2000+ Pre-Recorded & Instructor-Led IT Networking, Service & Project Management Certification Courses.

AI & ChatGPT

01. Using ChatGPT prompts to troubleshoot
02. Using ChatGPT prompts to create network configurations
03. Using ChatGPT to create IT documentation
04. Read more…
01. What is it?
02. Language Overview
03. Major Players in AI
04. Math at a glance
05. An overview of how it may change your position.. Read more
  1. Artificial Neural Networks
  2. Convolutional Neural Networks
  3. Recurrent Neural Networks
  4. Self Organizing Maps
  5. Read more…

Aruba

01. Introduction to Aruba, a Hewlett Packard Enterprise Company
02. Switch CLI (Command Line Interface) Navigation
03. Protecting Management Access
04. Management of Software and Configurations
05. VLANS
06. Spanning Tree Protocol (STP)
07. Link Aggregation
08. IP Routing
09. Virtual Switching Framework (VSF)
10. Wireless for Small-to-Medium Businesses (SMBs)
11. Aruba AirWave.. Read more

01. WLAN Fundamentals
02. Mobile First Architecture
03. Mobility Master Mobility Controller Configuration
04. Secure WLAN configuration
05. AP Provisioning
06. WLAN Security
07. Firewall Roles and Policies
08. Dynamic RF Management
09. Guest Access
10. Network Monitoring and Troubleshooting.. Read More

Automation

01. Introduction
02. Setting up the Learning Environment
03. Jumping into Ansible
04. A Real-World Playbook
05. Loops, Blocks, Strategies, and Galaxies
06. Ansible in the Cloud
07. Templates.. Read More
01. Introduction
02. Puppet Concepts
03. Building a Lab
04. The Puppet Language
05. Resources and Types
06. Using Modules
07. Hiera
08. Advanced Puppet Language
09. Puppet at Scale
10. Common Puppet Problems
11. Puppet Enterprise.. Read More

AWS

01. Course Overview and the AWS Global Infrastructure
02. Compute
03. Databases
04. Networking
05. Storage and Migration
06. Application Integration and Customer Engagement
07. Security
08. Monitoring and Management.. Read More

01. Database Basics
02. Amazon RDS
03. Aurora
04. Read More…

01. Collection

02. Storage

03. AWS Lambda

04. Learn More

01. AWS Networking Overview
02. AWS VPC Advanced Features
03. Private Connectivity Option in VPC
04. Hybrid Network in AWS.. Read More
01. SDLC and Code Tools
02. AWS Infrastructure and Cloud Formation
03. Beanstalk Deployment and Other Tools
04. ECS, Kenesis, and Logs.. Read More
01. Introduction to Amazon AWS Security
02. Associate Level Review
03. Services Review
04. Incident Response
05. Identity and Access Management
06. Infrastructure Security
07. Logging and Monitoring
08. Data Protection.. Read More
01. Course Overview and AWS Introduction
02. AWS Compute
03. AWS Databases
04. AWS Storage
05. AWS Networking
06. AWS Messaging, Migration, and Translation
07. Security
08. Monitoring and Maintenance.. Read More
01. Course Overview and the AWS Global Infrastructure
02. AWS Security
03. Networking and Compute
04. Databases
05. Simple Storage Service (S3)
06. Lambda, API Gateway, Step Functions
07. Messaging
08. Elastic Beanstalk and Kinesis
09. Developer Tools
10. Monitoring.. Read More
01. Course Overview and AWS Introduction
02. AWS Networking
03. AWS Compute
04. AWS Databases
05. AWS Storage
06. AWS Migration and Messaging
07. AWS Security
08. Monitoring, Maintenance, and Management.. Read More
  1. Introduction and History of AWS
  2. AWS Foundational Services: EC2, VPC, S3, EBS
  3. AWS Security, Identity, and Access Management (IAM)
  4. Read More…

Check Point

01. Next Generation Firewalls
02. In-line versus Host-based Firewalls
03. CP is based on a centrally managed architecture
04. Configuration
05. SMS-Gateway Communication
06. Configuration and Commands
07. Security Policies & Rulebase
08. Software Blades
09. Logging and Tracing
10. Imaging & Clustering
11. VIPs & VMACs
12. Manage & Settings.. Read More

Cisco

01. Network Fundamentals
02. Switch Fundamentals
03. Routing Fundamentals
04. IPv4 Addressing and Subnetting
05. Cisco IOS
06. Advanced Routing
07. VLANs and Trunks
08. InterVlan Routing
09. Spanning Tree Protocol
10. EtherChannel
11. DHCP and NTP
12. CDP, LLDP, Syslog, and SNMP
13. QoS
14. Security
15. Port Security, DHCP Snooping, Dynamic ARP Inspection
16. ACLs
17. NAT
18. Wireless
19. Automation and Programmability
20. IPv6.. Read More
01. Course Overview
02. Campus Architecture and Device Fundamentals
03. Access and Distribution Layer Features and Services
04. Routing
05. VPNs
06. Management Protocols and Services
07. Security
08. Next Generation Campus Networks.. Read More
01. Course Overview
02. EIGRPv4, EIGRPv6 and Named EIGRP
03. OSPFv2, OSPFv3, OSPF Address-Families
04. Multi-Protocol BGPv4
05. Redistribution and Advanced Routing Control
06. VPNs
07. Management Protocol and Services
08. Device Security.. Read More
01. Security Foundations
02. Implementing Security
03. Cloud Concepts and Security
04. Application-Specific Security Tools
05. Securing Endpoints
06. Network Access Control and Visibility.. Read More
01. Introduction to VPN Technologies
02. VPN Configuration
03. Remote Access VPN Configuration.. Read More
01. Introducing Cisco ISE Architecture and Deployment
02. Cisco ISE Policy Enforcement
03. Web Authentication and Guest Services
04. Cisco ISE Profiler
05. Cisco ISE BYOD
06. Cisco ISE Endpoint Compliance Services
07. Working with Network Access Devices.. Read More

01. Service Provider Architectures and Concepts
02. Network Operating Systems
03. Interior Routing
04. Exterior Routing (v4/v6).. Read More…

01. Introduction to CyberOps Associate
02. Introduction to Security Concepts
03. Security Monitoring
04. Host-Based Security.. Read More…

