By you, For you, With you – Access it all at your ease. From Minor to Vital our courses range will never be a disappointment. Scroll to choose from a swarm of courses.















- SQL Admin Intro
- Installation
Module 2: Data Storage
- Introduction to Data Storage with SQL Server
- Managing Storage for System Databases
- Managing Storage for User Databases
- Moving Database Files
Module 3: Data Recover
- Intro to Data Recovery
- Understanding SQL Server Recovery Models
- Planning a Backup Strategy
- Backing up Databases and Transaction Logs
- Using SSMS For Backup
- Understanding the Restore Process
- How to Restore a Database
- Using SSMS For Restore
- T-SQL Backup and Restore
- Advanced Restore Scenarios
- Introduction to Transferring Data
- Importing and Exporting Table Data
- Copying or Moving a Database
Module 4: Monitoring
- Introduction to Monitoring SQL Server
- Dynamic Management Views and Functions
- Server Reports
- System Performance Monitor
- Tracing SQL Server Workload Activity
- Extended Events
- Database Tuning Advisor
Module 5: Security
- Introduction to SQL Server Security
- Managing Server-Level Security
- Managing Database-Level Security
- Row Level Security (RLS) Using Policies
- Database Security Tools
- Contained Database
- Auditing Data Access in SQL Server
- Implementing Transparent Data Encryption
Module 6: Maintenance
- Introduction to Maintenance
- Ensuring Database Integrity
- Maintaining Indexes
- Automating Routine Database Maintenance
- Automating SQL Server Management
- Monitoring SQL Server Errors
- Configuring Database Mai
Module 1: What are Big Data Clusters?
- 1.1 Introduction
- 1.2 Linux, PolyBase, and Active Directory
- 1.3 Scenarios
Module 2: Big Data Cluster Architecture
- 2.1 Introduction
- 2.2 Docker
- 2.3 Kubernetes
- 2.4 Hadoop and Spark
- 2.5 Components
- 2.6 Endpoints
Module 3: Deployment of Big Data Clusters
- 3.1 Introduction
- 3.2 Install Prerequisites
- 3.3 Deploy Kubernetes
- 3.4 Deploy BDC
- 3.5 Monitor and Verify Deployment
Module 4: Loading and Querying Data in Big Data Clusters
- 4.1 Introduction
- 4.2 HDFS with Curl
- 4.3 Loading Data with T-SQL
- 4.4 Virtualizing Data
- 4.5 Restoring a Database
Module 5: Working with Spark in Big Data Clusters
- 5.1 Introduction
- 5.2 What is Spark
- 5.3 Submitting Spark Jobs
- 5.4 Running Spark Jobs via Notebooks
- 5.5 Transforming CSV
- 5.6 Spark-SQL
- 5.7 Spark to SQL ETL
Module 6: Machine Learning on Big Data Clusters
- 6.1 Introduction
- 6.2 Machine Learning Services
- 6.3 Using MLeap
- 6.4 Using Python
- 6.5 Using R
Module 7: Create and Consume Big Data Cluster Apps
- 7.1 Introduction
- 7.2 Deploying, Running, Consuming, and Monitoring an App
- 7.3 Python Example – Deploy with azdata and Monitoring
- 7.4 R Example – Deploy with VS Code and Consume with Postman
- 7.5 MLeap Example – Create a yaml file
- 7.6 SSIS Example – Implement scheduled execution of a DB backup
Module 8: Maintenance of Big Data Clusters
- 8.1 Introduction
- 8.2 Monitoring
- 8.3 Managing and Automation
- 8.4 Course Wrap Up
Module 1 – Introduction to Business Intelligence and Data Modeling
- 1.1 Course Introduction
- 1.2 Module 1 Introduction
- 1.3 Introduction to Business Intelligence
- 1.4 The Microsoft Business Intelligence Platform
- 1.5 Exploring a Data Warehouse
- 1.6 Exploring a Data Model
Module 2 – Multidimensional Databases
- 2.1 Module 2 Introduction
- 2.2 Introduction to Multidimensional Analysis
- 2.3 Overview of Cube Security
- 2.4 Creating and Configuring a Cube
- 2.5 Data Sources
- 2.6 Data Source Views
- 2.7 Adding a Dimension to a Cube
Module 3 – Cubes and Dimensions
- 3.1 Module 3 Introduction
- 3.2 Dimensions
- 3.3 Attribute Hierarchies and Relationships
- 3.4 Sorting and Grouping Attributes
- 3.5 Slowly Changing Dimensions
Module 4 – Measures and Measure Groups
- 4.1 Module 4 Introduction
- 4.2 Measures
- 4.3 Measure Groups and Relationships
- 4.4 Measure Group Storage
Module 5 – Introduction to MDX
- 5.1 Module 5 Introduction
- 5.2 MDX Fundamentals
- 5.3 Adding Calculations to a Cube
- 5.4 Querying a cube using MDX
Module 6 – Customizing Cube Functionality
- 6.1 Module 6 Introduction
- 6.2 Key Performance Indicators
- 6.3 Actions
- 6.4 Perspectives
- 6.5 Translations
Module 7 – Tabular Data Models
- 7.1 Module 7 Introduction
- 7.2 Introduction to Tabular Data Models
- 7.3 Creating a Tabular Data Model
- 7.4 Configure Relationships and Attributes
- 7.5 Configuring Data Model for an Enterprise BI Solution
Module 8 – Data Analysis Expressions (DAX)
- 8.1 Module 8 Introduction
- 8.2 DAX Fundamentals
- 8.3 Calculated Columns
- 8.4 Relationships
- 8.5 Measures
- 8.6 Time Intelligence
- 8.7 KPI
- 8.8 Parent – Child Hierarchies
Module 9 – Data Mining
- 9.1 Module 9 Introduction
- 9.2 Overview of Data Mining
- 9.3 Custom Data Mining Solutions
- 9.4 Validating a Data Mining Model
- 9.5 Consuming a Data Mining Model
- 9.6 Course Wrap Up
- 1.1 Course Introduction
- 1.2 Module 1 Introduction
- 1.3 Intro to Management Studio
- 1.4 Intro to command-line query tools
Module 2 – Introduction to T-SQL Querying
- 2.1 Module 2 Introduction
- 2.2 Introducing T-SQL
- 2.3 Understanding Sets
- 2.4 Understanding the Logical Order of Operations in SELECT statements
Module 3 – Basic SELECT Queries
- 3.1 Module 3 Introduction
- 3.2 Writing Simple SELECT Statements
- 3.3 Eliminate Duplicates with DISTINCT
- 3.4 Using Column and Table Aliases
- 3.5 Write Simple CASE Expressions
Module 4 – Querying Multiple Tables
- 4.1 Module 4 Introduction
- 4.2 Understanding Joins
- 4.3 Querying with Inner Joins
- 4.4 Querying with Outer Joins
- 4.5 Querying with Cross Joins and Self Joins
Module 5 – Sorting and Filtering Data
- 5.1 Module 5 Introduction
- 5.2 Sorting Data
- 5.3 Filtering Data with Predicates
- 5.4 Filtering with the TOP and OFFSET-FETCH
- 5.5 Working with Unknown Values
Module 6 – Working with SQL Server Data Types
- 6.1 Module 6 Introduction
- 6.2 Writing Queries that return Date and Time Data
- 6.3 Writing Queries that use Date and Time Functions
- 6.4 Writing Queries that return Character Data
- 6.5 Writing Queries that use Character Functions
Module 7 – Using DML to Modify Data
- 7.1 Module 7 Introduction
- 7.2 Inserting Records with DML
- 7.3 Updating Records Using DML
- 7.4 Deleting Records Using DML
Module 8 – Using Built-In Functions
- 8.1 Module 8 Introduction
- 8.2 Writing Queries with Built-In Functions
- 8.3 Using Conversion Functions
- 8.4 Using Logical Functions
- 8.5 Using Functions to Work with NULL
Module 9 – Grouping and Aggregating Data
- 9.1 Module 9 Introduction
- 9.2 Using Aggregate Functions
- 9.3 Using the GROUP BY Clause
- 9.4 Filtering Groups with HAVING
Module 10 – Using Subqueries
- 10.1 Module 10 Introduction
- 10.2 Writing Self-Contained Subqueries
- 10.3 Writing Correlated Subqueries
- 10.4 Using the EXISTS Predicate with Subqueries
Module 11 – Using Table Expressions
- 11.1 Module 11 Introduction
- 11.2 Using Views
- 11.3 Using Inline Table-Valued Functions
- 11.4 Using Derived Tables
- 11.5 Using Common Table Expressions
Module 12 – Using Set Operators
- 12.1 Module 12 Introduction
- 12.2 Writing Queries with the UNION operator
- 12.3 Using EXCEPT and INTERSECT
- 12.4 Using APPLY
Module 13 – Using Window Ranking, Offset, and Aggregate Functions
- 13.1 Module 13 Introduction
- 13.2 Creating Windows with OVER
- 13.3 Exploring Window Functions
Module 14 – Pivoting and Grouping Sets
- 14.1 Module 14 Introduction
- 14.2 Writing Queries with PIVOT and UNPIVOT
- 14.3 Working with Grouping Sets
Module 15 – Implementing Error Handling
- 15.1 Module Introduction
- 15.2 Implementing T-SQL error handling
- 15.3 Implementing structured exception handling
Module 16 – Managing Transactions
- 16.1 Module 16 Introduction
- 16.2 Transactions and the Database Engine
- 16.3 Controlling Transactions
- 16.4 Course Wrap Up
- 1.1 Course Introduction
- 1.2 Intro to Management Studio
- 1.3 Intro to command-line query tools
Module 2 – Introduction to T-SQL Querying
- 2.1 Introducing T-SQL
- 2.2 Understanding Sets
- 2.3 Understanding the Logical Order of Operations in SELECT statements
Module 3 – Basic SELECT Queries
- 3.1 Writing Simple SELECT Statements
- 3.2 Eliminate Duplicates with DISTINCT
- 3.3 Using Column and Table Aliases
- 3.4 Write Simple CASE Expressions
Module 4 – Querying Multiple Tables
- 4.1 Understanding Joins
- 4.2 Querying with Inner Joins
- 4.3 Querying with Outer Joins
- 4.4 Querying with Cross Joins and Self Joins
Module 5 – Sorting and Filtering Data
- 5.1 Sorting Data
- 5.2 Filtering Data with Predicates
- 5.3 Filtering with the TOP and OFFSET-FETCH
- 5.4 Working with Unknown Values
Module 6 – Introduction to Business Intelligence and Data Modeling
- 6.1 Introduction to Business Intelligence
- 6.2 The Microsoft Business Intelligence Platform
- 6.3 Exploring a Data Warehouse
- 6.4 Exploring a Data Model
Module 7 – Prepare Data
- 7.1 Introduction to Power BI
- 7.2 Get data from various data sources
- 7.3 Preview source data
Module 8 – Clean, Transform, and Load Data
- 8.1 Data Transformation Intro
- 8.2 Transformation Example 1
- 8.3 Transformation Example 2
- 8.4 Transformation Example 3
- 8.5 Transformation Example 4
- 8.6 Transformation Example 5
- 8.7 Transformation Example 6
Module 9 – Design a Data Model
- 9.1 Introduction to Data Modeling
- 9.2 Model Relationships
- 9.3 Table Configuration
- 9.4 Model interface
- 9.5 Quick Measures
- 9.6 Many-to-many relationships
- 9.7 Row-level security
Module 10 – Create Model Calculations using DAX
- 10.1 DAX context
- 10.2 Calculated Tables
- 10.3 Calculated Columns
- 10.4 Managing Date Tables
- 10.5 Measures
- 10.6 Filter Manipulation
- 10.7 Time Intelligence
Module 11 – Create Reports
- 11.1 Basic Report Creation
- 11.2 Example Page 1
- 11.3 Example Page 2
- 11.4 Example Page 3
- 11.5 Report Publishing
- 11.6 Enhancing Reports
- 11.7 Drill-Through Pages
- 11.8 Conditional Formatting
- 11.9 Buttons and Bookmarks
Module 12 – Create Dashboards
- 12.1 Dashboard Basics
- 12.2 Real Time Dashboards
- 12.3 Enhanced Dashboards
Module 13 – Create Paginated Reports
- 13.1 Introduction to Power BI Report Builder
- 13.2 Report Layouts
- 13.3 Report Data
- 13.4 Report Tables
Module 14 – Perform Advanced Analytics
- 14.1 Introduction to Advanced Analytics
- 14.2 Scatter Chart
- 14.3 Forecast
- 14.4 Decomposition Tree
- 14.5 Key Influencers
Module 15 – Create and Manage Workspaces
- 15.1 Introduction to Workspaces
- 15.2 Working with Workspaces and the Portal
Module 16 – Create Power App Visuals
- 16.1 Introduction to Power Apps Visual
- 16.2 Creating the App
- 16.3 Basic Power Apps Concepts
- 16.4 Refreshing the Report
Module 17 – Analysis Services and Power BI
- 17.1 Introduction to Analysis Services
- 17.2 Connecting with Multidimensional Models
- 17.3 Premium Workspaces and Analysis Services
- 17.4 Course Wrap Up
Module 1: Introduction
- Instructor Introduction
- Course Overview
- Expectations
Module 2: Cloud Fundamentals
- What is the Cloud
- Basic Terms
- Types of cloud computing
- Cloud Service Models
Module 3: Azure’s Architecture
- Regions and Availability
- Resource Groups and Management
- Azure Marketplace
- Demo- Azure Console Exploration
Module 4: Compute
- Virtual Machines
- Containers
- Demo – Containers
- Functions
- Demo – Functions
- Windows Virtual Desktop and App Services
Module 5: Networking and CDN
- Virtual Networks
- Load Balancers
- Gateways
- Content Delivery Network
- Network Security
- Demo – Connecting two VMs
Module 6: Storage
- Storage
- Big Data and Analytics
- Databases
- Demo – SQL Database
- Database Migration
Module 7: Azure Solutions
- IoT
- Demo – IoT Hub
- AI
- Serverless Computing
Module 8: Administration
- Security
- Identity and Access Management
- Demo – Adding Users and Groups
- Governance
- Demo – Resource Locks
- Privacy and Compliance
Module 9: Pricing and Service Level Agreements
- Managing Costs
- Demo – Pricing Calculator
- Service Level Agreements and Service Lifecycles
Module 10: Exam Preparation
- Exam Layout
- Best Practices and Study Tips
- Overview and Conclusion
Module 11: Review Questions
- Module 11 pt 1
- Module 11 pt 2
- Module 11 pt 3
- Module 11 pt 4
Module 1: Implement VM Solutions
- Intro
- Implement VM Solutions Pt 1
- Implement VM Solutions Pt 2
- Implement VM Solutions Pt 3
- Implement VM Solutions Pt 4
- Implement Batch Jobs Using AZ Batch Services
- Create Containerized Solutions Pt 1
- Create Containerized Solutions Pt 2
Module 2: Develop Azure Platform as a Service
- Develop Azure Platform as a Service (PaaS) Pt 1
- Develop Azure Platform as a Service (PaaS) Pt 2
- Develop Azure Platform as a Service (PaaS) Pt 3
- Develop Azure Platform as a Service (PaaS) Demo Pt 1
- Develop Azure Platform as a Service (PaaS) Demo Pt 2
- Create Azure App Service Mobile Apps
- Create Azure App Service API Apps
- Implement Azure Functions Pt 1
- Implement Azure Functions Pt 2
Module 3: Develop for Azure Storage
- Develop for Azure Storage Pt 1
- Develop for Azure Storage Pt 2
- Develop for Azure Storage Pt 3
- Develop Solutions that use Azure Cosmos DB Pt 1
- Develop Solutions that use Azure Cosmos DB Pt 2
- Develop Solutions that use Relational Database Pt 1
- Develop Solutions that use Relational Database Pt 2
- Develop Solutions that use Microsoft Blob Storage
Module 4: Implement Azure Security
- Implement Azure Security Pt 1
- Implement Azure Security Pt 2
- Implement Azure Security Pt 3
- Implementing Access Control Pt 1
- Implementing Access Control Pt 2
- Implementing Secure Data Solutions
Module 5: Monitor, Troubleshoot and Optimize Azure Solutions
- Monitor, Troubleshoot and Optimize Azure Solutions Pt 1
- Monitor, Troubleshoot and Optimize Azure Solutions Pt 2
- Develop for Code Scalability
- Instrument Solutions to Support Monitoring and Logging
- Integrate Caching and Content Delivery Pt 1
- Integrate Caching and Content Delivery Pt 2
Module 6: Connect to and Consume Azure and Third Party Services
- Connect to and Consume Azure and Third Party Services Pt 1
- Connect to and Consume Azure and Third Party Services Pt 2
- Working with Azure Search
- Azure API Management
- Develop Event Based Solutions Pt 1
- Develop Event Based Solutions Pt 2
- Develop Message Based Solutions Pt 1
- Develop Message Based Solutions Pt 2
- Outro
- 1.1 Course Introduction
- 1.2 Module 1 Introduction
- 1.3 Introduction to Power BI
- 1.4 Get data from various data sources
- 1.5 Preview source data
Module 2 – Clean, Transform, and Load Data
- 2.1 Module 2 Introduction
- 2.2 DimEmployee Example
- 2.3 DimEmployeeSalesTerritory Example
- 2.4 DimReseller Example
- 2.5 FactResellersSales Example
- 2.6 ResellerSalesTargets Example
- 2.7 Color Formats Example
Module 3 – Design a Data Model
- 3.1 Module 3 Introduction
- 3.2 Introduction to Data Modeling
- 3.3 Model Relationships
- 3.4 Table Configuration
- 3.5 Model interface
- 3.6 Quick Measures
- 3.7 Many-to-many relationships
- 3.8 Row-level security
Module 4 – Create Model Calculations using DAX
- 4.1 Module 4 Introduction
- 4.2 DAX context
- 4.3 Calculated Tables
- 4.4 Calculated Columns
- 4.5 Managing Date Tables
- 4.6 Measures
- 4.7 Filter Manipulation
- 4.8 Time Intelligence
Module 5 – Create Reports
- 5.1 Module 5 Introduction
- 5.2 Basic Report Creation
- 5.3 Example Page 1
- 5.4 Example Page 2
- 5.5 Example Page 3
- 5.6 Report Publishing
- 5.7 Enhancing Reports
- 5.8 Drill-Through Pages
- 5.9 Conditional Formatting
- 5.10 Buttons and Bookmarks
Module 6 – Create Dashboards
- 6.1 Module 6 Introduction
- 6.2 Dashboard Basics
- 6.3 Real Time Dashboards
- 6.4 Enhanced Dashboards
Module 7 – Create Paginated Reports
- 7.1 Module 7 Introduction
- 7.2 Introduction to Power BI Report Builder
- 7.3 Report Layouts
- 7.4 Report Data
- 7.5 Report Tables
Module 8 – Perform Advanced AnalyticsModule 9 – Create and Manage Workspaces
- 9.1 Introduction to Workspaces
- 9.2 Working with Workspaces and the Portal
Module 10 – Create Power App Visuals
- 10.1 Module 10 Introduction
- 10.2 Introduction to Power Apps Visual
- 10.3 Creating the App
- 10.4 Basic Power Apps Concepts
- 10.5 Refreshing the Report
Module 11 – Analysis Services and Power BI
- 11.1 Module 11 Introduction
- 11.2 Introduction to Analysis Services
- 11.3 Connecting with Multidimensional Models
- 11.4 Premium Workspaces and Analysis Services
- 11.5 Course Wrap Up
Module 1 Understanding Local Area Networking
- Module 1 Notes
- 1.0 Intro to Networking Fundamentals
- 1.1 Exam Overview
- 1.1 Examining Local Network Devices and Data Transfers 1a
- 1.1 Examining Local Network Devices and Data Transfers 1b
- 1.1 Examining Local Network Devices and Data Transfers 1c
- 1.1 Examining Local Network Devices and Data Transfers 1d
- 1.1 Examining Local Network Devices and Data Transfers 1e
- 1.1 Examining Local Network Devices and Data Transfers 1f
- 1.2 Examining Local Network Devices and Data Transfers Part 2a
- 1.2 Examining Local Network Devices and Data Transfers Part 2b
Module 2 Defining Networks with the OSI Model
- Module 2 Notes
- 2.1 Defining Networks with OSI Model Part 1a
- 2.2 Defining Networks with OSI Model Part 1b
- 2.3 Defining Networks with OSI Model Part 1c
- 2.4 Defining Networks with OSI Model Part 1d
- 2.5 Defining Networks with OSI Model Part 1e
- 2.6 Defining Networks with OSI Model Part 1f
- 2.7 Defining Networks with OSI Model Part 1g
- 2.8 Defining Networks with OSI Model Part 1h
Module 3 Understanding Wired and Wireless Networks
- Module 3 Notes
- 3.1 Understand Wired and Wireless Networks Part1
- 3.2 Understand Wired and Wireless Networks Part2
Module 4 Understanding Internet Protocol
- Module 4 Notes
- 4.1 Understanding Internet Protocol Part1
- 4.2 Understanding Internet Protocol Part2
Module 5 Implementing TCP-IP in the command line
- Module 5 Notes
- 5.1 Implementing TCPIP in the Command Line
Module 6 Working with Networking Services
- Module 6 Notes
- 6.1 Working with Networking Services
Module 7 Understanding Wide Area Networks
- Module 7 Notes
- 7.1 Understanding Wide Area Network Part1
- 7.2 Understanding Wide Area Network Part2
Module 8 Defining Network Infrastructure and Security
- Module 8 Notes
- 8.1 Defining Network Infrastructure & Network Security Part1
- 8.2 Defining Network Infrastructure & Network Security Part2
Module 9 Key Takeaways
- Key Takeaway Notes
- 1. Key Take Aways of Networking Fundamentals
- 2. Key Take Aways Mod1
- 3. Key Take Aways Mod2
- 4. Key Take Aways Mod3
- 5. Key Take Aways Mod4
- 6. Key Take Aways Mod5
- 7. Key Take Aways Mod6
- 8. Key Take Aways Mod7
Module 10 Terms to Know
- Terms to Know Notes
- 1. Terms to Know Networking Fundamentals
- 2. Terms to Know Mod1
- 3. Terms to Know Mod2
- 4. Terms to Know Mod3
- 5. Terms to Know Mod4
- 6. Terms to Know Mod5
- 7. Terms to Know Mod6
- 8. Terms to Know Mod7
- 9. Terms to Know Mod8
Module 1 Understanding Local Area Networking
- Module 1 Notes
- 1.0 Intro to Networking Fundamentals
- 1.1 Exam Overview
- 1.1 Examining Local Network Devices and Data Transfers 1a
- 1.1 Examining Local Network Devices and Data Transfers 1b
- 1.1 Examining Local Network Devices and Data Transfers 1c
- 1.1 Examining Local Network Devices and Data Transfers 1d
- 1.1 Examining Local Network Devices and Data Transfers 1e
- 1.1 Examining Local Network Devices and Data Transfers 1f
- 1.2 Examining Local Network Devices and Data Transfers Part 2a
- 1.2 Examining Local Network Devices and Data Transfers Part 2b
Module 2 Defining Networks with the OSI Model
- Module 2 Notes
- 2.1 Defining Networks with OSI Model Part 1a
- 2.2 Defining Networks with OSI Model Part 1b
- 2.3 Defining Networks with OSI Model Part 1c
- 2.4 Defining Networks with OSI Model Part 1d
- 2.5 Defining Networks with OSI Model Part 1e
- 2.6 Defining Networks with OSI Model Part 1f
- 2.7 Defining Networks with OSI Model Part 1g
- 2.8 Defining Networks with OSI Model Part 1h
Module 3 Understanding Wired and Wireless Networks
- Module 3 Notes
- 3.1 Understand Wired and Wireless Networks Part1
- 3.2 Understand Wired and Wireless Networks Part2
Module 4 Understanding Internet Protocol
- Module 4 Notes
- 4.1 Understanding Internet Protocol Part1
- 4.2 Understanding Internet Protocol Part2
Module 5 Implementing TCP-IP in the command line
- Module 5 Notes
- 5.1 Implementing TCPIP in the Command Line
Module 6 Working with Networking Services
- Module 6 Notes
- 6.1 Working with Networking Services
Module 7 Understanding Wide Area Networks
- Module 7 Notes
- 7.1 Understanding Wide Area Network Part1
- 7.2 Understanding Wide Area Network Part2
Module 8 Defining Network Infrastructure and Security
- Module 8 Notes
- 8.1 Defining Network Infrastructure & Network Security Part1
- 8.2 Defining Network Infrastructure & Network Security Part2
Module 9 Key Takeaways
- Key Takeaway Notes
- 1. Key Take Aways of Networking Fundamentals
- 2. Key Take Aways Mod1
- 3. Key Take Aways Mod2
- 4. Key Take Aways Mod3
- 5. Key Take Aways Mod4
- 6. Key Take Aways Mod5
- 7. Key Take Aways Mod6
- 8. Key Take Aways Mod7
Module 10 Terms to Know
- Terms to Know Notes
- 1. Terms to Know Networking Fundamentals
- 2. Terms to Know Mod1
- 3. Terms to Know Mod2
- 4. Terms to Know Mod3
- 5. Terms to Know Mod4
- 6. Terms to Know Mod5
- 7. Terms to Know Mod6
- 8. Terms to Know Mod7
- 9. Terms to Know Mod8
Module 1 Introducing Windows Server 2016
- Module 1 Notes
- 1. Windows Server 2016 Fundamentals Intro
- 2. Mod 1 Introducing Windows Server 2016
- 3. Mod 1a Introducing Windows Server 2016
Module 2 Managing Windows Server 2016
- Module 2 Notes
- 4. Mod 2 Managing Windows Server 2016
- 5. Mod 2a Managing Windows Server 2016
Module 3 Managing Storage
- Module 3 Notes
- 6. Mod 3 Managing Storage
- 7. Mod 3a Managing Storage
Module 4 Monitoring and Troubleshooting Servers
- Module 4 Notes
- 8. Mod 4 Monitoring and Troubleshooting Servers
- 9. Mod 4a Monitoring and Troubleshooting Servers
Module 5 Essential Services
- Module 5 Notes
- 10. Mod 5 Essential Services
- 11. Mod 5a Essential Services
Module 6 Understanding File and Print Services
- Module 6 Notes
- 12. Mod 6 Understanding File and Print Services
Module 7 Windows Network Services and Applications
- Module 7 Notes
- 13. Mod 7 Windows Network Services and Applications-
- 14. Mod 7a Windows Network Services and Applications-
Mod 8 Key Takeaways
- Key Takeaway Notes
- 15. Key takeaways Intro
- 16. Key takeaways – Module 1 Introducing Windows Server 2016
- 17. Key takeaways – Module 2 Managing Windows Server 2016
- 18 Key takeaways – Module 3 Storing Data in Windows Server 2016
- 19. Key takeaways – Module 4 Monitoring and Troubleshooting Servers
- 20. Key takeaways – Module 5 Essential Services
- 21. Key takeaways – Module 6 Understanding File and Print Services
- 22. Key takeaways – Module 7 Windows Network Services and Applications
Mod 9 Terms to Know
- Terms to Know Notes
- 23. Terms to Know Intro
- 24. Terms to Know – Module 1 Introducing Windows Server 2016
- 25. Terms to Know – Module 2 Managing Windows Server 2016
- 26 Terms to Know – Module 3 Storing Data in Windows Server 2016
- 27. Terms to Know – Module 4 Monitoring and Troubleshooting Servers
- 28. Terms to Know – Module 5 Essential Services
- 29. Terms to Know – Module 6 Understanding File and Print Services
- 30. Terms to Know – Module 7 Windows Network Services and Applications
Mod 10 Hands on Labs
- Hands on Labs Setup Notes
- 01 MTA 98-365 Windows Server 2016 Administration Fundamentals Lab setup
- 02 Step by Step Install VMware Player 15 in Windows 10 1
- 03 Installing and Configuring DC1 Virtual Machine
- 04 Installing and Configuring SRV-1 Virtual Machine
- 05 Installing and Configuring Client 1 Virtual Machine
- 06 Installing and Configuring the Router Virtual Machine
- 07 Creating and Configuring SRV-2 Virtual Machine
- 08 Working with Windows Server 2016 Desktop Experience
- 09 Managing Organizational Units and Groups in AD DS
Module 1: Deploy a Microsoft Azure SQL Database
- Introduction
- Introducing the Azure SQL Database Part 1
- Introducing the Azure SQL Database Part 2
- Setting Up Azure Lab
- Chose a Service Tier Part 1
- Chose a Service Tier Part 2
- Create Servers and Databases Part 1
- Creating a Azure SQL Server and Database Lab
- Create Servers and Databases Part 2
- Create Servers and Databases Part 3
- Connecting SSMS to Azure SQL Lab Part 1
- Connecting SSMS to Azure SQL Lab Part 2
- Create a Sysadmin Account
- Creating Azure SQL Logins and Users Lab
- Congure Elastic Pools
- Creating and Conguring an Elastic Pool Lab
Module 2: Plan for SQL Server Installation
- Plan for an IaaS or On-Premises Deployment Part 1
- Plan for an IaaS or On-Premises Deployment Part 2
- Select the Appropriate Size for a Virtual Machine
- Plan Storage Pools Based on Performance Requirements Part 1
- Plan Storage Pools Based on Performance Requirements Part 2
- Evaluate Best Practices for Installation
- Design a Storage Layout for a SQL Server Virtual Machine
Module 3: Deploy SQL Server Instances
- Deploy a SQL Server Instance in IaaS and On-Premises
- Restoring AdventureWorks 2016 Database Lab
- Provision an Azure Virtual Machine to Host a SQL Server Instance
- Provisioning an Azure Virtual Machine to Host a SQL Server Lab
- Manually Install SQL Server on an Azure Virtual Machine
- Installing SQL 2016 Lab Part 1
- Installing SQL 2016 Lab Part 2
- Automate the Deployment of SQL Server Databases
- Exploring Azure SQL Database Automation Lab
- Deploy SQL Server by Using Templates
- Managing JSON Templates Lab
Module 4: Deploy SQL Server Databases to Azure Virtual Machines
- Migrate an On-Premises SQL Server Database to an Azure Virtual Machine
- Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 1
- Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 2
- Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 3
- Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 4
- Generate Benchmark Data for Performance Needs
- Generating Benchmark Data Lab Part 1
- Generating Benchmark Data Lab Part 2
- Perform Performance Tuning on Azure IaaS
- Perform Performance Tuning on Azure IaaS Lab Part 1
- Perform Performance Tuning on Azure IaaS Lab Part 2
- Support Availability Sets in Azure Part 1
- Support Availability Sets in Azure Part 2
- Manage High Availability Lab Part 1
- Manage High Availability Lab Part 2
- Manage High Availability Lab Part 3
- Manage High Availability Lab Part 4
- Manage High Availability Lab Part 5
Module 5: Configure Secure Access to Microsoft Azure SQL Databases
- Configure Firewall Rules
- Creating Firewall Rules Lab
- Configure Always Encrypted for Azure SQL Database
- Implementing Always Encrypted Lab
- Configure Cell-Level Encryption
- Cell-Level Encryption Lab
- Configure Dynamic Data Masking
- Dynamic Data Masking Lab
- Configure Transparent Data Encryption (TDE)
- Transparent Data Encryption (TDE) Lab
Module 6: Configure SQL Server performance settings
- Configure SQL Performance Settings
- Configuring SQL Performance Settings Lab
- Configure Max Server Memory
- Configuring SQL Memory Lab
- Configure Database Performance Settings
