Artificial Intelligence

01. What is it?
02. Language Overview
03. Major Players in AI
04. Math at a glance
05. An overview of how it may change your position

Aruba

01. Introduction to Aruba, a Hewlett Packard Enterprise Company
02. Switch CLI (Command Line Interface) Navigation
03. Protecting Management Access
04. Management of Software and Configurations
05. VLANS
06. Spanning Tree Protocol (STP)
07. Link Aggregation
08. IP Routing
09. Virtual Switching Framework (VSF)
10. Wireless for Small-to-Medium Businesses (SMBs)
11. Aruba AirWave

01. WLAN Fundamentals
02. Mobile First Architecture
03. Mobility Master Mobility Controller Configuration
04. Secure WLAN configuration
05. AP Provisioning
06. WLAN Security
07. Firewall Roles and Policies
08. Dynamic RF Management
09. Guest Access
10. Network Monitoring and Troubleshooting

Automation

01. Introduction
02. Setting up the Learning Environment
03. Jumping into Ansible
04. A Real-World Playbook
05. Loops, Blocks, Strategies, and Galaxies
06. Ansible in the Cloud
07. Templates
01. Introduction
02. Puppet Concepts
03. Building a Lab
04. The Puppet Language
05. Resources and Types
06. Using Modules
07. Hiera
08. Advanced Puppet Language
09. Puppet at Scale
10. Common Puppet Problems
11. Puppet Enterprise

AWS

01. Course Overview and the AWS Global Infrastructure
02. Compute
03. Databases
04. Networking
05. Storage and Migration
06. Application Integration and Customer Engagement
07. Security
08. Monitoring and Management
01. Introduction to Amazon AWS Security
02. Associate Level Review
03. Services Review
04. Incident Response
05. Identity and Access Management
06. Infrastructure Security
07. Logging and Monitoring
08. Data Protection
01. Course Overview and AWS Introduction
02. AWS Compute
03. AWS Databases
04. AWS Storage
05. AWS Networking
06. AWS Messaging, Migration, and Translation
07. Security
08. Monitoring and Maintenance
01. Course Overview and the AWS Global Infrastructure
02. AWS Security
03. Networking and Compute
04. Databases
05. Simple Storage Service (S3)
06. Lambda, API Gateway, Step Functions
07. Messaging
08. Elastic Beanstalk and Kinesis
09. Developer Tools
10. Monitoring
01. Course Overview and AWS Introduction
02. AWS Networking
03. AWS Compute
04. AWS Databases
05. AWS Storage
06. AWS Migration and Messaging
07. AWS Security
08. Monitoring, Maintenance, and Management

Check Point

01. Next Generation Firewalls
02. In-line versus Host-based Firewalls
03. CP is based on a centrally managed architecture
04. Configuration
05. SMS-Gateway Communication
06. Configuration and Commands
07. Security Policies & Rulebase
08. Software Blades
09. Logging and Tracing
10. Imaging & Clustering
11. VIPs & VMACs
12. Manage & Settings