01. Introduction to Cisco Unified Communications Fundamentals and Network Terminology
02. Understanding CUCM Administrative and User Interfaces
03. Common Phone and User Configuration Settings
04. Basic Dial Plan Using NANP
05. Configuring Endpoint Phone Features
06. Basic Media Resource Configuration
07. Basic Cisco Unity Connection Architecture
08. Basic Call Detail Records (CDRs) and Disaster Recovery.. Read More
01. Network Fundamentals
02. LAN Switching Fundamentals
03. Routing Fundamentals
04. Infrastructure Services
05. Infrastructure Maintenance.. Read More
01. Module 1. Cisco Unified Communications Solutions
02. Module 2. Administrator and End-User Interfaces
03. Module 3. Call Flows in Cisco Call Control Platforms
04. Module 4. Endpoint and End-User Administration
05. Module 5. End User Telephony and Mobility Features
06. Module 6. Cisco Unity Connection and Cisco Unified Communications Manager IM and Presence Service
07. Module 7. Cisco Unified Communications Solutions Maintenance Providing End-User Support.. Read More
  1. Module 1: Describe the components and architectures of Cisco Business Video solutions
  2. Module 2: Implement Cisco Collaboration endpoints
  3. Module 3: Implement Cisco TelePresence endpoints
  4. Read More
  1. Compare and contrast common data center network architectures
  2. Describe the use of access control lists to perform basic traffic filtering
  3. Describe the basic concepts and components of authentication, authorization, and accounting
  4. Read More…
01. Unified Computing
02. Network Virtualization
03. Cisco Data Center Networking Technologies
04. Automation and Orchestration
05. Application Centric Infrastructure.. Read More
01. Module 1: Security Concepts
02. Module 2: Secure Network Devices
03. Module 3: Layer 2 Security
04. Module 4: Firewall
05. Module 5: VPN
06. Module 6: Advanced Topics.. Read More
  1. Wireless Fundamentals l
  2. Wireless Fundamentals ll
  3. Client Access l
  4. Client Access ll
  5. Read More…
01. Module 1: Cisco Unity Connection
02. Module 2: Cisco Unity Express
03. Module 3: Cisco Unified IM and Presence Implementation
04. Module 4: Video Provisioning and Integration in a Unified Communications Deployment.. Read More
01. Cisco Unified Communications Manager Introduction
02. Dial Plan Introduction and Implementation of Single-Site On-Cluster Calling
03. Implementation of Single-Site Off-Cluster Calling
04. Media Resources
05. Audio and Video Conferencing
06. Quality of Service.. Read More
01. Module 1. Multisite Deployment Implementation
02. Module 2. Centralized Call-Processing Redundancy Implementation
03. Module 3. Bandwidth Management and CAC Implementation
04. Module 4. Implementation of Features and Applications for Multisite Deployments
05. Module 5. Cisco VCS and Cisco Expressway
06. Module 6. GDPR and CCD.. Read More
01. Overview of Infrastructure and Design
02. Overview of Cisco Collaborations
03. Voice Gateways & Trunks
04. Understanding & Configuring Call Routing
05. Cisco Unity Connection
06. Describe Cisco Unified IM & P Protocols and Deployment
07. Describe Problems That Can Lead to Poor Voice and Video Quality
08. Troubleshooting Cisco Collaboration.. Read More
01. Single Sign-On (SSO) for Collaboration Applications
02. Configuring Cisco Unified IM and Presence
03. Configuring Cisco Unity Connection and Cisco Unity Express
04. Application Clients.. Read More
  1. Module 1: Introduction to Troubleshooting Cisco Collaboration Solutions
  2. Module 2: Cisco Unified Communications Manager Troubleshooting
  3. Module 3: Cisco VCS Control and VCS Expressway Troubleshooting
  4. Read More…
01. Implementing Data Center Switching Protocols
02. Implementing First-Hop Redundancy Protocols
03. Implementing Routing in Data Center
04. Implementing Multicast in Data Center
05. Implementing Data Center Overlay Protocols
06. Implementing Network Infrastructure Security
07. Describing Cisco Application-Centric Infrastructure
08. Describing Cisco ACI Building Blocks and VMM Domain Integration
09. Describing Packet Flow in Data Center Network
10. Describing Cisco Cloud Service and Deployment Models
11. Describing Data Center Network Infrastructure Management, Maintenance, and Operations
12. Explaining Cisco Network Assurance Concepts
13. Implementing Fibre Channel Fabric
14. Implementing Storage Infrastructure Services
15. Implementing FCoE Unified Fabric
16. Implementing Storage Infrastructure Security
17. Describing Data Center Storage Infrastructure Maintenance and Operations
18. Describing Cisco UCS Server Form Factors
19. Implementing Cisco Unified Computing Network Connectivity
20. Implementing Cisco Unified Computing Server Abstraction
21. Implementing Cisco Unified Computing SAN Connectivity
22. Implementing Unified Computing Security
23. Introducing Cisco HyperFlex Systems
24. Describing Data Center Unified Computing Management, Maintenance, and Operations
25. Implementing Cisco Data Center Automation and Scripting Tools
26. Describing Cisco Integration with Automation and Orchestration Software Platforms
27. Describing Cisco Data Center Automation and Orchestration Technologies.. Read More
01. Routing Protocol Troubleshooting
02. Troubleshooting layer 2 connectivity on Nexus switches
03. Troubleshooting VXLAN, EVPN and OTV
04. Troubleshoot ACI
05. Troubleshooting Cisco UCS
06. Implementing security for Cisco UCS
07. Troubleshooting SANs
08. Automation in the Data Center
09. Working with Data Center Management and Operations Management and Operations
10. Implementing AAA and RBAC
11. Working with firmware upgrades, packages, and interoperability
12. Troubleshooting network security.. Read More
01. Routed Protocols – Addressing
02. Routing Protocols – Secure and scale (create design)
03. Enterprise Campus Networks (design)
04. WAN
05. QoS
06. Multicast
07. Automation.. Read More
01. Securing and Troubleshooting the Wireless Network Infrastructure including
02. Implementing and Troubleshooting Secure Client Connectivity including
03. Implementing and Troubleshooting QoS in Wireless Networks including
04. Implementing and Troubleshooting Advanced Wireless Network Services including.. Read More
01. Module 1. Basic Concepts and Network Design
02. Module 2. Campus Network Architecture
03. Module 3. Spanning Tree Implementation
04. Module 4. Configuring Inter-VLAN Routing
05. Module 5. Implementing High Availability Networks
06. Module 6. First Hop Redundancy Implementation
07. Module 7. Campus Network Security.. Read More
01. Module 1. Tools and Methodologies of Troubleshooting
02. Module 2. Troubleshooting at SECHNIK Networking Ltd.
03. Module 3. Troubleshooting at TINC Garbage Disposal Ltd.
04. Module 4. Troubleshooting at PILE Forensic Accounting Ltd.
05. Module 5. Troubleshooting at Bank of POLONA Ltd.
06. Module 6. Troubleshooting at RADULKO Transport Ltd… Read More
01. Cisco Secure Design Principles
02. Deploying Cisco Network Infrastructure Protection Solutions
03. Deploying NAT on Cisco IOS and Cisco Adaptive Security Appliance (ASA) Firewalls
04. Deploying Threat Controls on Cisco ASA Firewalls
05. Deploying Threat Controls on Cisco IOS Software.. Read More
01. Fundamentals of VPN Technologies and Cryptography
02. Deploying Secure Site-to-Site Connectivity Solutions
03. Deploying Cisco IOS Site-to-Site FlexVPN Solutions
04. Deploying Client-less SSL VPN -Deploying AnyConnect VPN for Remote Access
05. Deploying Endpoint Security and Dynamic Access Policies
06. Endpoint Security and Dynamic Access Policies.. Read More
01. Threat Mitigation through Identity Services
02. Cisco ISE Fundamentals
03. Advance Access Control
04. Web Authentication and Guest Access
05. Endpoint Access Control
06. Troubleshooting Network Access Control.. Read More
01. Content Security
02. Network Threat Defense
03. Cisco Fire Next-Generation IPS (NGIPS)
04. Cisco ASA with FirePOWER Services
05. Security Architectures
06. Troubleshooting, Monitoring, and Reporting Tools.. Read More
01. Service Provider Architectures
02. Cisco Operating Systems
03. Interior Routing
04. SP Exterior Routing (v4/v6)
05. HA Protocols
06. Multi-Protocol Label Switching (MPLS)
07. MPLS-TE
08. Segment Routing / Source Packet Routing in Networking
09. SP QoS Architectures (v4/v6)
10. Security
11. L2VPN / Carrier Ethernet
12. L3VPN
13. IPv6 Transition Mechanisms
14. Multicast (v4/v6)
15. Automation and Assurance
16. SP Virtualization.. Read More
01. Introduction
02. Platform Architecture
03. Deployments
04. Call Routing Basics
05. Configuration Manager
06. Finesse Installation
07. Finesse
08. IP Phone Agents
09. UCCM Portal
10. Installing CUIC
11. Reporting CUIC
12. Basic Scripting
13. Outbound Dialing
14. Optional Components
15. UCCE Databases in Brief
16. Troubleshooting.. Read More
  1. Introduction and preparation
  2. Installation and initiation
  3. Terminology
  4. Call distribution
  5. Complete telephony
  6. Read More…
  1. Describing and Implementing Foundational Wireless Theory
  2. Describing and Implementing Foundational Wireless Math and Antennas
  3. Describing and Implementing Foundational Wireless Operation
  4. Read More…
  1. Organization and Networks
  2. Inventory and Devices
  3. Privacy and Security
  4. Templates and Config Sync
  5. Read More…
01. Overview of traditional networks
02. What is SDN?
03. Southbound Communication
04. The Role Applications Play
05. Northbound Communication
06. Cisco SDN Vision
07. Cisco SDN for the DC
08. Cisco ACI Devices
09. Cisco SDN for the Enterprise
10. Cisco SDN Controllers
11. Accessing the APIC
12. Controllers Demonstration
13. Why
ACI?
14. Policies
15. Do I need to Learn Programming?
16. Programming Demo..

