:
04. Searchsploit (Searches exploitdb)
05. Some common ports and what to do:
06. SSH
07. Telnet
08. SMTP
09. DNS
10. FINGER
11. WEB
12. SNMP
13. LDAP
14. SMB.. Read More
01. Introduction
02. Mysonicwall.com
03. Monitor Tab
04. Investigate Tab
05. Manage Tab
06. Quick Configuration Wizards
07. Appliance Settings
08. Network Configurations
09. Virtual Private Networks
10. Policies
11. High Availability.. Read More
01. Security Operations and Administration
02. Access Controls
03. Risk Identification
04. Incident Response
05. Cryptography
06. Network and Communication Security
07. Systems and Applications Security.. Read More

End-User Training

01. What’s New Excel?
02. ABC’s of Sort & Filter
03. Clean Your Data!
04. Get inFORMed!
05. Mathematically challenged?
06. Hands Off My Work!
07. Let Macros do it
08. Chart, Spark and Pivot.. Read More
01. Getting Started
02. Type of Sites
03. Apps
04. Pages
05. Lists
06. Libraries
07. Calendars
08. News Posts
09. Alerts
10. Search
11. Workflows
12. Office Integration.. Read More
01. Introduction to the Teams App
02. Teams and Channels
03. Setting up your Teams
04. Chat, Calls, and Meetings
05. Posts and Messages
06. Apps and Tools
07. Activity Feed
08. Teams Tips and Tricks.. Read More
01. What’s new
02. Basic Necessities
03. Outlines? Word!
04. Bust out the selfies
05. Super cool 3D/animations
06. Got video?
07. Excel infiltration.. Read More
01. Navigating MS Project 2019
02. Create and schedule a new project
03. Add resources to your project
04. View and track scheduling factors
05. Creating reports
06. Overview of master projects.. Read More
01. What’s new with Word 2019?
02. Back to basics
03. Get InFORMed
04. Who’s got mail?
05. Show your style
06. Excel? Word!.. Read More
01. Getting Started with Excel 2013
02. Entering Data
03. Creating Formulas and Functions
04. Formatting
05. Adjusting Worksheet Layout and Data
06. Printing
07. Introduction to Charting
08. Adjusting Worksheet Views
09. Multiple Worksheets and Workbooks
10. IF, VLOOKUP, and Power Functions
11. Security and Sharing
12. Database Features
13. PivotTables
14. Introduction to Macros.. Read More
01. Introducing InfoPath 2013
02. Template-Creation Basics
03. Creating a Data Source
04. Formatting a Template
05. Using Controls to Collect Data
06. Setting Options and Formatting Controls
07. Using Table and Sections for Repeating Data
08. Using Object Controls
09. Creating Browser Forms
10. Finishing a Template
11. Creating Views
12. Publishing Options
13. Publishing a Template in SharePoint
14. Advanced Data Techniques
15. Using Advanced Templates
16. Digital Signatures.. Read More
01. Getting Started
02. Meetings and Collaboration
03. Integrating Lync with other Applications.. Read More
01. Getting Started
02. Adding and Connecting Accounts
03. Reading Mail
04. Organizing Mail
05. Creating and Sending Mail
06. Creating and Working with Contacts
07. Working with the Calendar
08. Creating Tasks and Notes
09. Working with Outlook Data.. Read More
01. Navigating PowerPoint
02. Working with Presentations
03. Working with Slides
04. Adding Pictures to Slides
05. Adding Content to Slides
06. Adding Shapes, Diagrams, and Charts to Slides
07. Adding Video, Audio, and Animation to Slides
08. Preparing the Presentation
09. Delivering Your Presentation
10. Reusing and Sharing Presentations.. Read More
01. Getting Started with Word 2013
02. Customizing Word
03. Editing Text
04. Formatting Text
05. Using Paragraph Formatting
06. Formatting Pages
07. Formatting Efficiently with Styles and Themes
08. Creating Bulleted and Numbered Lists
09. Working with Tables
10. Illustrating Your Documents
11. Using Macros and Building Blocks
12. Proofing Your Documents
13. Reviewing Documents with Others
14. Sharing Documents with Others.. Read More
01. Introduction
02. The Human Factor
03. Your Cubicle
04. The Trouble with Passwords
05. Social Engineering
06. Phishing
07. Working Remotely
08. Your Company
09. International travel concerns
10. Advanced Persistent Threats
11. Conclusion.. Read More