Cisco

01. Introduction to Cisco Unified Communications Fundamentals and Network Terminology
02. Understanding CUCM Administrative and User Interfaces
03. Common Phone and User Configuration Settings
04. Basic Dial Plan Using NANP
05. Configuring Endpoint Phone Features
06. Basic Media Resource Configuration
07. Basic Cisco Unity Connection Architecture
08. Basic Call Detail Records (CDRs) and Disaster Recovery
01. Network Fundamentals
02. LAN Switching Fundamentals
03. Routing Fundamentals
04. Infrastructure Services
05. Infrastructure Maintenance
01. Module 1. Cisco Unified Communications Solutions
02. Module 2. Administrator and End-User Interfaces
03. Module 3. Call Flows in Cisco Call Control Platforms
04. Module 4. Endpoint and End-User Administration
05. Module 5. End User Telephony and Mobility Features
06. Module 6. Cisco Unity Connection and Cisco Unified Communications Manager IM and Presence Service
07. Module 7. Cisco Unified Communications Solutions Maintenance Providing End-User Support
01. Unified Computing
02. Network Virtualization
03. Cisco Data Center Networking Technologies
04. Automation and Orchestration
05. Application Centric Infrastructure
01. Module 1: Security Concepts
02. Module 2: Secure Network Devices
03. Module 3: Layer 2 Security
04. Module 4: Firewall
05. Module 5: VPN
06. Module 6: Advanced Topics
01. Network Fundamentals
02. Switch Fundamentals
03. Routing Fundamentals
04. IPv4 Addressing and Subnetting
05. Cisco IOS
06. Advanced Routing
07. VLANs and Trunks
08. InterVlan Routing
09. Spanning Tree Protocol
10. EtherChannel
11. DHCP and NTP
12. CDP, LLDP, Syslog, and SNMP
13. QoS
14. Security
15. Port Security, DHCP Snooping, Dynamic ARP Inspection
16. ACLs
17. NAT
18. Wireless
19. Automation and Programmability
20. IPv6
01. Module 1: Cisco Unity Connection
02. Module 2: Cisco Unity Express
03. Module 3: Cisco Unified IM and Presence Implementation
04. Module 4: Video Provisioning and Integration in a Unified Communications Deployment
01. Cisco Unified Communications Manager Introduction
02. Dial Plan Introduction and Implementation of Single-Site On-Cluster Calling
03. Implementation of Single-Site Off-Cluster Calling
04. Media Resources
05. Audio and Video Conferencing
06. Quality of Service
01. Module 1. Multisite Deployment Implementation
02. Module 2. Centralized Call-Processing Redundancy Implementation
03. Module 3. Bandwidth Management and CAC Implementation
04. Module 4. Implementation of Features and Applications for Multisite Deployments
05. Module 5. Cisco VCS and Cisco Expressway
06. Module 6. GDPR and CCD
01. Overview of Infrastructure and Design
02. Overview of Cisco Collaborations
03. Voice Gateways & Trunks
04. Understanding & Configuring Call Routing
05. Cisco Unity Connection
06. Describe Cisco Unified IM & P Protocols and Deployment
07. Describe Problems That Can Lead to Poor Voice and Video Quality
08. Troubleshooting Cisco Collaboration
01. Single Sign-On (SSO) for Collaboration Applications
02. Configuring Cisco Unified IM and Presence
03. Configuring Cisco Unity Connection and Cisco Unity Express
04. Application Clients
01. Implementing Data Center Switching Protocols
02. Implementing First-Hop Redundancy Protocols
03. Implementing Routing in Data Center
04. Implementing Multicast in Data Center
05. Implementing Data Center Overlay Protocols
06. Implementing Network Infrastructure Security
07. Describing Cisco Application-Centric Infrastructure
08. Describing Cisco ACI Building Blocks and VMM Domain Integration
09. Describing Packet Flow in Data Center Network
10. Describing Cisco Cloud Service and Deployment Models
11. Describing Data Center Network Infrastructure Management, Maintenance, and Operations
12. Explaining Cisco Network Assurance Concepts
13. Implementing Fibre Channel Fabric
14. Implementing Storage Infrastructure Services
15. Implementing FCoE Unified Fabric
16. Implementing Storage Infrastructure Security
17. Describing Data Center Storage Infrastructure Maintenance and Operations
18. Describing Cisco UCS Server Form Factors
19. Implementing Cisco Unified Computing Network Connectivity
20. Implementing Cisco Unified Computing Server Abstraction
21. Implementing Cisco Unified Computing SAN Connectivity
22. Implementing Unified Computing Security
23. Introducing Cisco HyperFlex Systems
24. Describing Data Center Unified Computing Management, Maintenance, and Operations
25. Implementing Cisco Data Center Automation and Scripting Tools
26. Describing Cisco Integration with Automation and Orchestration Software Platforms
27. Describing Cisco Data Center Automation and Orchestration Technologies
01. Routing Protocol Troubleshooting
02. Troubleshooting layer 2 connectivity on Nexus switches
03. Troubleshooting VXLAN, EVPN and OTV
04. Troubleshoot ACI
05. Troubleshooting Cisco UCS
06. Implementing security for Cisco UCS
07. Troubleshooting SANs
08. Automation in the Data Center
09. Working with Data Center Management and Operations Management and Operations
10. Implementing AAA and RBAC
11. Working with firmware upgrades, packages, and interoperability
12. Troubleshooting network security
01. Course Overview
02. EIGRPv4, EIGRPv6 and Named EIGRP
03. OSPFv2, OSPFv3, OSPF Address-Families
04. Multi-Protocol BGPv4
05. Redistribution and Advanced Routing Control
06. VPNs
07. Management Protocol and Services
08. Device Security
01. Course Overview
02. Campus Architecture and Device Fundamentals
03. Access and Distribution Layer Features and Services
04. Routing
05. VPNs
06. Management Protocols and Services
07. Security
08. Next Generation Campus Networks
01. Routed Protocols – Addressing
02. Routing Protocols – Secure and scale (create design)
03. Enterprise Campus Networks (design)
04. WAN
05. QoS
06. Multicast
07. Automation
01. Securing and Troubleshooting the Wireless Network Infrastructure including
02. Implementing and Troubleshooting Secure Client Connectivity including
03. Implementing and Troubleshooting QoS in Wireless Networks including
04. Implementing and Troubleshooting Advanced Wireless Network Services including
01. Module 1. Basic Concepts and Network Design
02. Module 2. Campus Network Architecture
03. Module 3. Spanning Tree Implementation
04. Module 4. Configuring Inter-VLAN Routing
05. Module 5. Implementing High Availability Networks
06. Module 6. First Hop Redundancy Implementation
07. Module 7. Campus Network Security
01. Module 1. Tools and Methodologies of Troubleshooting
02. Module 2. Troubleshooting at SECHNIK Networking Ltd.
03. Module 3. Troubleshooting at TINC Garbage Disposal Ltd.
04. Module 4. Troubleshooting at PILE Forensic Accounting Ltd.
05. Module 5. Troubleshooting at Bank of POLONA Ltd.
06. Module 6. Troubleshooting at RADULKO Transport Ltd.
01. Security Foundations
02. Implementing Security
03. Cloud Concepts and Security
04. Application-Specific Security Tools
05. Securing Endpoints
06. Network Access Control and Visibility
01. Cisco Secure Design Principles
02. Deploying Cisco Network Infrastructure Protection Solutions
03. Deploying NAT on Cisco IOS and Cisco Adaptive Security Appliance (ASA) Firewalls
04. Deploying Threat Controls on Cisco ASA Firewalls
05. Deploying Threat Controls on Cisco IOS Software
01. Fundamentals of VPN Technologies and Cryptography
02. Deploying Secure Site-to-Site Connectivity Solutions
03. Deploying Cisco IOS Site-to-Site FlexVPN Solutions
04. Deploying Client-less SSL VPN -Deploying AnyConnect VPN for Remote Access
05. Deploying Endpoint Security and Dynamic Access Policies
06. Endpoint Security and Dynamic Access Policies
01. Threat Mitigation through Identity Services
02. Cisco ISE Fundamentals
03. Advance Access Control
04. Web Authentication and Guest Access
05. Endpoint Access Control
06. Troubleshooting Network Access Control
01. Introducing Cisco ISE Architecture and Deployment
02. Cisco ISE Policy Enforcement
03. Web Authentication and Guest Services
04. Cisco ISE Profiler
05. Cisco ISE BYOD
06. Cisco ISE Endpoint Compliance Services
07. Working with Network Access Devices
01. Content Security
02. Network Threat Defense
03. Cisco Fire Next-Generation IPS (NGIPS)
04. Cisco ASA with FirePOWER Services
05. Security Architectures
06. Troubleshooting, Monitoring, and Reporting Tools
01. Introduction to VPN Technologies
02. VPN Configuration
03. Remote Access VPN Configuration
01. Service Provider Architectures
02. Cisco Operating Systems
03. Interior Routing
04. SP Exterior Routing (v4/v6)
05. HA Protocols
06. Multi-Protocol Label Switching (MPLS)
07. MPLS-TE
08. Segment Routing / Source Packet Routing in Networking
09. SP QoS Architectures (v4/v6)
10. Security
11. L2VPN / Carrier Ethernet
12. L3VPN
13. IPv6 Transition Mechanisms
14. Multicast (v4/v6)
15. Automation and Assurance
16. SP Virtualization
01. Introduction
02. Platform Architecture
03. Deployments
04. Call Routing Basics
05. Configuration Manager
06. Finesse Installation
07. Finesse
08. IP Phone Agents
09. UCCM Portal
10. Installing CUIC
11. Reporting CUIC
12. Basic Scripting
13. Outbound Dialing
14. Optional Components
15. UCCE Databases in Brief
16. Troubleshooting
01. Overview of traditional networks
02. What is SDN?
03. Southbound Communication
04. The Role Applications Play
05. Northbound Communication
06. Cisco SDN Vision
07. Cisco SDN for the DC
08. Cisco ACI Devices
09. Cisco SDN for the Enterprise
10. Cisco SDN Controllers
11. Accessing the APIC
12. Controllers Demonstration
13. Why ACI?
14. Policies
15. Do I need to Learn Programming?
16. Programming Demo
01. LAN Switching Technologies
02. Routing Technologies
03. WAN Technologies
04. Infrastructure Services
05. Infrastructure Maintenance
01. Introduction to managing Cisco UCS hardware
02. Managing UCS through the management interfaces
03. Administering RBAC for granular permissions
04. Maintaining the UCS
05. UCS architecture options
06. Configuring UCS options
07. Understand UCS options for interfacing with Fibre Channel
08. Using UCS pools
01. Introduction to GNS3
02. Windows Installation
03. MacOS Installation
04. Tour of GNS3 Interface
05. Acquiring Cisco IOS Binaries
06. Emulating Cisco IOS Binaries
07. Juniper Devices
08. Integrating Docker Containers
09. Using Cisco VIRL Images
10. Attaching Virtual Machines to GNS3 Topologies
11. Client-Server Setup
12. Connecting to Physical Networks
01. Module 1. Basic Network and Routing Concepts
02. Module 2. EIGRP Implementation
03. Module 3. OSPF Implementation
04. Module 4. Configuration of Redistribution
05. Module 5. Path Control Implementation
06. Module 6. Enterprise Internet Connectivity
07. Module 7. Routers and Routing Protocol Hardening