Read More

01. LAN Switching Technologies
02. Routing Technologies
03. WAN Technologies
04. Infrastructure Services
05. Infrastructure Maintenance.. Read More
  1. Course Introduction
  2. FirePOWER Core Technologies
  3. FirePOWER Platforms & Sizing
  4. Read More….
01. Introduction to managing Cisco UCS hardware
02. Managing UCS through the management interfaces
03. Administering RBAC for granular permissions
04. Maintaining the UCS
05. UCS architecture options
06. Configuring UCS options
07. Understand UCS options for interfacing with Fibre Channel
08. Using UCS pools.. Read More
01. Introduction to GNS3
02. Windows Installation
03. MacOS Installation
04. Tour of GNS3 Interface
05. Acquiring Cisco IOS Binaries
06. Emulating Cisco IOS Binaries
07. Juniper Devices
08. Integrating Docker Containers
09. Using Cisco VIRL Images
10. Attaching Virtual Machines to GNS3 Topologies
11. Client-Server Setup
12. Connecting to Physical Networks.. Read More
01. Module 1. Basic Network and Routing Concepts
02. Module 2. EIGRP Implementation
03. Module 3. OSPF Implementation
04. Module 4. Configuration of Redistribution
05. Module 5. Path Control Implementation
06. Module 6. Enterprise Internet Connectivity
07. Module 7. Routers and Routing Protocol Hardening.. Read More

Citrix

  1. Citrix architecture and supporting infrastructure
  2. Installation and configuration of core components
  3. Delivery controller
  4. Read More…

Coding and Development

01. *args and **kwargs
02. Debugging
03. Generators
04. Map, Filter and Reduce.. Read More

01. Introduction to Angular
02. Angular Architecture
03. Angular Forms
04. Angular Tables
05. Angular NG Graphs
06. Angular Restful Services
07. Application Templates.. Read More
01. Introduction to Visual Studio
02. An introduction to .NET development options
03. C# Syntax
04. Reference Types and Value Types
05. Generics
06. More on Types
07. All About Strings
08. Object Orientation
09. Events and Delegates
10. Controlling Execution Flow
11. Handling Exceptions
12. Performance Tips.. Read More
01. Environment setup
02. What is CSS?
03. Part I
04. Part II
05. Part III
06. Part IV.. Read More
01. Environment setup
02. What is HTML?
03. HTML Foundations I
04. HTML Foundations II
05. HTML Foundations III
06. HTML Foundations IV.. Read More
  1. Introduction
  2. Installing and configuring Java
  3. Syntax and Hello World
  4. Classes and objects
  5. Read More…
01. Module 1 – Introduction to JavaScript
02. Module 2 – JavaScript Operation
03. Module 3 – Working with JavaScript
04. Module 4 – JavaScript Constructs
05. Module 5 – Modern JavaScript
06. Module 6 – Object-oriented JavaScript.. Read More
  1. What is Node.js?
  2. Where can Node.js be used?
  3. Why do people write Node.js?
  4. What this course offers
  5. Read More…
  1. What is App security?
  2. Why do we care about app security?
  3. OWASP
  4. SSI/TLS
  5. Read More…
  1. What is Flask?
  2. Why do people use Flask?
  3. Installing Flask modules
  4. Setting up virtualenv
  5. Read More…
01. Introduction
02. Installing and Configuring Python
03. Hello World!
04. Variables
05. Data Types
06. Checking Datatypes
07. Strings
08. Lists
09. Tuples
10. Sets
11. Basic Operators
12. Conditional Flow
13. Loops
14. Control Statements
15. Exercises
16. Dictionaries
17. Functions
18. Modules
19. Date and Time
20. Input Output
21. Exceptions
22. Classes and Objects
23. GUI
24. Capstone Project: Building a Complete App.. Read More
01. Introduction
02. Components
03. JSX
04. Events
05. Forms
06. State.. Read More
  1. Introduction
  2. Installing and configuring Ruby
  3. Hello World!
  4. Classes and objects
  5. Read More…

CompTIA

01. Security Concepts and Attacks
02. Implementing Security Controls and Technologies
03. Policies, Procedures, Practices, and Regulations.. Read More

01. Mobile Devices
02. Networking
03. Hardware
04. Virtualization and the Cloud
05. Troubleshooting hardware and networks.. Read More

01. Operating Systems
02. Security
03. Software Troubleshooting
04. Operational Procedures.. Read More

01. Mobile Devices
02. Networking
03. Hardware
04. Virtualization and the Cloud
05. Troubleshooting hardware and networks.. Read More
01. Operating Systems
02. Security
03. Troubleshooting
04. Operational Procedures.. Read More
  1. Introduction to Networks
  2. The Open Systems Interconnection Specifications
  3. Networking Topologies, Connectors, and Wiring Standards
  4. The Current Ethernet Specifications
  5. Read More…
  1. Cloud Computing concepts, models, and terminology
  2. Disk Storage Systems
  3. Storage Networking
  4. Network Infrastructure
  5. Read More…
01. Introduction
02. Threat and Vulnerability Management
03. Software and Systems Security
04. Security Operations and Monitoring
05. Incident Response
06. Compliance and Assessment
07. Demos.. Read More
  1. Hardware and system configuration
  2. Systems operations and maintenance
  3. Security
  4. Linux troubleshooting and diagnostics
  5. Read More…
  1. Introduction To Project Management
  2. Initiating The Project
  3. Project Team Roles And Responsibilities
  4. Read More…
  1. Introduction to Networks
  2. The Open Systems Interconnection Specifications
  3. Networking Topologies, Connectors, and Wiring Standards
  4. The Current Ethernet Specifications
  5. Read More…
  1. Security Concepts and Attacks
  2. Implementing Security Controls and Technologies
  3. Policies, Procedures, Practices, and Regulations
  4. Read More…
01. Introduction to Networks
02. The Open Systems Interconnection Specifications
03. Networking Topologies, Connectors, and Wiring Standards. Read More

Containerization

01. Introduction
02. Installation
03. Configuration
04. Networking
05. Storage and Volumes
06. Image Creation, Management, and Registry
07. Orchestration
08. Security.. Read More
01. Course Introduction
02. Core Concepts
03. Installation, Configuration, & Validation
04. Scheduling
05. Networking
06. Storage
07. Security
08. Logging and Monitoring
09. Extending the API
10. Troubleshooting.. Read More
01. Containers, Kubernetes, and OpenShift
02. Containerized Services
03. Managing containers
04. Managing Container images
05. Creating Custom Container Images
06. Deploying Containerized Applications on OpenShift
07. Deploying Multi-container applications
08. Troubleshooting Containerized Applications.. Read More

CWNP

01. Background of Wi-FI Technology including
02. Radio Frequency (RF) Technologies including
03. Wireless Local Area Network (WLAN) Regulations and Standards including
04. WLAN Protocols and Devices including
05. WLAN Network Architecture
06. WLAN Security
07. RF Validation
08. WLAN Troubleshooting.. Read More

Cyber Security

01. Course Overview
02. Panorama (PN) Overview
03. Plan
04. Deploy and Configure
05. Demonstrations.. Read More
  1. What is an ISC2 CCSP?
  2. Understand Cloud Computing Concepts
  3. Describe Cloud Reference Architecture
  4. Understand Security Concepts Relevant to Cloud Computing
  5. Read More…

01. Introduction
02. Threats, Attacks, and Vulnerabilities
03. Authentication, Authorization, and Accounting
04. Read More…