F5

Fortinet

Google

01. Creating a Class
02. Managing the Classroom Page
03. Configuring Grading Settings
04. Transferring and Removing Grades
05. Stream Management
06. Type of Assignments
07. Google Meets
08. Calendar and Class Drive
09. Creating an Assignment
10. Rubric
11. Plagiarism
12. Quiz Creation
13. Managing Your Materials
14. Managing Access
15. Grades
16. Managing Classes.. Read More
01. Deploying & Managing a cloud solution environment
02. Planning, Creating, and Configuring a cloud solution
03. Creating, Configurating and implementing a cloud solution
04. Planning for the successful operation of a cloud solution.. Read More

ISACA

01. Domain 1: Information Security Governance
02. Domain 2: Information Risk Management
03. Domain 3: Information Security Program Development & Management
04. Domain 4: Information Security Incident Management.. Read More
01. Module 1 – The Process of Auditing Information Systems
02. Module 2 – Goverance and Management of IT
03. Module 3 – Information Systems Acquisition, Development, and Implementation
04. Module 4 – Information Systems Operation, Maintenance, and Support
05. Module 5 – Protection and Information Assets.. Read More

ISC2

01. CISSP and the Exam
02. Security and Risk Management
03. Security Controls
04. Security Architecture and Engineering
05. Identity and Access Management
06. Authorization and Access Management Vulnerabilities Intro
07. Cryptography
08. Computer Architecture and Application Development Intro
09. Communication and Network Security
10. Physical Security
11. Security Operations.. Read More
01. Security Operations and Administration
02. Access Controls
03. Risk Identification
04. Incident Response
05. Cryptography
06. Network and Communication Security
07. Systems and Applications Security.. Read More

ITIL

01. Course and ITILv4 Overview
02. ITILv4 Learning Outcome 1
03. ITILv4 Learning Outcome 4 and 3
04. ITILv4 Learning Outcome 2
05. ITILv4 Part of Learning Outcome 7 and Learning Outcome 5
06. ITILv4 Learning Outcome 6 and 7.. Read More