- Configure Database Performance Settings Lab
- Configure Operators and Alerts
- Configure alerts in Azure and On-Premise SQL Server Lab
Module 7: Manage SQL Server instances
- Create Databases
- Creating Databases Lab
- Manage Files and File Groups
- Managing Files and File Groups Lab
- Manage System Database Files
- Manage System Database Files Lab
- Configure tempdb
- Configure tempdb Lab
Module 8: Manage SQL Storage
- Manage SMB File Shares
- Manage SMB File Shares Lab
- Manage Stretch Databases
- Configure Azure Storage
- Change Service Tiers
- Change Service Tiers Lab Part 1
- Review Wait Statistics
- Manage Storage Pools
- Recover from Failed Storage
- Managing Storage Lab Part 1
- Managing Storage Lab Part 2
Module 9: Perform Database Maintenance
- Monitoring Tools
- Using Monitoring Tools Lab Part 1
- Using Monitoring Tools Lab Part 2
- Azure Performance Tuning
- Automate Maintenance Tasks
- Update Statistics and Indexes
- Update Statistics and Indexes Lab Part 1
- Update Statistics and Indexes Lab Part 2
- Verify Database Integrity
- Verify Database Integrity Lab
- Recover from Database Corruption
- Recover from Database Corruption Lab
- Conclusion
Module 1: Configure Encryption
- Introduction
- Exam Objectives and Lab Setup
- Restoring AdventureWorks 2016 Database Lab Part 1
- Restoring AdventureWorks 2016 Database Lab Part 2
- Restoring AdventureWorks 2016 Database Lab Part 3
- Configure Encryption
- Cell-Level Encryption Part 1
- Cell-Level Encryption Part 2
- Cell-Level Encryption Lab Part 1
- Cell-Level Encryption Lab Part 2
- Transparent Data Encryption
- Transparent Data Encryption Lab
- Always Encrypted
- Always Encrypted Lab
- Backup Encryption
- Backup Encryption Lab
- Connection Encryption
- Encryption Troubleshooting
Module 2: Configure Data Access and Permissions
- Create and Maintain Users
- Create and Maintain Users Lab Part 1
- Create and Maintain Users Lab Part 2
- Configure and Maintain Custom Roles
- Configure and Maintain Custom Roles Lab
- Manage Database Object Permissions Part 1
- Manage Database Object Permissions Part 2
- Manage Database Object Permissions Lab Part 1
- Manage Database Object Permissions Lab Part 2
- Configure User Options for Azure SQL Database
- Configure Row-Level Security
- Configure Dynamic Data Masking
- Configure Dynamic Data Masking Lab
Module 3: Configure Auditing
- Manage a SQL Server Audit
- Manage a SQL Server Audit Lab
- Query the SQL Server Audit Log
- Manage an Azure SQL Server Audit
Module 4: Develop a Backup Strategy
- Backup Types Part 1
- Backup Types Part 2
- Manage, Backup, and Restore Databases Lab Part 1
- Manage, Backup, and Restore Databases Lab Part 2
- Backup Very Large Databases Part 1
- Backup Very Large Databases Part 2
- Backup Very Large Databases Part 3
- Backup Very Large Databases Part 4
- 4.9 Managing Very Large Databases Lab Part 1
- 4.10 Managing Very Large Databases Lab Part 2
- 4.11 Managing Very Large Databases Lab Part 3
- Configure Alerting for Failed Backups
- Configure Alerting for Failed Backups Lab Part 1
- Configure Alerting for Failed Backups Lab Part 2
- Back up Databases to Azure
- Manage Transaction Log Backups
- Configure Database Recovery Models
- Set Database Recovery Model Lab
- Configure Backup Automation
- Configure Backup Automation Lab
Module 5: Restore Databases
- Perform Piecemeal Restores
- Restore Databases Lab Part 1
- Restore Databases Lab Part 2
- Restore Databases Lab Part 3
- Perform Page Recovery
- Perform Point-in-Time Recovery
- Perform Point-in-Time Recovery Lab
- Restore File Groups
- Develop a Plan to Automate and Test Restores
Module 6: Manage Database Integrity
- Implement Database Consistency Checks
- Implement Database Consistency Checks Lab
- Identify Database Corruption
- Recover From Database Corruption
Module 7: Monitor Database Activity
- Monitor Current Sessions
- Monitor Current Sessions Lab
- Identify Sessions that Cause Blocking Activity
- Identify Sessions that Consume tempdb Resources
- Configure the Data Collector
Module 8: Monitor Queries
- Manage the Query Store
- Manage the Query Store Lab
- Configure Extended Events and Trace Events
- Identify Problematic Execution Plans
Module 9: Manage Indexes
- Identify and Repair Index Fragmentation
- Identify and Create Missing Indexes
- Identify and Drop Underutilized Indexes
- Manage Existing Columnstore Indexes Part 1
- Manage Existing Columnstore Indexes Part 2
- Partitioned Tables
Module 10: Monitor SQL Server Instances
- Create and Manage Operators
- Create and Manage SQL Agent Alerts
- Configure Policy-Based Management
- Configure Policy-Based Management Lab
- Identify Available Space on Data Volumes
- Identify the Cause of- Manage Performance Degradation
- Identify the Cause of- Manage Performance Degradation Lab Part 1
- Identify the Cause of- Manage Performance Degradation Lab Part 2
Module 11: Implement Log Shipping
- Configure and Monitor Log Shipping
- Configure and Monitor Log Shipping Lab Part 1
- Configure and Monitor Log Shipping Lab Part 2
Module 12: Implement Failover Cluster Instances
- Windows Server Failover Cluster
- Manage Shared Disks
- Configure Cluster Shared Volumes
- Configuring WSFC Lab
Module 13: Implement Always On Availability Groups
- Database Mirroring
- Create an Availability Group
- Manage Failover
- Configure Read-Only Routing
- Create Distributed Availability Groups
- Configuring Always On Availability Group Lab Part 1
- Configuring Always On Availability Group Lab Part 2
- Conclusion
Module 1: Installing and Configuring Domain Controllers
- Introduction
- Overview of Identity Management Concepts Part 1
- Overview of Identity Management Concepts Part 2
- Active Directory Domain Services Components Part 1
- Active Directory Domain Services Components Part 2
- Active Directory Domain Services Components Part 3
- Overview of ADDS Domain Services Part 1
- Overview of ADDS Domain Services Part 2
- Deploying Domain Controllers Part 1
- Deploying Domain Controllers Part 2
- Deploying Domain Controllers Part 3
Module 2: Managing AD DS Objects
- Overview of Object Management Part 1
- Overview of Object Management Part 2
- Managing User Accounts Part 1
- Managing User Accounts Part 2
- Managing User Accounts Part 3
- Managing User Accounts Part 4
- Managing User Accounts Part 5
- Managing Groups Part 1
- Managing Groups Part 2
- Managing Groups Part 3
- Managing Computer Accounts Part 1
- Managing Computer Accounts Part 2
- Managing Organizational Units Part 1
- Managing Organizational Units Part 2
Module 3: Securing Active Directory Domain Services
- Managing Organizational Units Part 1
- Managing Organizational Units Part 2
- Implementing Account Security Part 1
- Implementing Account Security Part 2
- Auditing AD DS
- Configuring Managed Service Accounts
Module 4: Working with Complex AD Infrastructures
- Overview of Advanced AD DS Deployments
- Deploying a Distributed AD DS Environment Part 1
- Deploying a Distributed AD DS Environment Part 2
- Deploying a Distributed AD DS Environment Part 3
- Overview of AD DS Replication
- Configuring AD DS Services Part 1
- Configuring AD DS Services Part 2
- Configuring AD DS Services Part 3
Module 5: Implementing Group Policy
- Overview of Group Policy Part 1
- Overview of Group Policy Part 2
- Overview of Group Policy Part 3
- Creating and Configuring GPOs Part 1
- Creating and Configuring GPOs Part 2
- Monitoring and Troubleshooting Group Policy
- Managing Security Options for Computers using Group Policy Part 1
- Managing Security Options for Computers using Group Policy Part 2
- Managing User Environments Part 1
- Managing User Environments Part 2
- Managing User Environments Part 3
Module 6: Understanding Microsoft Azure AD and Directory Synchronization
- Planning Directory Synchronization Part 1
- Planning Directory Synchronization Part 2
- Implementing Azure AD Connect Part 1
- Implementing Azure AD Connect Part 2
- Managing Identities with Directory Synchronization
Module 7: Monitoring and Recovering AD DS
- Monitoring AD DS Part 1
- Monitoring AD DS Part 2
- Monitoring AD DS Part 3
- Database Management
- Backup and Recovery in AD DS Part 1
- Backup and Recovery in AD DS Part 2
Module 8: Implementing Active Directory Certificate Services
- Overview of Public Key Infrastructure and AD CS Part 1
- Overview of Public Key Infrastructure and AD CS Part 2
- Deploying Certificate Authority Hierarchy
- Administering Certificate Authorities
- Deploying and Managing Certificates Part 1
- Deploying and Managing Certificates Part 2
- Managing Revocation and Distribution
- Configuring Certificate Recovery
Module 9: Implementing Active Directory Federation Services
- Overview of AD FS
- Planning and Deploying AD FS
- Overview of Web Application Proxy
- Module 10: Implementing Active Directory Rights Management Services
- Overview of AD RMS
- Deploying AD RMS
- Protecting with AD RMS
- Conclusion
Module 1: Plan and Implement IPv4 and IPv6 Networks
- Introduction
- Planning and Implementing IP addressing Schemes for IPv4 Networks Part 1
- Planning and Implementing IP addressing Schemes for IPv4 Networks Part 2
- Planning and Implementing IP addressing Schemes for IPv4 Networks Part 3
- Planning and Implementing IP addressing Schemes for IPv4 Networks Part 4
- Planning and Implementing IP addressing Schemes for IPv4 Networks Part 5
- Planning and Implementing IP addressing Schemes for IPv4 Networks Part 6
- Planning and Implementing IP addressing Schemes for IPv4 Networks Part 7
- Configuring IPv4 Hosts Part 1
- Configuring IPv4 Hosts Part 2
- Managing and Troubleshooting IPv4 Connectivity Part 1
- Managing and Troubleshooting IPv4 Connectivity Part 2
- Managing and Troubleshooting IPv4 Connectivity Part 3
- Implementing IPV6 for Network Hosts Part 1
- Implementing IPV6 for Network Hosts Part 2
- Implementing IPV6 for Network Hosts Part 3
- Implementing IPv6 Transitioning and Coexistence
Module 2: Installing and Configuring DHCP
- Overview of DHCP Server Role Part 1
- Overview of DHCP Server Role Part 2
- Deploying DHCP Part 1
- Deploying DHCP Part 2
- Deploying DHCP Part 3
- Deploying DHCP Part 4
- Deploying DHCP Part 5
- Managing and Troubleshooting DHCP Part 1
- Managing and Troubleshooting DHCP Part 2
- Managing and Troubleshooting DHCP Part 3
- Managing and Troubleshooting DHCP Part 4
- Managing and Troubleshooting DHCP Part 5
Module 3: Installing and Configuring DNS
- Implementing DNS Servers Part 1
- Implementing DNS Servers Part 2
- Implementing DNS Servers Part 3
- Creating and Configuring DNS Zones Part 1
- Creating and Configuring DNS Zones Part 2
- Creating and Configuring DNS Zones Part 3
- Creating and Configuring DNS Zones Part 4
- Understanding Active Directory Integration Part 1
- Configuring Advanced DNS Settings Part 1
- Configuring Advanced DNS Settings Part 2
- Configuring Advanced DNS Settings Part 3
- Troubleshooting DNS Name Resolution Part 1
- Troubleshooting DNS Name Resolution Part 2
Module 4: Implementing and Managing IP Address Management
- Overview of IPAM Part 1
- Overview of IPAM Part 2
- IPAM Deployment and Administration Part 1
- IPAM Deployment and Administration Part 2
- IPAM Deployment and Administration Part 3
- Managing IP Address Spaces by Using IPAM
Module 5: Implementing Remote Access
- Remote Access Overview Part 1
- Remote Access Overview Part 2
- Remote Access Overview Part 3
- Implementing the Web Application Proxy
- Planning and Implementing Virtual Private Networks Part 1
- Planning and Implementing Virtual Private Networks Part 2
- Planning and Implementing Virtual Private Networks Part 3
- Planning and Implementing Virtual Private Networks Part 4
- Planning and Implementing Virtual Private Networks Part 5
- Overview of Direct Access Part 1
- Overview of Direct Access Part 2
- Implementing Direct Access Part 1
- Implementing Direct Access Part 2
- Implementing Direct Access Part 3
Module 6: Securing the Network Infrastructure
- Using the Windows Firewall with Advanced Security Part 1
- Using the Windows Firewall with Advanced Security Part 2
- Utilizing IP Security Part 1
- Utilizing IP Security Part 2
- Conclusion
Module 1: Installing Windows Server 2016 in Host and Compute Environments
- Course Introduction
- Determining Windows Server 2016-Part1
- Determining Windows Server 2016-Part2
- Determining Windows Server 2016-Part3
- Determining Windows Server 2016-Part4
- Determining Windows Server 2016-Part5
- Installing Windows 2016-Part1
- Installing Windows 2016-Part2
- Installing Windows 2016-Part3
- Installing Windows 2016-Part4
- Installing Windows 2016-Part5
- Managing Windows Installation With Windows PowerShell
- Creating Managing And Maintaining Windows Images For Deployment-Part1
- Creating Managing And Maintaining Windows Images For Deployment-Part2
- Creating Managing And Maintaining Windows Images For Deployment-Part3
- Creating Managing And Maintaining Windows Images For Deployment-Part4
Module 2: Configuring Active Directory Networks for Host and Compute Environments
- Overview Of Active Directory Domain Services-Part1
- Overview Of Active Directory Domain Services-Part2
- Overview Of Active Directory Domain Services-Part3
- Overview Of ADDS Domain Controllers-Part1
- Overview Of ADDS Domain Controllers-Part2
- Deploying Domain Controllers-Part1
- Deploying Domain Controllers-Part2
- Overview Of Group Policy Purpose Components And Processes-Part1
- Overview Of Group Policy Purpose Components And Processes-Part2
- Overview Of Group Policy Purpose Components And Processes-Part3
- Creating And Configuring GPOs-Part1
- Creating And Configuring GPOs-Part2
- Security Management Using Group Policy-Part1
- Security Management Using Group Policy-Part2
- Security Management Using Group Policy-Part3
Module 3: Implementing Local and Enterprise Storage Solutions
- Managing Disk And Volumes In Windows Server 2016-Part1
- Managing Disk And Volumes In Windows Server 2016-Part2
- Managing Disk And Volumes In Windows Server 2016-Part3
- Managing Disk And Volumes In Windows Server 2016-Part4
- Implementing And Managing Storage Spaces-Part1
- Implementing And Managing Storage Spaces-Part2
- Implementing And Managing Storage Spaces-Part3
- Configuring Data Duplication-Part1
- Configuring Data Duplication-Part2
- Understanding Various Types Of Storage
- Comparing SAN Options-Part1
- Comparing SAN Options-Part2
- Understanding ISNS DCB And MPIO
- Configuring File And Folder Sharing In Windows Server-Part1
- Configuring File And Folder Sharing In Windows Server-Part2
- Configuring File And Folder Sharing In Windows Server-Part3
- Configuring Advanced File Services With FSRM-Part1
- Configuring Advanced File Services With FSRM-Part2
- Configuring Advanced File Services With FSRM-Part3
Module 4: Implementing Hyper-V Virtualization and Containers
- Installing Hyper-V Virtualization
- Configuring Storage And Networking In Hyper-VHosts-Part1
- Configuring Storage And Networking In Hyper-VHosts-Part2
- Configuring And Managing Virtual Machines-Part1
- Configuring And Managing Virtual Machines-Part2
- Understanding Windows Server And Hyper-VContainers
- Deploying Windows Server And Hyper-VContainers
- Using Docker To Install Configure And Manage Containers
Module 5: Implementing High Availability
- Overview Of High Availability And Disaster Recovery-Part1
- Overview Of High Availability And Disaster Recovery-Part2
- Implementing Network Load Balancing-Part1
- Implementing Network Load Balancing-Part2
- Planning And Configuring Failover Clustering-Part1
- Planning And Configuring Failover Clustering-Part2
- Planning And Configuring Failover Clustering-Part3
- Managing A Failover Cluster
- Integrating Failover Clustering And Hyper-V-Part1
- Integrating Failover Clustering And Hyper-V-Part2
- Configuring Site Availability
Module 6: Maintaining and Monitoring Windows Server 2016
- Windows Server Update Services-Part1
- Windows Server Update Services-Part2
- Windows PowerShell Desired State Configuration
- Windows Server 2016 Monitoring Tools-Part1
- Windows Server 2016 Monitoring Tools-Part2
- Conclusion
Module 1 : Prepare for installation requirements
- Prep for Installation Windows 10
- Clean Install or Upgrade Windows 10
- Editions of Windows 10
- What Features Do You Want
- Installation Media
- Looking at MS Application Compatibility Toolkit (ACT)
Module 2 : Install Windows
- Installing Windows
- Clean installation of Windows 10-Demo
- Upgrade using Installation Media
- Configure Native Boot and VHD
- Migrating to Windows 10
- Chp2 Booting from VHD
- Creating a VHD-Demo
- Installing Windows 10 to a VHD-Demo
- Installing on Bootable USB
- Using USMT User State Migration Tool-Demo
- Additional Windows Features
- Create an MBR-Partitioned VHD-Demo
- Additional Regional and Language Support
- Putting Win 10 on a VHD with DISM-Demo
Module 3 : Configure devices and device drivers
- Configure Devices and Device Drivers
- Resolve Driver Issues
- Configuring Driver Settings
- Manage Driver Packages
- Download and Import Driver Packages
- Using DISM
- Installing o Updating Drivers using Device Manager-Demo
- Roll Back Drivers-Demo
- Using Sigverif-Demo
- More on Device Manager-Demo
Module 4 : Perform post-installation configuration
- Perform Post Installation Configuration
- Configure Accessibilty Options
- Configure Cortana
- Configure Microsoft Edge
- Configure Internet Explorer
- Configure Client Hyper-V
- Configure Power Settings
- Customizing the Start Menu-Demo
- Start Tiles-Demo
- Desktop Customization-Demo
- Action Center and Notifications-Demo
- Hyper V-Demo
- Power Settings-Demo
Module 5 : Implement Windows in an enterprise environment
- Implement Windows in an Enterprise Enviornment
- Implementing Active Directory
- Implement Volume Activation Using a Key Mgmt Service
- Query and Configure Activation State using Command line
- Configure Active Directory Including Group Policies
- Configure and Optimize User Account Control UAC
- Using Software Licensing Manager; slmgr.vbs -dli-Demo
- Taking a look at UAC-Demo
Module 6 : Configure networking
- Configuring Networking
- Configuring Name Resolution
- Connect to a Network
- Configure Network Locations
- Configure Windows Firewall
- Configure Windows Firewall with Advance Security
- Configure Network Discovery
- Configuring Wi-Fi Settings
- Troubleshoot Network Issues
- Configure VPNs
- Configure IPsec
- Configure DirectAccess
- Configure IP Addresses Manually-Demo
- DNS Settings-Demo
- Looking at Network Locations and where to make Chpanges-Demo
- Windows Firewall – Basic Settings-Demo
- Windows Firewall – Advanced Settings-Demo
- Troubleshooting Tools-Demo
- Create a VPN Connection-Demo
Module 7 : Configure storage
- Configure Storage
- Create and Configure VHD
- Configure Removable Devices
- Create and Configure Storage Spaces
- Troubleshoot Storage and Removable Device Issue
- Steps to create a simple volume-Demo
- Create VHD with Hyper-V Manager-Demo
- Create VHD with PowerShell-Demo
- Bitlocker to Go-Demo
Module 8 : Configure data access and usage
- Configure Data Access and Usage File-Printer
- Configure File System Permissions
- Configure File Share Public Folders and OneDrive
- Configure OneDrive usage including Files On Demand
- Troubleshoot Data Access and Usage
- File Sharing-Demo
- Printer Sharing-Demo
- Set Printer Security-Demo
- File system permissions-Demo
- Public Folder Sharing-Demo
- OneDrive-Demo
- Storage Sense-Demo
- Disk Quotas-Demo
Module 9 : Implement Apps
- Implement Apps
- Configure Startup Options
- Configure Windows Features
- Configure Windows Stores
- Implementing Windows Store Apps
- Implement Windows Store for Business and Education
- Provison Packages
- Create Packages
- Chpange Default Apps-Demo
- Application Startup Options-Demo
- Looking at Windows Features-Demo
- Windows Store-Demo
- Windows Imaging and Configuration Designer Tool ICD-Demo
Module 10 : Configure remote management
- Configuring Remote Management
- Configure Remote Management Settings
- Configure Remote Desktop
- Configure Remote Assistance
- Modifying Using MMC or PS
- Configure Remote PowerShell
- Remote Management Settings-Demo
- Allow through Windows Firewall-Demo
- Remote Desktop-Demo
- Remote Assistance-Demo
- Remote with MMC-Demo
- Windows PowerShell Remoting-Demo
Module 11 : Configure Updates
- Configure Update Windows 10
- Manage Update History
- Roll Back Updates
- Implement Insider Preview CB CBB and LTSB
- Update Windows Store Apps
- Windows Update Options-Demo
- Update History-Demo
- Rolling Back Updates-Demo
- Update Windows Store apps-Demo
Module 12 : Monitor Windows
- Monitor Windows
- Configure Event Subscriptions
- Monitor Performance Using Task Manager
- Monitor System
- Monitor and Manage Printers
- Monitor Performance Using Performance Monitor Data Collectors
- Monitor and Manage Printers
- Configure Indexing Options
- Manage Client Security by Using Windows Defender
- Evaluate System Stability by Using Reliaability Monitor
- Troubleshoot Performance Issues
- Manage Security Using Windows Defender Security Center
- Configure Windows Defender Advanced Threat Detection
- Event Viewer-Demo
- Creating Event Subscriptions-Demo
- Task Manager-Demo
- Performance Monitor-Demo
- Resource Monitor-Demo
- Managing the Printers with Print Management-Demo
- Indexing-Demo
- Windows Defender-Demo
- Reliability Monitor-Demo
Module 13 : Configure System and Data Recovery
- Configure System and Data Recovery
- Configure System Restore
- Configure Restore Points
- Peform a Refresh or Recycle
- Restore Previous Versions of Files and Folders
- Configure File History
- Recover Files from OneDrive
- Use Windows Backup and Restore
- Perform a Backup and Restore with WBAdmin
- Perform Recovery Operations Windows Recovery
- Configure a Recovery Drive-Demo
- Configure System Restore-Demo
- Configure Restore Points-Demo
- Performing a Refresh or Recycle-Demo
- Configure File History-Demo
- Use Windows Backup & Restore-Demo
Module 14 : Configure Authorization and Authentication
- Configure Authorization and Authentication
- Configure Pictures Passwords and Biometrics
- Configure Workgroups
- Configure Domain Settings
- Configue Homegroup Settings
- Configure Credential Manager
- Configure Local Accounts
- Configure Microsoft Accounts
- Configure Device Registration
- Configure Windows Hello for Business
- Configure Device Guard
- Credential Guard
- Configure Device Health Attestation
- Configure UAC Behavior
- Configure Dynamic Look
- Picture Passwords-Demo
- Workgroups-Demo
- Domains-Demo
- Credential Manager-Demo
- Configure Local Accounts-Demo
- Dynamic Lock-Demo
Module 15 : Configure Advanced Management Tools
- Configure Advanced Management Tools
- Configure Device Manager
- Configure and use the MMC
- Configure Task Schedule
- Configure Automation of Mgmt Task Using Windows PowerShell
- Convert Group Policy Objects to MDM Policies using the MDM
- Services-Demo
- Using the MMC-Demo
- Task Scheduler-Demo
- Opening PowerShell and the Integrated Scripting Environment-Demo
Module 1: Introducing Windows 10
- Course Introduction
- What Makes Windows 10 Different
- Overview Of Windows 10 Features
- Navigating And Using Windows 10-Part 1
- Navigating And Using Windows 10-Part 2
Module 2: Installing Windows 10
- Preparing For Installation
- Installation Options
- Upgrading And Migrating-Part 1
- Upgrading And Migrating-Part 2
Module 3: Configuring Devices
- Overview Of Configuration Tools
- Common Configuration Options
- Managing User Accounts-Part 1
- Managing User Accounts-Part 2
- Using Control Panel
- Using Windows Administration Tools-Part 1
- Using Windows Administration Tools-Part 2
- Using Windows PowerShell-Part 1
- Using Windows PowerShell-Part 2
Module 4: Configuring Network Connectivity
- TCP IP Network Connectivity-Part 1
- TCP IP Network Connectivity-Part 2
- TCP IP Network Connectivity-Part 3
- Name Resolution
- Wireless
- Remote Access Overview-Part 1
- Remote Access Overview-Part 2
- Troubleshooting Connectivity
Module 5: Managing Storage, Data, And Printers
- Managing Hard Disks-Part 1
- Managing Hard Disks-Part 2
- Managing Hard Disks-Part 3
- Creating And Managing Storage Spaces
- Overview Of Data Access
- Configuring And Managing File Access
- Managing Shared Folder
- Understanding Work Folder
- Managing Printers
Module 6: Managing Apps
- Installing And Configuring Applications
- Managing Apps From The Windows Store
- Managing Microsoft Edge Web Browser
Module 7: Managing Device Security
- Configuring Network Security-Part 1
- Configuring Network Security-Part 2
- Configuring Local Security
- Configuring Data Security-Part 1
- Configuring Data Security-Part 2
- Configuring Device Security
Module 8: Maintaining Windows 10
- Updating Windows 10
- Monitoring And Optimizing Windows 10-Part 1
- Monitoring And Optimizing Windows 10-Part 2
Module 9: Troubleshooting And Recovery
- Managing Devices And Drives
- Recovery Files
- Recovering Devices
Module 10: Deploying Windows 10 Enterprise Desktops
- Overview Of Image Based Deployment
- Automating Installations
- Windows Activation
Module 11: Managing User Profiles And User State Virtualization
- Managing User Profiles-Part 1
- Managing User Profiles-Part 2
- User State Virtualization
- User Profile Migration
Module 12: Managing Desktop And Application Settings Using Group policy
- Using Group Policy To Manage Windows 10 Devices Part 1
- Using Group Policy To Manage Windows 10 Devices-Part 2
- Using Group Policy To Manage Windows 10 Devices-Part 3
- Using Group Policy To Manage Windows 10 Devices-Part 4
- Using Group Policy To Manage Applications-Part 1
- Using Group Policy To Manage Applications-Part 2
Module 13: Configuring And Managing Client Hyper-V
- Introduction To Client Hyper-V
- Creating Virtual Machines
- Managing Virtual Machine Storage And Snapshot
- Conclusion
Module 14: Configuring Windows Devices – December, 2017 Update – Part1
- 1. Intro to Windows 10 Update 70-697-1D
- 2. Mod 1 Win 10 Update
- 3. Mod 1 Installing Windows 10
- 4. Mod 1 Examining Windows 10 Act
- 5. Mod 3 Configuring Devices
- 6. Mod 3 Examining GPOs Act
- 7. Mod 3.3 Display Options
- 8. Mod 3 Examining One Drive Act
- 9. Mod 4 Configuring Network Connectivity
- 10. Mod 4 Powershell Networking Commands Act
- 11. Mod 4.1 Network Mgmt Tools
- 12. Mod 4.1 Command Prompt Networkiing Tools Act
- 13. Mod 4.1 Network Mgmt Tools Part2
- 14. Mod 4.2 DNS
- 15. Mod 4.2 Name Resolution Act
- 16. Mod 4.3 Direct Access
- 17. Mod 5 Managing Storage
- 18. Mod 5 Server Based Storage
- 19. Mod 5 Storage Act
- 20. Mod 5.5 Diskpart
- 21. Mod 5.6 Powershell Disk Mgmt
- 22. Mod 5.7 Storage Mgmt
- 23. Mod 5 Storage Mgmt Act
- 24. Mod 6 Managing Files and Printers
- 25. Mod 6 CMD and PS Files System Commands Act
- 26. Mod 6.2 Permissions Inheritance
- 27. Mod 6.2 NTFS and Sharing Permissions Act
- 28. Mod 6.3 Type 4 Printer Drivers
- 29. Mod 6 Printing Mgmt Act
- 30. Mod 7 Managing Apps
- 31. Mod 7 Internet Explorer 11 Act
- 32. Mod 8 Managing Device Security
- 33. Mod 8.1 Security Compliance Toolkit
- 34. Mod 9 Maintaining Windows 10