01. Reconnaissance
02. Social Engineering
03. Phishing
04. Read More…

01. Security Concepts and Attacks
02. Implementing Security Controls and Technologies
03. Policies, Procedures, Practices, and Regulations.. Read More
01. Module 1 – The Process of Auditing Information Systems
02. Module 2 – Goverance and Management of IT
03. Module 3 – Information Systems Acquisition, Development, and Implementation
04. Module 4 – Information Systems Operation, Maintenance, and Support
05. Module 5 – Protection and Information Assets.. Read More
  1. CISSP and the Exam
  2. Security and Risk Management
  3. Security Controls
  4. Security Architecture and Engineering
  5. Read More…
  1. How to Protect Your Team with Multifactor Authentication
  2. How to Protect Your Team from Viruses
  3. How to Protect Your Team from Malware
  4. Read More….
  1. How to Deploy Secure lPSec Site-to-Site VPNs in AWS
  2. Securing Web Servers in AWS
  3. Securing LAN Connectivity in Your Organization
  4. Read More….
  1. How to Protect Your Team from Ransomware
  2. Mitigating Ransomware through Risk Analysis
  3. Ransomware Response
  4. Read More….
  1. Ransomware Breaches Caused By Unpatched Systems
  2. Ransomware Breaches Caused By Compromised Passwords
  3. Ransomware Breaches Caused By Careless Users Clicking on Stuff
  4. Read More….
  1. Breach detection and using the Sysinternals tools
  2. Protecting credentials and privileged access
  3. Limiting administrator rights with Just Enough Administration
  4. Privileged Access Management and administrative forests
  5. Read More….
01. Identity and Access
02. Platform Protection
03. Security Operations
04. Data and applications.. Read More
01. Domain 1: Information Security Governance
02. Domain 2: Information Risk Management
03. Domain 3: Information Security Program Development & Management
04. Domain 4: Information Security Incident Management.. Read More
01. Next Generation Firewalls
02. In-line versus Host-based Firewalls
03. CP is based on a centrally managed architecture
04. Configuration
05. SMS-Gateway Communication
06. Configuration and Commands
07. Security Policies & Rulebase
08. Software Blades
09. Logging and Tracing
10. Imaging & Clustering
11. VIPs & VMACs
12. Manage & Settings.. Read More
01. Security Foundations
02. Implementing Security
03. Cloud Concepts and Security
04. Application-Specific Security Tools
05. Securing Endpoints
06. Network Access Control and Visibility.. Read More
01. Introducing Cisco ISE Architecture and Deployment
02. Cisco ISE Policy Enforcement
03. Web Authentication and Guest Services
04. Cisco ISE Profiler
05. Cisco ISE BYOD
06. Cisco ISE Endpoint Compliance Services
07. Working with Network Access Devices.. Read More
01. Introduction to VPN Technologies
02. VPN Configuration
03. Remote Access VPN Configuration.. Read More
  1. What is it?
  2. Language Overview
  3. Major Players in AI
  4. Math at a glance
  5. Read More….
01. Introduction
02. Threat and Vulnerability Management
03. Software and Systems Security
04. Security Operations and Monitoring
05. Incident Response
06. Compliance and Assessment
07. Demos.. Read More
01. Introduction to Hacking
02. IT Infrastructure
03. Security Standards and Governance
04. Encryption Methodologies
05. Ethical Hacking
06. Exploits and Cracking
07. Recon, Scanning, and Social Engineering.. Read More
  1. The role of F5 products
  2. Discuss the purpose of, use cases for, and key considerations related to load balancing
  3. Differentiate between a client and server
  4. Read More…
  1. Forensics Introduction: Concepts and objectives in Forensic Investigations
  2. Digital Evidence: Considerations when dealing with digital information
  3. Computer Investigations: An overview of the processes around forensic investigations
  4. Read More…
  1. Introduction to FortiGate
  2. Security Fabric
  3. Firewall Policies
  4. Network Address Translation (NAT)
  5. Read More…
  1. Introduction
  2. Understanding the healthcare environment
  3. Identifying applicable domestic and international regulations
  4. Apply compliance frameworks
  5. Read More…
  1. Course Introduction
  2. FirePOWER Core Technologies
  3. FirePOWER Platforms & Sizing
  4. Upgrading to FirePOWER Threat Defense
  5. FirePOWER Management
  6. Read More…
  1. The Tools & the Team – Functional testing vs. policy/procedure review
  2. Elements of a Good Vulnerability Assessment
  3. Developing a Project Plan
  4. Read more…
01. Initial Security Steps
02. Manage Directory Synchronization
03. Identity Access Management and RBAC
04. Microsoft 365: Threats & Mitigation
05. Microsoft 365 Exchange Online and ATP
06. Mitigating Threats via Microsoft Threat Management
07. RM services & Encryption
08. How to mitigate Data loss
09. INFOSEC
10. Security in the Cloud
11. Archiving data related to Retention
12. Data Governance
13. Utilizing eDiscovery to search data
14. Mobile Device Management.. Read More…
01. Introduction and Installation
02. Basic Wireshark Usage
03. Filtering
04. Dissecting Layer 2 and 3 Protocols
05. Dissecting Higher Level Protocols
06. Statistical Tools, Troubleshooting, and Additional Resources.. Read More
  1. Next-Generation security platform and architecture
  2. Virtual and cloud deployment
  3. Initial configuration
  4. Read More..

01. Discovering hosts via Ping Scan
02. TCP Scanning:
03. UDP Scanning:
04. SMB.. Read More…

  1. What is MITRE
  2. Drive-by compromise
  3. What is it?
  4. Watering hole attacks
  5. Read More…
01. Introduction
02. Mysonicwall.com
03. Monitor Tab
04. Investigate Tab
05. Manage Tab
06. Quick Configuration Wizards
07. Appliance Settings
08. Network Configurations
09. Virtual Private Networks
10. Policies
11. High Availability.. Read More
01. Security Operations and Administration
02. Access Controls
03. Risk Identification
04. Incident Response
05. Cryptography
06. Network and Communication Security
07. Systems and Applications Security.. Read More
  1. Distinguish the various attacks types that target wireless LANs, Bluetooth, mobile devices, and Internet of Things (IoT) devices
  2. Fundamentals of Wireless Security
  3. Anatomy of a Secure Connection
  4. Read More…
01. Course and ITILv4 Overview
02. ITILv4 Learning Outcome 1
03. ITILv4 Learning Outcome 4 and 3
04. ITILv4 Learning Outcome 2
05. ITILv4 Part of Learning Outcome 7 and Learning Outcome 5
06. ITILv4 Learning Outcome 6 and 7.. Read More

Enterprise Linux

  1. What is Troubleshooting
  2. Being Proactive
  3. Troubleshooting Boot Issues
  4. Identifying Hardware Issues
  5. Read More…
  1. Hardware and system configuration
  2. Systems operations and maintenance
  3. Security
  4. Linux troubleshooting and diagnostics
  5. Read More…
01. Be able to perform all tasks expected of a Red Hat Certified System Administrator
02. Understand core components of Ansible
03. Install and configure an Ansible control node
04. Configure Ansible managed nodes
05. Script administration tasks
06. Create Ansible plays and playbooks
07. Use Ansible modules for system administration tasks that work with:
08. Work with roles
09. Use advanced Ansible features.. Read More
01. Understand and use essential tools
02. Operate running systems
03. Configure local storage
04. Create and configure file systems
05. Deploy, configure, and maintain systems
06. Manage basic networking
07. Manage users and groups
08. Manage security.. Read More
01. Discovering hosts via Ping Scan
02. TCP Scanning:
03. UDP Scanning:
04. Searchsploit (Searches exploitdb)
05. Some common ports and what to do:
06. SSH
07. Telnet
08. SMTP
09. DNS
10. FINGER
11. WEB
12. SNMP
13. LDAP
14. SMB.. Read More
  1. What is MITRE
  2. Drive-by compromise
  3. Exploit public-facing application
  4. Hardware additions
  5. Read More…

F5

  1. The role of F5 products
  2. Discuss the purpose of, use cases for, and key considerations related to load balancing
  3. Differentiate between a client and server
  4. Read More…

Fortinet

Google

  1. Introduction to Google Docs
  2. How to get started with Google Docs
  3. Navigating Google Doc features
  4. Organizing information on a Google Doc.. Read More
  1. Google Drive Introduction
  2. Working With Google Drive.. Read More
  1. Introduction to Google Forms
  2. How to get started with Google Forms
  3. Formatting Google Forms… Read More
  1. Introduction to Google Workspace
  2. Setting up the Basics
  3. Setting up Users
  4. Read more…
01. Creating a Class
02. Managing the Classroom Page
03. Configuring Grading Settings
04. Transferring and Removing Grades
05. Stream Management
06. Type of Assignments
07. Google Meets
08. Calendar and Class Drive
09. Creating an Assignment
10. Rubric
11. Plagiarism
12. Quiz Creation
13. Managing Your Materials
14. Managing Access
15. Grades
16. Managing Classes.. Read More
01. Deploying & Managing a cloud solution environment
02. Planning, Creating, and Configuring a cloud solution
03. Creating, Configurating and implementing a cloud solution
04. Planning for the successful operation of a cloud solution.. Read More

01. Introduction to Google Sheets
02. How to get started with Google Sheets
03. Navigating Google Sheet features .. Read More…

01. Slide Presentations
02. Slide Features
03. Slide Formatting .. Read More…

01. Google Meets Setup .. Read More…

Microsoft

01. Upgrade from Skype for Business to Microsoft Teams
02. Plan and configure network settings for Microsoft Teams
03. Manage a team
04. Manage membership in a team
05. Implement governance and lifecycle management for Microsoft Teams
06. Configure and manage guest access
07. Manage security and compliance
08. Deploy and manage Microsoft Teams endpoints
09. Monitor and analyze service usage
10. Manage chat and collaboration experiences
11. Manage meeting experiences
12. Manage phone numbers
13. Manage Phone System
14. App Policies in a Team.. Read More

01. Core Network Infrastructure

02. Wide Area Network (WAN)

03. Routing

04. Read More…

01. Defender for Endpoint
02. M365 Defender
03. Working with Defender for Cloud
04. Read More…

01. Introduction

02. Getting Started3. Personalizing the Windows 11 Environment

04. Microsoft 365 Integration

05. Conclusion

06. Read More…

01. Tool Building Introduction to PowerShell
02. Functions
03. Inputs and Outputs
04. Read More…

01. Getting Started
02. Azure
03. DSC, Intune, and VMware
04. Read More…

01. Starting with Powershell
02. Cmdlets and Parameters
03. Working with PowerShell
04. Read More…

01. Setting up PowerShell for Automation
02. Automation and Logging
03. Managing Remote Systems
04. Read More…

01. Introduction to Windows 11
02. Personalization and Network Settings
03. Control Panel and Privacy.. Read More…

  1. Introduction
  2. Getting Started in Windows 10
  3. File Management
  4. Customizing Windows 10
  5. Read More…
  1. Introduction
  2. Troubleshooting Overview
  3. Troubleshooting the Boot Process and Drivers
  4. Troubleshooting the Logon Process and User Profile Issues
  5. Read More…
  1. Introduction
  2. Getting Started with PowerApps
  3. Modifying SharePoint List Forms Using PowerApps
  4. Introduction to PowerApp Formulas.. Read More
  1. Microsoft Intune
  2. Configuration Manager
  3. Co-Management
  4. Windows Autopilot… Read More
  1. Design governance and compute solutions
  2. Design storage and data integration solutions
  3. Design app architecture, access, and monitoring solutions
  4. Design network, continuity, and migration solutions
  5. Read More…
  1. Deploy and manage AD DS domain controllers
  2. Configure and manage multi-site, multi-domain, and multi-forest environments
  3. Create and manage AD DS security principals
  4. Implement and manage hybrid identities
  5. Read More…
  1. Secure Windows Server operating system
  2. Secure a hybrid Active Directory (AD) infrastructure
  3. Identify and remediate Windows Server security issues by using Azure services
  4. Secure Windows Server networking
  5. Read More…