Juniper

Microsoft

01. Introduction to Windows Server 2019
02. Designing the network Infrastructure
03. Installation of Windows Server 2019
04. Understanding Active Directory
05. Using Azure
06. Federation Services
07. Working with Windows Systems
08. Using PowerShell.. Read More
01. Plan and Deploy Windows Server Infrastructure
02. Manage High Availability and Disaster Recovery
03. Security and Update Management
04. Manage Virtualizations and Containers
05. Enabling RDS and Remote Access in Windows Server.. Read More
01. Chapter 1 Installation, Upgrade, and Migration of Workloads and Servers
02. Chapter 2 Local Storage Configuration
03. Chapter 3 Enterprise Storage Solutions
04. Chapter 4 Storage Spaces and Data Deduplication
05. Chapter 5 Hyper-V Installation and Configuration
06. Chapter 6 Windows and Hyper-V Container Deployment and Management
07. Chapter 7 High Availability and Disaster Recovery
08. Chapter 8 Failover Clustering
09. Chapter 9 Hyper-V and Failover Clustering
10. Chapter 10 Network Load Balancing
11. Chapter 11 Deployment Images
12. Chapter 12 Virtual Machine Management.. Read More
01. Understanding TCP/IP
02. Installing DNS
03. Configuring DHCP
04. Implement IP Address Management (IPAM)
05. Understanding File Servers
06. Configuring High Availability
07. Implementing Software Defined Networking.. Read More
01. Install and configure Active Directory Domain Services (AD DS)
02. Manage and Maintain AD DS
03. Create and Manage Group Policy
04. Implement Active Directory Certificate Services (AD CS)
05. Implement identity federation and access solutions.. Read More
01. Introduction to PowerShell
02. Using Help
03. Understanding Commands
04. Using Providers
05. Connecting Commands
06. Adding Commands
07. Understanding Objects
08. Using the Pipeline
09. Learning to Format
10. Filtering Commands
11. Using Commands Remotely
12. Understanding WIM
13. PowerShell Multitasking
14. Understanding Automation
15. Knowing Security
16. Introduction to Variables
17. Welcome to Scripting
18. PowerShell Tricks.. Read More
01. Hyper-V Installation and Configuration
02. Hyper-V and Failover Clustering.. Read More
01. Module 1: Deploying and Managing Windows Server 2012
02. Module 2: Active Directory Domain Services
03. Module 3: Managing Active Directory Domain Services Objects
04. Module 4: Automating Active Directory Domain Services Administration
05. Module 5: Implementing IPv4
06. Module 6: Implementing DHCP
07. Module 7: Implementing DNS
08. Module 8: Implementing IPv6
09. Module 9: Implementing Local Storage
10. Module 10: Implementing File and Print Services
11. Module 11: Implementing a Group Policy Infrastructure
12. Module 12: Securing Windows Servers by Using Group Policy Objects
13. Module 13: Implementing Server Virtualization with Hyper-V.. Read More
01. Module 1: Implementing a Group Policy Infrastructure
02. Module 2: Managing User Desktops with Group Policy
03. Module 3: Managing User and Service Accounts
04. Module 4: Maintaining AD DS
05. Module 5: Configuring and Troubleshooting DNS
06. Module 6: Configuring and Troubleshooting Remote Access
07. Module 7: Installing, Configuring, and Troubleshooting the NPS Role
08. Module 8: Implementing NAP
09. Module 9: Optimizing File Services
10. Module 10: Configuring Encryption and Advanced Auditing
11. Module 11: Deploying and Maintaining Server Images
12. Module 12: Implementing Update Management
13. Module 13: Monitoring Windows Server 2012.. Read More
01. Module 1: Implementing Advanced Network Services
02. Module 2: Implementing Advanced File Services
03. Module 3: Implementing Dynamic Access Control (DAC)
04. Module 4: Implementing Network Load Balancing (NLB)
05. Module 5: Implementing Failover Clustering
06. Module 6: Implementing Failover Clustering with Hyper-V
07. Module 7: Implementing Disaster Recovery
08. Module 8: Implementing Distributed AD DS Deployments
09. Module 9: Implementing AD DS Sites and Replication
10. Module 10: Implementing AD CS
11. Module 11: Implementing AD RMS
12. Module 12: Implementing AD FS.. Read More
01. Module 1: Planning Server Upgrade and Migration
02. Module 2: Planning and Implementing a Server Deployment Infrastructure
03. Module 3: Designing and Maintaining an IP Configuration and Address Management Solution
04. Module 4: Designing and Implementing Name Resolution
05. Module 5: Designing and Implementing an AD DS Forest and Domain Infrastructure
06. Module 6: Designing and Implementing an Organizational Unit (OU) Infrastructure and AD DS Permissions Model
07. Module 7: Designing and Implementing a Group Policy Object (GPO) Strategy