Citrix

Coding and Development

01. Introduction to Angular
02. Angular Architecture
03. Angular Forms
04. Angular Tables
05. Angular NG Graphs
06. Angular Restful Services
07. Application Templates
01. Introduction to Visual Studio
02. An introduction to .NET development options
03. C# Syntax
04. Reference Types and Value Types
05. Generics
06. More on Types
07. All About Strings
08. Object Orientation
09. Events and Delegates
10. Controlling Execution Flow
11. Handling Exceptions
12. Performance Tips
01. Environment setup
02. What is CSS?
03. Part I
04. Part II
05. Part III
06. Part IV
01. Environment setup
02. What is HTML?
03. HTML Foundations I
04. HTML Foundations II
05. HTML Foundations III
06. HTML Foundations IV
01. Overview
01. Module 1 – Introduction to JavaScript
02. Module 2 – JavaScript Operation
03. Module 3 – Working with JavaScript
04. Module 4 – JavaScript Constructs
05. Module 5 – Modern JavaScript
06. Module 6 – Object-oriented JavaScript
01. Overview
01. Overview
01. Introduction
02. Installing and Configuring Python
03. Hello World!
04. Variables
05. Data Types
06. Checking Datatypes
07. Strings
08. Lists
09. Tuples
10. Sets
11. Basic Operators
12. Conditional Flow
13. Loops
14. Control Statements
15. Exercises
16. Dictionaries
17. Functions
18. Modules
19. Date and Time
20. Input Output
21. Exceptions
22. Classes and Objects
23. GUI
24. Capstone Project: Building a Complete App
01. Introduction
02. Components
03. JSX
04. Events
05. Forms
06. State
01. Overview

CompTIA

01. Mobile Devices
02. Networking
03. Hardware
04. Virtualization and the Cloud
05. Troubleshooting hardware and networks
01. Operating Systems
02. Security
03. Troubleshooting
04. Operational Procedures
01. Overview
01. Introduction
02. Threat and Vulnerability Management
03. Software and Systems Security
04. Security Operations and Monitoring
05. Incident Response
06. Compliance and Assessment
07. Demos
01. Introduction
01. Introduction
01. Introduction
01. Security Concepts and Attacks
02. Implementing Security Controls and Technologies
03. Policies, Procedures, Practices, and Regulations