01. Windows Server 2022 Requirements
02. Windows Server 2022 Components
03. Windows Server 2022 On-Site Networking.. Read More…

  1. Recommend Solutions for Cost Management
  2. Recommended Viewpoints for Minimizing Costs
  3. Azure Monitoring Services
  4. Azure Monitor
  5. Read More…

01. Monitoring and Security
02. Storage Accounts
03. Windows and Linux VM’s.. Read More…

  1. What is R? What is Microsoft R Open?
  2. Introduction to R Studio and other R language tools
  3. Loading packages
  4. Loading data into R
  5. Read More…
  1. O365 Application Use Cases
  2. Teams, One Drive and SharePoint Integration
  3. Teams and Exchange
  4. Phone System Integration
  5. Deploying Teams
  6. Read More…
01. Introduction to the Azure Module
02. Migration from AzureRM
03. Getting Started
04. Deployment
05. Concepts
06. Virtual Machines
07. Sample Scripts.. Read More
01. Introduction to PowerShell
02. Using Help
03. Understanding Commands
04. Using Providers
05. Connecting Commands
06. Adding Commands
07. Understanding Objects
08. Using the Pipeline
09. Learning to Format
10. Filtering Commands
11. Using Commands Remotely
12. Understanding WIM
13. PowerShell Multitasking
14. Understanding Automation
15. Knowing Security
16. Introduction to Variables
17. Welcome to Scripting
18. PowerShell Tricks.. Read More
01. Introduction to Windows Server 2019
02. Designing the network Infrastructure
03. Installation of Windows Server 2019
04. Understanding Active Directory
05. Using Azure
06. Federation Services
07. Working with Windows Systems
08. Using PowerShell.. Read More
01. Plan and Deploy Windows Server Infrastructure
02. Manage High Availability and Disaster Recovery
03. Security and Update Management
04. Manage Virtualizations and Containers
05. Enabling RDS and Remote Access in Windows Server.. Read More
  1. Windows 10 platforms and devices
  2. Form factors
  3. Purchasing considerations
  4. Windows 10 editions and features
  5. Read More…
01. Introduction to the Teams App
02. Teams and Channels
03. Setting up your Teams
04. Chat, Calls, and Meetings
05. Posts and Messages
06. Apps and Tools
07. Activity Feed
08. Teams Tips and Tricks.. Read More…
01. Module 1: Introduction to SharePoint 2013
02. Module 2: What’s New in SharePoint 2013
03. Module 3: SharePoint 2013’s Architecture
04. Module 4: Preparing SQL Server for the SharePoint Installation
05. Module 5: Installing SharePoint 2013
06. Module 6: Upgrading to SharePoint 2013
07. Module 7: Using Central Administration to Manage SharePoint
08. Module 8: Creating and Managing Service Applications
09. Module 9: Understanding the Application Management Center
10. Module 10: Creating and Managing Workflows in SharePoint 2013
11. Module 11: Creating and Managing Business Data Connections
12. Module 12: Understanding the Search Service Architecture
13. Module 13: Managing the Search Service using PowerShell
14. Module 14: Scaling your SharePoint 2013 Farm
15. Module 15: Implementing Data Protection, Recoverability, and High Availability
16. Module 16: Administering the Office 365 SharePoint Environment.. Read More
01. Navigating the SharePoint Admin Center
02. Configuring Site Collections for Teams Integration.. Read More
01. Hyper-V Installation and Configuration
02. Hyper-V and Failover Clustering.. Read More
  1. Planning an Operating System Deployment Strategy
  2. Implementing Windows 10
  3. Managing Updates for Windows 10
  4. Device Enrollment
  5. Read More…
  1. Installing Windows
  2. Updating Windows
  3. Post-installation Configuration and Personalization
  4. Configuring Peripherals and Drivers
  5. Read More…
01. Initial Security Steps
02. Manage Directory Synchronization
03. Identity Access Management and RBAC
04. Microsoft 365: Threats & Mitigation
05. Microsoft 365 Exchange Online and ATP
06. Mitigating Threats via Microsoft Threat Management
07. RM services & Encryption
08. How to mitigate Data loss
09. INFOSEC
10. Security in the Cloud
11. Archiving data related to Retention
12. Data Governance
13. Utilizing eDiscovery to search data
14. Mobile Device Management.. Read More…
  1. Modern Messaging Infrastructure
  2. Recipient Objects and Resources
  3. Mailbox Databases
  4. Organizational Settings
  5. Read More…
01. Device Management
02. App Management
03. Device Compliance
04. Microsoft Endpoint Manager Endpoint Security
05. Windows 10 Deployment
06. Device Enrollment
07. Tenant and Device Security
08. Application and Information Security
09. Microsoft 365 Governance
10. Microsoft 365 Compliance
11. Microsoft 365 Investigation and Response.. Read More
  1. Moving your Organization to Office 365
  2. Configuring your Microsoft 365 Tenant
  3. Configuring Office 365
  4. Managing Office 365 ProPlus Deployments
  5. Read More…
01. Onsite Networking
02. Benefits and Considerations of Using Cloud Services
03. Differences between IaaS, PaaS, and SaaS.. Read More
01. Identity and Access
02. Platform Protection
03. Security Operations
04. Data and applications.. Read More
  1. Managing Azure subscriptions
  2. Analyze resource utilization and consumption
  3. Manage resource groups
  4. Manage Role Based Access Control (RBAC)
  5. Read More…
  1. Introduction to self-service BI solutions
  2. Introducing Power BI
  3. Power BI
  4. Shaping and combining data
  5. Read More…
01. Configuring auditing
02. Developing a backup strategy
03. Monitoring database activity
04. Monitoring Queries
05. Managing indexes
06. Managing statistics
07. Monitoring queries
08. Implement log shipping
09. Implement AlwaysOn availability groups
10. Implement failover cluster instances
11. Monitoring database activity
12. Replication setup walkthrough
13. Monitoring replication
14. Performance tuning.. Read More
  1. Introduction to database development
  2. Designing and implementing tables
  3. Advanced table designs
  4. Ensuring data integrity through constraints
  5. Read More…
  1. Introduction to Microsoft SQL Server
  2. Introduction to T-SQL querying
  3. Writing SELECT queries
  4. Querying multiple tables
  5. Read More…
  1. Breach detection and using the Sysinternals tools
  2. Protecting credentials and privileged access
  3. Limiting administrator rights with Just Enough Administration
  4. Privileged Access Management and administrative forests
  5. Read More….
01. Install and configure Active Directory Domain Services (AD DS)
02. Manage and Maintain AD DS
03. Create and Manage Group Policy
04. Implement Active Directory Certificate Services (AD CS)
05. Implement identity federation and access solutions.. Read More
01. Understanding TCP/IP
02. Installing DNS
03. Configuring DHCP
04. Implement IP Address Management (IPAM)
05. Understanding File Servers
06. Configuring High Availability
07. Implementing Software Defined Networking.. Read More
01. Chapter 1 Installation, Upgrade, and Migration of Workloads and Servers
02. Chapter 2 Local Storage Configuration
03. Chapter 3 Enterprise Storage Solutions
04. Chapter 4 Storage Spaces and Data Deduplication
05. Chapter 5 Hyper-V Installation and Configuration
06. Chapter 6 Windows and Hyper-V Container Deployment and Management
07. Chapter 7 High Availability and Disaster Recovery
08. Chapter 8 Failover Clustering
09. Chapter 9 Hyper-V and Failover Clustering
10. Chapter 10 Network Load Balancing
11. Chapter 11 Deployment Images
12. Chapter 12 Virtual Machine Management.. Read More
  1. Overview of System Center Configuration Manager and Microsoft Intune
  2. Planning a Configuration Manager Infrastructure
  3. Migrating to Configuration Manager
  4. Installation and Site Role Configuration
  5. Read More…
  1. Windows 10 Installation
  2. Installing in an Enterprise Environment
  3. Configuring Devices and Drivers
  4. Configuring Storage
  5. Read More…
  1. Module 1: Installing Windows 10
  2. Module 2: Automating Windows 10 Deployments
  3. Module 3: Configuring Storage and Security
  4. Module 4: Managing Data Access
  5. Read More…
01. Module 1: Planning and Implementing Management of Windows 8.1
02. Module 2: Designing and Implementing an Installation Strategy
03. Module 3: Planning and Implementing Authentication for Windows 8.1
04. Module 4: Planning and Implementing IP Addressing and Intranet Connectivity
05. Module 5: Implementing an Application Strategy for Windows 8.1
06. Module 6: Planning and Implementing a Solution for User Settings
07. Module 7: Planning for and Configuring Cloud Services
08. Module 8: Planning and Implementing Windows Intune
09. Module 9: Managing Computers by Using Windows Intune
10. Module 10: Planning and Implementing Access to File and Print Services
11. Module 11: Planning and Implementing Encryption for Windows 8.1
12. Module 12: Planning and Implementing Endpoint Security
13. Module 13: Planning and Implementing Extranet Connectivity
14. Module 14: Planning and Implementing a Recovery Solution.. Read More
01. Module 1: Installing Windows 8
02. Module 2: Upgrading and Migrating to Windows 8
03. Module 3: Managing Disks and Device Drivers
04. Module 4: Configuring and Troubleshooting Network Connections
05. Module 5: Implementing Wireless Network Connections
06. Module 6: Implementing Network Security
07. Module 7: Configuring File Access and Printers on Windows 8 Clients
08. Module 8: Securing Windows 8 Desktops
09. Module 9: Configuring Applications
10. Module 10: Optimizing and Maintaining Windows 8 Client Computers
11. Module 11: Configuring Mobile Computing and Remote Access
12. Module 12: Implementing Hyper-V
13. Module 13: Troubleshooting and Recovering Windows 8
14. Module 14: Using Windows PowerShell.. Read More
01. Chapter 1: Installing Microsoft Windows 7
02. Chapter 2: Automating the Microsoft Windows 7 Installation
03. Chapter 3: Managing Disks
04. Chapter 4: Managing the Microsoft Windows 7 Environment
05. Chapter 5: Configuring Hardware and Applications
06. Chapter 6: Managing Users, Groups, and Security
07. Chapter 7: Configuring Network Connectivity
08. Chapter 8: Monitoring and Maintaining Windows 7
09. Chapter 9: Configuring Backups and Recovery.. Read More
01. Chapter 1: Planning the Logical Architecture
02. Chapter 2: Designing the Physical Architecture
03. Chapter 3: Integrating SharePoint with the Network Infrastructure
04. Chapter 4: Planning for Farm Deployment
05. Chapter 5: Planning the Security Architecture
06. Chapter 6: Designing an Operations Strategy
07. Chapter 7: Designing a Strategy for Business Continuity
08. Chapter 8: Planning Service Applications
09. Chapter 9: Planning a SharePoint Component Strategy
10. Chapter 10: Planning Search Solutions
11. Chapter 11: Planning Business Management Strategies
12. Chapter 12: Planning an Upgrade and Migration Strategy.. Read More
01. Chapter 1: What’s New in Microsoft SharePoint 2010
02. Chapter 2: Planning and Deploying a SharePoint 2010
03. Chapter 3: Configuring SharePoint Farm Environments
04. Chapter 4: Configuring Service Applications
05. Chapter 5: Configuring Indexing and Search
06. Chapter 6: Managing Operational Settings
07. Chapter 7: Managing User Accounts and Roles
08. Chapter 8: Managing Authentication Providers and Permissions
09. Chapter 9: Managing Web Applications and Host Sites
10. Chapter 10: Managing Site Collections