08. Module 8: Designing and Implementing an AD DS Physical Topology
09. Module 9: Planning and Implementing Storage
10. Module 10: Planning and Implementing File Services
11. Module 11: Designing and Implementing Network Access Services
12. Module 12: Designing and Implementing Network Protection.. Read More
01. Module 1: Planning and Implementing a Server Virtualization Strategy
02. Module 2: Planning and Implementing Networks and Storage for Virtualization
03. Module 3: Planning and Deploying Virtual Machines
04. Module 4: Planning and Implementing a Virtualization Administration Solution
05. Module 5: Planning and Implementing a Server Monitoring Strategy
06. Module 6: Planning and Implementing High Availability for File Services and Applications
07. Module 7: Planning and Implementing a Highly Available Infrastructure Using Failover Clustering
08. Module 8: Planning and Implementing a Server Updates Infrastructure
09. Module 9: Planning and Implementing a Business Continuity Strategy
10. Module 10: Planning and Implementing a Public Key Infrastructure (PKI)
11. Module 11: Planning and Implementing an Identity Federation Infrastructure
12. Module 12: Planning and Implementing an Information Rights Management Infrastructures.. Read More
01. Chapter 1: Designing a Complex Microsoft Windows Server 2008 Infrastructure
02. Chapter 2: Planning Naming Conventions, Networking, and Access Principles
03. Chapter 3: Planning for Forestwide and Domainwide Upgrades with Server 2008
04. Chapter 4: Planning for Terminal Services and Application Virtualization
05. Chapter 5: Designing an Effective Administration Model
06. Chapter 6: Planning and Designing Group Policy
07. Chapter 7: Administering Security in an Enterprise-Level Infrastructure
08. Chapter 8: Planning for Business Continuity and Backup
09. Chapter 9: Designing a Windows Update Strategy for the Enterprise
10. Chapter 10: Using Virtualization to Increase Productivity and Facilitate Consolidation.. Read More
01. Introducing SharePoint 2016
02. Designing an information architecture
03. Designing a logical architecture
04. Designing a physical architecture
05. Installing and configuring SharePoint 2016
06. Creating web applications and site collections
07. Planning and configuring service applications
08. Managing users and permissions, and securing content
09. Configuring authentication for SharePoint 2016
10. Securing a SharePoint 2016 deployment
11. Managing taxonomy
12. Configuring user profiles
13. Configuring Enterprise Search
14. Monitoring and maintaining a SharePoint 2016 environment.. Read More
01. Chapter 1 Plan business continuity management
02. Chapter 2 Plan a SharePoint environment
03. Chapter 3 Upgrade and migrate a SharePoint environment
04. Chapter 4 Create and configure service applications
05. Chapter 5 Manage SharePoint solutions, BI, and systems integration.. Read More
01. Module 1: Introduction to SharePoint 2013
02. Module 2: What’s New in SharePoint 2013
03. Module 3: SharePoint 2013’s Architecture
04. Module 4: Preparing SQL Server for the SharePoint Installation
05. Module 5: Installing SharePoint 2013
06. Module 6: Upgrading to SharePoint 2013
07. Module 7: Using Central Administration to Manage SharePoint
08. Module 8: Creating and Managing Service Applications
09. Module 9: Understanding the Application Management Center
10. Module 10: Creating and Managing Workflows in SharePoint 2013
11. Module 11: Creating and Managing Business Data Connections
12. Module 12: Understanding the Search Service Architecture
13. Module 13: Managing the Search Service using PowerShell
14. Module 14: Scaling your SharePoint 2013 Farm
15. Module 15: Implementing Data Protection, Recoverability, and High Availability
16. Module 16: Administering the Office 365 SharePoint Environment.. Read More
01. Chapter 1: What’s New in Microsoft SharePoint 2010
02. Chapter 2: Planning and Deploying a SharePoint 2010
03. Chapter 3: Configuring SharePoint Farm Environments
04. Chapter 4: Configuring Service Applications
05. Chapter 5: Configuring Indexing and Search
06. Chapter 6: Managing Operational Settings
07. Chapter 7: Managing User Accounts and Roles
08. Chapter 8: Managing Authentication Providers and Permissions
09. Chapter 9: Managing Web Applications and Host Sites
10. Chapter 10: Managing Site Collections
11. Chapter 11: Deploying and Managing Applications and Solutions
12. Chapter 12: Backing Up and Restoring SharePoint
13. Chapter 13: Monitoring the SharePoint Environment
14. Chapter 14: Optimizing SharePoint