- 35. Mod 9 Windows Update Settings Act
- 36. Mod 10 Startup and Recovery
- 37. Mod 10 Startup and Recovery settings Act
- 38. Mod 11 Additional Skills
- Windows Intro Update 70-697-2C
Module 15: Configuring Windows Devices – December, 2017 Update – Part2
- 1. Mod 1 Developing Mgmt Win 10
- 2. Mod 1 Windows Defender Act
- 3. Mod 1.1 Developing Part2
- 4. Mod 1 Applocker Act2
- 5. Mod1.2 Managing a Mobile Workforce
- 6. Mod 1 Remote Access Act2
- 7. Mod 1.2 Managing a Mobile Workforce Part2
- 8. Mod 1.3 Overview
- 9. Mod 1 Microsoft Azure Act2
- 10. Mod 2 Managing Win 10 Sign-in
- 11. Mod 2 Microsoft Account Act2
- 12. Mod 2.2 Overview of Azure AD
- 13. Mod 2 Microsoft Azure AD Act2
- 14. Mod 3 Managing User Profiles and User
- 15. Mod 4 Managing Desktop and Apps
- 16. Mod 5 Managing Devices in MS365
- 17. Mod 5 Office 365 Act2
- 18. Mod 6 Managing PCs Devices using Intune
- 19. Mod 6 Intune Act2
- 20. Mod 6.3 Intune App Mgmt
- 21. Mod 6.4 Working with WIP
- 22. Mod 7 Configuring and Using MS Store
- 23. Mod 7 Microsoft Store for Business Act2
- 24. Mod 7.2 Deploy Win 10 Auto-pilot
- 25. Mod 8 Managing Data Access Windows
- 26. Mod 8.4 Publishing and Using RemoteApp
- 27. Mod 9 Configuring and Managing Client Hyper-V
- 28. Mod 10 Additional Skills
- 29. Outro to Windows 10 Update 70-697
Module 1: Introduction
- Intro To Exam 70-688
- Implementing A Methodology For Troubleshooting-Part1
- Implementing A Methodology For Troubleshooting-Part2
- Implementing A Methodology For Troubleshooting-Demo
Module 2: Troubleshooting Start Up Issues
- Troubleshooting Start Up Issues-Part1
- Troubleshooting Start Up Issues-Part2
- Troubleshooting Start Up Issues-Part3
- Troubleshooting Start Up Issues-Part4
- Troubleshooting Start Up Issues-Demo
Module 3: ​Managing Drivers And Hardware
- Managing Drivers And Hardware-Part1
- Managing Drivers And Hardware-Part2
- Managing Drivers And Hardware-Part3
- Managing Drivers And Hardware-Demo
Module 4: Troubleshooting Remote Computers
- Troubleshooting Remote Computers-Part1
- Troubleshooting Remote Computers-Part2
- Troubleshooting Remote Computers-Part3
Module 5: Resolving Problems With Network Connectivity
- Resolving Problems With Network Connectivity-Part1
- Resolving Problems With Network Connectivity-Part2
- Resolving Problems With Network Connectivity-Part3
- Resolving Problems With Network Connectivity-Part4
- Resolving Problems With Network Connectivity-Part5
Module 6: Troubleshooting Group Policy
- Troubleshooting Group Policy-Part1
- Troubleshooting Group Policy-Part2
- Troubleshooting Group Policy-Part3
- Troubleshooting Group Policy-Part4
Module 7: Troubleshooting User Settings
- Troubleshooting User Settings-Part1
- Troubleshooting User Settings-Part2
- Troubleshooting User Settings-Part3
Module 8: Configuring And Troubleshooting Remote Connectivity
- Configuring And Troubleshooting Remote Connectivity-Part1
- Configuring And Troubleshooting Remote Connectivity-Part2
- Configuring And Troubleshooting Remote Connectivity-Part3
- Configuring And Troubleshooting Remote Connectivity Demo-Part1
- Configuring And Troubleshooting Remote Connectivity Demo-Part2
- Configuring And Troubleshooting Remote Connectivity Demo-Part3
Module 9: ​Troubleshooting Resource Access In A Domain
- Troubleshooting Resource Access In A Domain-Part1
- Troubleshooting Resource Access In A Domain-Part2
- Troubleshooting Resource Access In A Domain-Part3
- Troubleshooting Resource Access In A Domain-Demo
Module 10: Configuring And Troubleshooting Resource Access For Non-Domain Members
- Configuring And Troubleshooting Resource Access For Non-Domain Members-Part1
- Configuring And Troubleshooting Resource Access For Non-Domain Members-Part2
- Configuring And Troubleshooting Resource Access For Non-Domain Members-Part3
- Configuring And Troubleshooting Resource Access For Non-Domain Members-Demo
Module 11: Troubleshooting Applications
- Troubleshooting Applications-Part1
- Troubleshooting Applications-Part2
- Troubleshooting Applications-Part3
- Troubleshooting Applications-Part4
- Troubleshooting Applications-Demo
Module 12: Maintaining Windows 8.1
- Maintaining Windows 8.1-Part1
- Maintaining Windows 8.1-Part2
- Maintaining Windows 8.1-Part3
- Maintaining Windows 8.1-Part4
- Maintaining Windows 8.1-Demo
Module 13: Recovering Windows 8.1
- Recovering Windows 8.1
- Conclusion
Lesson 1: Getting to Know PCs and the Windows 8 User Interface
- Introduction
- Identify Components of a Personal Computer
- Sign in to Windows 8
- Navigate the Desktop
Lesson 2: Using the Modern Apps and Navigation Features
- Using the Modern Apps and Navigation Features
Lesson 3: Working with Desktop Applications
- Navigate the Desktop
Lesson 4: Using Internet Explorer 10
- Navigate Internet Explorer 10
Lesson 5: Customizing the Windows 8 Environment
- Multitasking With Apps
- Use the Control Panel and Task Manager-Part1
- Use the Control Panel and Task Manager-Part2
Lesson 6: Using Windows 8 Security Features
- Customizing the Windows 8 Environment
- Security Features
- Using Other Windows 8 Features-Part1
- Using Other Windows 8 Features-Part2
- Using Other Windows 8 Features-Part3
Module 1: Developing a Strategy for Windows® 7 Business Desktops Deployment
- Introduction
- Developing A Strategy-Part1
- Developing A Strategy-Part2
- Developing A Strategy-Part3
- Developing A Strategy-Part4
- Developing A Strategy Demo-Part1
- Developing A Strategy Demo-Part2
Module 2: Evaluating Application Compatibility in Windows® 7
- Evaluating Application Compatibility-Part1
- Evaluating Application Compatibility-Part2
- Evaluating Application Compatibility-Demo
Module 3: Assessing Deployment Methods for Windows® 7
- Assessing Deployment Methods-Part1
- Assessing Deployment Methods-Part2
- Assessing Deployment Methods-Demo
Module 4: Designing Standard Images for Windows® 7
- Designing Standard Images-Part1
- Designing Standard Images-Part2
- Designing Standard Images-Part3
- Designing Standard Images-Demo
Module 5: Deploying Windows® 7 with Windows AIK
- Deploying Windows With Windows AIK
- Deploying Windows With Windows AIK-Demo
Module 6: Using Windows Deployment Services to Deploy Windows® 7
- Using Windows Deployment Services-Part1
- Using Windows Deployment Services-Part2
- Using Windows Deployment Services-Demo
Module 7: Deploying Windows® 7 Using Lite Touch Installation
- Deploying Windows 7 Using Lite Touch Installation
- Deploying Windows 7 Using Lite Touch Installation-Demo
Module 8: Deploying Windows® 7 Using Zero Touch Installation
- Deploying Windows 7 Using Zero Touch Installation
- Deploying Windows 7 Using Zero Touch Installation-Demo
Module 9: Migrating User State Using USMT 4.0 and WET
- Migrating User State Using USMT 4.0 And WET-Part1
- Migrating User State Using USMT 4.0 And WET-Part2
Module 10: Planning, Configuring, and Managing the Client Environment
- Planning Configuring And Managing The Client Environment-Part1
- Planning Configuring And Managing The Client Environment-Part2
- Planning Configuring And Managing The Client Environment-Part3
- Planning Configuring And Managing The Client Environment-Part4
- Planning Configuring And Managing The Client Environment-Demo
Module 11: Planning and Deploying Applications and Updates to Windows® 7 Clients
- Planning And Deploying Applications And Updates To Windows 7 Clients-Part1
- Planning And Deploying Applications And Updates To Windows 7 Clients-Part2
- Planning And Deploying Applications And Updates To Windows 7 Clients-Part3
- Planning And Deploying Applications And Updates To Windows 7 Clients-Demo
Module 1: Installing, Upgrading, and Migrating to Windows 7
- Introduction To Exam 685 Windows 7 Enterprise Desktop Support Technician
- Introduction To Installing Upgrading And Migrating To Windows 7
- Windows 7 Pre-Installation Requirements
- Installing Windows 7-Part1
- Installing Windows 7-Part2
- Installing Windows 7-Part3
- Overview Of Image Based Installations-Part1
- Overview Of Image Based Installations-Part2
- Overview Of Image Based Installations-Part3
- Configuring Application Compatibility
- Chapter 1 Summary
Module 2: Configuring Disks And Device Drivers
- Introduction To Configuring Disks And Device Drivers
- Managing And Maintaining Disks-Part1
- Managing And Maintaining Disks-Part2
- Managing And Maintaining Disks-Part3
- Installing And Configuring Device Drivers
- Chapter 2 Summary
Module 3: Configuring File Access And Printers
- Introduction To Configuring File Access And Printers
- Overview Of Authentication And Authorization
- Managing File Access-Part1
- Managing File Access-Part2
- Managing Shared Folders-Part1
- Managing Shared Folders-Part2
- Configuring File Compression
- Managing Printing
- Chapter 3 Summary
Module 4: Indentifying And Resolving Log on Problems
- Introduction To Identifying And Resolving Logon Problems
- Understanding Authentication
- Managing Computer Accounts
- Additional Network Services-Part1
- Additional Network Services-Part2
- Troubleshooting User Properties
- Resolving Logon Issues
- Chapter 4 Summary
Module 5: Configuring Network Connectivity
- Introduction To Configuring Network Connectivity
- Configuring TCPIP Connectivity-Part1
- Configuring TCPIP Connectivity-Part2
- Configuring TCPIP Connectivity-Part3
- Automatic IP Address Allocation
- Name Resolution
- Wireless Networking-Part1
- Wireless Networking-Part2
- Wireless Networking-Part3
- Chapter 5 Summary
Module 6: Troubleshooting Network Issues
- Introduction To Troubleshooting Network Issues
- Troubleshooting Network Connectivity-Part1
- Troubleshooting Network Connectivity-Part2
- Troubleshooting Network Connectivity-Part3
- Troubleshooting Name Resolution-Part1
- Troubleshooting Name Resolution-Part2
- Troubleshooting Name Resolution-Part3
- Troubleshooting Network Printing-Part1
- Troubleshooting Network Printing-Part2
- Troubleshooting Network Printing-Part3
- Chapter 6 Summary
Module 7: Mobile Computing And Remote Access
- Introduction To Mobile Computing And Remote Access
- Configuring Mobile Computer And Device Settings
- Using Remote Control Tools
- Configuring And Troubleshooting Remote Access-Part1
- Configuring And Troubleshooting Remote Access-Part2
- Configuring And Troubleshooting Remote Access-Part3
- Configuring And Troubleshooting Remote Access-Part4
- Configuring Branch Cache Managing Computer Accounts
- Chapter 7 Summary
Module 8: Securing Windows 7 Desktops
- Introduction To Securing Windows 7 Desktops
- Overview Of Security Management-Part1
- Overview Of Security Management-Part2
- Overview Of Security Management-Part3
- User Account Control
- Application Restrictions-Part1
- Application Restrictions-Part2
- Configuring The Windows Firewall-Part1
- Configuring The Windows Firewall-Part2
- Configuring The Windows Firewall-Part3
- Configuring The Windows Firewall-Part4
- Securing And Troubleshooting Internet Explorer-Part1
- Securing And Troubleshooting Internet Explorer-Part2
- Securing And Troubleshooting Internet Explorer-Part3
- Chapter 8 Summary
Module 9: Optimizing And Troubleshooting Performance And Reliabilty
- Introduction To Optimizing And Troubleshooting Performance And Reliability
- Overview Of Performance And Reliability Tools-Part1
- Overview Of Performance And Reliability Tools-Part2
- Optimizing Performance-Part1
- Optimizing Performance-Part2
- Dealing With Hardware Failure
- Chapter 9 Summary
Module 10: Maintaining Windows 7 Desktops
- Introduction To Maintaining Windows 7 Desktops
- Troubleshooting Utilities-Part1
- Troubleshooting Utilities-Part2
- Troubleshooting Utilities-Part3
- Troubleshooting Utilities-Part4
- Backing Up And Restoring Data
- Using System Restore
- Configuring Windows Update
- Chapter 10 Summary
- Conclusion
Module 1: Installing, Upgrading and Migrating Windows 7
- Course And Instructor Introduction
- Introducing Windows 7-Part1
- Introducing Windows 7-Part2
- Pre Installation Requirements-Part1
- Pre Installation Requirements-Part2
- Installing Windows 7-Part1
- Installing Windows 7-Part2
- Upgrading Windows 7
- Migrating Windows 7
Module 2: Deploying Windows 7 in the Enterprise
- Overview Of Image Based Installations-Part1
- Overview Of Image Based Installations-Part2
- Overview Of Image Based Installations Demo
- Capturing System Images-Part1
- Capturing System Images-Part2
- Capturing System Images-Part3
- Preparing Images For Deployment-Part1
- Preparing Images For Deployment-Part2
- Working With User State
- Working With Virtual Drives
- Activating Windows 7
Module 3: Enterprise Management in Windows 7
- Automating Management Using Group Policy-Part1
- Automating Management Using Group Policy-Part2
- Automating Management Using Group Policy-Part3
- Using Windows Powershell 2.0-Part1
- Using Windows Powershell 2.0-Part2
- Using Windows Powershell 2.0-Part3
Module 4: Configuring Hardware and Applications
- Working With Device Drivers-Part1
- Working With Device Drivers-Part2
- Working With Hard Disks-Part1
- Working With Hard Disks-Part2
- Configuring Application Compatibility
- Configuring Internet Explorer-Part1
- Configuring Internet Explorer-Part2
- Configuring Application Restrictions
Module 5: Configuring Network Connectivity
- Configuring TCPIP-Part1
- Configuring TCPIP-Part2
- Configuring TCPIP-Part3
- IP Address Assignment-Part1
- IP Address Assignment-Part2
- Name Resolution Services-Part1
- Name Resolution Services-Part2
- Wireless Networking-Part1
- Wireless Networking-Part2
- Remote Management
- Troubleshooting Connectivity Issues
Module 6: Configuring Access to Resources
- Authentication And Authorization-Part1
- Authentication And Authorization-Part2
- Managing Access To Files Using NTFS
- Managing Sharing
- Managing Shared Printers
- Configuring Branch Cache
Module 7: Configuring Mobile Computing
- Configuring Mobile Computer And Device Settings-Part1
- Configuring Mobile Computer And Device Settings-Part2
- Configuring Remote Access-Part1
- Configuring Remote Access-Part2
Module 8: Configuring Security Options
- User Account Control
- Encrypting File Systems
- Bit Locker Drive Encryption-Part1
- Bit Locker Drive Encryption-Part2
- Network Access Protection
- Windows Firewall With Advanced Security
- Configuring Anti-Malware
- Auditing Network Access
Module 9: Monitoring And Maintaining Systems
- Configuring Windows Updates
- Event Monitoring
- Performance Monitoring
Module 10: Configuring Backup and Recovery Options
- Troubleshooting Startup Issues
- Using Windows Backup
- Using System Restore
- Course Conclusion
Module 1: Planning Server Deployment
- Introduction
- Overview Of Windows Server 2008 Deployment-Part1
- Overview Of Windows Server 2008 Deployment-Part2
- Overview Of Windows Server 2008 Deployment-Part3
- Overview Of Windows Server 2008 Deployment-Part4
- Identifying Windows Server 2008 Compatibility Issues
- Developing A Deployment Plan-Part1
- Developing A Deployment Plan-Part2
- Planning The Server Decommissioning
- Commissioning Windows 2008 Server
- Planning Server Deployment Summary
Module 2: Automating Server Deployment
- Understanding Deployment Options-Part1
- Understanding Deployment Options-Part2
- Windows Automated Installation Kit-Part1
- Windows Automated Installation Kit-Part2
- Windows Automated Installation Kit-Part3
- Working With Images
- Using Windows Deployment Services-Part1
- Using Windows Deployment Services-Part2
- Using Windows Deployment Services-Part3
- Using Windows Deployment Services-Part4
- Automating Server Activation
- Automating Server Deployment Summary
Module 3: Planning for Server Management
- Introduction To Server Management
- Remote Server Management-Part1
- Remote Server Management-Part2
- Remote Server Management-Part3
- Decentralizing Server Management-Part1
- Decentralizing Server Management-Part2
- Planning For Server Management Summary
Module 4: Planning the Network Infrastructure
- Planning An IPv4 Addressing Scheme-Part1
- Planning An IPv4 Addressing Scheme-Part2
- Planning An IPv4 Addressing Scheme-Part3
- Planning An IPv6 Transition
- Planning The DHCP Infrastructure-Part1
- Planning The DHCP Infrastructure-Part2
- Planning DHCP Configuration
- Planning The Network Infrastructure Summary
Module 5: Planning Name Resolution Services
- Gathering Information For The Name Resolution Design-Part1
- Gathering Information For The Name Resolution Design-Part2
- Designing A DNS Server Strategy-Part1
- Designing A DNS Server Strategy-Part2
- Designing DNS Zone Implementations-Part1
- Designing DNS Zone Implementations-Part2
- Optimizing DNS Servers
- Designing DNS For High Availability And Security
- Designing A WINS Name Resolution Strategy
- Planning Name Resolution Services Summary
Module 6: Planning File and Print Services
- Planning File Services-Part1
- Planning File Services-Part2
- Planning File Services-Part3
- Planning File Services-Part4
- Planning File Services-Part5
- Planning For Storage Management
- Planning Print Services-Part1
- Planning Print Services-Part2
- Planning Print Services-Part3
- Planning File And Print Services Summary
Module 7: Planning Active Directory Domain Services
- Planning ADDS Forests
- Planning ADDS Domains
- Planning ADDS Physical Structure-Part1
- Planning ADDS Physical Structure-Part2
- Planning Administrative Structures
- Planning ADDS Maintenance Strategies
- Planning Group Policy Implementations-Part1
- Planning Group Policy Implementations-Part2
- Planning Group Policy Implementations-Part3
- Planning Group Policy Implementations-Part4
- Planning ADDS Summary
Module 8: Planning Active Directory Certificate Services
- Overview Of PublicKey Infrastructure And ADCS-Part1
- Overview Of PublicKey Infrastructure And ADCS-Part2
- Designing Certificate Authority Hierarchy
- Design Certificate Template
- Designing Certificate Distribution And Revocation
- Planning AD Certificate Servers
Module 9: Planning High Availability
- Overview Of High Availability
- Planning Network Load Balancing
- Planning Failover Clustering-Part1
- Planning Failover Clustering-Part2
- Planning High Availability Summary
Module 10: Planning Backups For Windows Server
- Planning Backups For Windows Server-Part1
- Planning Backups For Windows Server-Part2
- Planning A Backup Policy
- Planning Restore Policies For Windows Server 2008
- Planning Business Continuity Summary
Module 11: Planning Server Monitoring and Maintenance
- Planning Server Monitoring-Part1
- Planning Server Monitoring-Part2
- Planning Server Maintenance
- Planning Server Monitoring And Maintenance Summary
- Conclusion
Module 1: Installing and Configuring Windows Services
- Introduction
- Installing Windows Servers-Part1
- Installing Windows Servers-Part2
- Installing Windows Servers-Part3
- Managing Server Roles And Features-Part1
- Managing Server Roles And Features-Part2
- Windows Server 2008 Server Care Installations-Part1
- Windows Server 2008 Server Care Installations-Part2
- Installing And Configuring Windows Services Summary
Module 2: TCP/IP Protocol Suite
- Overview Of TCP IP-Part1
- Overview Of TCP IP-Part2
- TCP IP Addressing-Part1
- TCP IP Addressing-Part2
- Communication Types
- Name Resolution-Part1
- Name Resolution-Part2
- Name Resolution-Part3
- Name Resolution-Part4
- Dynamic IP Addressing
- TCP IP Tools
- TCP IP Protocol Suite Summary
Module 3: Configuring IPv4 Addressing
- Overview Of IPv4 Communication-Part1
- Overview Of IPv4 Communication-Part2
- Subnetting IPv4 Networks-Part1
- Subnetting IPv4 Networks-Part2
- Subnetting IPv4 Networks-Part3
- Configuring IPv4 Addressing Summary
Module 4: Configuring IP Address Assignment Services
- Overview Of DHC-Part1
- Overview Of DHC-Part2
- Configuring DHCP Scopes And Options-Part1
- Configuring DHCP Scopes And Options-Part2
- Configuring DHCP Scopes And Options-Part3
- Managing The DHCP Database
- Monitoring And Troubleshooting DHCP-Part1
- Monitoring And Troubleshooting DHCP-Part2
- Configuring IP Address Assignment Services Summary
Module 5: Configuring IPv6 Addressing
- Introduction To IPv6-Part1
- Introduction To IPv6-Part2
- Unicast IPv6 Addresses
- Configuring IPv6-Part1
- Configuring IPv6-Part2
- Configuring IPv6 Addressing Summary
Module 6: Configuring Name Resolution Services
- Overview Of DNS-Part1
- Overview Of DNS-Part2
- Configuring The DNS Server Role-Part1
- Configuring The DNS Server Role-Part2
- Configuring The DNS Server Role-Part3
- Configuring The DNS Server Role-Part4
- Configuring The DNS Server Role-Part5
- Manage And Troubleshooting DNS
- Migrating From WIN To DNS
- Configuring Name Resolution Services Summary
Module 1: Active Directory – An Identity And Access Solution
- Introduction
- Understanding The Purpose Of Identity And Access Control
- Active Directory Server Roles For IDA Management-Part 1
- Active Directory Server Roles For IDA Management-Part 2
- Active Directory Server Roles That Support IDA Solutions
- Active Directory Summary
Module 2: Introduction To Active Directory Domain Services
- Overview Of Active Directory Identity And Access-Part 1
- Overview Of Active Directory Identity And Access-Part 2
- Overview Of Active Directory Identity And Access-Part 3
- Active Directory Components And Concepts-Part 1
- Active Directory Components And Concepts-Part 2
- Active Directory Components And Concepts-Part 3
- Active Directory Components And Concepts-Part 4
- Active Directory Components And Concepts-Part 5
- Implementing Active Directory-Part 1
- Implementing Active Directory-Part 2
- Implementing Active Directory-Part 3
- Implementing Active Directory-Part 4
- Implementing Active Directory-Part 5
- Implementing Active Directory-Part 6
- Implementing Active Directory-Part 7
- Implementing Active Directory-Part 8
- Overview Of Active Directory-Part1
- Overview Of Active Directory-Part2
- Overview Of Active Directory-Part3
- Summary
Module 3: Configuring DNS To Support Active Directory Domain Services
- Overview Of Active Directory And DNS Integration-Part 1
- Overview Of Active Directory And DNS Integration-Part 2
- Configure Active Directory Integrated Zones-Part 1
- Configure Active Directory Integrated Zones-Part 2
- Configure Dynamic Updates
- Configure Read-Only Zones
Module 4: Active Directory Object Management
- Overview Of Active Directory Objects
- Configuring User And Computer Accounts-Part 1
- Configuring User And Computer Accounts-Part 2
- Configuring User And Computer Accounts-Part 3
- Configuring Groups-Part1
- Configuring Groups-Part2
- Configuring Groups-Part3
- Configuring Groups-Part4
- Configuring Groups-Part5
- Automating Object Management-Part1
- Automating Object Management-Part2
- Automating Object Management-Part3
- Automating Object Management-Part4
- Automating Object Management-Part5
- Delegation Of Administrative Control-Part1
- Delegation Of Administrative Control-Part2
- Summary
Module 5: Managing Active Directory Replication Using Sites
- Configuring Sites And Subnets-Part 1
- Configuring Sites And Subnets-Part 2
- Configuring Replication-Part 1
- Configuring Replication-Part 2
- Configuring Replication-Part 3
- Configuring Replication-Part 4
- Summary
Module 6: Configuration Management Using Group Policy
- Understanding Group Policy-Part 1
- Understanding Group Policy-Part 2
- Understanding Group Policy-Part 3
- Understanding Group Policy-Part 4
- Understanding Group Policy-Part 5
- Understanding Group Policy-Part 6
- Working With GPOs-Part 1
- Working With GPOs-Part 2
- Working With GPOs-Part 3
- Working With GPOs-Part 4
- Troubleshooting Application Of GPO
- Delegating Administrative Control Of Group Policy
- Summary
Module 7: Desktop Environmental And Security Management
- Configure Scripts And Folder Redirection-Part 1
- Configure Scripts And Folder Redirection-Part 2
- Deploying Software-Part 1
- Deploying Software-Part 2
- Deploying Software-Part 3
- Delegating Computer Support
- Managing Security Settings-Part 1
- Managing Security Settings-Part 2
- Managing Security Settings-Part 3
- Managing Security Settings-Part 4
- Managing Security Settings-Part 5
- Utilizing Auditing-Part 1
- Utilizing Auditing-Part 2
- Summary
Module 8: Maintaining Active Directory
- Monitoring Active Directory-Part 1
- Monitoring Active Directory-Part 2
- Monitoring Active Directory-Part 3
- Monitoring Active Directory-Part 4
- Managing The Active Directory Database
- Disaster Recovery For Active Directory-Part 1
- Disaster Recovery For Active Directory-Part 2
- Disaster Recovery For Active Directory-Part 3
- Disaster Recovery For Active Directory-Part 4
- Maintaining Active Directory Domain Services Summary
Module 9: Deploy and Manage a Public Key Infrastructure
- Overview Of Public Key Infrastructure And ADCS-Part 1
- Overview Of Public Key Infrastructure And ADCS-Part 2
- Overview Of Public Key Infrastructure And ADCS-Part 3
- Deploying A Certificate Authority Hierarchy
- Installing ADCS-Part 1
- Installing ADCS-Part 2
- Installing ADCS-Part 3
- Installing ADCS-Part 4
- Deploying And Managing Certificates-Part 1
- Deploying And Managing Certificates-Part 2
- Deploying And Managing Certificates-Part 3
- Deploying And Managing Certificates-Part 4
- Managing Revocation And Distribution-Part 1
- Managing Revocation And Distribution-Part 2
- Configuring Certificate Recovery-Part 1
- Configuring Certificate Recovery-Part 2
- Deploy And Manage A Public Key Infrastructure Summary
Module 10: Supporting Applications with AD LDS
- ADLDS Overview-Part 1
- ADLDS Overview-Part 2
- Configuring ADLDS Instances
- Configuring Replication
- Understanding Integration With ADLDS
- Supporting Applications With ADLDS Summary
Module 11: Deploying Active Directory Federated Services
- ADFS Overview
- ADFS Deployment Scenarios
- Deploying ADFS-Part 1
- Deploying ADFS-Part 2
- Deploying ADFS-Part 3
- Deploying Active Directory Federated Services Summary
Module 12: Deploying Active Directory Rights Management Services
- ADRMS Overview
- Understanding ADRMS
- Managing ADRMS-Part 1
- Managing ADRMS-Part 2
- Managing ADRMS-Part 3
- Managing ADRMS-Part 4
- Deployment Active Directory Rights Management Services Summary
- Active Directory Conclusion
Module 1: Introduction To Creating Efficient Apps For Sharepoint
- Course And Instructor Introduction
- Apps For SharePoint Part1
- Apps For SharePoint Part2
- Communication From Apps To SharePoint Part1
- Communication From Apps To SharePoint Part2
- Authentication And Authorization Part1
- Authentication And Authorization Part2
- Designing Apps For Performance Part1
- Designing Apps For Performance Part2
- Designing Apps For Performance Part3
Module 2: Working With Managed Metadata Solutions
- Overview Of Managed Metadata Part1
- Overview Of Managed Metadata Part2
- Configuring Managed Metadata Term Sets Part1
- Configuring Managed Metadata Term Sets Part2
- Configuring Managed Metadata Term Sets Part3
- Configuring Managed Metadata Term Sets Part4
- Working With Managed Metadata Fields Part1
- Working With Managed Metadata Fields Part2
Module 3: Working With The Search Service
- Overview Of The SharePoint 2013 Search Service Part1