11. Chapter 11: Deploying and Managing Applications and Solutions
12. Chapter 12: Backing Up and Restoring SharePoint
13. Chapter 13: Monitoring the SharePoint Environment
14. Chapter 14: Optimizing SharePoint
15. Chapter 15: Working with Windows PowerShell.. Read More
01. Chapter 1: Introduction to Microsoft Exchange Server 2010
02. Chapter 2: Installing and Configuring Exchange Server 2010
03. Chapter 3: Configuring Connectors, Routing and Transport, and Connectivity
04. Chapter 4: Managing Exchange Server 2010
05. Chapter 5: Configuring and Managing Public Folders
06. Chapter 6: Configuring Security, Compliance, and Policies
07. Chapter 7: Configuring High-Availability Solutions for Exchange Server
08. Chapter 8: Disaster Recovery Operations for Exchange Server
09. Chapter 9: Monitoring and Reporting with Exchange Server 2010
10. Chapter 10: Planning the Exchange Server 2010
11. Chapter 11: Designing and Deploying Mailbox Services
12. Chapter 12: Designing Routing and Client Connectivity
13. Chapter 13: Designing Security and Compliance
14. Chapter 14: Designing High Availability and Recovery.. Read More
01. Chapter 1: Designing a Complex Microsoft Windows Server 2008 Infrastructure
02. Chapter 2: Planning Naming Conventions, Networking, and Access Principles
03. Chapter 3: Planning for Forestwide and Domainwide Upgrades with Server 2008
04. Chapter 4: Planning for Terminal Services and Application Virtualization
05. Chapter 5: Designing an Effective Administration Model
06. Chapter 6: Planning and Designing Group Policy
07. Chapter 7: Administering Security in an Enterprise-Level Infrastructure
08. Chapter 8: Planning for Business Continuity and Backup
09. Chapter 9: Designing a Windows Update Strategy for the Enterprise
10. Chapter 10: Using Virtualization to Increase Productivity and Facilitate Consolidation.. Read More
01. Chapter 1: Introducing Windows Server 2008
02. Chapter 2: Planning Server Deployments
03. Chapter 3: Using Windows Server 2008 Management Tools.  Read More…
01. Chapter 1: Windows Server 2008 Storage Services
02. Chapter 2: Exploring Terminal Services in Windows Server 2008
03. Chapter 3: Terminal Services Licensing, Advance Configuration, and Monitoring for Terminal Services.  Read More…
01. Chapter 1: Understanding Windows Server 2008 Networking
02. Chapter 2: TCP/IP
03. Chapter 3: Domain Name System (DNS).  Read More…
01. Module 1: The Active Directory Infrastructure in Windows Server 2008
02. Module 2: Additional Active Directory Server Roles in Windows Server 2008
03. Module 3: Active Directory Objects in Windows Server 2008.  Read More…
01. Module 1: Introduction to SQL Server 2012 and Its Toolset
02. Module 2: Preparing Systems for SQL Server 2012
03. Module 3: Installing and Configuring SQL Server 2012
04. Module 4: Working with Databases
05. Module 5: Understanding SQL Server 2012 Recovery Models
06. Module 6: Backup of SQL Server 2012 Databases
07. Module 7: Restoring SQL Server 2012 Databases
08. Module 8: Importing and Exporting Data
09. Module 9: Authenticating and Authorizing Users
10. Module 10: Assigning Server and Database Roles
11. Module 11: Authorizing Users to Access Resources
12. Module 12: Auditing SQL Server 2012 Environments
13. Module 13: Automating SQL Server 2012 Management
14. Module 14: Configuring Security for SQL Server Agent
15. Module 15: Monitoring SQL Server 2012 with Alerts and Notifications
16. Module 16: Performing Ongoing Database Maintenance
17. Module 17: Tracing Access to SQL Server 2012
18. Module 18: Monitoring SQL Server 2012
19. Module 19: Managing Multiple Servers
20. Module 20: Troubleshooting Common SQL Server 2012 Administrative Issues.. Read More
01. Module 1: Planning and Implementing a Server Virtualization Strategy
02. Module 2: Planning and Implementing Networks and Storage for Virtualization
03. Module 3: Planning and Deploying Virtual Machines
04. Module 4: Planning and Implementing a Virtualization Administration Solution
05. Module 5: Planning and Implementing a Server Monitoring Strategy
06. Module 6: Planning and Implementing High Availability for File Services and Applications
07. Module 7: Planning and Implementing a Highly Available Infrastructure Using Failover Clustering
08. Module 8: Planning and Implementing a Server Updates Infrastructure
09. Module 9: Planning and Implementing a Business Continuity Strategy
10. Module 10: Planning and Implementing a Public Key Infrastructure (PKI)
11. Module 11: Planning and Implementing an Identity Federation Infrastructure
12. Module 12: Planning and Implementing an Information Rights Management Infrastructures.. Read More
01. Module 1: Planning Server Upgrade and Migration
02. Module 2: Planning and Implementing a Server Deployment Infrastructure
03. Module 3: Designing and Maintaining an IP Configuration and Address Management Solution
04. Module 4: Designing and Implementing Name Resolution
05. Module 5: Designing and Implementing an AD DS Forest and Domain Infrastructure
06. Module 6: Designing and Implementing an Organizational Unit (OU) Infrastructure and AD DS Permissions Model
07. Module 7: Designing and Implementing a Group Policy Object (GPO) Strategy
08. Module 8: Designing and Implementing an AD DS Physical Topology
09. Module 9: Planning and Implementing Storage
10. Module 10: Planning and Implementing File Services
11. Module 11: Designing and Implementing Network Access Services
12. Module 12: Designing and Implementing Network Protection.. Read More
01. Module 1: Implementing Advanced Network Services
02. Module 2: Implementing Advanced File Services
03. Module 3: Implementing Dynamic Access Control (DAC)
04. Module 4: Implementing Network Load Balancing (NLB)
05. Module 5: Implementing Failover Clustering
06. Module 6: Implementing Failover Clustering with Hyper-V
07. Module 7: Implementing Disaster Recovery
08. Module 8: Implementing Distributed AD DS Deployments
09. Module 9: Implementing AD DS Sites and Replication
10. Module 10: Implementing AD CS
11. Module 11: Implementing AD RMS
12. Module 12: Implementing AD FS.. Read More
01. Module 1: Implementing a Group Policy Infrastructure
02. Module 2: Managing User Desktops with Group Policy
03. Module 3: Managing User and Service Accounts
04. Module 4: Maintaining AD DS
05. Module 5: Configuring and Troubleshooting DNS
06. Module 6: Configuring and Troubleshooting Remote Access
07. Module 7: Installing, Configuring, and Troubleshooting the NPS Role
08. Module 8: Implementing NAP
09. Module 9: Optimizing File Services
10. Module 10: Configuring Encryption and Advanced Auditing
11. Module 11: Deploying and Maintaining Server Images
12. Module 12: Implementing Update Management
13. Module 13: Monitoring Windows Server 2012.. Read More
01. Module 1: Deploying and Managing Windows Server 2012
02. Module 2: Active Directory Domain Services
03. Module 3: Managing Active Directory Domain Services Objects
04. Module 4: Automating Active Directory Domain Services Administration
05. Module 5: Implementing IPv4
06. Module 6: Implementing DHCP
07. Module 7: Implementing DNS
08. Module 8: Implementing IPv6
09. Module 9: Implementing Local Storage
10. Module 10: Implementing File and Print Services
11. Module 11: Implementing a Group Policy Infrastructure
12. Module 12: Securing Windows Servers by Using Group Policy Objects
13. Module 13: Implementing Server Virtualization with Hyper-V.. Read More
01. Exchange 2016 Deployment
02. Exchange Administration
03. Exchange Management
04. Recipients
05. Exchange Management Shell
06. Client Connectivity
07. High Availability
08. Disaster Recovery
09. Message Transport
10. Antivirus, Anti spam, and Malware Protection
11. Exchange Online
12. Monitoring and Troubleshooting.. Read More
01. Putting Exchange Server 2013 in Context
02. Introducing the Changes in Exchange Server 2013
03. Understanding Availability, Recovery, and Compliance
04. Virtualizing Exchange Server 2013
05. Introduction to PowerShell and the Exchange Management Shell
06. Understanding the Exchange Autodiscover Process
07. Exchange Server 2013 Quick Start Guide
08. Understanding Server Roles and Configuration
09. Exchange Server 2013 Requirements
10. Installing Exchange Server 2013
11. Upgrades and Migrations to Exchange Server 2013 or Office 365
12. Management Permissions and Role-based Access Control
13. Basics of Recipient Management
14. Managing Mailboxes and Mailbox Content
15. Managing Mail-enabled Groups, Mail-enabled Users, and Mail-enabled Contacts
16. Managing Resource Mailboxes
17. Managing Modern Public Folders
18. Managing Archiving and Compliance
19. Creating and Managing Mailbox Databases
20. Creating and Managing Database Availability Groups
21. Understanding the Client Access Server
22. Managing Connectivity with Transport Services
23. Managing Transport, Data Loss Prevention, and Journaling Rules
24. Troubleshooting Exchange Server 2013
25. Backing Up and Restoring Exchange Server.. Read More
  1. Intro to SharePoint 2016
  2. Introduction to hybrid scenarios for SharePoint 2016
  3. Designing business continuity management strategies
  4. Planning and implementing Businesss Connectivity Services and Secure Store Service
  5. Read More…
01. Introducing SharePoint 2016
02. Designing an information architecture
03. Designing a logical architecture
04. Designing a physical architecture
05. Installing and configuring SharePoint 2016
06. Creating web applications and site collections
07. Planning and configuring service applications
08. Managing users and permissions, and securing content
09. Configuring authentication for SharePoint 2016
10. Securing a SharePoint 2016 deployment
11. Managing taxonomy
12. Configuring user profiles
13. Configuring Enterprise Search
14. Monitoring and maintaining a SharePoint 2016 environment.. Read More
01. Chapter 1 Plan business continuity management
02. Chapter 2 Plan a SharePoint environment
03. Chapter 3 Upgrade and migrate a SharePoint environment
04. Chapter 4 Create and configure service applications
05. Chapter 5 Manage SharePoint solutions, BI, and systems integration.. Read More
01. Design and Deploy System Center
02. Configure System Center Infrastructure
03. Configure the Fabric
04. Configure System Center Integration
05. Configure and Deploy Virtual Machines and Services.. Read More
01. Configure Data Center Process Automation
02. Deploy Resource Monitoring
03. Monitor Resources
04. Configure and Maintain Service Management
05. Manage Configuration and Protection.. Read More
01. Chapter 1: Overview of Operations Management
02. Chapter 2: Planning a Configuration Manager Infrastructure
03. Chapter 3: Migrating from Configuration Manager 2007
04. Chapter 4: Installation and Site Role Configuration
05. Chapter 5: Role-Based Administration
06. Chapter 6: Client Installation
07. Chapter 7: Application Deployment
08. Chapter 8: Software Updates
09. Chapter 9: Operating System Deployment
10. Chapter 10: Asset Intelligence
11. Chapter 11: Inventory and Software Metering
12. Chapter 12: Reporting
13. Chapter 13: Compliance Settings
14. Chapter 14: Mobile Device Management
15. Chapter 15: Troubleshooting
16. Chapter 16: Disaster Recovery
17. Chapter 17: System Center Endpoint Protection
18. Chapter 18: Client Health.. Read More