15. Chapter 15: Working with Windows PowerShell.. Read More
01. Chapter 1: Planning the Logical Architecture
02. Chapter 2: Designing the Physical Architecture
03. Chapter 3: Integrating SharePoint with the Network Infrastructure
04. Chapter 4: Planning for Farm Deployment
05. Chapter 5: Planning the Security Architecture
06. Chapter 6: Designing an Operations Strategy
07. Chapter 7: Designing a Strategy for Business Continuity
08. Chapter 8: Planning Service Applications
09. Chapter 9: Planning a SharePoint Component Strategy
10. Chapter 10: Planning Search Solutions
11. Chapter 11: Planning Business Management Strategies
12. Chapter 12: Planning an Upgrade and Migration Strategy.. Read More
01. Navigating the SharePoint Admin Center
02. Configuring Site Collections for Teams Integration.. Read More
01. Exchange 2016 Deployment
02. Exchange Administration
03. Exchange Management
04. Recipients
05. Exchange Management Shell
06. Client Connectivity
07. High Availability
08. Disaster Recovery
09. Message Transport
10. Antivirus, Anti spam, and Malware Protection
11. Exchange Online
12. Monitoring and Troubleshooting.. Read More
01. Putting Exchange Server 2013 in Context
02. Introducing the Changes in Exchange Server 2013
03. Understanding Availability, Recovery, and Compliance
04. Virtualizing Exchange Server 2013
05. Introduction to PowerShell and the Exchange Management Shell
06. Understanding the Exchange Autodiscover Process
07. Exchange Server 2013 Quick Start Guide
08. Understanding Server Roles and Configuration
09. Exchange Server 2013 Requirements
10. Installing Exchange Server 2013
11. Upgrades and Migrations to Exchange Server 2013 or Office 365
12. Management Permissions and Role-based Access Control
13. Basics of Recipient Management
14. Managing Mailboxes and Mailbox Content
15. Managing Mail-enabled Groups, Mail-enabled Users, and Mail-enabled Contacts
16. Managing Resource Mailboxes
17. Managing Modern Public Folders
18. Managing Archiving and Compliance
19. Creating and Managing Mailbox Databases
20. Creating and Managing Database Availability Groups
21. Understanding the Client Access Server
22. Managing Connectivity with Transport Services
23. Managing Transport, Data Loss Prevention, and Journaling Rules
24. Troubleshooting Exchange Server 2013
25. Backing Up and Restoring Exchange Server.. Read More
01. Chapter 1: Introduction to Microsoft Exchange Server 2010
02. Chapter 2: Installing and Configuring Exchange Server 2010
03. Chapter 3: Configuring Connectors, Routing and Transport, and Connectivity
04. Chapter 4: Managing Exchange Server 2010
05. Chapter 5: Configuring and Managing Public Folders
06. Chapter 6: Configuring Security, Compliance, and Policies
07. Chapter 7: Configuring High-Availability Solutions for Exchange Server
08. Chapter 8: Disaster Recovery Operations for Exchange Server
09. Chapter 9: Monitoring and Reporting with Exchange Server 2010
10. Chapter 10: Planning the Exchange Server 2010
11. Chapter 11: Designing and Deploying Mailbox Services
12. Chapter 12: Designing Routing and Client Connectivity
13. Chapter 13: Designing Security and Compliance
14. Chapter 14: Designing High Availability and Recovery.. Read More
01. Module 1: Installing Windows 8
02. Module 2: Upgrading and Migrating to Windows 8
03. Module 3: Managing Disks and Device Drivers
04. Module 4: Configuring and Troubleshooting Network Connections
05. Module 5: Implementing Wireless Network Connections
06. Module 6: Implementing Network Security
07. Module 7: Configuring File Access and Printers on Windows 8 Clients
08. Module 8: Securing Windows 8 Desktops
09. Module 9: Configuring Applications
10. Module 10: Optimizing and Maintaining Windows 8 Client Computers
11. Module 11: Configuring Mobile Computing and Remote Access
12. Module 12: Implementing Hyper-V
13. Module 13: Troubleshooting and Recovering Windows 8
14. Module 14: Using Windows PowerShell.. Read More
01. Module 1: Planning and Implementing Management of Windows 8.1
02. Module 2: Designing and Implementing an Installation Strategy
03. Module 3: Planning and Implementing Authentication for Windows 8.1
04. Module 4: Planning and Implementing IP Addressing and Intranet Connectivity
05. Module 5: Implementing an Application Strategy for Windows 8.1
06. Module 6: Planning and Implementing a Solution for User Settings
07. Module 7: Planning for and Configuring Cloud Services
08. Module 8: Planning and Implementing Windows Intune
09. Module 9: Managing Computers by Using Windows Intune
10. Module 10: Planning and Implementing Access to File and Print Services