- Overview Of The SharePoint 2013 Search Service Part2
- Overview Of The SharePoint 2013 Search Service Part3
- Building Search Queries
- Using Code To Execute Search Queries Part1
- Using Code To Execute Search Queries Part2
- Customizing Query Processing Part1
- Customizing Query Processing Part2
- Customizing Search Results Part1
- Customizing Search Results Part2
- Customizing Content Processing Part1
- Customizing Content Processing Part2
Module 4: Implementing Enterprise Content Management
- Working With eDiscovery Part1
- Working With eDiscovery Part2
- Working With Content Management Part1
- Working With Content Management Part2
- Handling Automated Records Management Part1
- Handling Automated Records Management Part2
- Handling Automated Records Management Part3
Module 5: Developing Publishing Sites
- Introduction To Developing Publishing Solutions
- Developing Page Components For Web Content Publishing Part1
- Developing Page Components For Web Content Publishing Part2
- Developing Page Components For Web Content Publishing Part3
- Website Structure And Navigation Part1
- Website Structure And Navigation Part2
- Website Structure And Navigation Part3
- Publishing Content
- Publishing To Mobile Devices
- Optimizing For Search Engines Part1
- Optimizing For Search Engines Part2
- Optimizing Performance And Availability Part1
- Optimizing Performance And Availability Part2
Module 6: Interacting With Business Connectivity Services
- Overview Of Business Connectivity Services
- Creating BDC Models
- Creating An App Scoped External Content Type
- Conclusion
Module 1: Overview of SharePoint Development
- Course Introduction
- Introduction To SharePoint Development Part1
- Introduction To SharePoint Development Part2
- Introduction To SharePoint Development Part3
- Choosing A Development Approach Part1
- Choosing A Development Approach Part2
- SharePoint 2013 Deployment And Execution Models Part1
- SharePoint 2013 Deployment And Execution Models Part2
- SharePoint 2013 Deployment And Execution Models Part3
Module 2: Working With Objects, List, And Libraries
- Introduction To The SharePoint Object Hierarchy Part1
- Introduction To The SharePoint Object Hierarchy Part2
- Working With Sites And Webs Part1
- Working With Sites And Webs Part2
- Working With Sites And Webs Part3
- Working With Sites And Webs Part4
- Managing Execution Contexts Part1
- Managing Execution Contexts Part2
- Using Lists And Library Objects Part1
- Using Lists And Library Objects Part2
- Querying And Retrieving Data From Lists Part1
- Querying And Retrieving Data From Lists Part2
- Querying And Retrieving Data From Lists Part3
- Working With Large Lists Part1
- Working With Large Lists Part2
Module 3: Working With Features and Solutions
- Introduction To Features
- Introduction To Solutions
- Creating And Configuring Features And Solutions Part1
- Creating And Configuring Features And Solutions Part2
- Creating And Configuring Features And Solutions Part3
- Creating And Configuring Features And Solutions Part4
- Using Sandboxed Solutions
Module 4: Developing Server Side Code
- Web Parts
- Event Receivers Part1
- Event Receivers Part2
- Timer Jobs
- Storing Configuration Data Part1
- Storing Configuration Data Part2
Module 5: Managing Authentication And Authorization
- Introduction To Identity Management
- Managing Permissions
- Configuring Forms Based Authentication
- Working With Custom Authentication Part1
- Working With Custom Authentication Part2
- Working With Custom Authentication Part3
Module 6: Client Side SharePoint Development
- Using The CSOM For Managed Code Part1
- Using The CSOM For Managed Code Part2
- Using The CSOM For Managed Code Part3
- Using The CSOM For JavaScript
- Using The Rest API With JavaScript Part1
- Using The Rest API With JavaScript Part2
Module 7: Developing And Managing Apps
- Overview Of Apps For SharePoint Part1
- Overview Of Apps For SharePoint Part2
- Developing Apps For SharePoint
- Overview Of Remote Hosted Apps
- Configuring Remote Hosted Apps
- Developing Remote Hosted Apps Part1
- Developing Remote Hosted Apps Part2
- Publishing And Distributing Apps Part1
- Publishing And Distributing Apps Part2
- Publishing And Distributing Apps Part3
Module 8: Using Workflows To Automate Business Processes
- Overview Of Workflows In SharePoint 2013
- Building Workflows Part1
- Building Workflows Part2
- Developing Workflows Part1
- Developing Workflows Part2
Module 9: Customizing SharePoint Interfaces
- Working With Custom Actions
- Using Client-Side Interface Components
- Customizing The SharePoint List User Interface
- Course Conclusion
Module 1: Accessing Data
- Introduction To 70 – 487 Developing Microsoft Azure And Web Services
- Overview Of Service And Cloud Technologies
- Accessing Data Using ADO Dot NET Part1
- Accessing Data Using ADO Dot NET Part2
- Accessing Data From Web Service
- SQL Server Database In Azure
- Read And Write XML Data
- Implementing Azure Storage
- Managing Azure PowerShell
- WCF Data Services Part1
- WCF Data Services Part2
- WCF With Client
Module 2: Designing And Implementing WCF Services
- Create WCF Service And Client From Scratch Part1
- Create WCF Service And Client From Scratch Part2
- WCF Configuration Settings Part1
- WCF Configuration Settings Part2
- WCF And Azure SQL Database Part1
- WCF And Azure SQL Database Part2
- WCF And Azure SQL Database Part3
- WCF Services And Azure Review
Module 3: Querying And Manipulating Data Using Entity Framework
- Design And Implement An ERD
- Introduction To Entity Framework
- Introduction To LINQ
- LINQ To SQL
- LINQ To Entities
- Introduction To Lambda Expressions
- Introduction To Entity SQL
- Profiling Queries Created By Entity Framework
- Query Projections
- Query With Navigation Properties
- Bringing It All Together Part1
- Bringing It All Together Part2
- Using Entity Framework From Scratch
- Entity Framework Review
Module 4: Creating And Consuming Web API Based Services
- Introduction To Web API
- First Web API App
- Web API App Enhanced
- Web API App Extended
- Web API Using Standard Conventions
- Debugging Our Web API App
- Getting Data From Database In Web API App
- Web API Standards
- More On Web API Standards
- Simple Web API CRUD App
- Web API Example In Depth
- Summarizing Web API
Module 5: Deploying Web Applications And Services
- Introduction To Application Deployment Strategies Part1
- Introduction To Application Deployment Strategies Part2
- Introduction To Application Deployment Strategies Part3
- Introduction To Application Deployment Strategies Part4
- Deploying Web Applications ToIIs
- Deploying Web Applications To Azure
- Deployment Considerations
- Deployment Design
- Deployment Configurations
Module 6: Course Review
- Accessing Data
- Web Front End Options
- Course Conclusion
Module 1: Intro To Business Intelligence
- Introduction
- The Business Intelligence Solution
- Overview Of Business Intelligence
- BI And Power Pivot Demo
- ETL Intro
- Designing Data Warehouses
- Design For Speed
- BI Semantic Model
Module 2: Database Essentials
- Basic Database Objects Demo
- Stored Procedures And Triggers Demo
- Database Clusters Demo
- SQL Server Management
- Table Triggers
- DB Config Options
- DB Backup
- DB Files And Restore
Module 3: Business Intelligence Development
- Using SQL Server Data Tools Demo
- Building An IS Integration Services Package Demo
- Loading Data From Remote Sources Demo
Module 4: Business Intelligence Results
- Report Building Intro Setup Demo
- Using Report Builder Demo
- Processing Data From Web Service Demo
- Reporting From Multiple Tables Demo
- Report Function And Matrix Demo
- Interactive Reports Demo
- Sorting Report Data Demo
Module 5: Advanced Reporting And Development
- Drill Through Reports
- Data Visualization
- Creating Store Procedure From Scratch
- Memory Optimize Table
Module 6: SQL Server Integration Services (SSIS)
- Building Our First Integration Project
- Data Transformation
- Introduction To Big Data
- Transformation Using Store Procedure
- Transformation Using SSIS
- Building Fact Table Using Store Procedure
- Building Fact Table Using SSIS
Module 7: SQL Server 2014 New Features
- Backup Enhancements
- Index Enhancements
- Online DB Enhancements
- BackUp To The Cloud
- Partition Data
Module 8: Course Review And Exam Prep
- BI Review
- SharePoint Overview
- SharePoint Demo
- Exam Prep
- Before You Take The Exam
- Conclusion
Module 1: Introduction To Business Intelligence And Data Modeling
- Introduction To Business Intelligence and Data Modeling Part1
- Introduction To Business Intelligence and Data Modeling Part2
- The Microsoft Business Intelligence Platform Part 1
- The Microsoft Business Intelligence Platform Part 2
- The Microsoft Business Intelligence Platform Part 3
- The Microsoft Business Intelligence Platform Part 4
Module 2: Implementing Reports The SQL Server Reporting Services
- Implementing Reports the SQL Server Reporting Services Part 1
- Implementing Reports the SQL Server Reporting Services Part 2
- Implementing Reports the SQL Server Reporting Services Part 3
- Implementing Reports the SQL Server Reporting Services Part 4
- Implementing Reports the SQL Server Reporting Services Part 5
- Implementing Reports the SQL Server Reporting Services Part 6
- Implementing Reports the SQL Server Reporting Services Part 7
- Implementing Reports the SQL Server Reporting Services Part 8
Module 3: Supporting Self Service Reporting
- Supporting Self Service Reporting Part 1
- Supporting Self Service Reporting Part 2
Module 4: Managing Report Execution And Delivery
- Managing Report Execution And Delivery
- Managing Report Execution
- Subscriptions And Data Alerts
Module 5: Creating Multidimensional Databases
- Creating Multidimensional Databases
- Creating Data Sources And Data Source Views
- Creating And Browsing a Cube
Module 6: Working With Cubes And Dimensions
- Working with Cubes And Dimensions
- Sorting And Grouping Attributes
Module 7: Working With Measures And Measure Groups
- Working With Measures and Measure Groups
Module 8: Introduction To MDX
- Introduction To MDX
- Adding Calculations To A Cube
Module 9: Customizing Cube Functionality
- Customizing Cube Functionality Part 1
- Customizing Cube Functionality Part 2
- Customizing Cube Functionality Part 3
Module 10: Implementing A Tabular Data Model
- Implementing A Tabular Data Model Part 1
- Implementing A Tabular Data Model Part 2
Module 11: Introduction To DAX
- Introduction to DAX
- Demonstration Making A Tabular Model Part 1
- Demonstration Making A Tabular Model Part 2
- Using DAX
Module 12: Implementing An Analysis Services Tabular Data Model
- Implementing An Analysis Services Tabular Data Model Part 1
- Implementing An Analysis Services Tabular Data Model Part 2
- Deploying A Tabular Data Model
Module 13: SQL Analysis Services
- SQL Analysis Services Part 1
- SQL Analysis Services Part 2
Module 14: Creating Data Visualizations With Power View
- Creating Data Visualizations With Power View
Module 15: Supporting Self Service Reporting
- Supporting Self Service Reporting
Module 16: Performing Predictive Analysis With Data Mining
- Performing Predictive Analysis With Data Mining
- Using The Data Mining Wizard
Module 17: Predictive Analytics
- Predictive Analytics Part 1
- Predictive Analytics Part 2
Module 1: Designing A Database Server Infrastructure
- Introduction
- Designing A Database Server Infrastructure-Part1
- Designing A Database Server Infrastructure-Part2
- Designing A Database Server Infrastructure-Part3
- Designing A Database Server Infrastructure-Part4
- Considerations For Database Server Consolidation
- Managing Server Resources
Module 2: Designing A Logical Database Scheme
- Designing A Logical Database Scheme-Part1
- Designing A Logical Database Scheme-Part2
- Designing A Logical Database Scheme-Part3
- Designing A Logical Database Scheme-Part4
- Designing A Logical Database Scheme-Part5
Module 3: Designing A Physical Database Implementation
- Designing A Physical Database Implementation-Part1
- Designing A Physical Database Implementation-Part2
- Designing A Physical Database Implementation-Part3
Module 4: Incorporating Data Files Into the Database
- Incorporating Data Files Into The Database-Part1
- Incorporating Data Files Into The Database-Part2
- Incorporating Data Files Into The Database-Part3
- Incorporating Data Files Into The Database Demo
- Searching Data Files
- Searching Data Files Demo
Module 5: Tuning Database Performance
- Tuning Database Performance-Part1
- Tuning Database Performance-Part2
- Tuning Database Performance-Part3
- Working With Query Plans-Part1
- Working With Query Plans-Part2
- Working With Query Plans-Part3
- Working With Query Plans-Part4
Module 6: Designing Database Security
- Designing Database Security-Part1
- Designing Database Security-Part2
- Contained Databases
- Protecting Data With Encryption
Module 7: Policy Based Management
- Policy Based Management
- Policy Based Management Demo
Module 8: Monitoring Server Health
- Monitoring Server Health
- Monitoring Server Health Demo
Module 9: Designing Database Backup Solution
- Designing Database Backup Solution-Part1
- Designing Database Backup Solution-Part2
- Designing Database Backup Solution-Part3
- Designing Database Backup Solution-Part4
- Disaster Recovery Plan-Part1
- Disaster Recovery Plan-Part2
Module 10: Automating Multi Server Maintenance
- Automating Multi Server Maintenance
- Managing Multiple Servers
Module 11: Managing SQL Server With Windows Powershell
- Managing SQL Server WIth Windows Powershell
- Windows Powershell Lab
Module 12: Replicating Data
- Replicating Data-Part1
- Replicating Data-Part2
- Replicating Data-Part3
Module 13: Planning High Availability
- Planning High Availability-Part1
- Planning High Availability-Part2
Module 14: Review of SQL Statements
- Review Of SQL Statements-Part1
- Review Of SQL Statements-Part2
- Review Of SQL Statements-Part3
Module 15: Eleven Rules of Database Design
- Eleven Rules Of Database Design
- Conclusion
Module 1: SQL 2012 And The 464 Test
- Introduction
- Intro To SQL Server 2012-Part1
- Intro To SQL Server 2012-Part2
- Management Studio Demo-Part1
- Management Studio Demo-Part2
- Management Studio Demo-Part3
- Other SQL Server Tools
Module 2: Working With Data Types
- Working With Data Types-Part1
- Working With Data Types-Part2
- Working With Data Types-Part3
- Other Data Types
Module 3: Tables
- Tables
- Creating Tables
Module 4: Data Constraints
- Data Constraints-Part1
- Data Constraints-Part2
Module 5: Planning In Indexing
- Planning In Indexing-Part1
- Planning In Indexing-Part2
- Planning In Indexing-Part3
- Planning In Indexing-Part4
Module 6: Table Structures
- Table Structures
- Working With Clustered Indexes
- Clustered Indexes
- Designing Effective Clustered Indexes
Module 7: Improving Performance with Non-Clustered Indexes
- Improving Performance With Non-Clustered Indexes-Part1
- Improving Performance With Non-Clustered Indexes-Part2
- Improving Performance With Non-Clustered Indexes-Part3
Module 8: Using Indexes And Execution Plans
- Using Indexes
- Execution Plans-Part1
- Execution Plans Demo
- Execution Plans-Part2
Module 9: Working with Views
- Working With Views-Part1
- Working With Views-Part2
Module 10: Designing and Implementing Stored Procedures
- Designing And Implementing Stored Procedures-Part1
- Designing And Implementing Stored Procedures-Part2
- Designing And Implementing Stored Procedures-Part3
Module 11: Merging Data and Passing Tables
- Merging Data And Passing Tables-Part1
- Merging Data And Passing Tables-Part2
- Merging Data And Passing Tables-Part3
Module 12: Designing and Implementing User Functions
- Designing And Implementing User Functions
Module 13: Creating Highly Concurrent SQL Server Applications
- Creating Highly Concurrent SQL Server Applications-Part1
- Creating Highly Concurrent SQL Server Applications-Part2
- Creating Highly Concurrent SQL Server Applications-Part3
Module 14: Handling Errors in T-SQL
- Handling Error InT-SQL-Part1
- Handling Error InT-SQL-Part2
Module 15: Triggers
- Triggers
Module 16: Implementing Managed Code
- Implementing Managed Code-Part1
- Implementing Managed Code-Part2
- Implementing Managed Code-Part3
- Implementing Managed Code-Part4
Module 17: Storing XML in SQL
- Storing XML In SQL-Part1
- Storing XML In SQL-Part2
Module 18: Querying XML
- Querying XML-Part1
- Querying XML-Part2
Module 19: Working with the Spatial Data
- Working With Spatial Data-Part1
- Working With Spatial Data-Part2
- Working With Spatial Data-Part3
Module 20: Working With Full-Text Indexes and Queries
- Working With Full-Text Indexes And Queries-Part1
- Working With Full-Text Indexes And Queries-Part2
- Working With Full-Text Indexes And Queries-Part3
Lesson 1: Introduction to Data Warehouse
- Introduction
- Introduction To Data Warehouse-Part1
- Introduction To Data Warehouse-Part2
- Introduction To Data Warehouse-Part3
- Introduction To Data Warehouse-Part4
- Introduction To Data Warehouse-Part5
- Introduction To Data Warehouse-Part6
Lesson 2: Creating Dimensions and Changing Granularity of Dimensions
- Creating Dimensions And Changing Granularity Of Dimensions-Part1
- Creating Dimensions And Changing Granularity Of Dimensions-Part2
- Creating Dimensions And Changing Granularity Of Dimensions-Part3
- Creating Dimensions And Changing Granularity Of Dimensions-Part4
- Creating Dimensions And Changing Granularity Of Dimensions-Part5
- Creating Dimensions And Changing Granularity Of Dimensions-Part6
Lesson 3: Creating Fact Tables and ColumnStore Indexes
- Creating Fact Tables And Column Store Indexes-Part1
- Creating Fact Tables And Column Store Indexes-Part2
- Creating Fact Tables And Column Store Indexes-Part3
- Creating Fact Tables And Column Store Indexes-Part4
- Creating Fact Tables And Column Store Indexes-Part5
Lesson 4: Implementing Data Warehouse in SQL Server 2012
- Implementing Data Warehouse-Part1
- Implementing Data Warehouse-Part2
- Implementing Data Warehouse-Part3
- Implementing Data Warehouse-Part4
Lesson 5: Working with Integration Services
- Working With Integration Services-Part1
- Working With Integration Services-Part2
- Working With Integration Services-Part3
- Working With Integration Services-Part4
- Working With Integration Services-Part5
- Working With Integration Services-Part6
Lesson 6: Managing Control Flow
- Managing Control Flow-Part1
- Managing Control Flow-Part2
- Managing Control Flow-Part3
- Managing Control Flow-Part4
- Managing Control Flow-Part5
Lesson 7: Working with Dynamic Variables
- Working With Dynamic Variables-Part1
- Working With Dynamic Variables-Part2
- Working With Dynamic Variables-Part3
- Working With Dynamic Variables-Part4
- Working With Dynamic Variables-Part5
- Working With Dynamic Variables-Part6
- Working With Dynamic Variables-Part7
- Working With Dynamic Variables-Part8
Lesson 8: Implementing Data Flow
- Implementing DataFlow-Part1
- Implementing DataFlow-Part2
- Implementing DataFlow-Part3
- Implementing DataFlow-Part4
- Implementing DataFlow-Part5
- Implementing DataFlow-Part6
- Implementing DataFlow-Part7
- Implementing DataFlow-Part8
Lesson 9: Managing Data Flow
- Managing DataFlow-Part1
- Managing DataFlow-Part2
- Managing DataFlow-Part3
- Managing DataFlow-Part4
Lesson 10: Managing SSIS Package Execution
- Managing SSIS Package Execution-Part1
- Managing SSIS Package Execution-Part2
- Managing SSIS Package Execution-Part3
- Managing SSIS Package Execution-Part4
- Managing SSIS Package Execution-Part5
- Managing SSIS Package Execution-Part6
Lesson 11: Debugging and Troubleshooting
- Debugging And Troubleshooting-Part1
- Debugging And Troubleshooting-Part2
- Debugging And Troubleshooting-Part3
- Debugging And Troubleshooting-Part4
Lesson 12: Deploying Packages
- Deploying Packages-Part1
- Deploying Packages-Part2
- Deploying Packages-Part3
Lesson 13: Securing Packages and Databases
- Securing Packages And Databases-Part1
- Securing Packages And Databases-Part2
Lesson 14: Working with MDS and Windows
- Working With MDS And Windows Azure
Lesson 1: Identifying the SQL Server Platform
- Overview
- DataStorage-Part 1
- DataStorage-Part 2
Lesson 2: Deploying SQL Server
- Install-Part 1
- Install-Part 2
Lesson 3: Configuring SQL Server
- Configuring-Part 1
- Configuring-Part 2
- Changing Memory-Part 1
- Changing Memory-Part 2
- Email-Part 1
- Email-Part 2
Lesson 4: Managing Databases in SQL Server 2012
- User Databases-Part 1
- User Databases-Part 2
- User Databases-Part 3
- User Databases-Part 4
- User Databases-Part 5
Lesson 5: Managing SQL Server Security
- Setting Security-Part 1
- Setting Security-Part 2
- Server Roles-Part 1
- Server Roles-Part 2
- Setting Permissions-Part 1
- Setting Permissions-Part 2
Lesson 6: Implementing Advanced Security Settings
- Querying Data From Multiple Tables-Part 1
- Querying Data From Multiple Tables-Part 2
- Querying Data From Multiple Tables-Part 3
- Querying Data From Multiple Tables-Part 4
Querying Data From Multiple Tables-Part 5
Lesson 7: Applying Encryption and Compression
- Encrypting And Compressing-Part 1
- Encrypting And Compressing-Part 2
- Encrypting And Compressing-Part 3
Lesson 8: Working with Indexes and Log Files
- Functions-Part 1
- Functions-Part 2
- Functions-Part 3
- Functions-Part 4
- Functions-Part 5
- Functions-Part 6
Lesson 9: Working with Backup and Restore
- Managing Backups-Part 1
- Managing Backups-Part 2
- Managing Backups-Part 3
- Managing Backups-Part 4
- Managing Backups-Part 5
- Managing Backups-Part 6
- Managing Backups-Part 7
Lesson 10: Implementing High Availability
- Stored Procedures-Part 1
- Stored Procedures-Part 2
- Stored Procedures-Part 3
- Stored Procedures-Part 4
Lesson 11: Optimizing Server Performance
- Managing SQL Performance-Part 1
- Managing SQL Performance-Part 2
- Managing SQL Performance-Part 3
- Managing SQL Performance-Part 4
- Managing SQL Performance-Part 5
- Managing SQL Performance-Part 6
- Managing SQL Performance-Part 7
Lesson 12: Troubleshooting Issues and Recovering Databases
- Set Operators-Part 1
- Set Operators-Part 2
- Set Operators-Part 3
- Set Operators-Part 4
- Set Operators-Part 5
Lesson 13: Performing Advanced Database Management Tasks
- Managing Database Infrastructures-Part 1
- Managing Database Infrastructures-Part 2
- Managing Database Infrastructures-Part 3
Lesson 1: Getting Started with SQL Server 2012
- Course Introduction
Lesson 2: Working with T-SQL
- Creating Queries-Part 1
- Creating Queries-Part 2
- Creating Queries-Part 3
- Creating Queries-Part 4
- Creating Queries-Part 5
- Constraints-Part 1
- Constraints-Part 2
- Constraints-Part 3
- Constraints-Part 4
- Constraints-Part 5
Lesson 3: Writing SELECT Queries
- Select Statement-Part 1
- Select Statement-Part 2
- Select Statement-Part 3
- Select Statement-Part 4
Lesson 4: Working with SQL Data Types
- Data Types-Part 1
- Data Types-Part 2
- Data Types-Part 3
- Data Types-Part 4
- Data Types-Part 5
- Data Types-Part 6
- Data Types-Part 7
- Data Types-Part 8
- Data Types-Part 9
- Data Types-Part 10
Lesson 5: Sorting and Filtering Data
- Sorting Results-Part 1
- Sorting Results-Part 2
- Sorting Results-Part 3
- Sorting Results-Part 4
- Sorting Results-Part 5
- Sorting Results-Part 6
Lesson 6: Querying Data from Multiple Tables
- Tables Part 1
- Tables Part 2
- Tables Part 3
- Tables Part 4
- Tables Part 5
- Tables Part 6
Lesson 7: Modifying Data
- Inserting Data-Part 1
- Inserting Data-Part 2
- Inserting Data-Part 3
- Inserting Data-Part 4
- Inserting Data-Part 5
- Inserting Data-Part 6
Lesson 8: Working with SQL Server Built-in Functions
- Functions
- Parse
- Logical Functions
- Group By
Lesson 9: Programming in T-SQL
- Programming-Part 1
- Programming-Part 2
- Programming-Part 3
- Programming-Part 4
- Programming-Part 5
- Programming-Part 6
Lesson 10: Implementing Stored Procedures
- Storage Procedures-Part 1
- Storage Procedures-Part 2
- Dynamic SQL-Part 1
- Dynamic SQL-Part 2
Lesson 11: Working with Subqueries and Table Expressions
- Sub-Queries And Table Expressions-Part 1
- Sub-Queries And Table Expressions-Part 2
- Sub-Queries And Table Expressions-Part 3
- Sub-Queries And Table Expressions-Part 4
Lesson 12: Working with Set Operators, Conditional Operators, and Window Functions
- Set Operators-Part 1
- Set Operators-Part 2
- Window Functions-Part 1
- Window Functions-Part 2
- User Defined Functions-Part 1
- User Defined Functions-Part 2
- Advanced Analytical Functions
Lesson 13: Working with PIVOT, UNPIVOT, and Grouping Sets
- Pivot
- Grouping Sets
Lesson 14: Managing Error Handling and Transactions
- Error Handling-Part 1
- Error Handling-Part 2
- Manage Transactions-Part 1
- Manage Transactions-Part 2
- Manage Transactions-Part 3
Lesson 15: Querying SQL Server System
- System Databases-Part 1
- System Databases-Part 2
- System Databases-Part 3
- System Databases-Part 4
Lesson 16: Optimizing Query Performance
- Query Planning-Part 1
- Query Planning-Part 2
- Index-Part 1
- Index-Part 2
- Index-Part 3
Module 1: SSIS Packages
- Introduction
- Creating SSIS Packages
- Creating A New Package Lab
- Data Sources Lab
- Connections Lab
- Control Flow
- Creating And Editing Control Flow Lab
- Data Flow
- Data Flow Transformations
- Data Flow Lab
Module 2: Debugging and Error Handling in SSIS
- Debugging And Error Handling in SSIS-Part1
- Enable Transactions And Observe Trans Rollback Lab
- Set Checkpoints In A Package Lab
- Debugging And Error Handling in SSIS-Part2
- Setting Up Constraints Lab
- Turn On Logging Lab
- Debugging And Error Handling in SSIS-Part3
- Identifying Data Flow Errors Lab
Module 3: Deploying and Configuring SSIS Packages
- Lesson1-Part1 Deploying
- Lesson1-Part2 Sharing Ordering And Configuring
- Create An XML Configuration Lab
- Create A SQL Server Configuration Lab
- Use A Property Expression To Update A Connection Lab
- Deploying An SSIS Package
- Create And Deploy An Installer Kit Lab
Module 4: Securing and Executing SSIS Packages; Service Administration
- Lesson1-Part1 Securing And Executing SSIS Packages
- Lesson1-Part2 SSIS Package Security
- Turn On Package Encryption Lab
- Change Security Roles Lab
- Lesson2 Executing And Administration
- Create And Execute A Command-Line Statement Lab
- Execute A Package Through SQL Server Agent Lab
Module 5: Data Analysis
- Lesson1 SSAS Cube Development
- Create SSAS Project Lab
- Create A Data Source Lab
- Create A Data Source View Lab
- Lesson2 Creating And Modifying SSAS Cube
- Creating A Cube Lab
- Using Cube Designer To Edit A Cube Structure Lab
- Lesson3 Creating A Dimension
- Create A New Dimension Lab
- Lesson4 Creating Measure Groups And Measures
- Add Measure Groups Lab
- Configure Measure Groups And Measures Lab
Module 6: Extending SSAS Cubes
- Lesson1 Extending SSAS Cubes-Part1
- Define Attribute Relationships Lab
- Define User Hierarchy Lab
- Lesson2 Extending SSAS Cube-Part3
- Implement The Reseller Sales KPI Lab
- Lesson3 Extending SSAS Cube-Part3
- Turn On Proactive Caching Lab
Module 7: Extending SSAS Cubes