Containerization

01. Introduction
02. Installation
03. Configuration
04. Networking
05. Storage and Volumes
06. Image Creation, Management, and Registry
07. Orchestration
08. Security
01. Course Introduction
02. Core Concepts
03. Installation, Configuration, & Validation
04. Scheduling
05. Networking
06. Storage
07. Security
08. Logging and Monitoring
09. Extending the API
10. Troubleshooting
01. Containers, Kubernetes, and OpenShift
02. Containerized Services
03. Managing containers
04. Managing Container images
05. Creating Custom Container Images
06. Deploying Containerized Applications on OpenShift
07. Deploying Multi-container applications
08. Troubleshooting Containerized Applications

CWNP

01. Background of Wi-FI Technology including
02. Radio Frequency (RF) Technologies including
03. Wireless Local Area Network (WLAN) Regulations and Standards including
04. WLAN Protocols and Devices including
05. WLAN Network Architecture
06. WLAN Security
07. RF Validation
08. WLAN Troubleshooting

F5

Fortinet

01. Overview

Google

01. Creating a Class
02. Managing the Classroom Page
03. Configuring Grading Settings
04. Transferring and Removing Grades
05. Stream Management
06. Type of Assignments
07. Google Meets
08. Calendar and Class Drive
09. Creating an Assignment
10. Rubric
11. Plagiarism
12. Quiz Creation
13. Managing Your Materials
14. Managing Access
15. Grades
16. Managing Classes
01. Deploying & Managing a cloud solution environment
02. Planning, Creating, and Configuring a cloud solution
03. Creating, Configurating and implementing a cloud solution
04. Planning for the successful operation of a cloud solution

ISACA

01. Domain 1: Information Security Governance
02. Domain 2: Information Risk Management
03. Domain 3: Information Security Program Development & Management
04. Domain 4: Information Security Incident Management
01. Module 1 – The Process of Auditing Information Systems
02. Module 2 – Goverance and Management of IT
03. Module 3 – Information Systems Acquisition, Development, and Implementation
04. Module 4 – Information Systems Operation, Maintenance, and Support
05. Module 5 – Protection and Information Assets

ISC2

01. CISSP and the Exam
02. Security and Risk Management
03. Security Controls
04. Security Architecture and Engineering
05. Identity and Access Management
06. Authorization and Access Management Vulnerabilities Intro
07. Cryptography
08. Computer Architecture and Application Development Intro
09. Communication and Network Security
10. Physical Security
11. Security Operations
01. Security Operations and Administration
02. Access Controls
03. Risk Identification
04. Incident Response
05. Cryptography
06. Network and Communication Security
07. Systems and Applications Security

ITIL

01. Course and ITILv4 Overview
02. ITILv4 Learning Outcome 1
03. ITILv4 Learning Outcome 4 and 3
04. ITILv4 Learning Outcome 2
05. ITILv4 Part of Learning Outcome 7 and Learning Outcome 5
06. ITILv4 Learning Outcome 6 and 7