11. Module 11: Planning and Implementing Encryption for Windows 8.1
12. Module 12: Planning and Implementing Endpoint Security
13. Module 13: Planning and Implementing Extranet Connectivity
14. Module 14: Planning and Implementing a Recovery Solution.. Read More
01. Chapter 1: Installing Microsoft Windows 7
02. Chapter 2: Automating the Microsoft Windows 7 Installation
03. Chapter 3: Managing Disks
04. Chapter 4: Managing the Microsoft Windows 7 Environment
05. Chapter 5: Configuring Hardware and Applications
06. Chapter 6: Managing Users, Groups, and Security
07. Chapter 7: Configuring Network Connectivity
08. Chapter 8: Monitoring and Maintaining Windows 7
09. Chapter 9: Configuring Backups and Recovery.. Read More
01. Upgrade from Skype for Business to Microsoft Teams
02. Plan and configure network settings for Microsoft Teams
03. Manage a team
04. Manage membership in a team
05. Implement governance and lifecycle management for Microsoft Teams
06. Configure and manage guest access
07. Manage security and compliance
08. Deploy and manage Microsoft Teams endpoints
09. Monitor and analyze service usage
10. Manage chat and collaboration experiences
11. Manage meeting experiences
12. Manage phone numbers
13. Manage Phone System
14. App Policies in a Team.. Read More
01. Chapter 1: Overview of Operations Management
02. Chapter 2: Planning a Configuration Manager Infrastructure
03. Chapter 3: Migrating from Configuration Manager 2007
04. Chapter 4: Installation and Site Role Configuration
05. Chapter 5: Role-Based Administration
06. Chapter 6: Client Installation
07. Chapter 7: Application Deployment
08. Chapter 8: Software Updates
09. Chapter 9: Operating System Deployment
10. Chapter 10: Asset Intelligence
11. Chapter 11: Inventory and Software Metering
12. Chapter 12: Reporting
13. Chapter 13: Compliance Settings
14. Chapter 14: Mobile Device Management
15. Chapter 15: Troubleshooting
16. Chapter 16: Disaster Recovery
17. Chapter 17: System Center Endpoint Protection
18. Chapter 18: Client Health.. Read More
01. Configure Data Center Process Automation
02. Deploy Resource Monitoring
03. Monitor Resources
04. Configure and Maintain Service Management
05. Manage Configuration and Protection.. Read More
01. Design and Deploy System Center
02. Configure System Center Infrastructure
03. Configure the Fabric
04. Configure System Center Integration
05. Configure and Deploy Virtual Machines and Services.. Read More
01. Configuring auditing
02. Developing a backup strategy
03. Monitoring database activity
04. Monitoring Queries
05. Managing indexes
06. Managing statistics
07. Monitoring queries
08. Implement log shipping
09. Implement AlwaysOn availability groups
10. Implement failover cluster instances
11. Monitoring database activity
12. Replication setup walkthrough
13. Monitoring replication
14. Performance tuning.. Read More
01. Module 1: Introduction to SQL Server 2012 and Its Toolset
02. Module 2: Preparing Systems for SQL Server 2012
03. Module 3: Installing and Configuring SQL Server 2012
04. Module 4: Working with Databases
05. Module 5: Understanding SQL Server 2012 Recovery Models
06. Module 6: Backup of SQL Server 2012 Databases
07. Module 7: Restoring SQL Server 2012 Databases
08. Module 8: Importing and Exporting Data
09. Module 9: Authenticating and Authorizing Users
10. Module 10: Assigning Server and Database Roles
11. Module 11: Authorizing Users to Access Resources
12. Module 12: Auditing SQL Server 2012 Environments
13. Module 13: Automating SQL Server 2012 Management
14. Module 14: Configuring Security for SQL Server Agent
15. Module 15: Monitoring SQL Server 2012 with Alerts and Notifications
16. Module 16: Performing Ongoing Database Maintenance
17. Module 17: Tracing Access to SQL Server 2012
18. Module 18: Monitoring SQL Server 2012
19. Module 19: Managing Multiple Servers
20. Module 20: Troubleshooting Common SQL Server 2012 Administrative Issues.. Read More
01. Device Management
02. App Management
03. Device Compliance
04. Microsoft Endpoint Manager Endpoint Security
05. Windows 10 Deployment
06. Device Enrollment
07. Tenant and Device Security
08. Application and Information Security
09. Microsoft 365 Governance
10. Microsoft 365 Compliance
11. Microsoft 365 Investigation and Response.. Read More
01. Azure IaaS and Monitoring Management
02. Networking and Security Management
03. Applications Solutions
04. Data Platforms.. Read More
01. Introduction to the Azure Module
02. Migration from AzureRM
03. Getting Started
04. Deployment
05. Concepts
06. Virtual Machines
07. Sample Scripts.. Read More