- Lesson1-Part1 SSAS Storage Processing And Deployment
- Lesson1-Part2 Aggregating And Enabling Proactive Caching
- Turning On Proactive Caching Lab
- Lesson2 SSAS Deployment
- Deploy Database With Deployment Wizard Lab
- Lesson3 Processing
- Processing Scripts Using SQL Server Agent Lab
Module 8: Securing and Administering SSAS
- Lesson1 SSAS Security
- Create A Role And Set Security Lab
- Lesson2 Backing Up SSAS
- Backing Up And Maintain Management Studio Lab
- Lesson3 Managing SSAS Turning And Logging
- Turning On Query Logging Lab
- Lesson4 SSAS Administering
- Turn On And Use SQL Server Profiler Lab
- Monitor SSAS Performance Lab
Module 9: Working With SSAS Data Mining
- Lesson1-Part1 Prepare And Creating Data Mining Structures
- Lesson1-Part2 Data Mining Algorithms And Usage
- Data Mining Wizard Lab
- Lesson2 Mapping Mining Structure Attributes To Source Columns
- Create A Model From A Cube Lab
- Lesson3 Predictive Models
- Lesson4 Data Mining Security
- Managing Permissions Lab
Module 10: Developing SSAS Reports
- Lesson1 Understanding SSRS Reports
- Creating Reports Lab
- Lesson2 Creating A New Report Database
- Generate More Reports Lab
- Lesson3 Advanced Report Object Properties-Part1
- Lesson4 Advanced Report Object Properties-Part2
Module 11: Extending and Deploying SSRS Reports
- Lesson1 SSRS Report Parameters
- Create A Report Without Using Wizard Lab
- Lesson2 Extending SSRS Reports
- Lesson3 Deploying SSRS Reports
Module 12: Scheduling Deployed Reports and Data Sources
- Lesson1 Scheduling Reports And Subscriptions
- Creating A New Role For SSRS Lab
- Lesson2 SSRS And Data Sources
- Set Up Shared Schedule Lab
Module 13: Configuring And Administering the SSRS Server
- Installing And Configuring SSRS Server
- Changing Settings In Configuration Manager Lab
- Lesson2 Administering The SSES Server And Command-Line Utilities
- Backing Up And Restoring Encryption Keys Lab
- Conclusion
Installing on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
- Introduction
- Installing Part 1
- Installing Part 2
- Installing Part 2 Demo 1
- Installing Part 2 Demo 2
Getting familiar with SQL on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
- Getting Familiar With SQL Part 1
- Getting Familiar With SQL Part 1 Demo
- Getting Familiar With SQL Part 2
- Getting Familiar With SQL Part 2 Demo
- Getting Familiar With SQL Part 3
- Getting Familiar With SQL Part 3 Demo
Types of Data on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
- Data Types
- Data Types Demo
Databases on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
- Databases Part 1
- Databases Part 1 Demo
- Databases Part 2
- Databases Part 2 Demo
- Databases Part 3
Looking at Tables on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
- Tables
- Tables Demo
Module 6: Looking at Views
- Views Part 1
- Views Part 1 Demo
- Views Part 2
- Views Part 2 Demo
- Views Part 3
Module 7: About Constraints
- Constraints Part 1
- Constraints Part 1 Demo
- Constraints Part 2
Module 8: Looking at Stored Procedures
- Stored Procedures Part 1
- Stored Procedures Part 1 Demo
- Stored Procedures Part 2
Module 9: Functions
- Functions
- Functions Demo
Modules 10: About Service Broker
- Service Broker Part 1
- Service Broker Part 2
Modules 11: Integrity
- Data Integrity Part 1
- Data Integrity Part 2
Modules 12: Permissions in SQL
- Permissions Part 1
- Permissions Part 1 Demo
- Permissions Part 2
Modules 13: Accounts
- Logins Roles And Credentials
- Logins Roles And Credentials Demo
Modules 14: Security
- Additional Security Tools
- Additional Security Tools Demo
Modules 15: Backups/Restores
- Backing Up And Restoring Databases Part 1
- Backing Up And Restoring Databases Part 2
- Backing Up And Restoring Databases Demo
Modules 16: Endpoints
- Endpoints
Modules 17: Servers working together
- Linking Servers
Modules 18: Triggers in SQL
- Triggers
Modules 19: Replication between servers
- Replication Part 1
- Replication Part 2
Modules 20: Indexes
- Performing Indexing And Full Text Searching
Modules 21: Transactions in SQL
- Transaction And Locks
Modules 22: Data moves
- Moving Data
Modules 23: Data specialties in SQL
- Handling Specialty Data
Modules 24: Fault Tolerance
- High-Availability Methods Part 1
- High-Availability Methods Part 2
Modules 25: SQL Management
- Maintaining And Automating SQL Server
Modules 26: SQL Management Monitoring
- Monitoring And Optimizing SQL Server
- Monitoring And Optimizing SQL Server Demo
Modules 27: SQL Management tools
- SQL Server Management Tools
Module 28: Troubleshooting
- Troubleshooting Techniques
- Troubleshooting Techniques Demo
Module 29: Course Review
- Course Review Part 1
- Course Review Part 2
- Course Review Part 3
- Course Review Part 4
- Course Review Part 5
Module 30: Common Questions
- Common Student Questions Part 1
- Common Student Questions Part 2
Module 31: Real World Scenarios
- Real World Scenarios Part 1
- Real World Scenarios Part 2
Module 1: Manage and Maintain a Server Infrastructure
- Introduction
- Manage And Maintain A Server Infrastructure-Part1
- Manage And Maintain A Server Infrastructure-Part2
- Design A Monitoring Strategy-Part1
- Design A Monitoring Strategy-Part2
- Plan And Implement Automated Remediation-Part1
- Plan And Implement Automated Remediation-Part2
- Plan And Implement Automated Remediation-Part3
Module 2: Plan and Implement a Highly Available Enterprise Infrastructure
- Plan And Implement A Highly Available Enterprise Infrastructure-Part1
- Plan And Implement A Highly Available Enterprise Infrastructure-Part2
- Highly Available Network Services-Part1
- Highly Available Network Services-Part2
- Plan And Implement Highly Available Storage Solutions-Part1
- Plan And Implement Highly Available Storage Solutions-Part2
- Plan And Implement Highly Available Roles-Part1
- Plan And Implement Highly Available Roles-Part2
- Business Continuity And Disaster Recovery Solution
Module 3: Plan and Implement a Server Virtualization Infrastructure
- Plan And Implement Virtual Hosts – Part 1
- Plan And Implement Virtual Hosts-Part2
- Plan And Implement Virtual Machines
- Plan And Implement Virtualization Networking-Part1
- Plan And Implement Virtualization Networking-Part2
- Plan And Implement Virtualization Storage
- Plan And Implement Virtual Machine Movement
- Manage And Maintain A Server Virtualization Infrastructure
Module 4: Design and Implement Identity and Access Solutions
- Design And Implement Identity And Access Solutions-Part1
- Design And Implement Identity And Access Solutions-Part2
- Implement And Manage Certificates
- Design And Implement A Federated Identity Solution
- Design And Implement AD Rights Management Services
- Conclusion
Module 1: Plan and Deploy Infrastructure
- Introduction
- Plan And Deploy Infrastructure-Part 1
- Plan And Deploy Infrastructure-Part 2
- Plan And Deploy Infrastructure-Part 3
Module 2: Planning and Implementing
- Planning And Implementing-Part 1
- Multicast Deployment Wizard Demo
- Planning And Implementing-Part 2
- Pre-staging Clients Demo
- Planning And Implementing-Part 3
- Configuring Windows Deployment Services Demo
- Planning And Implementing-Part 4
Module 3: Planning and Implementing Server Upgrade and Migration
- Planning And Implementing Server Upgrade And Migration-Part 1
- Planning And Implementing Server Upgrade And Migration-Part 2
- Planning And Implementing Server Upgrade And Migration-Part 3
Module 4: Planning and Deploying Virtual Machine Manager Resources
- Planning And Deploying Virtual Machine Manager Resources-Part 1
- Planning And Deploying Virtual Machine Manager Resources-Part 2
- Planning And Deploying Virtual Machine Manager Resources-Part 3
- Planning And Deploying Virtual Machine Manager Resources-Part 4
Module 5: Planning and Implementing File and Storage Services
- PlanningAnd Implementing File And Storage Services-Part 1
- Planning And Implementing File And Storage Services-Part 2
- Configuring The iSCSI Target Server Demo
- Planning And Implementing File And Storage Services-Part 3
- Configuring Internet Storage Name Server Demo
- Planning And Implementing File And Storage Services-Part 4
Module 6: Design and Implement Network Infrastructure Services
- Design And Implement Network Infrastructure Services
Module 7: Design and Maintain a Dynamic Host Configuration Protocol Solution
- Design And Maintain A Dynamic Host Configuration Protocol Solution-Part 1
- Configuring Split Scope In DHCP Demo
- Design And Maintain A Dynamic Host Configuration Protocol Solution-Part 2
- Design And Maintain A Dynamic Host Configuration Protocol Solution-Part 3
Module 8: Design a Name Resolution Solution Strategy
- Design A Name Resolution Solution Strategy-Part 1
- Design A Name Resolution Solution Strategy-Part 2
- Configuring Global Names Zone Demo
- Design A Name Resolution Solution Strategy-Part 3
Module 9: Design and Manage an IP Address Management Solution
- Design And Manage An IP Address Management Solution-Part 1
- Design And Manage An IP Address Management Solution-Part 2
Module 10: Design and Implement Network Access Services
- Design And Implement Network Access Services
Module 11: Design a VPN Solution
- Design A VPN Solution-Part 1
- Design A VPN Solution-Part 2
Module 12: Design a DirectAccess Solution
- Design A Direct Access Solution-Part 1
- Design A Direct Access Solution-Part 2
Module 13: Implement a Scalable Remote Access Solution
- Implement A Scalable Remote Access Solution-Part 1
- Implementing Packet Tracing Demo
- Implement A Scalable Remote Access Solution-Part 2
- Implement A Scalable Remote Access Solution-Part 3
- Looking At Setting In Direct Access Demo
- Implement A Scalable Remote Access Solution-Part 4
Module 14: Design and Implement a Network Protection Solution
- Design And Implement A Network Protection Solution-Part 1
- Design And Implement A Network Protection Solution-Part 2
- Design And Implement A Network Protection Solution-Part 3
- Looking At Multiple RADIUS Servers Demo
- Design And Implement A Network Protection Solution-Part 4
- Taking A Look At IP Sec Policy Enforcement Demo
- Showing 802.1X Policy Enforcement Demo
- Design And Implement A Network Protection Solution-Part 5
Module 15: Design and Implement an Active Directory Infrastructure
- Design And Implement An Active Directory Infrastructure
Module 16: Design a Forest and Domain Infrastructure
- Design A Forest And Domain Infrastructure
Module 17: Implement a Forest and Domain Infrastructure
- Implement A Forest And Domain Infrastructure-Part 1
- Steps To Perform A Realm Trust Demo
- Implement A Forest And Domain Infrastructure-Part 2
Module 18: Design a Group Policy Strategy
- Design A Group Policy Strategy
Module 19: Design an Active Directory Permission Model
- Design An Active Directory Permission Model-Part 1
- Taking A Look At The Security Tab Or Lack Of Demo
- Design An Active Directory Permission Model-Part 2
- Taking A Look At The Delegation Or Control Wizard Demo
- Design An Active Directory Permission Model-Part 3
- Taking A Look At Kerberos Delegation Demo
- Design An Active Directory Permission Model-Part 4
Module 20: Design and Implement an Active Directory Infrastructure (Physical)
- Design And Implement An Active Directory Infrastructure Physical
Module 21: Design an Active Directory Site Topology
- Design An Active Directory Site Topology
Module 22: Design an Active Directory Site Topology
- Design A Domain Controller Strategy
Module 23: Design and Implement a Branch Office Infrastructure
- Design And Implement A Branch Office Infrastructure-Part 1
- Design And Implement A Branch Office Infrastructure-Part 2
- Taking A Look At Password Replication Policy Tab Demo
- Design And Implement A Branch Office Infrastructure-Part 3
- Conclusion
Module 1: Configuring Advanced DNS Services
- Introduction
- DNSSEC
- Socket Pool And Cache Locking
- Advanced DNS Settings
- Questions
Module 2: Advanced DHCP Services
- DHCP Scopes
- High Availability
- Policy-Based Assignments
- DHCPv6
- Questions
Module 3: Active Directory Forest Configuration
- Active Directory Forests
- Active Directory Sites
- Active Directory Trusts
- Active Directory Read Only Domain Controllers
- Active Directory Replication
Module 4: Active Directory Certificate Services
- ADCS Overview
- ADCS Management
Module 5: ISCSI And ISNS
- ISCSI And ISNS
- ISCSI And ISNS Demo
- Questions
Module 6: Configuring IPAM
- Install And Configure IPAM
- IPAM Demo
- Questions
Module 7: Network Balancing
- Install And Configure NLB
- NLB Demo
- Questions
Module 8: Failover Clusters
- Cluster Overview
- Cluster Aware Updating
- Failover Clusters Demo
- Questions
Module 9: Configuring Hyper_V Virtual Machines
- Create VM Replicas In Hyper-V And Migrate VMs
- Hyper V Virtual Machines Demo
- Questions
Module 10: Dynamic Access Control
- DAC Overview And Configure
- DAC Demo
- Questions
Module 11: Active Directory Rights Management Services
- Install ADRMS
- Manage ADRMS
- ADRMS Demo
- Questions
Module 12: Active Directory Federation Services
- Configure And Manage ADFS
- ADFS Demo
- Questions
Module 13: Disaster Recovery
- Configure And Restore Windows Server Backup
- Configure And Restore Windows Server Backup Demo
- Questions
Module 14: Configuring Additional Services
- Configuring Additional Services
- Configuring Additional Services Demo-Part1
- Configuring Additional Services Demo-Part2
- Questions
- Conclusion
Module 1: Managing User and Service Accounts
- Introduction
- User Accounts-Part 1
- User Accounts-Part 2
- User Accounts-Part 3
- Service Accounts-Part 1
- Service Accounts-Part 2
- Questions
Module 2: Administer Group Policy
- Group Policy
- User Configuration-Part 1
- User Configuration-Part 2
- User Configuration-Part 3
- Computer Configurations
- Group Policy Management-Part 1
- Group Policy Management-Part 2
- Group Policy Management-Part 3
- Questions
Module 3: Managing Network File Services
- File System Resource Manager
- Distributed File System
- Encrypting File System
- Auditing Resources
- Questions
Module 4: Domain Name System
- DNS Functionality-Part 1
- DNS Functionality-Part 2
- DNS and Active Directory
- DNS Server Configuration-Part 1
- DNS Server Configuration-Part 2
- Questions
Module 5: Windows Deployment Services
WDS Overview
- Creating Images
Module 6: Windows Server Update Services
- WSUS-Part 1
- WSUS-Part 2
Module 7: Remote Access
- Implement Remote Access-Part 1
- Implement Remote Access-Part 2
- Implement Remote Access-Part 3
- Offline Domain Join
- Implement Network Policy Server-Part 1
- Implement Network Policy Server-Part 2
- Implement Network Policy Server-Part 3
Module 8: Monitoring System
- Monitoring System Resources-Part 1
- Monitoring System Resources-Part 2
Module 9: Managing Active Directory Services
- Managing Active Directory Services-Part 1
- Managing Active Directory Services-Part 2
- Managing Active Directory Services-Part 3
- Conclusion
Module 1: Installing And Configuring Windows Server 2012 R2
- Course And Instructor Introduction
- Overview-Part1
- Overview-Part2
- Overview-Part3
- Management-Part1
- Management-Part2
- Management-Part3
- Management-Part4
- Management-Part5
- Installation-Part1
- Installation-Part2
- Installation-Part3
- Questions-Part1
- Questions-Part2
Module 2: Installing and Configuring an Active Directory Domaine Control
- Active Directory Design-Part1
- Active Directory Design-Part2
- Active Directory Design-Part3
- Installing Active Directory Domain Services-Part1
- Installing Active Directory Domain Services-Part2
- Installing Active Directory Domain Services-Part3
- Installing Active Directory Domain Services-Part4
- Questions
Module 3: Administering Active Directory Objects
- Design And Create An Active Directory Hierarchy-Part1
- Design And Create An Active Directory Hierarchy-Part2
- Manage Users-Part1
- Manage Users-Part2
- Manage Users-Part3
- Manage Computers-Part1
- Manage Computers-Part2
- Manage Computers-Part3
- Questions
Module 4: Automating Administration Tasks
- Powershell Overview And Object Command-Part1
- Powershell Overview And Object Command-Part2
- Powershell Overview And Object Command-Part3
- Command Line Object Management And Bulk Operations-Part1
- Command Line Object Management And Bulk Operations-Part2
- Questions
Module 5: Configuring IPv4
- TCP IP Overview
- IPv4 Addressing-Part1
- IPv4 Addressing-Part2
- Subnetting And Supernetting
- Configure And Troubleshoot IPv4-Part1
- Configure And Troubleshoot IPv4-Part2
- Questions-Part1
- Questions-Part2
Module 6: Configuring IPv6
- Configuring IPV6-Part1
- Configuring IPV6-Part2
- Questions
Module 7: Installing and Configuring DHCP
- DHCP Overview Database Security-Part1
- DHCP Overview Database Security-Part2
- Questions
Module 8: Installing and Configuring DNS
- Installing And Configuring DNS-Part1
- Installing And Configuring DNS-Part2
- Installing And Configuring DNS-Part3
- Installing And Configuring DNS-Part4
- Installing And Configuring DNS-Part5
- Questions
Module 9: Configuring Storage Spaces And File And Print Services
- Design And Implement Storage Spaces-Part1
- Design And Implement Storage Spaces-Part2
- Design And Implement Storage Spaces-Part3
- Secure Files And Folders Configure Offline Files And Shadow Copies
- Implement Network Printing
- Questions
Module 10: Configuring Group Policy
- Create Group Policy Objects
- Configure Group Policy Settings-Part1
- Configure Group Policy Settings-Part2
- Implement A Central Store And Questions
Module 11: Securing Windows Servers
- Securing Windows Servers-Part1
- Securing Windows Servers-Part2
- Questions
Module 12: Installing and Configuring Virtual Servers and Clients
- Virtualization Solution
- Hyper V-Part1
- Hyper V-Part2
- Network Virtualization And Questions-Part1
- Network Virtualization And Questions-Part2
- Conclusion
Module 1: Understanding Microsoft Applications
- Introduction To Exam 70-409
- Introduction To Microsoft Virtualization-Part1
- Introduction To Microsoft Virtualization-Part2
- Introduction To System Center 2012 R2 Components
- Evaluate The Existing Environment For Virtualization
- Module 1 Review Questions
Module 2: Installing And Configuring The Hyper-V Role
- Install The Hyper-V Role
- Manage Hyper-V
- Configure Hyper-V Settings
- Introduction To Hyper-V Host Storage And Networking
- Module 2 Review Questions
- Installing Hyper-V-Demo
Module 3: Creating And Managing Virtual Hard Disks, Virtual Machines, And Virtual
- Create And Configure Virtual Hard Disks
- Create And Configure Virtual Machines
- Install And Import Virtual Machines
- Manage Virtual Machine Checkpoints
- Monitor Hyper-V
- Design Virtual Machines For Server Roles-Services
- Module 3 Review Questions
- Creating A Virtual Machine-Demo
Module 4: Producing And Configuring Virtual Machine Networks
- Generate And Utilize Hyper-V Virtual Switches-Part1
- Generate And Utilize Hyper-V Virtual Switches-Part2
- Introduction To Advanced Hyper-V Networking Features
- Configure And Utilize Hyper-V Network Virtualization
- Module 4 Review Questions
- Controlling The VM Demo
Module 5: Virtual Machine Movement And Hyper-V Replicas
- Deliver High Availability And Redundancy For Virtualization
- Implement Virtual Machine Movement
- Implement And Manage Hyper-V Replica
- Module 5 Review Questions
Module 6: Implementing Failover Clustering Using Hyper-V
- Introduction To Failover Clustering-Part1
- Introduction To Failover Clustering-Part2
- Configure And Utilize Shared Storage
- Implement And Manage Failover Clustering Using Hyper-V
- Module 6 Review Questions
- Exploring Clustering-Demo
Module 7: Installing And Configuring Microsoft System Center 2012 R2 Virtual
- Integrated System Center And Server Virtualization
- Virtual Machine Manager
- Install VMM And Add Hosts And Manage Host Groups
- Module 7 Review Questions
- Exploring SCVMM
Module 8: Managing The Network And Storage Infrastructure In Microsoft System
- Managing Networking Infrastructure
- Managing Storage Infrastructure And Infrastructure Updates
- Module 8 Review Questions
Module 9: Creating And Managing Virtual Machines Using Microsoft System Center 2012 R2Virtual Machine Manager
- Introduction To Virtual Machine Management Tasks In VMM
- Create Clone And Convert Virtual Machines
- Introduction To Virtual Machine Updating
- Module 9 Review Questions
Module 10: Configuring And Managing The Microsoft System Center 2012 R2 Virtual Machine Manager Library
- Introduction To The Virtual Machine Manager Library
- Working With Profiles And Templates
- Module 10 Review Questions
Module 11: Managing Clouds In Microsoft System Center 2012 R2 Virtual Machine
- Introduction To The Cloud
- Produce And Manage A Cloud And User Role Utilization In VMM
- Module 11 Review Questions
Module 12: Managing Services In Microsoft System Center 2012 R2 Virtual
- Managing Service In MSC 2012 R2 VMM And Application Controller-Part1
- Managing Service In MSC 2012 R2 VMM And Application Controller-Part2
- Module 12 Review Questions
Module 13: Protecting And Monitoring Virtualization Infrastructure
- Introduction To Backup And Restore Options For Virtual Machines
- Protecting Virtualization Infrastructure By Using DPM-Part1
- Protecting Virtualization Infrastructure By Using DPM-Part2
- Utilize Operations Manager For Monitoring And Reporting
- Integrate VMM With Operations Manager
- Module 13 Review Questions
- Exploring DPM-Demo
Module 14: Hyper-V And SCVMM Review
- Hyper-V And SCVMM Review-Part1
- Hyper-V And SCVMM Review-Part2
- Hyper-V And SCVMM Review-Part3
- Hyper-V And SCVMM Review-Part4
- Exam 70-409 Conclusion
Module 1: Technology Review
- Introduction
- Active Directory Install And Configure
- PowerShell Primer
- Microsoft Exchange Server Install And Configure – Part 1
- Microsoft Exchange Server Install And Configure – Part 2
- Review Cloud Computing – Part 1
- Review Cloud Computing – Part 2
- Review Virtualization And The Cloud – Part 1
- Review Virtualization And The Cloud – Part 2
- Review Virtualization And The Cloud – Part 3
Module 2: Device Management
- Client Devices
- Demo Client Device Setup – Part 1
- Demo Client Device Setup – Part 2
- Office 365 Client Deployment
- Office 365 Components
- Office 365 Deployment Methods
- Office 365 Cloud Deployment Methods
- Office 365 Deployment Prerequisites
- Office 365 Deployment Readiness
- Office 365 Deployment Network Environment
Module 3: Office 365 Deployment Plan
- Network Planning
- Internet Network Usage Planning
- Network Device Planning
- Account Management Planning – Part 1
- Account Management Planning – Part 2
- Migration And Coexistence Options
- Single Sign On Architecture
- Demo Server 2012 Core With Active Directory Role
Module 4: Windows Azure
- SharePoint 2013 Using Windows Azure – Part 1
- SharePoint 2013 Using Windows Azure – Part 2
- SharePoint 2013 Capabilities
Module 5: PowerShell
- Scripting And PowerShell – Part 1
- Scripting And PowerShell – Part 2
- PowerShell Scripting Techniques – Part 1
- PowerShell Scripting Techniques – Part 2
- Enterprise Ready Scripts – Part 1
- Enterprise Ready Scripts – Part 2
- PowerShell Scripting Syntax – Part 1
- PowerShell Scripting Syntax – Part 2
- PowerShell Scripting Active Directory – Part 1
- PowerShell Scripting Active Directory – Part 2
- PowerShell Remoting
- PowerShell Adding Bulk Users In AD
Module 6: SQL Server
- Introduction To SQL Queries
- SQL Queries – Part 1
- SQL Queries – Part 2
- DML And DDL – Part 1
- DML And DDL – Part 2
- DDL
- SQL Server And PowerShell
- SQL Server PowerShell And AD
- Logging Data In SQL Server Using PowerShell
Module 7: Azure Lync and SharePoint
- Azure Active Directory Fundamentals – Part 1
- Azure Active Directory Fundamentals – Part 2
- Deploying Lync Server – Part 1
- Deploying Lync Server – Part 2
- Deploying Lync Server – Part 3
- SharePoint Designer
- Backup And Restore Share Point
- Windows PowerShell And SharePoint
- Identity Service With Active Directory
- Setup And Deploy Exchange
Module 8: Course Review
- Review Virtualization
- Review Cloud
- Review Automation Using PowerShell
- Review Desktop Applications
- Move To Office 365
- Conclusion
Module 1: Introduction To Office 365
- Course Introduction
- Introduction To Office 365 – Part 1
- Introduction To Office 365 – Part 2
- Planning A Pilot Implementation – Part 1
- Planning A Pilot Implementation – Part 2
- Planning A Pilot Implementation – Part 3
- Planning A Pilot Implementation – Part 4
- Provisioning Tenant Accounts – Part 1
- Configuring A Test Lab
- Provisioning Tenant Accounts – Part 2
Module 2: Administration In Office 365
- Introduction To Administration In Office 365 – Part 1
- Introduction To Administration In Office 365 – Part 2
- Introduction To Administration In Office 365 – Part 3Introduction To Administration In Office 365 – Part 4
- Introduction To Administration In Office 365 – Part 5
- Managing Users And Licenses – Part 1
- Managing Users And Licenses – Part 2
- Managing Users And Licenses – Part 3
- Managing Security And Distribution Groups – Part 1
- Managing Security And Distribution Groups – Part 2
Module 3: Managing Clients
- Planning For Office Clients – Part 1
- Planning For Office Clients – Part 2
- Planning For Office Clients – Part 3
- Managing User – Driver Client Deployments
- IT Managed Deployments – Part 1
- IT Managed Deployments – Part 2
- IT Managed Deployments – Part 3
- Office Telemetry And Reporting
Module 4: Planning DNS And Exchange Migrations
- Working With Custom Domains – Part 1
- Working With Custom Domains – Part 2
- Working With Custom Domains – Part 3
- Working With Custom Domains – Part 4
- Planning To Migrate Mailboxes
- Choosing A Migration Method – Part 1
- Choosing A Migration Method – Part 2
- Choosing A Migration Method – Part 3
Module 5: Planning And Configuring Exchange Online
- Planning For Exchange Online – Part 1
- Planning For Exchange Online – Part 2
- Planning For Exchange Online – Part 3
- Planning For Exchange Online – Part 4
- Planning For Exchange Online – Part 5
- Planning For Exchange Online – Part 6
- Planning For Exchange Online – Part 7
- Managing Recipients – Part 1
- Managing Recipients – Part 2
- Managing Recipients – Part 3
- Managing Recipients – Part 4
- Managing Anti-Malware And Anti-Spam
- Managing Message Retention Recovery – Part 1
- Managing Message Retention Recovery – Part 2
Module 6: Configuring Sharepoint Online
- Managing Site Collections – Part 1
- Managing Site Collections – Part 2
- Configuring Sharing With External Users
- Planning For Users Collaboration
Module 7: Configuring Lync Online
- Plan For Lync Online
- Configuring Lync Online Settings
Module 8: Implementing Coexistence Technologies
- Implementing Directory Synchorization – Part 1
- Implementing Directory Synchorization – Part 2
- Implementing Directory Synchorization – Part 3
- Implementing Organizational Federation
- Course Outro
Module 1: Overview
- Intro
- Overview Of Advanced Solutions – Part 1
- Overview Of Advanced Solutions – Part 2
- Test Connectivity Demo
- Web Based Outlook Demo – Part 1
- Web Based Outlook Demo – Part 2