Juniper

Microsoft

01. Introduction to Windows Server 2019
02. Designing the network Infrastructure
03. Installation of Windows Server 2019
04. Understanding Active Directory
05. Using Azure
06. Federation Services
07. Working with Windows Systems
08. Using PowerShell
01. Plan and Deploy Windows Server Infrastructure
02. Manage High Availability and Disaster Recovery
03. Security and Update Management
04. Manage Virtualizations and Containers
05. Enabling RDS and Remote Access in Windows Server
01. Chapter 1 Installation, Upgrade, and Migration of Workloads and Servers
02. Chapter 2 Local Storage Configuration
03. Chapter 3 Enterprise Storage Solutions
04. Chapter 4 Storage Spaces and Data Deduplication
05. Chapter 5 Hyper-V Installation and Configuration
06. Chapter 6 Windows and Hyper-V Container Deployment and Management
07. Chapter 7 High Availability and Disaster Recovery
08. Chapter 8 Failover Clustering
09. Chapter 9 Hyper-V and Failover Clustering
10. Chapter 10 Network Load Balancing
11. Chapter 11 Deployment Images
12. Chapter 12 Virtual Machine Management
01. Understanding TCP/IP
02. Installing DNS
03. Configuring DHCP
04. Implement IP Address Management (IPAM)
05. Understanding File Servers
06. Configuring High Availability
07. Implementing Software Defined Networking
01. Install and configure Active Directory Domain Services (AD DS)
02. Manage and Maintain AD DS
03. Create and Manage Group Policy
04. Implement Active Directory Certificate Services (AD CS)
05. Implement identity federation and access solutions
01. Introduction to PowerShell
02. Using Help
03. Understanding Commands
04. Using Providers
05. Connecting Commands
06. Adding Commands
07. Understanding Objects
08. Using the Pipeline
09. Learning to Format
10. Filtering Commands
11. Using Commands Remotely
12. Understanding WIM
13. PowerShell Multitasking
14. Understanding Automation
15. Knowing Security
16. Introduction to Variables
17. Welcome to Scripting
18. PowerShell Tricks
01. Hyper-V Installation and Configuration
02. Hyper-V and Failover Clustering
01. Module 1: Deploying and Managing Windows Server 2012
02. Module 2: Active Directory Domain Services
03. Module 3: Managing Active Directory Domain Services Objects
04. Module 4: Automating Active Directory Domain Services Administration
05. Module 5: Implementing IPv4
06. Module 6: Implementing DHCP
07. Module 7: Implementing DNS
08. Module 8: Implementing IPv6
09. Module 9: Implementing Local Storage
10. Module 10: Implementing File and Print Services
11. Module 11: Implementing a Group Policy Infrastructure
12. Module 12: Securing Windows Servers by Using Group Policy Objects
13. Module 13: Implementing Server Virtualization with Hyper-V
01. Module 1: Implementing a Group Policy Infrastructure
02. Module 2: Managing User Desktops with Group Policy
03. Module 3: Managing User and Service Accounts
04. Module 4: Maintaining AD DS
05. Module 5: Configuring and Troubleshooting DNS
06. Module 6: Configuring and Troubleshooting Remote Access
07. Module 7: Installing, Configuring, and Troubleshooting the NPS Role
08. Module 8: Implementing NAP
09. Module 9: Optimizing File Services
10. Module 10: Configuring Encryption and Advanced Auditing
11. Module 11: Deploying and Maintaining Server Images
12. Module 12: Implementing Update Management
13. Module 13: Monitoring Windows Server 2012
01. Module 1: Implementing Advanced Network Services
02. Module 2: Implementing Advanced File Services
03. Module 3: Implementing Dynamic Access Control (DAC)
04. Module 4: Implementing Network Load Balancing (NLB)
05. Module 5: Implementing Failover Clustering
06. Module 6: Implementing Failover Clustering with Hyper-V
07. Module 7: Implementing Disaster Recovery
08. Module 8: Implementing Distributed AD DS Deployments
09. Module 9: Implementing AD DS Sites and Replication
10. Module 10: Implementing AD CS
11. Module 11: Implementing AD RMS
12. Module 12: Implementing AD FS
01. Module 1: Planning Server Upgrade and Migration
02. Module 2: Planning and Implementing a Server Deployment Infrastructure
03. Module 3: Designing and Maintaining an IP Configuration and Address Management Solution
04. Module 4: Designing and Implementing Name Resolution
05. Module 5: Designing and Implementing an AD DS Forest and Domain Infrastructure
06. Module 6: Designing and Implementing an Organizational Unit (OU) Infrastructure and AD DS Permissions Model
07. Module 7: Designing and Implementing a Group Policy Object (GPO) Strategy
08. Module 8: Designing and Implementing an AD DS Physical Topology
09. Module 9: Planning and Implementing Storage
10. Module 10: Planning and Implementing File Services
11. Module 11: Designing and Implementing Network Access Services
12. Module 12: Designing and Implementing Network Protection
01. Module 1: Planning and Implementing a Server Virtualization Strategy
02. Module 2: Planning and Implementing Networks and Storage for Virtualization
03. Module 3: Planning and Deploying Virtual Machines
04. Module 4: Planning and Implementing a Virtualization Administration Solution
05. Module 5: Planning and Implementing a Server Monitoring Strategy
06. Module 6: Planning and Implementing High Availability for File Services and Applications
07. Module 7: Planning and Implementing a Highly Available Infrastructure Using Failover Clustering
08. Module 8: Planning and Implementing a Server Updates Infrastructure
09. Module 9: Planning and Implementing a Business Continuity Strategy
10. Module 10: Planning and Implementing a Public Key Infrastructure (PKI)
11. Module 11: Planning and Implementing an Identity Federation Infrastructure
12. Module 12: Planning and Implementing an Information Rights Management Infrastructures
01. Chapter 1: Designing a Complex Microsoft Windows Server 2008 Infrastructure
02. Chapter 2: Planning Naming Conventions, Networking, and Access Principles
03. Chapter 3: Planning for Forestwide and Domainwide Upgrades with Server 2008
04. Chapter 4: Planning for Terminal Services and Application Virtualization
05. Chapter 5: Designing an Effective Administration Model
06. Chapter 6: Planning and Designing Group Policy
07. Chapter 7: Administering Security in an Enterprise-Level Infrastructure
08. Chapter 8: Planning for Business Continuity and Backup
09. Chapter 9: Designing a Windows Update Strategy for the Enterprise
10. Chapter 10: Using Virtualization to Increase Productivity and Facilitate Consolidation
01. Introducing SharePoint 2016
02. Designing an information architecture
03. Designing a logical architecture
04. Designing a physical architecture
05. Installing and configuring SharePoint 2016
06. Creating web applications and site collections
07. Planning and configuring service applications
08. Managing users and permissions, and securing content
09. Configuring authentication for SharePoint 2016
10. Securing a SharePoint 2016 deployment
11. Managing taxonomy
12. Configuring user profiles