OpenStack

01. OpenStack Fundamentals
02. Keystone
03. Glance
04. Nova
05. Neutron
06. Horizon
07. Cinder
08. Heat
09. Swift.. Read More
01. Expanding the cloud
02. Scaling Compute Services
03. Increasing OpenStack Storage capabilities
04. Containerization in OpenStack.. Read More

Palo Alto

01. Course Overview
02. Panorama (PN) Overview
03. Plan
04. Deploy and Configure
05. Demonstrations.. Read More

Project Management

01. Introduction to Six Sigma
02. Projects and processes
03. Advanced DMAIC
04. Beginner Statistics
05. Intermediate Statistics.. Read More
01. What is Six Sigma?
02. Six Sigma history and application
03. Other process improvement and quality methods
04. Lean Concepts
05. Basic Six Sigma concepts
06. Approaching a problem
07. What is a process
08. Quality Management
09. Selecting the right projects
10. Introduction to DMAIC (define, measure, analyze, improve, control) and DMADV (define, measure, analyze, design, verify).. Read More
01. Navigating MS Project 2019
02. Create and schedule a new project
03. Add resources to your project
04. View and track scheduling factors
05. Creating reports
06. Overview of master projects.. Read More
01. Intro to the PMI-ACP exam
02. Domain I: Agile Principles and Mindset
03. Domain II: Value Driven Delivery
04. Domain III: Stakeholder Engagement
05. Domain IV: Team Performance
06. Domain V: Adaptive Planning
07. Domain VI: Problem Detection and Resolution
08. Domain VII: Continuous Improvement.. Read More
01. Creating A High-Performing Team
02. Starting The Project
03. Doing The Work
04. Keeping The Team On Track
05. Keeping The Business In Mind.. Read More