Module 2: Beginning Powershell
- Beginning Powershell
- New Mail Contact Demo
- New Mail Contacts Powershell Demo
Module 3: Exhange Control Panel
- Exchange Control Panel
Module 4: Create A New Mailbox with Powershell
- Create A New Mailbox With Powershell
- New Mailbox With Powershell Demo – Part 1
- New Mailbox With Powershell Demo – Part 2
Module 5: Mailbox Statistics With Powershell
- Mailbox Statistics With Powershell
- Get Mailbox Statistics Demo
Module 6: Intermediate Powershell
- Intermediate Powershell
- Wrap Up Of Intermediate Powershell
- Creating A New Accepted Domain Demo – Part 1
- Creating A New Accepted Domain Demo – Part 2
Module 7: Unified Messaging
- Unified Messaging – Part 1
- Unified Messaging – Part 2
- UM Dial Plan Demo
- UM Dial Plan Powershell Demo
Module 8: Installation and Configuration
- Installation And Configuration – Part 1
- Installation And Configuration – Part 2
- Build Exchange From Scratch Demo – Part 1
- Build Exchange From Scratch Demo – Part 2
- Build Exchange From Scratch Demo – Part 3
- Build Exchange From Scratch Demo – Part 4
- Build Exchange From Scratch Demo – Part 5
- Build Exchange From Scratch Demo – Part 6
- Confirming Installation Demo
- Scheme Changes – Part 1
- Scheme Changes – Part 2
- Required Software For Exchange
- Powershell Add Features – Part 1
- Powershell Add Features – Part 2
- Installation – Part 1
- Installation – Part 2
- Installation – Part 3
Module 9: Exchange Online
- Exchange Online – Part 1
- Exchange Online – Part 2
- Exchange Online Demo
Module 10: Advanced Design
- Advanced Design – Part 1
- Advanced Design – Part 2
- Advanced Design – Part 3
- Deployment Assistant Demo
- Ports And Protocols For Exchange Demo
- Outro
Module 1: Overview
- Introduction
- Overview Of Exchanger Server 2013 – Part 1
- Overview Of Exchanger Server 2013 – Part 2
- Overview Of Exchanger Server 2013 – Part 3
- Overview Of Exchanger Server 2013 – Part 4
- Overview Of Exchanger Server 2013 – Part 5
- Overview Of Exam – Part 1
- Overview Of Exam – Part 2
Module 2: Exchange Server 2013 Administration
- Exchange Server 2013 Administration – Part 1
- Exchange Server 2013 Administration – Part 2
- Exchange Server 2013 Administration – Part 3
- Exchange Server 2013 Administration – Part 4
- Exchange Server 2013 Administration – Demo 1
- Exchange Server 2013 Administration – Demo 2
- Exchange Server 2013 Administration – Demo 3
Module 3: Fundamentals of Exchange Administration
- Fundamentals Of Exchange Administration – Part 1
- Fundamentals Of Exchange Administration – Demo
Module 4: Archive Mailboxes
- Archive Mailboxes – Part 1
- Archive Mailboxes – Part 2
- Archive Mailboxes – Part 3
- Archive Mailboxes – Demo
Module 5: Properties of User Mailboxes
- Properties Of User Mailboxes
- Properties Of User Mailboxes – Demo
Module 6: Distribution Groups
- Distribution Groups
- Distribution Groups – Demo
Module 7: Outlook and Outlook Web Apps
- Outlook And Outlook Web Apps – Part 1
- Outlook And Outlook Web Apps – Part 2
- Outlook And Outlook Web Apps – Demo
Module 8: Preparation Prerequisites
- Preparation Prerequisites – Part 1
- Preparation Prerequisites – Part 2
- Preparation Prerequisites – Part 3
- Preparation Prerequisites Demo – Part 1
- Preparation Prerequisites Demo – Part 2
- Preparation Prerequisites Demo – Part 3
Module 9: Installation of Exchange 2013
- Installation Of Exchange 2013
- Installation Of Exchange 2013 – Demo
Module 10: Exchange 2013 Design
- Exchange 2013 Design – Part 1
- Exchange 2013 Design – Part 2
- Exchange 2013 Design – Part 3
- Exchange 2013 Design Demo – Part 1
- Exchange 2013 Design Demo – Part 2
- Exchange 2013 Design Demo – Part 3
- Exchange 2013 Design Demo – Part 4
- Exchange 2013 Design Demo – Part 5
- Exchange 2013 Design Demo – Part 6
Module 11: Labs and Demos
- Building Home Lab (setup)
- Creating A Win Server Virtual Machine
- Signing On To Server
- Configuration (Joining Domain)
- Installing Domain Controller – Part 1
- Installing Domain Controller – Part 2
- Checking The Domain Controller
- Setting Up DNS For Exchange
- Schema Updates
- Prerequisite For Exchange 2013
- Installing Exchange
- Confirmation Of Exchange
- How Exchange Is Installed
- Setting Up A Send Connector
- Outro
Module 1: Handling Design And Architecture For Microsoft Lync Server 2013
- Course And Instructor Introduction
- Introduction To Lync Server 2013 Architecture – Part 1
- Introduction To Lync Server 2013 Architecture – Part 2
- Introduction To Lync Server 2013 Architecture – Part 3
- Introduction To Lync Server 2013 Architecture – Part 4
- Introduction To Lync Server 2013 Architecture – Part 5
- Introduction To Lync Server 2013 Architecture – Part 6
- Introduction To Lync Server 2013 Core Capabilites
- Introduction To Lync Server 2013 Design Process
- Evaluate Infrastructure Requirements And Update The Design
- Plan For All Phases Of Microsoft Solutions Framework – Part 1
- Plan For All Phases Of Microsoft Solutions Framework – Part 2
- Plan For All Phases Of Microsoft Solutions Framework – Part 3
- Module 1 Questions
Module 2: Designing A Lync Server 2013
- Plan Infrastructure Requirements For Lync Server 2013 – Part 1
- Plan Infrastructure Requirements For Lync Server 2013 – Part 2
- Use The Lync Server 2013 Planning Tool
- Use The Topology Builder – Part 1
- Use The Topology Builder – Part 2
- Plan The Server Infrastructure
- Design Documentation With The Use Of Microsoft Office – Part 1
- Design Documentation With The Use Of Microsoft Office – Part 2 And Module 2 Questions
Module 3: Installing Lync
- Prepare For Installation
- Install Lync – Part 1
- Install Lync – Part 2
- Module 4: Using Management Tools And RBAC
- Using Management Tools – Part 1
- Using Management Tools – Part 2
- Using Management Tools – Part 3
- Using Management Tools – Part 4
- Using Management Tools – Part 5
- Using Management Tools – Part 6
- Introduction To Role-Based Access Control
Module 4 Questions
Module 5: Deploying And Managing Clients And Devices
- Prepare For Client Deployment
- Deploy And Manage Lync 2013 Clients
- Prepare For Device Deployment And Module 5 Questions
Module 6: Conferencing In Lync Server 2013
- Introduction To Conference In Lync Server 2013 – Part 1
- Introduction To Conference In Lync Server 2013 – Part 2
- Design For Web And Audio-Video Conferencing
- Introduction To Dial-In Conferencing In Lync Server 2013
- Manage And Administer Conferencing And Module 6 Questions
Module 7: Designing And Deploying External Access
- Introduction To Lync 2013 External Capabilities – Part 1
- Introduction To Lync 2013 External Capabilities – Part 2
- Plan For IM And Presence Federation
- Design Edge Requirements – Part 1
- Design Edge Requirements – Part 2
- Module 7 Questions
Module 8: Deploying Microsoft Lync Server 2013 Persistant Chat
- Introduction To Persistent Chat Architecture And Design Considerations In Lync Server 2013
- Deploy And Configure Lync Server 2013 Persistent Chat And Module 8 Questions
Module 9: Archiving And Monitoring
- Introduction To The Archiving And Monitoring Services
- Configure Archiving And Monitoring And Module 9 Questions
Module 10: Administering And Maintaining Lync Server 2013
- Administering And Maintaining Lync Server 2013 – Part 1
- Administering And Maintaining Lync Server 2013 – Part 2
Module 11: Configuring And Managing High Availability In Lync Server 2013
- Introduction To High Availability In Lync Server 2013
- Design Load Balancing – Part 1
- Design Load Balancing – Part 2
Module 12: Understanding Disaster Recover In Lync Server 2013
- Understanding Disaster Recover In Lync Server 2013 – Part 1
- Understanding Disaster Recover In Lync Server 2013 – Part 2
- Module 12 Real World Scenarios And Questions
Module 13: Planning a Migration to Lync Server 2013
- Introduction To Coexistence And Migration – Part 1
- Introduction To Coexistence And Migration – Part 2
- Introduction To Coexistence And Migration – Part 3
- Introduction To Migration Steps – Part 1
- Introduction To Migration Steps – Part 2
- Plan For Clients And Devices And Design Client Migration And Device Migration Strategy
- Course Outro
Module 1: Understanding Voice Architecture
- Course Introduction
- Introduction To Architecture And Server Roles – Part 1
- Introduction To Architecture And Server Roles – Part 2
- Introduction To Architecture And Server Roles – Part 3
- Introduction To Architecture And Server Roles – Part 4
- Introduction To Architecture And Server Roles – Part 5
Module 2: Configuring Key Enterprise Voice Functionality
- Introduction To Lync Voice Routing
- Configure Enterprise Voice – Part 1
- Configure Enterprise Voice – Part 2
- Configure Enterprise Voice – Part 3
- Define Voice Policies – Part 1
- Define Voice Policies – Part 2
Module 3: Designing Exchange Server 2013 Unified Messaging Intergration with
- Introduction To Exchange 2013 Unified Messaging – Part 1
- Introduction To Exchange 2013 Unified Messaging – Part 2
- Configure Exchange UM To Work With Lync 2013 – Part 1
- Configure Exchange UM To Work With Lync 2013 – Part 2
- Configure Exchange UM To Work With Lync 2013 – Part 3
- Configure Exchange UM To Work With Lync 2013 – Part 4
- Configuring Exchange And Lync Feature Integration – Part 1
- Configuring Exchange And Lync Feature Integration – Part 2
- Configuring Exchange And Lync Feature Integration – Part 3
- Configuring Exchange And Lync Feature Integration – Part 4
- Configuring Exchange And Lync Feature Integration – Part 5
Module 4: Understanding Voice Applications
- Introduction To Response Group Services – Part 1
- Introduction To Response Group Services – Part 2
- Introduction To Response Group Services – Part 3
- Introduction To Response Group Services – Part 4
Module 5: Configuring and Deploying Emergency Calling
- Introduction To Location Information Server – Part 1
- Introduction To Location Information Server – Part 2
- Introduction To Set Up And Call Flow – Part 1
- Introduction To Set Up And Call Flow – Part 2
- E911 User Experience
Module 6: Integrating the PSTN
- Connect To The PSTN – Part 1
- Connect To The PSTN – Part 2
- Connect To The PSTN – Part 3
- Connect To The Existing PBX
- Intro To M-N Interworking Routing
- Introduction To Call Routing Reliability
Module 7: Understanding Lync Server 2013 and Networking
- Plan For Media Requirements – Part 1
- Plan For Media Requirements – Part 2
- Plan For Call Admission Control – Part 1
- Plan For Call Admission Control – Part 2
- Introduction To Media Bypass
Module 8: Understanding Phones and Devices
- Introduction To Phones And Devices Deploy Device – Part 1
- Introduction To Phones And Devices Deploy Device – Part 2
- Introduction To Phones And Devices Deploy Device – Part 3
- Lync Server 2013 Phones Management – Part 1
- Lync Server 2013 Phones Management – Part 2
Module 9: Configuring And Migrating Lync Online
- Introduction To Office 365 Architecture
- Deploy Lync Online
- Introduction To Lyncy brid Scenerios
Module 10: Monitoring
- Introduction To Voice Quality Concepts
- Explore Lync Monitoring Server Components
- Explore Lync Monitoring Server Reports
Module 11: Understanding Lync Server2013 Voice Resiliency
- Introduction To Voice Resilience
- Introduction Lync Pool Resilience
- Introduction Branch Office Resilience
- Course Outro
Module 1: Business Continuity
- Course Intro
- Intro to Plan Business Continuity Management – Part 1
- Intro to Plan Business Continuity Management – Part 2
- Describe High Availability
- Degraded Availability
- Qualifying Downtime
- Qualifying Downtime Demo – Part 1
- Qualifying Downtime Demo – Part 2
- Qualifying Downtime Demo – Part 3
- Qualifying Downtime Demo – Part 4
- Qualifying Downtime Demo – Part 5
- Qualifying Downtime Demo – Part 6
- Disaster Recovery Plan (DRP) – Part 1
- Disaster Recovery Plan (DRP) – Part 2
- Measure Availability – Part 1
- Measure Availability (Demo) – Part 2
- Measure Availability – Part 3
- Downtime Metrics – Part 1
- Downtime Metrics – Part 2
- Performance to Availability Relationship
- Costs of HA
- HA Supports in a Farm
- Fault Tolerant in your HA Solution
- Backup and Recovery in SharePoint 2013
- Summary
Module 2: Model, Design, and Test
- Intro
- Plan for Success
- Model – Part 1
- Model – Part 2
- Model – Part 3
- Model – Part 4
- Model – Part 5
- Model – Part 6
- Model – Part 7
- Model – Part 8
- Design – Part 1
- Design – Part 2
- Design – Part 3
- Design – Part 4
- Design – Part 5
- Design – Part 6
- Design – Part 7
- Test – Part 1
- Test – Part 2
- Test – Part 3
- Test – Part 4
- Test – Part 5
- Test – Part 6
- Test – Part 7
- Deploy
- Monitor and Maintain
Module 3: Upgrade and Migrate
- Intro to Upgrade and Migrate to SharePoint 2013
- Upgrading to SharePoint 2013 – Part 1
- Upgrading to SharePoint 2013 – Part 2
- Upgrading to SharePoint 2013 – Part 3
- Upgrading to SharePoint 2013 – Part 4
- Upgrading to SharePoint 2013 – Part 5
- Upgrading to SharePoint 2013 – Part 6
- Upgrading to SharePoint 2013 – Part 7
Module 4: Create and Configure Service Applications
- Intro to Create and Configure Service Applications
- Create and Configure Service Applications
- Create and Configure Service Applications Demo
- Create and Configure Service Applications Summary
Module 5: SharePoint Management
- Intro to Manage SharePoint Solution, BI, and System Integration
- Manage SP Solutions, BI, and System Integration
Module 1: Comprehensive Introduction to Sharepoint
- Course Intro
- Social Media
- Moblie Access
- Business Intelligence – Part 1
- Business Intelligence – Part 2
- Sharepoint Licensing Overview
- Organize Info
- Share Your Insights
- Minimal Download Strategy
- Enhances Social and Collaboration Features
- Enhanced Search
- Workflow
- Enterprise Content Management
- Web Content Management
Module 2: Installing SharePoint
- What We Will Cover – Part 1
- What We Will Cover – Part 2
- What We Will Cover – Part 3
- What We Will Cover – Part 4
- What We Will Cover – Part 5
- What We Will Cover – Part 6
- What We Will Cover – Part 7
- What We Will Cover – Part 8
- What We Will Cover – Part 9
- Software Requirements
- Service and Accounts
Module 3: SharePoint Architecture, Logical & Physical
- Physical Architecture
- Physical Architecture – Traditional Topologies
- Physical Architecture – Streamlined Topologies
- Physical Architecture – Search Architectures
- Physical Architecture – Enterprise Search Architecture
- Physical Architecture – Multi – Farm
- Logical Architecture
- Logical Architecture – Host Names Based Sites
- Logical Architecture – Path – Based
- Logical Architecture – Extranet
- Logical Architecture – Mobile
- Logical Architecture – Single Farm Deployment
- Databasis
- Summary
Module 4: Web Applications and Site Collections
- Web Applications and Site Collections Intro
- Logical Structure and Web Applications
- Demo
- Site Collections
- Demo – Part 1
- Demo – Part 2
- Application Pools and Summary
Module 5: Configure Service Applications
- Intro
- Service Applications
- Demo of Configuring Excel Services
- Sharepoint Management Shell Demo
- Summary
Module 6: Permissions
- Intro
- Site Permissions
- Terms
- Demo
- Authentication Modes
- O Auth
- Summary
Module 7: Search
- Intro
- Intro to Search
- Search Logical Architecture
- Crawling the Content
- Conent Processing
- Analytics Processing Component
- Summary
Module 8: User Profiles
- Intro
- User Profile Service
- User Profile Demo
- Profile Synchronization Goals
- Profile Synchronization Demo
- Sync Performance Changes
- Sync Performance Changes Demo
- Profile Import Options
Module 9: Ongoing Support and Maintenance
- Intro
- What To Look For
Module 1: Designing For The Cloud
- Introduction
- Designing The Cloud
- Reason For Using The Cloud
- Choosing The Right Cloud Model
- Designing Private Clouds
- Overview Of Virtualization Components
- Windows Server 2012 R2 And Hyper-V
- System Center 2012 R2 – Part 1
- System Center 2012 R2 – Part 2
- Deploying Highly Available Hyper-V Hosts
Module 2: Using System Center Virtual Machine Manager R2
- Overview Of Virtual Machine – Part 1
- Overview Of Virtual Machine – Part 2
- Deploying VMM
- Configuring Role Based Access Control
- Managing Hosts
- Configuring Networking – Part 1
- Configuring Networking – Part 2
- Configuring Storage
Module 3: Deploying And Maintaining Fabric Resources
- Extending And Maintaining The Cloud Infrastructure
- Deploying Hyper-V Host Servers – Part 1
- Deploying Hyper-V Host Servers – Part 2
- Providing Patch Management For Fabric Resources – Part 1
- Providing Patch Management For Fabric Resources – Part 2
Module 4: Building The Private Cloud
- Creating Building Blocks For The Private Cloud – Part 1
- Creating Building Blocks For The Private Cloud – Part 2
- Creating Virtual Machine Templates
- Creating A Private Cloud
- Creating And Deploying Applications – Part 1
- Creating And Deploying Applications – Part 2
- Creating And Deploying Applications – Part 3
- Creating And Configuring Services – Part 1
- Creating And Configuring Services – Part 2
- Configuring Access To The Private Cloud
Module 5: Monitoring And Optimizing The Private Cloud
- Overview Of Operations Manager
- Installing Operations Manager
- Deploying Monitoring Agents
- Configuring Access To Operations Manager
- Creating And Configuring Management Packs
- Configuring System Center Integration
- Extending And Optimizing Monitoring – Part 1
- Extending And Optimizing Monitoring – Part 2
Module 6: Planning And Deploying Service Management
- Overview Of Service Manager
- Deploying Service Manager
- Service Manager Work Items – Part 1
- Service Manager Work Items – Part 2
- Service Manager Work Items – Part 3
- Service Manager Notifications
- System Center Integration – Part 1
- System Center Integration – Part 2
Module 7: Automating And Standardizing The Private Cloud
- Overview Of Orchestrator
- Deploying Automation Using Orchestrator
- Configuring Integration Packs
- Configuring And Managing Runbooks
Module 8: Disaster Recovery And High Availability For The Private Cloud
- Overview Of Data Protection Manager
- Planning For Data Protection Manager
- Deploying Data Protection Manager
- Configuring Protection For The Private Cloud
- Configuring Protection For Applications – Part 1
- Configuring Protection For Applications – Part 2
- Hyper-V Recovery Manager
Module 9: Implementing SelfService MultiTenant Private Clouds
- Implementing The Cloud Services Process Pack – Part 1
- Implementing The Cloud Services Process Pack – Part 2
- Service Provider Foundation
- Configuring The Windows Azure Pack
- Conclusion
Module 1: Introducing The Cloud Model
- Course And Instructor Introduction
- Overview Of Cloud Computing
- Dissecting Hybrid Cloud Environments
- Requirements For Cloud Implementation
- Using System Center To Operate The Cloud – Part 1
- Using System Center To Operate The Cloud – Part 2
- Using System Center To Operate The Cloud – Part 3
- Ongoing Cloud Maintenance
- System Center Component Integration
- Verifying The Cloud Infrastructure Demo
Module 2: Configuring The Private Cloud Environment
- Overview Of Virtual Machine Manager
- Managing Virtual Environments
- Creating Private Cloud
- Configuring And Optimizing The Private Cloud
Module 3: Deploying Services For The Private Cloud
- Understanding Service Templates
- Configuring Profiles – Part 1
- Configuring Profiles – Part 2
- Using Web Deploy Packages
- Configuring Server App-V
- Using Data Tier Applications
- Using App Controller To Deploy Services
- Deploying Cloud Services Demo
Module 4: Monitoring Cloud Based Applications
- Overview Of Operations Manager
- Deploying Monitoring Agents
- Customizing Monitoring Solutions
- Monitoring The Network Infrastructure
- Distributed Application Monitoring
- Application Performance Monitoring – Part 1
- Application Performance Monitoring – Part 2
- Application Performance Monitoring – Part 3
- Application Performance Monitoring – Part 4
- Application Performance Monitoring – Part 5
Module 5: Service Management For The New Cloud
- Configuring Service Manager – Part 1
- Configuring Service Manager – Part 2
- Configuring Service Manager – Part 3
- Configuring Service Manager – Part 4
- Automating Service Management – Part 1
- Automating Service Management – Part 2
- Automating Service Management – Part 3
- Managing Incidents And Problems
Module 6: High Availability And Disaster Recovery For The Private Cloud
- High Availability For The Private Cloud – Part 1
- High Availability For The Private Cloud – Part 2
- High Availability For The Private Cloud – Part 3
- High Availability For The Private Cloud – Part 4
- Protecting Data In The Private Cloud – Part 1
- Protecting Data In The Private Cloud – Part 2
- Recovering Data In The Private Cloud – Part 1
- Recovering Data In The Private Cloud – Part 2
Module 7: Optimizing The Private Cloud Infrastructure
- Applying Infrastructure Updates
- Applying Updates To Virtual Machines
- Extending The Private Cloud Infrastructure
- Optimizing The Cloud Infrastructure With System Center Advisor
- Using PRO-Tips To Optimize The Cloud
Module 8: Configuring MultiTenant SelfService Using Windows Azure Pack
- Understanding Windows Azure Pack
- Windows Azure Pack Administration
- Windows Azure Pack Providers
Module 9: Configuring And Monitoring The Private Cloud Review
- Configuring And Monitoring The Private Cloud Review
- Conclusion
Module 1: Planning Configuration Manager Infrastructure
- Intro
- Planning Configuration Manager Infrastructure – Part 1
- Planning Configuration Manager Infrastructure – Part 2
- Planning Configuration Manager Infrastructure – Part 3
- Planning Configuration Manager Infrastructure – Part 4
- Planning Configuration Manager Infrastructure – Part 5
Module 2: Migrating To Configuration Manager 2012
- Migrating To Configuration Manager 2012
Module 3: Installations and Site Role Configuration
- Installation And Site Role Configuration – Part 1
- Installation And Site Role Configuration – Part 2
- Installation And Site Role Configuration – Lab 1
- Installation And Site Role Configuration – Lab 2
Module 4: Cloud Integration
- Cloud Integration
Module 5: Installing The Client
- Installing The Client – Part 1
- Installing The Client – Part 2
- Installing The Client – Part 3
- Installing The Client Lab
Module 6: Client Health
- Client Health
Module 7: Application Deployment
- Application Deployment
- Application Deployment Lab
Module 8: Software Updates
- Software Updates – Part 1
- Software Updates – Part 2
- Software Updates Lab
Module 9: Operating System Deployment
- Operating System Deployment – Part 1
- Operating System Deployment – Part 2
- Operating System Deployment – Part 3
Module 10: Inventory and Software Metering
- Inventory And Software Metering
- Inventory And Software Metering Lab
Module 11: Asset Intelligence
- Asset Intelligence
Module 12: Reporting
- Reporting
- Reporting Lab
Module 13: Compliance Settings
- Compliance Settings
Module 14: Endpoint Protection
- Endpoint Protection
Module 15: Mobile Device Management
- Mobile Device Management – Part 1
- Mobile Device Management – Part 2
Module 16: Role-Based Administration
- Role Based Administration
Module 17: Disaster Recovery
- Disaster Recovery
Module 18: Troubleshooting
- Troubleshooting
- Outro
Module 1: Getting Started With Windows 10
- Introduction
- First Steps
- Navigating The Desktop
- Using Cortana To Search
Module 2: Using File Explorer
- File Explorer
- Understanding File And Folder Basics
- Work With Libraries
- Creating A Home Group
Module 3: Using Windows Applications
- Opening And Using Applications
- Installing New Applications From The Windows Store
- Using Default Applications
Module 4: Browsing the Web With Microsoft Edge
- Examining The Edge Window
- Searching The Web With Edge
- Bookmarking Important Sites
- Using The Reading List
- Marking A Page With Web Notes
- Conclusion
Module 5: Customizing Windows
- Introduction
- Customizing The Display
- Customizing File Explorer
- Configuring Cortanas Notebook Feature
- Customizing Privacy Settings
- Customizing Microsoft Edge
Module 6: Connecting Devices And Devices
- Connecting Printers
- Connecting And Using A Flash Drive
- Connect A Phone
Module 7: Managing User Accounts
- Create Additional Users
- Understanding User Profiles
- Sharing Data Between Profiles
Module 8: Backing Up Important Data
- Using File History
- Using Windows Backup
- Using System Restore
Module 9: Maintaining Windows
- Windows Updates
- Working With The Action Center
- Using Disk Defragmenter
- Managing Storage And Apps Using Settings
- Conclusion
Module 10: Protecting Windows
- Introduction
- Using Windows Defender
- Using Windows Firewall
- Using Bit Locker
- Windows Hello
Module 11: Monitoring Performance
- Using Task Manager
- Using Resource Monitor
Module 12: Working With Control Panel And Settings
- Control Panel Part 1
- Control Panel Part 2
- Settings App
- Using Device Manager
- Using Remote Desktop
- Conclusion
Module 1: Introduction and Deploy Windows
- 1.1 Instructor and Course Introduction
- 1.2 Exam Overview
- 1.3 Deploy Windows Intro
- 1.4 Deploy Windows 10
- 1.5 Deploy Windows 10 Pt 2
- 1.6 Preparing Virtual Lab Setup for the Client 1
- 1.7 Installation of Windows 10 Enterprise
- 1.8 Troubleshooting Failed Installations with Setup Logs
- 1.9 Configuring Locales
- 1.10 Perform Post-Installation Configuration
- 1.11 Navigating Microsoft Edge
- 1.12 Modifying Microsoft Edge Settings
- 1.13 Customizing Your Computer Setting
Module 2: Manage Devices and Data
- 2.1 Manage devices and data intro
- 2.2 Manage local users, groups, and devices
- 2.3 Configure data access and protection
- 2.4 Adding and accessing local users and groups
- 2.5 Managing NTFS permissions in Windows 10
- 2.6 Configure devices by using local policies
- 2.7 Configuring Audit Policies on Windows 10
- 2.8 Manage Windows security
- 2.9 How to change user account settings
Module 3: Configure Connectivity
- 3.1 Configure connectivity intro
- 3.2 Configure networking
- 3.3 Configuring network adapter advanced properties
- 3.4 Configuring a static TCP/IP address
- 3.5 Viewing the networking connection details
- 3.6 Setting up a VPN connection
- 3.7 Configure remote connectivity
- 3.8 Configure remote management
Module 4: Maintain Windows
-
-
- 4.1 Maintain Windows intro
- 4.2 Configure system and data recovery
- 4.3 Backing up files in Windows 10
- 4.4 Using the recycle bin
- 4.5 Manage updates
- 4.6 Check for updates in Windows 10
- 4.7 Configuring hardware in Windows 10
- 4.8 Monitor and manage Windows
- 4.9 Configuring Windows 20 desktop options
- 4.10 Installing new features
-
- 1.1 Instructor and Course Introduction
- 1.2 Exam Overview
- 1.3 Deploy Windows Intro
- 1.4 Deploy Windows 10
- 1.5 Deploy Windows 10 Pt 2
- 1.6 Preparing Virtual Lab Setup for the Client 1
- 1.7 Installation of Windows 10 Enterprise
- 1.8 Troubleshooting Failed Installations with Setup Logs
- 1.9 Configuring Locales
- 1.10 Perform Post-Installation Configuration
- 1.11 Navigating Microsoft Edge
- 1.12 Modifying Microsoft Edge Settings