13. Configuring Enterprise Search
14. Monitoring and maintaining a SharePoint 2016 environment
01. Chapter 1 Plan business continuity management
02. Chapter 2 Plan a SharePoint environment
03. Chapter 3 Upgrade and migrate a SharePoint environment
04. Chapter 4 Create and configure service applications
05. Chapter 5 Manage SharePoint solutions, BI, and systems integration
01. Module 1: Introduction to SharePoint 2013
02. Module 2: What’s New in SharePoint 2013
03. Module 3: SharePoint 2013’s Architecture
04. Module 4: Preparing SQL Server for the SharePoint Installation
05. Module 5: Installing SharePoint 2013
06. Module 6: Upgrading to SharePoint 2013
07. Module 7: Using Central Administration to Manage SharePoint
08. Module 8: Creating and Managing Service Applications
09. Module 9: Understanding the Application Management Center
10. Module 10: Creating and Managing Workflows in SharePoint 2013
11. Module 11: Creating and Managing Business Data Connections
12. Module 12: Understanding the Search Service Architecture
13. Module 13: Managing the Search Service using PowerShell
14. Module 14: Scaling your SharePoint 2013 Farm
15. Module 15: Implementing Data Protection, Recoverability, and High Availability
16. Module 16: Administering the Office 365 SharePoint Environment
01. Chapter 1: What’s New in Microsoft SharePoint 2010
02. Chapter 2: Planning and Deploying a SharePoint 2010
03. Chapter 3: Configuring SharePoint Farm Environments
04. Chapter 4: Configuring Service Applications
05. Chapter 5: Configuring Indexing and Search
06. Chapter 6: Managing Operational Settings
07. Chapter 7: Managing User Accounts and Roles
08. Chapter 8: Managing Authentication Providers and Permissions
09. Chapter 9: Managing Web Applications and Host Sites
10. Chapter 10: Managing Site Collections
11. Chapter 11: Deploying and Managing Applications and Solutions
12. Chapter 12: Backing Up and Restoring SharePoint
13. Chapter 13: Monitoring the SharePoint Environment
14. Chapter 14: Optimizing SharePoint
15. Chapter 15: Working with Windows PowerShell
01. Chapter 1: Planning the Logical Architecture
02. Chapter 2: Designing the Physical Architecture
03. Chapter 3: Integrating SharePoint with the Network Infrastructure
04. Chapter 4: Planning for Farm Deployment
05. Chapter 5: Planning the Security Architecture
06. Chapter 6: Designing an Operations Strategy
07. Chapter 7: Designing a Strategy for Business Continuity
08. Chapter 8: Planning Service Applications
09. Chapter 9: Planning a SharePoint Component Strategy
10. Chapter 10: Planning Search Solutions
11. Chapter 11: Planning Business Management Strategies
12. Chapter 12: Planning an Upgrade and Migration Strategy
01. Navigating the SharePoint Admin Center
02. Configuring Site Collections for Teams Integration
01. Exchange 2016 Deployment
02. Exchange Administration
03. Exchange Management
04. Recipients
05. Exchange Management Shell
06. Client Connectivity
07. High Availability
08. Disaster Recovery
09. Message Transport
10. Antivirus, Anti spam, and Malware Protection
11. Exchange Online
12. Monitoring and Troubleshooting
01. Putting Exchange Server 2013 in Context
02. Introducing the Changes in Exchange Server 2013
03. Understanding Availability, Recovery, and Compliance
04. Virtualizing Exchange Server 2013
05. Introduction to PowerShell and the Exchange Management Shell
06. Understanding the Exchange Autodiscover Process
07. Exchange Server 2013 Quick Start Guide
08. Understanding Server Roles and Configuration
09. Exchange Server 2013 Requirements
10. Installing Exchange Server 2013
11. Upgrades and Migrations to Exchange Server 2013 or Office 365
12. Management Permissions and Role-based Access Control
13. Basics of Recipient Management
14. Managing Mailboxes and Mailbox Content
15. Managing Mail-enabled Groups, Mail-enabled Users, and Mail-enabled Contacts
16. Managing Resource Mailboxes
17. Managing Modern Public Folders
18. Managing Archiving and Compliance
19. Creating and Managing Mailbox Databases
20. Creating and Managing Database Availability Groups
21. Understanding the Client Access Server
22. Managing Connectivity with Transport Services
23. Managing Transport, Data Loss Prevention, and Journaling Rules
24. Troubleshooting Exchange Server 2013
25. Backing Up and Restoring Exchange Server
01. Chapter 1: Introduction to Microsoft Exchange Server 2010
02. Chapter 2: Installing and Configuring Exchange Server 2010
03. Chapter 3: Configuring Connectors, Routing and Transport, and Connectivity
04. Chapter 4: Managing Exchange Server 2010
05. Chapter 5: Configuring and Managing Public Folders
06. Chapter 6: Configuring Security, Compliance, and Policies
07. Chapter 7: Configuring High-Availability Solutions for Exchange Server
08. Chapter 8: Disaster Recovery Operations for Exchange Server
09. Chapter 9: Monitoring and Reporting with Exchange Server 2010
10. Chapter 10: Planning the Exchange Server 2010
11. Chapter 11: Designing and Deploying Mailbox Services
12. Chapter 12: Designing Routing and Client Connectivity
13. Chapter 13: Designing Security and Compliance
14. Chapter 14: Designing High Availability and Recovery
01. Overview
01. Module 1: Installing Windows 8
02. Module 2: Upgrading and Migrating to Windows 8
03. Module 3: Managing Disks and Device Drivers
04. Module 4: Configuring and Troubleshooting Network Connections
05. Module 5: Implementing Wireless Network Connections
06. Module 6: Implementing Network Security
07. Module 7: Configuring File Access and Printers on Windows 8 Clients
08. Module 8: Securing Windows 8 Desktops
09. Module 9: Configuring Applications
10. Module 10: Optimizing and Maintaining Windows 8 Client Computers
11. Module 11: Configuring Mobile Computing and Remote Access
12. Module 12: Implementing Hyper-V
13. Module 13: Troubleshooting and Recovering Windows 8
14. Module 14: Using Windows PowerShell
01. Module 1: Planning and Implementing Management of Windows 8.1
02. Module 2: Designing and Implementing an Installation Strategy
03. Module 3: Planning and Implementing Authentication for Windows 8.1
04. Module 4: Planning and Implementing IP Addressing and Intranet Connectivity
05. Module 5: Implementing an Application Strategy for Windows 8.1
06. Module 6: Planning and Implementing a Solution for User Settings
07. Module 7: Planning for and Configuring Cloud Services
08. Module 8: Planning and Implementing Windows Intune
09. Module 9: Managing Computers by Using Windows Intune
10. Module 10: Planning and Implementing Access to File and Print Services
11. Module 11: Planning and Implementing Encryption for Windows 8.1
12. Module 12: Planning and Implementing Endpoint Security
13. Module 13: Planning and Implementing Extranet Connectivity
14. Module 14: Planning and Implementing a Recovery Solution
01. Chapter 1: Installing Microsoft Windows 7
02. Chapter 2: Automating the Microsoft Windows 7 Installation
03. Chapter 3: Managing Disks
04. Chapter 4: Managing the Microsoft Windows 7 Environment