ISACA

01. Domain 1: Information Security Governance
02. Domain 2: Information Risk Management
03. Domain 3: Information Security Program Development & Management
04. Domain 4: Information Security Incident Management.. Read More
01. Module 1 – The Process of Auditing Information Systems
02. Module 2 – Goverance and Management of IT
03. Module 3 – Information Systems Acquisition, Development, and Implementation
04. Module 4 – Information Systems Operation, Maintenance, and Support
05. Module 5 – Protection and Information Assets.. Read More

ISC2

  1. What is an ISC2 CCSP?
  2. Understand Cloud Computing Concepts
  3. Describe Cloud Reference Architecture
  4. Understand Security Concepts Relevant to Cloud Computing
  5. Read More…
01. CISSP and the Exam
02. Security and Risk Management
03. Security Controls
04. Security Architecture and Engineering
05. Identity and Access Management
06. Authorization and Access Management Vulnerabilities Intro
07. Cryptography
08. Computer Architecture and Application Development Intro
09. Communication and Network Security
10. Physical Security
11. Security Operations.. Read More
  1. Introduction
  2. Understanding the healthcare environment
  3. Identifying applicable domestic and international regulations
  4. Apply compliance frameworks
  5. Read More…
01. Security Operations and Administration
02. Access Controls
03. Risk Identification
04. Incident Response
05. Cryptography
06. Network and Communication Security
07. Systems and Applications Security.. Read More

ITIL

01. Course and ITILv4 Overview
02. ITILv4 Learning Outcome 1
03. ITILv4 Learning Outcome 4 and 3
04. ITILv4 Learning Outcome 2
05. ITILv4 Part of Learning Outcome 7 and Learning Outcome 5
06. ITILv4 Learning Outcome 6 and 7.. Read More

Juniper

  1. Course Introduction
  2. Protocol-Independent Routing
  3. Describe and configure: static, aggregate and generated routes
  4. Martian Routes
  5. Read More…
  1. Course Introduction
  2. Layer 2 Switching
  3. Implementing switched LANs
  4. Bridging concepts and operations
  5. Read More…
  1. Junos Fundamentals
  2. Device Management
  3. System Configuration
  4. Monitoring and Maintenance… Read More
  1. Introduction
  2. OSPF
  3. IS-IS
  4. BGP
  5. Route Policy… Read More
  1. Course Introduction
  2. Junos Operating System Fundamentals
  3. User Interface Options: The Junos CLI
  4. User Interface Options: The J-Web Interface
  5. Read More…