- 1.13 Customizing Your Computer Setting
Module 2: Manage Devices and Data
- 2.1 Manage devices and data intro
- 2.2 Manage local users, groups, and devices
- 2.3 Configure data access and protection
- 2.4 Adding and accessing local users and groups
- 2.5 Managing NTFS permissions in Windows 10
- 2.6 Configure devices by using local policies
- 2.7 Configuring Audit Policies on Windows 10
- 2.8 Manage Windows security
- 2.9 How to change user account settings
Module 3: Configure Connectivity
- 3.1 Configure connectivity intro
- 3.2 Configure networking
- 3.3 Configuring network adapter advanced properties
- 3.4 Configuring a static TCP/IP address
- 3.5 Viewing the networking connection details
- 3.6 Setting up a VPN connection
- 3.7 Configure remote connectivity
- 3.8 Configure remote management
Module 4: Maintain Windows
- 4.1 Maintain Windows intro
- 4.2 Configure system and data recovery
- 4.3 Backing up files in Windows 10
- 4.4 Using the recycle bin
- 4.5 Manage updates
- 4.6 Check for updates in Windows 10
- 4.7 Configuring hardware in Windows 10
- 4.8 Monitor and manage Windows
- 4.9 Configuring Windows 20 desktop options
- 4.10 Installing new features
Lesson 1: Getting to Know PCs and the Windows 8 User Interface
- Introduction
- Identify Components of a Personal Computer
- Sign in to Windows 8
- Navigate the Desktop
Lesson 2: Using the Modern Apps and Navigation Features
- Using the Modern Apps and Navigation Features
Lesson 3: Working with Desktop Applications
- Navigate the Desktop
Lesson 4: Using Internet Explorer 10
- Navigate Internet Explorer 10
Lesson 5: Customizing the Windows 8 Environment
- Multitasking With Apps
- Use the Control Panel and Task Manager-Part1
- Use the Control Panel and Task Manager-Part2
Lesson 6: Using Windows 8 Security Features
- Customizing the Windows 8 Environment
- Security Features
- Using Other Windows 8 Features-Part1
- Using Other Windows 8 Features-Part2
- Using Other Windows 8 Features-Part3
Module 1: Exploring the Functions of Networking
- Course Introduction
- Instructor Introduction
- Exploring the Functions of Networking Pt 1
- Exploring the Functions of Networking Pt 2
Module 2: Introducing the Host-To-Host Communications Model
- Introducing the Host-To-Host Communications Model Pt 1
- Introducing the Host-To-Host Communications Model Pt 2
Module 3: Introducing LANs
- Introducing LANs
- Get Started with CLI Demo Pt 1
- Get Started with CLI Pt Demo 2
- Adding Descriptions to Interfaces Demo
- Configure Gateway on a Switch Demo
- Visualize Interfaces and Statistics Demo
- Show Version Command Demo
- CDP Demo
Module 4: Exploring the TCP/IP Link Layer
- Exploring the TCP-IP Link Layer Pt 1
- Exploring the TCP-IP Link Layer Pt 2
Module 5: Subnetting
- Subnetting Pt 1
- Subnetting Pt 2
- Subnetting Pt 3
- Subnetting Pt 4
- Subnetting Pt 5
- Subnetting Pt 6
Module 6: Explaining the TCP/IP Transport Layer and Application Layer
- Explaining the TCP-IP Transport Layer and Application Layer Pt 1
- Explaining the TCP-IP Transport Layer and Application Layer Pt 2
- Explaining the TCP-IP Transport Layer and Application Layer Pt 3
Module 7: Exploring the Functions of Routing
- Exploring the Functions of Routing Pt 1
- Exploring the Functions of Routing Pt 2
- Exploring the Functions of Routing Pt 3
- Configuring RIP Demo
- EIGRP Demo Pt 1
- EIGRP Demo Pt 2
Module 8: Exploring the Packet Delivery Process
- Exploring the Packet Delivery Process
Module 9: Troubleshooting a Simple Network
- Troubleshooting a Simple Network
Module 10: Introducing Basic IPv6
- Introducing Basic IPv6 Pt 1
- Introducing Basic IPv6 Pt 2
- Introducing Basic IPv6 Pt 3
- Introducing Basic IPv6 Pt 4
- Introducing Basic IPv6 Pt 5
- Introducing Basic IPv6 Pt 6
- Introducing Basic IPv6 Pt 7
- Introducing Basic IPv6 Pt 8
- IPV6 Basic Configuration and SLAAC Demo Pt 1
- IPV6 Basic Configuration and SLAAC Demo Pt 2
- IPV6 Routing Demo Pt 1
- IPV6 Routing Demo Pt 2
- IPV6 Static Routes Demo
Module 11: Configuring Static Routing
- Configuring Static Routing
- Static Routes Demo
Module 12: Implementing VLANs and Trunks
- Implementing VLANs and Trunks Pt 1
- Implementing VLANs and Trunks Pt 2
- Implementing VLANs and Trunks Pt 3
- Implementing VLANs and Trunks Pt 4
- Spanning-tree Protocol Demo Pt 1
- Spanning-tree Protocol Demo Pt 2
- Spanning-tree Protocol Demo Pt 3
Module 13: Routing Between VLANs
- Routing Between VLANs
- Inter VLAN Routing Demo
Module 14: Introducing OSPF
- Introducing OSPF Pt 1
- Introducing OSPF Pt 2
- Introducing OSPF Pt 3
- Introducing OSPF Pt 4
- OSPF Single Area Demo Pt 1
- OSPF Single Area Demo Pt 2
- OSPF Multiple Area Demo Pt 1
- OSPF Multiple Area Demo Pt 2
Module 15: Building Redundant Switched Topologies
- Building Redundant Switched Topologies Pt 1
- Building Redundant Switched Topologies Pt 2
Module 16: Improving Redundant Switched Topologies with EtherChannel
- Improving Redundant Switched Topologies with Ether Channel Pt 1
- Improving Redundant Switched Topologies with Ether Channel Pt 2
- Configuring Ether Channel Demo
Module 17: Exploring Layer 3 Redundancy
- Exploring Layer 3 Redundancy
Module 18: Introducing WAN Technologies
- Introducing WAN Technologies Pt 1
- Introducing WAN Technologies Pt 2
- Introducing WAN Technologies Pt 3
- Introducing WAN Technologies Pt 4
- Introducing WAN Technologies Pt 5
- Introducing WAN Technologies Pt 6
Module 19: Explaining Basics of ACL
- Explaining Basics of ACL Pt 1
- Explaining Basics of ACL Pt 2
- Explaining Basics of ACL Pt 3
Module 20: Enabling Internet Connectivity
- Enabling Internet Connectivity
- DHCP Demo
- Static NAT Demo
- PAT Using Specific IP Demo
- PAT Using IP of Interface Demo
Module 21: Introducing QoS
- Introducing QoS Pt 1
- Introducing QoS Pt 2
- Introducing QoS Pt 3
- Introducing QoS Pt 4
- Introducing QoS Pt 5
Module 22: Introducing Architectures and Virtualization
- Introducing Architectures and Virtualization Pt 1
- Introducing Architectures and Virtualization Pt 2
- Introducing Architectures and Virtualization Pt 3
- Introducing Architectures and Virtualization Pt 4
Module 23: Introducing System Monitoring
- Introducing System Monitoring Pt 1
- Introducing System Monitoring Pt 2
- Introducing System Monitoring Pt 3
Module 24: Managing Cisco Devices
- Managing Cisco Devices Pt 1
- Managing Cisco Devices Pt 2
- NTP Demo
- Syslog Demo
Module 25: Examining the Security Threat Landscape
- Examining the Security Threat Landscape Pt 1
- Examining the Security Threat Landscape Pt 2
Module 26: Implementing Threat Defense Technologies
- Implementing Threat Defense Technologies Pt 1
- Implementing Threat Defense Technologies Pt 2
- Implementing Threat Defense Technologies Pt 3
- Implementing Threat Defense Technologies Pt 4
- Implementing Threat Defense Technologies Pt 5
- Authentication Protocols Demo Pt 1
- Authentication Protocols Demo Pt 2
- Device Hardening Demo Pt 1
- Device Hardening Demo Pt 2
- Device Hardening Demo Pt 3
- Port Security Demo
Module 27: Exam Preparation
- Exam Prep Tips
Module 28: Practice Demos
- Get Started with CLI Demo Pt 1
- Get Started with CLI Pt Demo 2
- Adding Descriptions to Interfaces Demo
- Configure Gateway on a Switch Demo
- Visualize Interfaces and Statistics Demo
- Show Version Command Demo
- CDP Demo
- Static Routes Demo
- DHCP Demo
- Static NAT Demo
- PAT Using Specific IP Demo
- PAT Using IP of Interface Demo
- Configuring RIP Demo
- Configuring Ether Channel Demo
- Inter VLAN Routing Demo
- Spanning-tree Protocol Demo Pt 1
- Spanning-tree Protocol Demo Pt 2
- Spanning-tree Protocol Demo Pt 3
- EIGRP Demo Pt 1
- EIGRP Demo Pt 2
- Authentication Protocols Demo Pt 1
- Authentication Protocols Demo Pt 2
- NTP Demo
- Syslog Demo
- Device Hardening Demo Pt 1
- Device Hardening Demo Pt 2
- Device Hardening Demo Pt 3
- Port Security Demo
- OSPF Single Area Demo Pt 1
- OSPF Single Area Demo Pt 2
- OSPF Multiple Area Demo Pt 1
- OSPF Multiple Area Demo Pt 2
- IPV6 Basic Configuration and SLAAC Demo Pt 1
- IPV6 Basic Configuration and SLAAC Demo Pt 2
- IPV6 Routing Demo Pt 1
- IPV6 Routing Demo Pt 2
- IPV6 Static Routes Demo
Module 1: Architecture
- 1.1 About Your Instructor
- 1.2 Course Introduction
- 1.3 Welcome to the Architecture Domain
- 1.4 Classic 3 and 2 Tier Models
- 1.5 2 Tier Spine Leaf
- 1.6 Fabric Capacity Planning
- 1.7 High Availability
- 1.8 Designing a WLAN Deployment
- 1.9 Cloud vs On-Prem
- 1.10 The Cisco SD-WAN
- 1.11 Cisco SD-Access
- 1.12 QoS
- 1.13 Hardware vs Software Switching
Module 2: Virtualization
- 2.1 Welcome to the Virtualization Domain
- 2.2 Device Virtualization Technologies
- 2.3 Data Path Virtualization
- 2.4 Network Virtualization Concepts
Module 3: Infrastructure
- 3.1 Welcome to the Infrastructure Domain
- 3.2 Trunking – VTP – EtherChannel
- 3.3 RSTP and MST
- 3.4 EIGRP vs OSPF
- 3.4 OSPF
- 3.5 eBGP
- 3.6 eBGP Part 2
- 3.7 WLANs
- 3.8 NTP NAT PAT
- 3.9 HSRP VRRP GLBP
- 3.10 Multicast
Module 4: Network Assurance
- 4.1 Welcome to the Network Assurance Module
- 4.2 Diagnose Network Issues
- 4.3 NetFlow
- 4.4 SPAN
- 4.5 IP SLA
- 4.6 DNA Center
Module 5: Security
- 5.1 Welcome to the Security Module
- 5.2 Device Access Control
- 5.3 ACLs and CoPP
- 5.4 Wireless Security
- 5.5 Components in Security Design
Module 6: Automation
- 6.1 Welcome to the Automation Module
- 6.2 Python
- 6.3 JSON
- 6.4 YANG
- 6.5 NETCONF-RESTCONF
- 6.6 APIs
- 6.7 EEM
- 6.8 Orchestration Tools
Module 1: Networking Fundamentals
- Introduction
- Introduction To TCPIP Networking- Part 1
- Introduction To TCPIP Networking- Part 2
- Introduction To TCPIP Networking- Part 3
- Introduction To TCPIP Networking- Part 4
- Ethernet LAN Fundamentals- Part 1
- Ethernet LAN Fundamentals- Part 2
- Ethernet LAN Fundamentals- Part 3
- Wide Area Networks- Part 1
- Wide Area Networks- Part 2
- IPv4 Addressing And Routing Fundamentals- Part 1
- IPv4 Addressing And Routing Fundamentals- Part 2
- IPv4 Addressing And Routing Fundamentals- Part 3
- TCPIP Transport And Applications- Part 1
- TCPIP Transport And Applications- Part 2
Module 2: Basic Ethernet LAN Implementation
- Command Line Essentials- Part 1
- Command Line Essentials- Part 2
- Command Line Essentials- Part 3
- Ethernet LAN Switching
- Managing Ethernet Switches- Part 1
- Managing Ethernet Switches- Part 2
- Configuring Switch Interfaces
Module 3: Designing Ethernet LANS
- Understanding LAN Design Options- Part 1
- Understanding LAN Design Options- Part 2
- Understanding LAN Design Options- Part 3
- Implementing And Configuring Ethernet VLANS- Part 1
- Implementing And Configuring Ethernet VLANS- Part 2
Module 4: Understanding IPv4
- IPv4 Subnetting- Part 1
- IPv4 Subnetting- Part 2
- IPv4 Subnetting- Part 3
- IPv4 Subnetting- Part 4
- Analyzing Classful IPv4 Networks- Part 1
- Analyzing Classful IPv4 Networks- Part 2
- Analyzing Classful IPv4 Networks- Part 3
- Analyzing Subnet Masks- Part 1
- Analyzing Subnet Masks- Part 2
- Analyzing Existing Subnets
Module 5: Working With Cisco Routers
- Implementing IPv4- Part 1
- Implementing IPv4- Part 2
- Configuring IPv4 Address And Static Routes- Part 1
- Configuring IPv4 Address And Static Routes- Part 2
- Configuring IPv4 Address And Static Routes- Part 3
- Using Dynamic Routing Protocols- Part 1
- Using Dynamic Routing Protocols- Part 2
- Configuring IPv4 Hosts- Part 1
- Configuring IPv4 Hosts- Part 2
Module 6: IPv4 Design And Troubleshooting
- Designing IP Subnets- Part 1
- Designing IP Subnets- Part 2
- Using VLAN- Part 1
- Using VLAN- Part 2
- Troubleshooting IPv4
Module 7: IPv4 Services
- Access Control Lists- Part 1
- Access Control Lists- Part 2
- Access Control Lists- Part 3
- Access Control Lists- Part 4
- Network Address Translation- Part 1
- Network Address Translation- Part 2
Module 8: Implementing IPv6
- IPv6 Fundamentals- Part 1
- IPv6 Fundamentals- Part 2
- IPv6 Fundamentals- Part 3
- IPv6 Fundamentals- Part 4
- IPv6 Addressing And Subnetting- Part 1
- IPv6 Addressing And Subnetting- Part 2
- Implementing IPv6- Part 1
- Implementing IPv6- Part 2
- Implementing IPv6- Part 3
- Implementing IPv6- Part 4
- Course Conclusion
Module 1: Configuring Ethernet LANs
- Introduction
- Ethernet LAN Fundamentals- Part 1
- Ethernet LAN Fundamentals- Part 2
- Implementing Virtual LANs- Part 1
- Implementing Virtual LANs- Part 2
- Using VLAN Trunking- Part 1
- Using VLAN Trunking- Part 2
- Understanding Spanning Tree Protocol- Part 1
- Understanding Spanning Tree Protocol- Part 2
- Understanding Spanning Tree Protocol- Part 3
- Spanning Tree Implementation- Part 1
- Spanning Tree Implementation- Part 2
- Spanning Tree Implementation- Part 3
- Security Management- Part 1
- Security Management- Part 2
- Security Management- Part 3
- Security Management- Part 4
Module 2: Configuring IPv4 Routing Protocols
- Understanding OSPF- Part 1
- Understanding OSPF- Part 2
- Understanding OSPF- Part 3
- Implementing OSPF- Part 1
- Implementing OSPF- Part 2
- Implementing OSPF- Part 3
- Implementing OSPF- Part 4
- Understanding EIGRP- Part 1
- Understanding EIGRP- Part 2
- Understanding EIGRP- Part 3
- Implementing EIGRP- Part 1
- Implementing EIGRP- Part 2
- Troubleshooting IPv4- Part 1
- Troubleshooting IPv4- Part 2
- Troubleshooting IPv4- Part 3
Module 3: Wide Area Networks
- Implementing Point-To-Point WANs- Part 1
- Implementing Point-To-Point WANs- Part 2
- Implementing Point-To-Point WANs- Part 3
- Private WANs With Ethernet And MPLS- Part 1
- Private WANs With Ethernet And MPLS- Part 2
- Private WANs With Ethernet And MPLS- Part 3
- Private WANs With Internet VPNs- Part 1
- Private WANs With Internet VPNs- Part 2
- Private WANs With Internet VPNs- Part 3
Module 4: IPv4 Services
- Basic Access Control Lists- Part 1
- Basic Access Control Lists- Part 2
- Advanced Access Control Lists- Part 1
- Advanced Access Control Lists- Part 2
- Quality Of Service- Part 1
- Quality Of Service- Part 2
Module 5: IPv4 Routing And Troubleshooting
- IPv4 Routing In The LAN- Part 1
- IPv4 Routing In The LAN- Part 2
- Implementing HSRP- Part 1
- Implementing HSRP- Part 2
- Troubleshooting IPv4 Routing- Part 1
- Troubleshooting IPv4 Routing- Part 2
Module 6: IPv6 Routing
- IPv6 Implementation And Routing Basics- Part 1
- IPv6 Implementation And Routing Basics- Part 2
- IPv6 Implementation And Routing Basics- Part 3
- IPv6 Implementation And Routing Basics- Part 4
- Implementing OSPF For IPv6- Part 1
- Implementing OSPF For IPv6- Part 2
- Implementing EIGRP For IPv6- Part 1
- Implementing EIGRP For IPv6- Part 2
- IPv6 Access Control Lists- Part 1
- IPv6 Access Control Lists- Part 2
Module 7: Cloud Based Networking
- Overview Of Cloud Computing- Part 1
- Overview Of Cloud Computing- Part 2
- Conclusion
Module 1: Wireless Basics
- Course And Instructor Introduction
- Wireless Basics Part 1
- Wireless Basics Part 2
- Wireless Basics Part 3
- Wireless Basics Part 4
- Wireless Basics Part 5
- Wireless Basics Part 6
Module 2: Wireless Standards
- Wireless Standards Part 1
- Wireless Standards Part 2
- Wireless Standards Part 3
- Wireless Standards Part 4
- Wireless Standards Part 5
Module 3: Wireless Signals
- Wireless Signals Part 1
- Wireless Signals Part 2
Module 4: Antennas
- Antennas Part 1
- Antennas Part 2
- Antennas Part 3
Module 5: Topologies
- Topologies Part 1
- Topologies Part 2
Module 6: Frame Types
- Frame Types Part 1
- Frame Types Part 2
- Frame Types Part 3
Module 7: Planning Coverage
- Planning Coverage Part 1
- Planning Coverage Part 2
- Planning Coverage Part 3
Module 8: Architectures
- Architectures Part 1
- Architectures Part 2
- Architectures Part 3
Module 9: Stand Alone And Cloud Deployments
- Stand Alone And Cloud Deployments Part 1
- Stand Alone And Cloud Deployments Part 2
Module 10: Controller Based Deployment
- Controller Based Deployment Part 1
- Controller Based Deployment Part 2
- Controller Based Deployment Part 3
Module 11: Controller Discovery
- Controller Discovery Part 1
- Controller Discovery Part 2
- Controller Discovery Part 3
Module 12: Roaming
- Roaming Part 1
- Roaming Part 2
Module 13: Radio Resource Management
- Radio Resource Management Part 1
- Radio Resource Management Part 2
- Radio Resource Management Part 3
Module 14: Wireless Security
- Wireless Security Part 1
- Wireless Security Part 2
- Wireless Security Part 3
Module 15: WLAN Configuration
- WLAN Configuration
Module 16: Guest Networks
- Guest Networks
Module 17: Client Connectivity
- Client Connectivity Part 1
- Client Connectivity Part 2
Module 18: Managing Wireless
- Managing Wireless Part 1
- Managing Wireless Part 2
Module 19: Interference
- Interference Part 1
- Interference Part 2
Module 20: Troubleshooting
- Troubleshooting Part 1
- Troubleshooting Part 2
- Course Conclusion
Module 1: Introducing Cisco Collaboration Architecture
- Course Introduction
- Introducing Cisco Collaboration Architecture Part 1
- Introducing Cisco Collaboration Architecture Part 2
- Small To Mid-Size Business Part 1
- Small To Mid-Size Business Part 2
- Small To Mid-Size Business Part 3
- Cisco Unified Communications Manager Part 1
- Cisco Unified Communications Manager Part 2
- Cisco Unified Communications Manager Part 3
- Cisco Unified Connection
- Lab Introduction
Module 2: Telephony And Call Routing
- Telephony 101 Part 1
- Telephony 101 Part 2
- Telephony 101 Part 3
- Telephony 101 Part 4
- Telephony 101 Part 5
- Telephony 101 Part 6
- Call Routing 101 Part 1
- Call Routing 101 Part 2
- VoIP Call Routing 101
- Call Routing With DNS
- Deployment Scenarios Part 1
- Deployment Scenarios Part 2
- Deployment Scenarios Part 3
- Gateway Call Routing Basics Part 1
- Gateway Call Routing Basics Part 2
- Gateway Call Routing Basics Part 3
- Gateway Call Routing Basics Part 4
- Configuring The Gateway Lab Part 1
- Configuring The Gateway Lab Part 2
Module 3: Preparing The Network And Phone Behavior
- Preparing The Network For Voices Part 1
- Preparing The Network For Voices Part 2
- IP Phone Behavior
- Configuring The LAN Lab
- Standing Up The Platform Lab
- Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 1
- Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 2
- Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 3
- Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 4
- Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 5
- Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 6
- Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 7
- Using OVA Templates To Deploy Prime Collaboration Provisioning Lab Part 1
- Using OVA Templates To Deploy Prime Collaboration Provisioning Lab Part 2
Module 4: CUCM Administration Interfaces
- CUCM Administration Interfaces Part 1
- CUCM Administration Interfaces Part 2
- CUCM Stand Up
- CUCM Stand Up Lab
- End User Interfaces
- End User Configuration Lab
- AD Integration Lab
- End Point Implementation Part 1
- End Point Implementation Part 2
- IMP Integration Lab
- CUC Integration Lab Part 1
- CUC Integration Lab Part 2
- IP Communicator Lab
- Profiles And Templates Lab
- CUCME Phone Configuration
- Configuring CUCME Lab Part 1
- Configuring CUCME Lab Part 2
- CUCM End-User Portal Lab
- Configuring CUCM Phones From Scratch
- Configuring Cisco SX20 Codec Part 1
- Configuring Cisco SX20 Codec Part 2
Module 5: Call Configuration
- Advanced Call Coverage Part 1
- Advanced Call Coverage Part 2
- Advanced Call Coverage Part 3
- Call Coverage Lab Part 1
- Call Coverage Lab Part 2
- Call Coverage Lab Part 3
- Call Coverage Lab Part 4
- Call Coverage Lab Part 5
- Calling Constrictions And COS Part 1
- Calling Constrictions And COS Part 2
- Implementing Class Of Control Lab Part 1
- Implementing Class Of Control Lab Part 2
- Connecting To The PSTN Part 1
- Configuring Voice Gateway Features Lab Part 1
- Configuring Voice Gateway Features Lab Part 2
- Configuring Voice Gateway Features Lab Part 3
- Connecting To The PSTN Part 2
- PSTN Calling And Digit Manipulation Lab Part 1
- PSTN Calling And Digit Manipulation Lab Part 2
- PSTN Dial Plan Configuration Lab Part 1
- PSTN Dial Plan Configuration Lab Part 2
- Course Conclusion
Module 1: Pre-Course Chapter 1
- Course Introduction
- Civnd Intro Part 1
- Civnd Intro Part 2
- The Big Picture
Module 2: Pre-Course Chapter 2
- All About Video Part 1
- All About Video Part 2
- All About Video Part 3
- All About Video Part 4
Module 3: Cisco Video And Content Delivery
- Cisco Video And Content Delivery Part 1
- Cisco Video And Content Delivery Part 2
- Cisco Video And Content Delivery Part 3
Module 4: Cisco Video Surveillance
- Cisco Video Surveillance Part 1
- Cisco Video Surveillance Part 2
Module 5: Cisco Collaboration
- Cisco Collaboration Part 1
- Cisco Collaboration Part 2
- Cisco Collaboration Part 3
Module 6: Central Collaboration Endpoint Control
- Central Collaboration Endpoint Control
Module 7: Unified IP Phones, Desk Endpoints And Cisco Jabber
- Unified IP Phones Desk Endpoints And Cisco Jabber
Module 8: Configuring Unified IP Phones And Cisco Jabber
- Configuring Unified IP Phones And Cisco Jabber Part 1
- Configuring Unified IP Phones And Cisco Jabber Part 2
Module 9: Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber
- Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber Part 1
- Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber Part 2
- Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber Part 3
Module 10: Cisco Telepresence Endpoints Installation And Characteristics
- Cisco Telepresence Endpoints Installation And Characteristics Part 1
- Cisco Telepresence Endpoints Installation And Characteristics Part 2
- Cisco Telepresence Endpoints Installation And Characteristics Part 3
- Cisco Telepresence Endpoints Installation And Characteristics Part 4
Module 11: Configuring Cisco Telepresence CTS And Cisco DX650 Endpoints
- Configuring Cisco Telepresence CTs And Cisco D X650 Endpoints Part 1
- Configuring Cisco Telepresence CTs And Cisco D X650 Endpoints Part 2
Module 12: Configuring Cisco Telepresence TC Endpoints
- Configuring Cisco Telepresence TC Endpoints Part 1
- Configuring Cisco Telepresence TC Endpoints Part 2
- Configuring Cisco Telepresence TC Endpoints Part 3
- Configuring Cisco Telepresence TC Endpoints Part 4
- Configuring Cisco Telepresence TC Endpoints Part 5
- Configuring Cisco Telepresence TC Endpoints Part 6
Module 13: Operating And Troubleshooting Cisco Telepresence Endpoints
- Operating And Troubleshooting Cisco Telepresence Endpoints Part 1
- Operating And Troubleshooting Cisco Telepresence Endpoints Part 2
- Operating And Troubleshooting Cisco Telepresence Endpoints Part 3
- Operating And Troubleshooting Cisco Telepresence Endpoints Part 4
- Operating And Troubleshooting Cisco Telepresence Endpoints Part 5
Module 14: Cisco Multipoint Conferencing Solutions
- Cisco Multipoint Conferencing Solutions Part 1
- Cisco Multipoint Conferencing Solutions Part 2
- Cisco Multipoint Conferencing Solutions Part 3
Module 15: Configuring And Monitoring Cisco Multipoint
- Configuring And Monitoring Cisco Multipoint Part 1
- Configuring And Monitoring Cisco Multipoint Part 2
Module 16: Cisco DMP Characteristics And Installation
- Cisco DMP Characteristics And Installation Part 1
- Cisco DMP Characteristics And Installation Part 2
Module 17: Configuring Cisco DMPs
- Configuring Cisco DMP’s
Module 18: Managing Cisco Edge 340 DMPs
- Managing Cisco Edge340 DMPs
- Course Conclusion
Module 19: Labs
- Basic Switch Port Configuration
- Dashboard Options Part 1
- Dashboard Options Part 2
- Preparations For Endpoints Part 1
- Preparations For Endpoints Part 2
- Preparations For Endpoints Part 3
- Preparations For Endpoints Part 4
- Basic Troubleshooting
- Setup TC Endpoint Part 1
- Setup TC Endpoint Part 2
- Setup TC Endpoint Part 3
- Setup TC Endpoint Part 4
Module 1: Network Review
- Course Introduction
- Network Review Part 1
- Network Review Part 2
- Network Review Part 3
- Network Review Part 4
Module 2: Terminology And Fundamentals
- Terminology And Fundamentals Part 1
- Terminology And Fundamentals Part 2
- Terminology And Fundamentals Part 3
- Terminology And Fundamentals Part 4
- Terminology And Fundamentals Part 5
- Terminology And Fundamentals Part 6
- Terminology And Fundamentals Part 7
Module 3: PKI And Cryptography
- Pki And Cryptography Part 1
- Pki And Cryptography Part 2
Module 4: AAA
- AAA Part 1
- AAA Part 2
- AAA Part 3
Module 5: Bring Your Own Device
- Bring Your Own Device Part 1
- Bring Your Own Device Part 2
- Bring Your Own Device Part 3
Module 6: Secure Access
- Secure Access Part 1
- Secure Access Part 2
- Secure Access Part 3
- Secure Access Demo
Module 7: VPNs
- VPN Concepts Part 1
- VPN Concepts Part 2
- Remote Access VPNs Part 1
- Remote Access VPNs Part 2
- Site To Site VPNs
Module 8: Secure Routing And Switching
- Secure Routing And Switching Part 1
- Secure Routing And Switching Part 2
- Secure Routing And Switching Demo 1
- Secure Routing And Switching Demo 2
- Layer2 Attacks Part 1
- Layer2 Attacks Part 2
- Layer2 Attacks Part 3
- Mitigation Part 1
- Mitigation Part 2
Module 9: Firewalls
- Firewall Technologies Part 1
- Firewall Technologies Part 2
- Implementing Nat Part 1
- Implementing Nat Part 2
- Zone Based Firewall
- Firewall Features On The ASA Part 1
- Firewall Features On The ASA Part 2
- Firewall Features On The ASA Part 3
Module 10: Intrusion Protection System (IPS)
- Intrusion Protection System Part 1
- Intrusion Protection System Part 2
Module 11: Content And Endpoint Security
- Content And Endpoint Security Part 1
- Content And Endpoint Security Part 2
- Course Conclusion
Module 1: Plan And Design
- Introduction
- Review Routing Fundamentals
- Review Route Selection
- Review Switching Versus Routing
- Review IP Subnetting
- Review How To Subnet
- Review IP Address Classes
Module 2: EIGRP Enhanced Interior Gateway Routing Protocol
- Plan And Design-Part1
- Plan And Design-Part2
- EIGRP Config
- Configuring RIPng
- Building EIGRP Topology Table
- EIGRP Stub Routing
- EIGRP Summarization
- EIGRP Load Balancing
- Discovering Main EIGRP Configuration
- Implementing EIGRP Through Name Config
- Configure EIGRP Authentication
- Configure Authentication For EIGRP Routes
Module 3: IPv6
- Introduction To IPv6-Part1
- Introduction To IPv6-Part2
- IPv6 Addressing
- Basic IPv6 Configuration
- EIGRP For IPv6
- Configure And Optimize EIRGP For IPv6
Module 4: OSPF
- lntroduction To OSPF-Part1
- lntroduction To OSPF-Part2
- lntroduction To OSPF-Part3
- Configure OSPF
- Building The Link State Database
- OSPF Path Selection
- OSPF Route Summarization
- OSPF Stub Areas
- Implement OSPF
- Optimize OSPF
- OSPF Authentication Configuration
- Configure OSPFV3
- Basic Redistribution
Module 5: Border Gateway Protocol BGP
- Introduction To BGP
- BGP Specifics
- Basic BGP
- BGP Path Selection
- Configure BGP Authentication
- Configure BGP
Module 6: Course Review
- Configure Basic EIGRP
- Basic OSPF Configuration
- Summary Of-EIGRP-OSPF-IPv6-BGP
- Conclusion
- Course And Instructor Introduction
- Planning For Complex Network-Part1
- Planning For Complex Network-Part2
- Intro To Cisco Enterprise Architecture And CAM-Part1
- Intro To Cisco Enterprise Architecture And CAM-Part2