05. Chapter 5: Configuring Hardware and Applications
06. Chapter 6: Managing Users, Groups, and Security
07. Chapter 7: Configuring Network Connectivity
08. Chapter 8: Monitoring and Maintaining Windows 7
09. Chapter 9: Configuring Backups and Recovery
01. Upgrade from Skype for Business to Microsoft Teams
02. Plan and configure network settings for Microsoft Teams
03. Manage a team
04. Manage membership in a team
05. Implement governance and lifecycle management for Microsoft Teams
06. Configure and manage guest access
07. Manage security and compliance
08. Deploy and manage Microsoft Teams endpoints
09. Monitor and analyze service usage
10. Manage chat and collaboration experiences
11. Manage meeting experiences
12. Manage phone numbers
13. Manage Phone System
14. App Policies in a Team
01. Chapter 1: Overview of Operations Management
02. Chapter 2: Planning a Configuration Manager Infrastructure
03. Chapter 3: Migrating from Configuration Manager 2007
04. Chapter 4: Installation and Site Role Configuration
05. Chapter 5: Role-Based Administration
06. Chapter 6: Client Installation
07. Chapter 7: Application Deployment
08. Chapter 8: Software Updates
09. Chapter 9: Operating System Deployment
10. Chapter 10: Asset Intelligence
11. Chapter 11: Inventory and Software Metering
12. Chapter 12: Reporting
13. Chapter 13: Compliance Settings
14. Chapter 14: Mobile Device Management
15. Chapter 15: Troubleshooting
16. Chapter 16: Disaster Recovery
17. Chapter 17: System Center Endpoint Protection
18. Chapter 18: Client Health
01. Configure Data Center Process Automation
02. Deploy Resource Monitoring
03. Monitor Resources
04. Configure and Maintain Service Management
05. Manage Configuration and Protection
01. Design and Deploy System Center
02. Configure System Center Infrastructure
03. Configure the Fabric
04. Configure System Center Integration
05. Configure and Deploy Virtual Machines and Services
01. Configuring auditing
02. Developing a backup strategy
03. Monitoring database activity
04. Monitoring Queries
05. Managing indexes
06. Managing statistics
07. Monitoring queries
08. Implement log shipping
09. Implement AlwaysOn availability groups
10. Implement failover cluster instances
11. Monitoring database activity
12. Replication setup walkthrough
13. Monitoring replication
14. Performance tuning
01. Module 1: Introduction to SQL Server 2012 and Its Toolset
02. Module 2: Preparing Systems for SQL Server 2012
03. Module 3: Installing and Configuring SQL Server 2012
04. Module 4: Working with Databases
05. Module 5: Understanding SQL Server 2012 Recovery Models
06. Module 6: Backup of SQL Server 2012 Databases
07. Module 7: Restoring SQL Server 2012 Databases
08. Module 8: Importing and Exporting Data
09. Module 9: Authenticating and Authorizing Users
10. Module 10: Assigning Server and Database Roles
11. Module 11: Authorizing Users to Access Resources
12. Module 12: Auditing SQL Server 2012 Environments
13. Module 13: Automating SQL Server 2012 Management
14. Module 14: Configuring Security for SQL Server Agent
15. Module 15: Monitoring SQL Server 2012 with Alerts and Notifications
16. Module 16: Performing Ongoing Database Maintenance
17. Module 17: Tracing Access to SQL Server 2012
18. Module 18: Monitoring SQL Server 2012
19. Module 19: Managing Multiple Servers
20. Module 20: Troubleshooting Common SQL Server 2012 Administrative Issues
01. Device Management
02. App Management
03. Device Compliance
04. Microsoft Endpoint Manager Endpoint Security
05. Windows 10 Deployment
06. Device Enrollment
07. Tenant and Device Security
08. Application and Information Security
09. Microsoft 365 Governance
10. Microsoft 365 Compliance
11. Microsoft 365 Investigation and Response
01. Initial Security Steps
02. Manage Directory Synchronization
03. Identity Access Management and RBAC
04. Microsoft 365: Threats & Mitigation
05. Microsoft 365 Exchange Online and ATP
06. Mitigating Threats via Microsoft Threat Management
07. RM services & Encryption
08. How to mitigate Data loss
09. INFOSEC
10. Security in the Cloud
11. Archiving data related to Retention
12. Data Governance
13. Utilizing eDiscovery to search data
14. Mobile Device Management
01. Exchange 2016 Deployment
02. Exchange Administration
03. Exchange Management
04. Recipients
05. Exchange Management Shell
06. Client Connectivity
07. High Availability
08. Disaster Recovery
09. Message Transport
10. Antivirus, Anti spam, and Malware Protection
11. Exchange Online
12. Monitoring and Troubleshooting
01. Putting Exchange Server 2013 in Context
02. Introducing the Changes in Exchange Server 2013
03. Understanding Availability, Recovery, and Compliance
04. Virtualizing Exchange Server 2013
05. Introduction to PowerShell and the Exchange Management Shell
06. Understanding the Exchange Autodiscover Process
07. Exchange Server 2013 Quick Start Guide
08. Understanding Server Roles and Configuration
09. Exchange Server 2013 Requirements
10. Installing Exchange Server 2013
11. Upgrades and Migrations to Exchange Server 2013 or Office 365
12. Management Permissions and Role-based Access Control
13. Basics of Recipient Management
14. Managing Mailboxes and Mailbox Content
15. Managing Mail-enabled Groups, Mail-enabled Users, and Mail-enabled Contacts
16. Managing Resource Mailboxes
17. Managing Modern Public Folders
18. Managing Archiving and Compliance
19. Creating and Managing Mailbox Databases
20. Creating and Managing Database Availability Groups
21. Understanding the Client Access Server
22. Managing Connectivity with Transport Services
23. Managing Transport, Data Loss Prevention, and Journaling Rules
24. Troubleshooting Exchange Server 2013
25. Backing Up and Restoring Exchange Server
01. Chapter 1: Introduction to Microsoft Exchange Server 2010
02. Chapter 2: Installing and Configuring Exchange Server 2010
03. Chapter 3: Configuring Connectors, Routing and Transport, and Connectivity
04. Chapter 4: Managing Exchange Server 2010
05. Chapter 5: Configuring and Managing Public Folders
06. Chapter 6: Configuring Security, Compliance, and Policies
07. Chapter 7: Configuring High-Availability Solutions for Exchange Server
08. Chapter 8: Disaster Recovery Operations for Exchange Server
09. Chapter 9: Monitoring and Reporting with Exchange Server 2010
10. Chapter 10: Planning the Exchange Server 2010
11. Chapter 11: Designing and Deploying Mailbox Services
12. Chapter 12: Designing Routing and Client Connectivity
13. Chapter 13: Designing Security and Compliance
14. Chapter 14: Designing High Availability and Recovery
01. Azure IaaS and Monitoring Management
02. Networking and Security Management
03. Applications Solutions
04. Data Platforms
01. Identity and Access
02. Platform Protection
03. Security Operations
04. Data and applications
01. Introduction to the Azure Module
02. Migration from AzureRM
03. Getting Started
04. Deployment
05. Concepts
06. Virtual Machines
07. Sample Scripts