SonicWall

01. Introduction
02. Mysonicwall.com
03. Monitor Tab
04. Investigate Tab
05. Manage Tab
06. Quick Configuration Wizards
07. Appliance Settings
08. Network Configurations
09. Virtual Private Networks
10. Policies
11. High Availability.. Read More

Open Group Courses

01. Course Introduction
02. Management Overview
03. TOGAF 9 Components
04. Introduction to the Architecture Development Method
05. The Enterprise Continuum and Tools
06. Architecture Repository
07. Architecture Governance
08. The Architecture Content Framework
09. The Architecture Content Metamodel
10. Views and View points
11. Building Blocks
12. The Preliminary Phase.. Read More
01. Business Scenarios
02. Stakeholder Management
03. Architecture Implementation Support Techniques
04. Phase A: Architecture Vision
05. Phase B: Business Architecture
06. Business Architecture – Catalogs, Diagrams, and Matrices
07. Phase C: Overview of Information Systems Architectures
08. Phase C: Data Architecture
09. Phase C: Data Architecture – Catalogs, Matrices, and Diagrams
10. The Integrated Information Infrastructure Reference Model (III-RM)
11. Phase C: Applications Architecture
12. Phase C: Applications Architecture – Catalogs, Matrices, and Diagrams
13. Foundation Architecture
14. Phase D: Technology Architecture
15. Phase D: Technology Architecture – Catalogs, Matrices, and Diagrams
16. Migration Planning Techniques
17. Phase E: Opportunities and Solutions
18. Phase F: Migration Planning
19. Phase G: Implementation Governance
20. Phase H: Architecture Change Management
21. ADM Requirements Management
22. Architecture Partitioning
23. Guidelines for Adapting the ADM: Iteration and Levels
24. Guidelines for Adapting the ADM: Security
25. Guidelines for Adapting the ADM: SOA
26. Architecture Maturity Models
27. Architecture Skills Framework.. Read More

VMware

01. Course Introduction
02. Introduction to VMware Horizon
03. Introduction to Use Case
04. vSphere for VMware Horizon
05. VMware Horizon Desktops
06. VMware Horizon Agents
07. VMware Horizon Pools
08. VMware Horizon Client Options
09. Creating and Managing Instant-Clone Desktop Pools
10. Creating RDS Desktop and Application Pools
11. Monitoring VMware Horizon
12. Course Introduction
13. Horizon Connection Server
14. Authentication and Certificates
15. Workspace ONE Access & Virtual Application Management
16. Horizon Protocols
17. Graphic Cards
18. Horizon Scalability
19. Horizon Security.. Read More
01. Introduction & Foundational Knowledge
02. Horizon Infrastructure
03. Base Horizon Install
04. Desktop Images
05. Desktop Images
06. Create and Configure Pools
07. Configure and Manage Identity Manager
08. Configure and Manage User Environment Manager
09. Configure and Manage App Volumes
10. Troubleshooting VDI.. Read More

01. Course Introduction

02. Introduction to vSphere and the Software-Defined Data Center

03. Virtual Machines

04. vCenter Server

05. Configuring and Managing Virtual Networks

06. Configuring and Managing Virtual Storage

07. Virtual Machine Management

08. Resource Management and Monitoring

09. vSphere Cluster

10. vSphere Lifecycle.. Read More

01. Introduction to Virtualization
02. Installation of ESXi
03. vCenter Server Installation and Configuration
04. Virtual Machines
05. Networking
06. Storage
07. Security
08. Resource Allocation
09. Host Profiles
10. Business Continuity
11. Upgrade Process.. Read More
01. Introduction to virtualization
02. ESXi Installation
03. Virtual Machines
04. Networking
05. Storage
06. Security
07. Resource Allocation
08. Host Profiles
09. Monitoring and Performance
10. Upgrade Process
11. Troubleshooting
12. Virtual VSAN.. Read More

Take our SELF-PACE & Live IT Courses. Train your whole IT team at affordable pricing.

To see schedule of our LIVE CLASSES please click here!

See Schedule