OpenStack

01. OpenStack Fundamentals
02. Keystone
03. Glance
04. Nova
05. Neutron
06. Horizon
07. Cinder
08. Heat
09. Swift.. Read More
01. Expanding the cloud
02. Scaling Compute Services
03. Increasing OpenStack Storage capabilities
04. Containerization in OpenStack.. Read More

Palo Alto

  1. Course Overview
  2. Panorama (PN) Overview
  3. Plan
  4. Deploy and Configure
  5. Demonstrations
  6. Read More…
  1. Next-Generation security platform and architecture
  2. Virtual and cloud deployment
  3. Initial configuration
  4. Interface configuration
  5. Read More…

Project Management

  1. Create project charter
  2. Develop the project management plan
  3. Direct and manage project work
  4. Manage project knowledge
  5. Read More…
  1. How do you balance time, cost and scope on your projects?
  2. Read More…
  1. Scrum Overview
  2. Scrum team roles
  3. Scrum Process Overview
  4. Team space set-up
  5. Scrum Artifacts
  6. Read More…
  1. Introduction To Project Management
  2. Initiating The Project
  3. Project Team Roles And Responsibilities
  4. Read More…
  1. Learn to improve performance during the initiation of your project.
  2. Read More…
01. Introduction to Six Sigma
02. Projects and processes
03. Advanced DMAIC
04. Beginner Statistics
05. Intermediate Statistics.. Read More
01. What is Six Sigma?
02. Six Sigma history and application
03. Other process improvement and quality methods
04. Lean Concepts
05. Basic Six Sigma concepts
06. Approaching a problem
07. What is a process
08. Quality Management
09. Selecting the right projects
10. Introduction to DMAIC (define, measure, analyze, improve, control) and DMADV (define, measure, analyze, design, verify)..
  1. This course is designed to help you look deeper at the people involved in your project
  2. from planning your resource needs, to acquisition, development, and management of a team of individuals.
  3. Read More…
  1. Intro to Kanban
  2. Overview of Planner and groups
  3. Plan an event and working with buckets
  4. Add comments
  5. Track tasks and update progress
  6. Read More…
01. Navigating MS Project 2019
02. Create and schedule a new project
03. Add resources to your project
04. View and track scheduling factors
05. Creating reports
06. Overview of master projects.. Read More
  1. Risk happens on all projects, and how risk is managed can make or break any project.
  2. Read More…
  1. Plan Communications Management
  2. Analyzing Requirements
  3. Communication Style
  4. Virtual Communication
  5. Building a Communication Plan
  6. Read More…
  1. Review respect chapter in the code of conduct
  2. Terms to be aware of and avoid in practice
  3. A history of culture and context
  4. Things to be aware of on a cross-cultural virtual team
  5. Read More…
  1. This short course will review different theories through time, personality styles and how to apply that information to your own team dynamic.
  2. Read More…
  1. What is your definition of negotiation?
  2. How to put together a plan of action
  3. What’s your negotiation style and what is theirs?
  4. Negotiation with special circumstances and other considerations
  5. Read More…
01. Intro to the PMI-ACP exam
02. Domain I: Agile Principles and Mindset
03. Domain II: Value Driven Delivery
04. Domain III: Stakeholder Engagement
05. Domain IV: Team Performance
06. Domain V: Adaptive Planning
07. Domain VI: Problem Detection and Resolution
08. Domain VII: Continuous Improvement.. Read More
  1. Project and Development Life Cycles
  2. Crash Course on Waterfall and Agile Project Management
  3. Project Tailoring and Needs Assessments
  4. The Project Manager’s Role and Sphere of Influence
  5. Building A Case for Business
  6. Read More…
01. Creating A High-Performing Team
02. Starting The Project
03. Doing The Work
04. Keeping The Team On Track
05. Keeping The Business In Mind.. Read More
  1. The differences between waterfall and agile teams
  2. Successful frameworks for Agile implementation
  3. Roles and Responsibilities
  4. Agile Pre-project engagement and charters
  5. Read More…
  1. Overview of Kanban
  2. The Benefits of the Kanban approach
  3. Review of the principles of Kanban
  4. The product backlog and the definition of done
  5. User story workshops
  6. Read More…

01. Initiating a project pre-software implementation
02. Project planning
03. Navigating MS Project.. Read More…

SonicWall

01. Introduction
02. Mysonicwall.com
03. Monitor Tab
04. Investigate Tab
05. Manage Tab
06. Quick Configuration Wizards
07. Appliance Settings
08. Network Configurations
09. Virtual Private Networks
10. Policies
11. High Availability.. Read More

Open Group Courses

01. Course Introduction
02. Management Overview
03. TOGAF 9 Components
04. Introduction to the Architecture Development Method
05. The Enterprise Continuum and Tools
06. Architecture Repository
07. Architecture Governance
08. The Architecture Content Framework
09. The Architecture Content Metamodel
10. Views and View points
11. Building Blocks
12. The Preliminary Phase.. Read More
01. Business Scenarios
02. Stakeholder Management
03. Architecture Implementation Support Techniques
04. Phase A: Architecture Vision
05. Phase B: Business Architecture
06. Business Architecture – Catalogs, Diagrams, and Matrices
07. Phase C: Overview of Information Systems Architectures
08. Phase C: Data Architecture
09. Phase C: Data Architecture – Catalogs, Matrices, and Diagrams
10. The Integrated Information Infrastructure Reference Model (III-RM)
11. Phase C: Applications Architecture
12. Phase C: Applications Architecture – Catalogs, Matrices, and Diagrams
13. Foundation Architecture
14. Phase D: Technology Architecture
15. Phase D: Technology Architecture – Catalogs, Matrices, and Diagrams
16. Migration Planning Techniques
17. Phase E: Opportunities and Solutions
18. Phase F: Migration Planning
19. Phase G: Implementation Governance
20. Phase H: Architecture Change Management
21. ADM Requirements Management
22. Architecture Partitioning
23. Guidelines for Adapting the ADM: Iteration and Levels
24. Guidelines for Adapting the ADM: Security
25. Guidelines for Adapting the ADM: SOA
26. Architecture Maturity Models
27. Architecture Skills Framework.. Read More

VMware

01. Course Introduction
02. Introduction to VMware Horizon
03. Introduction to Use Case
04. vSphere for VMware Horizon
05. VMware Horizon Desktops
06. VMware Horizon Agents
07. VMware Horizon Pools
08. VMware Horizon Client Options
09. Creating and Managing Instant-Clone Desktop Pools
10. Creating RDS Desktop and Application Pools
11. Monitoring VMware Horizon
12. Course Introduction
13. Horizon Connection Server
14. Authentication and Certificates
15. Workspace ONE Access & Virtual Application Management
16. Horizon Protocols
17. Graphic Cards
18. Horizon Scalability
19. Horizon Security.. Read More
01. Introduction & Foundational Knowledge
02. Horizon Infrastructure
03. Base Horizon Install
04. Desktop Images
05. Desktop Images
06. Create and Configure Pools
07. Configure and Manage Identity Manager
08. Configure and Manage User Environment Manager
09. Configure and Manage App Volumes
10. Troubleshooting VDI.. Read More

01. Course Introduction
02. Introduction to vSphere and the Software-Defined Data Center
03. Virtual Machines
04. vCenter Server
05. Configuring and Managing Virtual Networks
06. Configuring and Managing Virtual Storage
07. Virtual Machine Management
08. Resource Management and Monitoring
09. vSphere Cluster
10. vSphere Lifecycle.. Read More

01. Introduction to Virtualization
02. Installation of ESXi
03. vCenter Server Installation and Configuration
04. Virtual Machines
05. Networking
06. Storage
07. Security
08. Resource Allocation
09. Host Profiles
10. Business Continuity
11. Upgrade Process.. Read More
01. Introduction to virtualization
02. ESXi Installation
03. Virtual Machines
04. Networking
05. Storage
06. Security
07. Resource Allocation
08. Host Profiles
09. Monitoring and Performance
10. Upgrade Process
11. Troubleshooting
12. Virtual VSAN.. Read More

Data Science Applications

  1. Introduction
  2. Teableau Fundamentals
  3. Connection to Data.. Read More…
  1. Introduction
  2. Enhancing Visualizations
  3. Joining Data from Multiple Sources.. Read More…
  1. Introduction
  2. Working with Sets
  3. Understanding Parameters.. Read More…
  1. Getting Started with Power BI
  2. Connecting to Data
  3. Visualizing Data.. Read More…
  1. Introduction
  2. Refreshing Data
  3. Data Modeling.. Read More…

Splunk Courses

Take our SELF-PACE & Live IT Courses. Train your whole IT team at affordable pricing.

To see schedule of our LIVE CLASSES please click here!

See Schedule