OpenStack

01. OpenStack Fundamentals
02. Keystone
03. Glance
04. Nova
05. Neutron
06. Horizon
07. Cinder
08. Heat
09. Swift
01. Expanding the cloud
02. Scaling Compute Services
03. Increasing OpenStack Storage capabilities
04. Containerization in OpenStack

Palo Alto

01. Course Overview

01. Course Overview
02. Panorama (PN) Overview
03. Plan
04. Deploy and Configure
05. Demonstrations

SonicWall

01. Introduction
02. Mysonicwall.com
03. Monitor Tab
04. Investigate Tab
05. Manage Tab
06. Quick Configuration Wizards
07. Appliance Settings
08. Network Configurations
09. Virtual Private Networks
10. Policies
11. High Availability

Open Group Courses

01. Course Introduction
02. Management Overview
03. TOGAF 9 Components
04. Introduction to the Architecture Development Method
05. The Enterprise Continuum and Tools
06. Architecture Repository
07. Architecture Governance
08. The Architecture Content Framework
09. The Architecture Content Metamodel
10. Views and View points
11. Building Blocks
12. The Preliminary Phase
01. Business Scenarios
02. Stakeholder Management
03. Architecture Implementation Support Techniques
04. Phase A: Architecture Vision
05. Phase B: Business Architecture
06. Business Architecture – Catalogs, Diagrams, and Matrices
07. Phase C: Overview of Information Systems Architectures
08. Phase C: Data Architecture
09. Phase C: Data Architecture – Catalogs, Matrices, and Diagrams
10. The Integrated Information Infrastructure Reference Model (III-RM)
11. Phase C: Applications Architecture
12. Phase C: Applications Architecture – Catalogs, Matrices, and Diagrams
13. Foundation Architecture
14. Phase D: Technology Architecture
15. Phase D: Technology Architecture – Catalogs, Matrices, and Diagrams
16. Migration Planning Techniques
17. Phase E: Opportunities and Solutions
18. Phase F: Migration Planning
19. Phase G: Implementation Governance
20. Phase H: Architecture Change Management
21. ADM Requirements Management
22. Architecture Partitioning
23. Guidelines for Adapting the ADM: Iteration and Levels
24. Guidelines for Adapting the ADM: Security
25. Guidelines for Adapting the ADM: SOA
26. Architecture Maturity Models
27. Architecture Skills Framework

VMware

01. Course Introduction
02. Introduction to VMware Horizon
03. Introduction to Use Case
04. vSphere for VMware Horizon
05. VMware Horizon Desktops
06. VMware Horizon Agents
07. VMware Horizon Pools
08. VMware Horizon Client Options
09. Creating and Managing Instant-Clone Desktop Pools
10. Creating RDS Desktop and Application Pools
11. Monitoring VMware Horizon
12. Course Introduction
13. Horizon Connection Server
14. Authentication and Certificates
15. Workspace ONE Access & Virtual Application Management
16. Horizon Protocols
17. Graphic Cards
18. Horizon Scalability
19. Horizon Security
01. Introduction & Foundational Knowledge
02. Horizon Infrastructure
03. Base Horizon Install
04. Desktop Images
05. Desktop Images
06. Create and Configure Pools
07. Configure and Manage Identity Manager
08. Configure and Manage User Environment Manager
09. Configure and Manage App Volumes
10. Troubleshooting VDI
” open=”no” class=”” id=””]
01. Course Introduction
02. Introduction to vSphere and the Software-Defined Data Center
03. Virtual Machines
04. vCenter Server
05. Configuring and Managing Virtual Networks
06. Configuring and Managing Virtual Storage
07. Virtual Machine Management
08. Resource Management and Monitoring
09. vSphere Cluster
10. vSphere Lifecycle
01. Introduction to Virtualization
02. Installation of ESXi
03. vCenter Server Installation and Configuration
04. Virtual Machines
05. Networking
06. Storage
07. Security
08. Resource Allocation
09. Host Profiles
10. Business Continuity
11. Upgrade Process
01. Introduction to virtualization
02. ESXi Installation
03. Virtual Machines
04. Networking
05. Storage
06. Security
07. Resource Allocation
08. Host Profiles
09. Monitoring and Performance
10. Upgrade Process
11. Troubleshooting
12. Virtual VSAN