- Review Networking Topology-Part1
- Review Networking Topology-Part2
- Review OSI Model
- Review SLA
- Network Discovery
- NTP Explained-Part1
- NTP Explained-Part2
- Network Security-Part1
- Network Security-Part2
Module 2: Switch Configuration
- VLAN And Trunking-Part1
- VLAN And Trunking-Part2
- VTP Intro And Config
- Ether Channel Configuration And Load Balancing
- More Ether Channel Configuration-Part1
- More Ether Channel Configuration-Part2
- Port Security
- Root Guard
- Configuring MST
Module 3: IP Configuration
- DHCP Intro And Config-Part1
- DHCP Intro And Config-Part2
- IPV6 Intro And Config-Part1
- IPV6 Intro And Config-Part2
- Configure DHCP
- Configure DHCPV6
- Configure IPSLA
- NTP Configuration
- Network Monitoring Using IPSLA-Part1
- Network Monitoring Using IPSLA-Part2
- Network Monitoring Using IPSLA-Part3
Module 4: STP And RTP
- Config Routing Between VLANs With A Router
- Improves STP Config-Part1
- Improve STP Config-Part2
- Improve STP Config-Part3
- Improve STP Config-Part4
- Implement RSTP
- Intro And Config MST
Module 5: Routing
- Config Routing Between VLANs With A Router
- Routing On A Multi Layer Switch
- Routing With An External Router
- Further Routing On Multilayer Switch
Module 6: HSRP, VRRP, GLBP
- Configure And Tune HSRP
- Configure HSRP With Load Balancing
- HSRP For IPv6
- Configure VRRP
- Configure VRRP With Load Balancing
- Implement GLBP
- Configure GLBP
Module 7: Course Review
- Designing Complex Networks
- Review Demo CAM
- Review Demo VLANs And Trunking
- Review Demo VTP Configure
- Review Demo Ether Channel And Load Balancing
- Review Demo RSTP
- Review Demo Routing Between VLANs With A Router
- Course Outro
Module 1: Introduction to Cisco Troubleshooting
- Introduction
- Troubleshooting And Maintenance
- IOS Troubleshooting Commands
- Remote Data Gathering
- Introduction To Graphical Troubleshooting Tools And Review
Module 2: Troubleshooting Switches
- Troubleshoot Catalyst Switches
- Troubleshoot TCAM
Module 3: Troubleshooting VLANS and Trunking
- Troubleshooting VLANs And Trunking-Part1
- Troubleshooting VLANs And Trunking-Part2
- Troubleshooting VLANs And Trunking-Part3
- Trouble Ticket 1 VLANS
Module 4: Troubleshooting Spanning Tree Protocol, EtherChannel
- Spanning Tree Protocol
- STP Port Configuration
- Ether Channel
- Trouble Ticket 2-Trunking
Module 5: Troubleshooting InterVLAN Routing and Layer 3 EtherChannel
- Troubleshooting Inter-VLAN Routing
- Troubleshooting Layer 3 Ether Channel
Module 6: Troubleshooting Switch Security Features
- Troubleshoot Switch Security-Part1
- Troubleshoot Switch Security-Part2
- Trouble Ticket 3-Switch Security-Part1
- Trouble Ticket 3-Switch Security-Part2
Module 7: Troubleshooting FirstHop Redundancy Protocols
- HSRP
- VRRP
- Questions
- Trouble Ticket 4
Module 8: Troubleshooting IPv4 and IPv4 Addressing
- IPv4 Addressing DHCPNAT-Part1
- IPv4 Addressing DHCPNAT-Part2
- Trouble Ticket 5
- Trouble Ticket 6
Module 9: IPv6 Addressing and Addressing Technologies
- IPv6 Addressing Options
Module 10: Troubleshooting IPv4 and IPv6 ACLs and Prefix Lists
- IPv4 ACLs
- Prefixlists IPv6 ACLs
- Trouble Ticket Access Control List1
- Trouble Ticket Access Control List2
Module 11: Troubleshooting GRE and Basic Routing Tunnels
- IPv4 Routing-Part1
- IPv4 Routing-Part2
- IPv6 Routing
- GRE Tunnels
Module 12: Troubleshooting RIPv2 and RIPng
- RIPv2
- RIPng
Module 13: Troubleshooting EIGRP
- EIGRP
- EIGRP For IPv6
- Trouble Ticket 1
- Trouble Ticket 2
Module 14: OSPF and OSPFv3
- OSPF-Part1
- OSPF-Part2
- OSPFv3
- Trouble Ticket 1
- Trouble Ticket 2
- Trouble Ticket 3
Module 15: Troubleshooting Route Maps and Policy Based Routing
- Route Maps And Policy Based Routing
Module 16: Troubleshooting Redistribution
- Verifying Redistribution Configuration
- Troubleshooting Redistribution With Route Maps
Module 17: Troubleshooting BGP
- BGP Overview
- BGP Configuration-Part1
- BGP Configuration-Part2
- Trouble Ticket 1
- Trouble Ticket 2
Module 18: Troubleshooting Management Protocols and Tools
- Troubleshooting Management Protocols And Tools
- SPAN And RSPAN
Module 19: Troubleshooting Management Access
- Management Access Troubleshooting
- Conclusion
Module 1: Introduction
- Intro Part 1
- Intro Part 2
- Intro Part 3
- Intro Part 4
- Intro Part 5
- Intro Part 6
- Intro Part 7
Module 2: Telephony
- Telephony Part 1
- Telephony Part 2
- Telephony Part 3
- Telephony Part 4
Module 3: Basic Call Routing
- Basic Call Routing Part 1
- Basic Call Routing Part 2
- Basic Call Routing Part 3
Module 4: VOIP Call Routing
- VOIP Call Routing Part 1
- VOIP Call Routing Part2
- VOIP Call Routing Part 3
- VOIP Call Routing Part 4
- VOIP Call Routing Part 5
Module 5: CUCME Call Routing Basics
- CUCME Call Routing Basics Part 1
- CUCME Call Routing Basics Part 2
- CUCME Call Routing Basics Part 3
- CUCME Call Routing Basics Part 4
- CUCME Call Routing Basics Part 5
- CUCME Call Routing Basics Part 6
- CUCME Call Routing Basics Part 7
- CUCME Call Routing Basics Part 8
- CUCME Call Routing Basics Part 9
- CUCME Call Routing Basics Part 10
- CUCME Call Routing Basics Part 11
Module 6: Preparing Network For Voice
- Preparing Network For Voice Part 1
- Preparing Network For Voice Part 2
- Preparing Network For Voice Part 3
- Preparing Network For Voice Part 4
- Preparing Network For Voice Part 5
- Preparing Network For Voice Part 6
Module 7: IP Phone Behavior
- IP Phone Behavior
Module 8: CUCME Administration Basics
- CUCME Administration Basics Part 1
- CUCME Administration Basics Part 2
- CUCME Administration Basics Part 3
- CUCME Administration Basics Part 4
Module 9: CUCME StandUp
- CUCME Stand Up Part 1
- CUCME Stand Up Part 2
- CUCME Stand Up Part 3
- CUCME Stand Up Part 4
- CUCME Stand Up Part 5
Module 10: CUCME StandUp Part 2
- CUCME Stand Up2 Part 1
- CUCME Stand Up2 Part 2
Module 11: CUCME StandUp CUCME
- CUCME Stand Up CUCME Part 1
- CUCME Stand Up CUCME Part 2
- CUCME Stand Up CUCME Part 3
Module 12: End Users and End User Interfaces
- End Users And End User Interfaces Part 1
- End Users And End User Interfaces Part 2
- End Users And End User Interfaces Part 3
Module 13: Endpoint Implementation
- Endpoint Implementation Part 1
- Endpoint Implementation Part 2
- Endpoint Implementation Part 3
- Endpoint Implementation Part 4
Module 14: Call Coverage
- Call Coverage Part 1
- Call Coverage Part 2
- Call Coverage Part 3
- Call Coverage Part 4
- Call Coverage Part 5
- Call Coverage Part 6
- Call Coverage Part 7
- Call Coverage Part 8
- Call Coverage Part 9
Module 15: Calling Restrictions and Routing
- Calling Restrictions And Routing Part 1
- Calling Restrictions And Routing Part 2
- Calling Restrictions And Routing Part 3
- Calling Restrictions And Routing Part 4
- Calling Restrictions And Routing Part 5
- Calling Restrictions And Routing Part 6
Module 16: CUCME Advance Call Coverage
- CUCME Advance Call Coverage Part 1
- CUCME Advance Call Coverage Part 2
Module 17: Implementing Unity Connection
- Implementing Unity Connection Part 1
- Implementing Unity Connection Part 2
- Implementing Unity Connection Part 3
- Implementing Unity Connection Part 4
- Implementing Unity Connection Part 5
- Implementing Unity Connection Part 6
- Implementing Unity Connection Part 7
- Implementing Unity Connection Part 8
- Outro
Module 1: Methodologies Used To Design A Network
- Introduction
- Developing Business Trends
- P P D I O O- Part 1
- P P D I O O- Part 2
- 3 Layer Campus Design
- Modular Network Design
- Cisco Eight Step Design Methodology
- Cisco I I N
Module 2: Network Structure And Modularity
- Network Design Fundamentals
- Design Methods And Methodologies- Part 1
- Design Methods And Methodologies- Part 2
- Enterprise Campus Design- Part 1
- Enterprise Campus Design- Part 2
Module 3: Basic Enterprise Campus Networks
- Campus Design Considerations- Part 1
- Campus Design Considerations- Part 2
- Cisco S O N A
Module 4: Enterprise Edge And Remote Network Modules
- WAN Technologies And VPN- Part 1
- WAN Technologies And VPN- Part 2
- WAN Technologies- Part 1
- WAN Technologies- Part 2
- VPN Technologies- Part 1
- VPN Technologies- Part 2
- VPN Technologies- Part 3
Module 5: IP Addressing And Routing Protocols
- Routing Protocol Operation And Design- Part 1
- Routing Protocol Operation And Design- Part 2
- Routing Protocol Operation And Design- Part 3
- Routing Protocol Operation And Design- Part 4
- EIGRP – Part 1
- EIGRP – Part 2
Module 6: Enterprise Switching I
- Enterprise Switching
- Inter VLAN Routing
- Multilayer Switch
- Enterprise Switch Features And Design
- VSS
- Best Practices
Module 7: Enterprise Switching II
- Switch Macros And Smart Ports
- Private VLANs
- Etherchannel
Module 8: Subnetting
- IP v4
- Subnetting- Part 1
- Subnetting- Part 2
- Subnetting- Part 3
- Subnetting- Part 4
- IP v6
Module 9: Designing Advanced Services
- Designing Advanced Services
- GLBP
- Access Points
- Radio Frequencies
- Wireless Signals
- Wireless LAN To VLAN Mapping
- Conclusion

Chapter 1: Course Introduction and Methodology
Chapter 2: Virtualization Overview
Chapter 3: Planning and Installing ESXi
Chapter 4: Using tools to Administer a VMware Environment
Chapter 5: vCenter and Licensing
Chapter 6: Configuring Networking
Chapter 7: Configuring Storage
Chapter 8: VM Creation, Configuration, and Snapshots
Chapter 9: Security and Permissions
Chapter 10: Host and VM Monitoring
Chapter 11: Advanced ESXi and vCenter Server Management
Chapter 12: Patching and Upgrading ESXi
Chapter 13: Disaster Recovery and Backup
Module 1: VM And VMWARE
- Introduction
- VMWARE Foundations-Part 1
- VMWARE Foundations-Part 2
- VMWARE Company Overview
- Server Virtualization
- Thin Clients
- Storage 101
- Three Basic Forms Of Storage
- Redundant Array
Module 2: Working With ESX And ESXI
- VMWARE ESX And ESXI
- Installing ESXI
- Installing ESXI-Lab 1
- Installing ESXI-Lab 2
- Vsphere Client-Lab 1
- Joining Active Directory Domain For Single Sign On-Part 1
- Joining Active Directory Domain For Single Sign On-Part 2
- Virtual Networking
- Nic Notes
- Virtual Network Basics-Lab
- NFS
- NFS-Lab
Module 3: Configuring Virtual Machines
- Virtual Machines
- Host Operating System
- Working With VM Files
- Virtual Machines-Lab 1
- Virtual Machines-Lab 2
- Working With New VM’s
- Virtual Machines-Lab 3
- Virtual Machines-Lab 4
Module 4: Vcenter Server
- Say Hello To Vcenter
- Vcenter Architecture
- Vcenter Architecture-Lab 1
- Vcenter Architecture-Lab 2
- Managing Host With Vcenter-Lab
- Working With Virtual Hardware-Part 1
- Working With Virtual Hardware-Part 2
- Adding Virtual Disk And Disk Expansion-Lab 1
- Adding Virtual Disk And Disk Expansion-Lab 2
- Configuring Vcenter SSO-Lab 1
Module 5: VM Storage Option
- Shared And Local Storage
- NAS
- DC Designs
- Configuring Shared Storage-Lab
- Creating VMFS Datastores On Our SANS-Lab 1
- Creating VMFS Datastores On Our SANS-Lab 2
Module 6: Managing A Virtual World
- Alarms
- Creating And Configuring Alarms-Lab 1
- Creating And Configuring Alarms-Lab 2
- Resource Pools
- Creating Resource Pools-Lab 1
- Creating Resource Pools-Lab 2
- VMWARE Converter
- Configuring VMWARE Converter-Lab 1
- Configuring VMWARE Converter-Lab 2
- Configuring VMWARE Converter-Lab 3
Module 7: Migrations, High Availability And VM Utilities
- Migrating Virtual Machines
- DRS And HA-Lab
- Host Profiles
- VM Utilities And Performance
- Conclusion
Blockchain
- 1.1 Course Introduction
- 1.2 Module 1 Introduction
- 1.3 Audience for the Certification
- 1.4 What is a CBDH
- 1.5 Exam Objectives
- 1.6 Exam Overview
Module 2: Hyperledger Framework
- 2.1 Module 2 Introduction
- 2.2 Hyperledger Project Overview
- 2.3 Hyperledger Frameworks
- 2.4 Hyperledger Fabric
- 2.5 Hyperledger Fabric Use Cases
Module 3: Hyperledger Fabric Blockchain
- 3.1 Module 3 Introduction
- 3.2 Hyperledger Fabric Design Overview
- 3.3 Hyperledger Fabric WhiteboardÂ
- 3.4 Hyperledger Fabric Consensus
- 3.5 Hyperledger Fabric Transactions
- 3.6 Transactions Whiteboard
- 3.7 Hyperledger Fabric Ledger
- 3.8 Ledger Whiteboard
- 3.9 Hyperledger Fabric Versions
- 3.10 Hyperledger Fabric Membership Services
- 3.11 Node Types and Roles
- 3.12 Nodes and Peers Whiteboard
- 3.13 Channels
- 3.14 Channels Whiteboard
Module 4: Access Controls and Secure Chaincode
- 4.1 Module 4 Introduction
- 4.2 Access Controls Lists (.acl)
- 4.3 Certificates and Certificate Authority
- 4.4 Organizations and Participants
- 4.5 Endorsement Policies
- 4.6 Rest APIs
Module 5: Plan and Prepare Apps for Deployment
- 5.1 Module 5 Introduction
- 5.2 Development Whiteboard
- 5.3 Installation Considerations
- 5.4 Composer
- 5.5 Composer Demo
Module 6: Hyperledger Fabric Explorer
- 6.1 Module 6 Introduction
- 6.2 Hyperledger Fabric Explorer Basics
- 6.3 Installation Requirements of Hyperledger Explorer
Module 7: Chaincode and Development
- 7.1 Module 7 Introduction
- 7.2 What is Chaincode
- 7.3 Writing Chaincode Considerations
- 7.4 Development Language
- 7.5 Client App Considerations
- 7.6 BNA Files
- 7.7 Service Discovery
Module 8: Course Wrap Up
- 8.1 Module 8 Introduction
- 8.2 Course Review
- 8.3 Top 10 Things to know for the exam
- 8.4 Taking the Exam
- 8.5 Course Closeout
Module 1: Certified Blockchain Developer Hyperledger Overview
- 1.1 Course Introduction
- 1.2 Module 1 Introduction
- 1.3 Audience for the Certification
- 1.4 What is a CBDH
- 1.5 Exam Objectives
- 1.6 Exam Overview
Module 2: Hyperledger Framework
- 2.1 Module 2 Introduction
- 2.2 Hyperledger Project Overview
- 2.3 Hyperledger Frameworks
- 2.4 Hyperledger Fabric
- 2.5 Hyperledger Fabric Use Cases
Module 3: Hyperledger Fabric Blockchain
- 3.1 Module 3 Introduction
- 3.2 Hyperledger Fabric Design Overview
- 3.3 Hyperledger Fabric WhiteboardÂ
- 3.4 Hyperledger Fabric Consensus
- 3.5 Hyperledger Fabric Transactions
- 3.6 Transactions Whiteboard
- 3.7 Hyperledger Fabric Ledger
- 3.8 Ledger Whiteboard
- 3.9 Hyperledger Fabric Versions
- 3.10 Hyperledger Fabric Membership Services
- 3.11 Node Types and Roles
- 3.12 Nodes and Peers Whiteboard
- 3.13 Channels
- 3.14 Channels Whiteboard
Module 4: Access Controls and Secure Chaincode
- 4.1 Module 4 Introduction
- 4.2 Access Controls Lists (.acl)
- 4.3 Certificates and Certificate Authority
- 4.4 Organizations and Participants
- 4.5 Endorsement Policies
- 4.6 Rest APIs
Module 5: Plan and Prepare Apps for Deployment
- 5.1 Module 5 Introduction
- 5.2 Development Whiteboard
- 5.3 Installation Considerations
- 5.4 Composer
- 5.5 Composer Demo
Module 6: Hyperledger Fabric Explorer
- 6.1 Module 6 Introduction
- 6.2 Hyperledger Fabric Explorer Basics
- 6.3 Installation Requirements of Hyperledger Explorer
Module 7: Chaincode and Development
- 7.1 Module 7 Introduction
- 7.2 What is Chaincode
- 7.3 Writing Chaincode Considerations
- 7.4 Development Language
- 7.5 Client App Considerations
- 7.6 BNA Files
- 7.7 Service Discovery
Module 8: Course Wrap Up
- 8.1 Module 8 Introduction
- 8.2 Course Review
- 8.3 Top 10 Things to know for the exam
- 8.4 Taking the Exam
- 8.5 Course Closeout
Module 1: Course Overview
- 1.1 Course Introduction
- 1.2 Course Target Audience
- 1.3 Course Pre-Requirements
Module 2: Pre-Sales Activities
- 2.1 Module 2 Introduction
- 2.2 Request for Proposals
- 2.3 Request for Proposals Fintech
- 2.4 Proof of Concepts
- 2.5 Return on Investment
- 2.6 Value Creation
- 2.7 Cost Modeling
- 2.8 Cost Considerations
- 2.9 Enterprise Integration
- 2.10 TPS
- 2.11 Whiteboard Discussion
Module 3: Blockchain Fundamentals
- 3.1 Module 3 Introduction
- 3.2 What is a Blockchain
- 3.3 Blockchain Components
- 3.4 Blockchain Terminology
- 3.5 Enterprise Blockchains
- 3.6 Consensus and Mining
- 3.7 Ledgers
- 3.8 Permissioned vs Permissionless Blockchains
- 3.9 Trust and Blockchain
- 3.10 Advantages of Transparency
- 3.11 Development Expertise
- 3.12 Dapps
- 3.13 BaaS
- 3.14 AWS BaaS Whiteboard Discussion
- 3.15 Understanding Blockchain Architecture
Module 4: Enterprise Blockchains
- 4.1 Module 4 Introduction
- 4.2 Hyperledger
- 4.3 Ethereum
- 4.4 Quorum
- 4.5 R3 Corda
- 4.6 Corda Demobench Demo
- 4.7 Ripple
- 4.8 IBM BaaS
- 4.9 AWS BaaS Demo
Module 5: Use Cases
- 5.1 Module 5 Introduction
- 5.2 Ripple Use Cases
- 5.3 Dubai Use Cases
Module 6: Course Closeout
- 6.1 Module 6 Introduction
- 6.2 Course Review
- 6.3 Blockchain Roles
Module 1 – CompTIA Cloud+ CV0-003 Course Overview
- 1.0 Course Trailer
- 1.1 Course Overview
- 1.2 What is the Cloud + Exam
- 1.3 Cloud + Domain Obectives Overview
- 1.4 CompTIA Certification Pathways
- 1.5 DoD and ISO Requirements
Module 2 – General Cloud Knowledge
- 2.1 Domain Overview
- 2.2 Compare and Contrast Cloud Models
- 2.3 Cloud Computing Defined
- 2.4 Deployment Models
- 2.5 Service Models
- 2.6 Cloud Characteristics
- 2.7 Cloud Roles
- 2.8 Evaluate Cloud Providers and Services
- 2.9 Regions and Zones
- 2.10 Shared Responsibility Model
- 2.11 Demonstration – AWS Shared Security Model
- 2.12 Comparing Cloud to Virtualization
- 2.13 Comparing Cloud to On Premises
- 2.14 What is a Virtual Machine
- 2.15 Demonstration – Deploy a Cloud VM (AWS EC2)
- 2.16 What is an API
- 2.17 Capacity Planning Factors
- 2.18 Licensing, Factors, Requirements and Planning
- 2.19 Capacity Planning
- 2.20 Demonstration – AWS Trusted Advisor
- 2.21 HA and Scaling
- 2.22 High Availability and Disaster Recovery
- 2.23 Virtual, System and Communication Protection
- 2.24 Hypervisor Affinity
- 2.25 Analyze the solution design
- 2.26 Business Requirements
- 2.27 Business Enablers
- 2.28 Demonstration -AWS Well Architected Tool
- 2.29 Testing Techniques
- 2.30 Testing Success Factors
- 2.31 Module Review Questions
- 2.32 Module Summary Review
Module 3 – Cloud Security
- 3.1 Domain Overview
- 3.2 Configure Identity and Access Management
- 3.3 Identification and Authorization Management (IAM)
- 3.4 SDLC
- 3.5 Directory Services
- 3.6 Security and Access Controls
- 3.7 Federation
- 3.8 SSO and MFA
- 3.9 Certificates and Key Management
- 3.10 Secure a Network in a Cloud Environment
- 3.11 Networking Devices and Segmentation
- 3.12 Firewalls and Proxies
- 3.13 NAT and PAT
- 3.14 Secure Network Configurations (Tunnelling and Encryption)
- 3.15 Demo Hardening and Configuration Changes
- 3.16 OS Application Controls and Security Credentials
- 3.17 Policies and Permissions
- 3.18 Host and Network Protections (HIDSIPS)
- 3.19 Virtualization Security
- 3.20 Monitoring
- 3.21 Data Security and Compliance Controls in Cloud Environments
- 3.22 Structured, Unstructured and Semi Structured Data
- 3.23 Data Classification and Labeling
- 3.24 Data Loss Prevention
- 3.25 Demonstration – Google Cloud DLP
- 3.26 Chain of Custody and Non-Repudiation
- 3.27 Discussion – CASB
- 3.28 Module Summary Review
- 3.29 Module Review Questions
Module 4 – Cloud Deployment
- 4.1 Domain Overview
- 4.2 Integrate Components into Cloud Solutions
- 4.3 Subscription Services
- 4.4 Demonstration – Provision VM
- 4.5 Cloud Infrastructure Components
- 4.6 Whiteboard – Design a Resilent AWS Cloud Architecture
- 4.7 Containers
- 4.8 Microservices
- 4.9 Demonstration – Deploy Containers
- 4.10 Scaling
- 4.11 Provision Storage
- 4.12 Cloud Storage Protocols
- 4.13 Storage Features
- 4.14 Storage Cost Considerations
- 4.15 Storage Performance
- 4.16 RAID and Tiering
- 4.17 Demonstration – AWS S3
- 4.18 Deploy Cloud Networking Solutions
- 4.19 Connecting to The Cloud
- 4.20 Network Protocols
- 4.21 VPNS, VPC and Connectivity
- 4.22 Whiteboard – AWS VPC Connectivity
- 4.23 Demonstration – AWS VPC
- 4.24 Software Defined Networking (SDN)
- 4.25 Compute Sizing
- 4.26 Virtualization Considerations
- 4.27 Resource Rightsizing (CPU, Memory, etc)
- 4.28 Module Summary Review
- 4.29 Module Review Questions
Module 5 – Operations and Support
- 5.1 Domain Overview
- 5.2 Logging Monitoring and Alerting
- 5.3 Logging, Storage and Analysis of Data Events
- 5.4 Monitoring Cloud Resources
- 5.5 Service Level Agreements
- 5.6 Demonstration – SLAs in AWS
- 5.7 Maintain Efficient Operations of a Cloud Environment
- 5.8 Lifecycle Management
- 5.9 Change and Asset Management
- 5.10 SOP, Patching and Upgrades
- 5.11 Orchestration and Automation
- 5.12 Orchestration or Automation
- 5.13 DevOps, IaC and CICD Pipelines
- 5.14 Playbooks and Templates
- 5.15 Backup and Restore Operations
- 5.16 Backup Types, Objects, Targets
- 5.17 Restore and Recovery
- 5.18 Module Summary Review
- 5.19 Module Review Questions
Module 6 – Troubleshooting
- 6.1 Domain Overview
- 6.2 Troubleshooting Methodology Intro
- 6.3 Troubleshooting Methodology
- 6.4 Troubleshoot Security Issues
- 6.5 Cloud Attacks
- 6.6 Security Groups and NACLS
- 6.7 Troubleshoot Deployment Issues
- 6.8 Discussion Site Connectivity Issues
- 6.9 Discussion – Capacity Issues
- 6.10 Connectivity Issues
- 6.11 Connectivity Troubleshooting Tools
- 6.12 Demonstration – GCP AWS Azure Latency Test
- 6.13 Module Summary Review
- 6.14 Module Review Questions
Module 7 – Course Closeout
- 7.1 Exam Preparation
- 7.2 Course Closeout
Module 1 – Mobile Devices
- Module 1 Workbook
- 0.1 Intro to A+ Core1 Instructor
- 1.0 CompTIA A+ Course Intro
- 1.1 Mobile Devices Part 1
- 1.1 Mobile Devices Part 2
- 1.1 Mobile Devices Part 3
- 1.2 Installing Components in Laptop
- 1.3 Laptop Features Part 1
- 1.3 Laptop Features Part 2
- 1.4 Compare and Contrast Types of Mobile Devices
- 1.5 Accessories and Ports of Other Mobile Devices Part 1
- 1.5 Accessories and Ports of Other Mobile Devices Part 2
- 1.6 Configure Basic Device Network Connectivity and Application Support Part 1
- 1.6 Configure Basic Device Network Connectivity and Application Support Part 2
- 1.7 Use Methods to Perform Mobile Device Synchronization
- 1.8 Laptop Disassemble and Assemble
Module 2 – Networking
- Module 2 Workbook
- 2.1 Networking Part 1
- 2.1 Networking Part 2
- 2.2 Compare and Contrast Common Networking Hardware Devices Part 1
- 2.2 Compare and Contrast Common Networking Hardware Devices Part 2
- 2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 1
- 2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 2
- 2.3 Setting Up a Wireless Router
- 2.4 Compare and Contrast Wireless Networking Protocols
- 2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 1
- 2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 2
- 2.6 Explain Common Network Configuration Concepts Part 1
- 2.6 Explain Common Network Configuration Concepts Part 2
- 2.7 Compare and Contrast Internet Connection Types Network Types and Features
- 2.8 Given a Scenario Using Appropriate Networking Tools
Module 3 – Hardware
- Module 3 Workbook
- 3.1 Hardware Part 1
- 3.1 Hardware Part 2
- 3.1 Hardware Part 3
- 3.2 Identify Common Connector Types
- 3.3 Scenario Install RAM Types
- 3.4 Scenario Select Install and Configure Storage Devices
- 3.4 Scenario Select Install and Configure Storage Devices Part 2
- 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 1
- 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 2
- 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 3
- 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 4
- 3.5 Install Disassemble and Assemble a Desktop
- 3.6 Purposes for Peripherals and Types
- 3.7 Summarize Power Supplies
- 3.8 Scenario Select and Configure Appropriate Components for Customers PCs
- 3.9 Scenario Installand Configure Common Devices
- 3.10 Scenario Configure SOHO Multifunction Devices Printers and Settings
- 3.11 Scenario Install and Maintain Various Print Technologies Part 1
- 3.11 Scenario Install and Maintain Various Print Technologies Part 2
- 3.11 Scenario Install and Maintain Various Print Technologies Part 3
Module 4 – Virtualization and Cloud Computing
- Module 4 Workbook
- 4.1 Virtualization Part 1
- 4.1 Virtualization Part 2
- 4.2 Scenario Setup and Configure Client-side Virtualization
Module 5 – Hardware and Network Troubleshooting
- Module 5 Workbook
- 5.1 Hardware and Networking Troubleshooting
- 5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 1
- 5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 2
- 5.3 Troubleshoot Hard Drives and RAID Arrays
- 5.4 Troubleshoot Video and Display Issues
- 5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 1
- 5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 2
- 5.6 Troubleshoot Printers
- 5.7 Troubleshoot Common Wired and Wireless Network Problems
Module 1 – Operating Systems
- 0.1 Intro to A+ Core2 Instructor
- 1.0 Intro to A+ Core2
- 1.1 Operating Systems Part1
- 1.1 Operating Systems Part2
- 1.2 Compare and Contrast features of Microsoft Windows Versions
- 1.3 Summarize General OS Installation Considerations Upgrade Methods
- 1.3 Summarize General OS Installation Considerations Upgrade Methods Part2
- 1.3 Summarize General OS Installation Considerations Upgrade Methods Part3
- 1.3 Summarize General OS Installation Considerations Upgrade Methods Demo
- 1.4 Scenario use appropriate Microsoft Command Line Tools Part1
- 1.4 Scenario use appropriate Microsoft Command Line Tools Part2
- 1.4 Scenario use appropriate Microsoft Command Line Tools Demo
- 1.5 Microsoft Operating System and Tools Part1
- 1.5 Microsoft Operating System and Tools Part1 Demo
- 1.5 Microsoft Operating System and Tools Part2
- 1.5 Microsoft Operating System and Tools Part2 Demo
- 1.5 Microsoft Operating System and Tools Part3
- 1.5 Microsoft Operating System and Tools Part3 Demo
- 1.5 Microsoft Operating System and Tools Part4
- 1.5 Microsoft Operating System and Tools Part4 Demo
- 1.6 Microsoft Windows Control Panel Utilities
- 1.6 Microsoft Windows Control Panel Utilities Demo
- 1.7 Summarize Application Installation and Configuration Concepts
- 1.8 Configure Windows Networking on a Client Desktop
- 1.8 Configure Windows Networking on a Client Desktop Demo
- 1.9 Features and Tools of MAC OS and Linux Client Desktop
Module 2 – Security
- 2.1 Security – Physical Security Measures
- 2.2 Explain Logical Security Concepts
- 2.2 Explain Logical Security Concepts Part2
- 2.3 Compare, Contrast Wireless Security Protocols & Authentication Methods
- 2.4 Detect, Remove, and Prevent Malware using Appropriate Tools
- 2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part1
- 2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part2
- 2.6 Compare Contrast the different Microsoft Windows Security Settings
- 2.6 Compare Contrast the different Microsoft Windows Security Settings- Demo
- 2.7 Implement Security Best Practices to Secure a Workstation
- 2.7 Implement Security Best Practices to Secure a Workstation Part2
- 2.8 Implement Methods for Securing Mobile Devices
- 2.9 Implement Appropriate Data Destruction & Disposal Methods
- 2.10 Configure Security on SOHO Wireless and Wired Networks
- 2.10 Configure Security on SOHO Wireless and Wired Networks Demo
Module 3 – Software Troubleshooting
- 3.1 Software Troubleshooting Part1
- 3.1 Software Troubleshooting Part2
- 3.1 Software Troubleshooting Demo
- 3.2 Troubleshoot and Resolve PC Security Issues
- 3.2 Troubleshoot and Resolve PC Security Issues Part2
- 3.2 Troubleshoot and Resolve PC Security Issues Demo
- 3.3 Best Practice Procedures for Malware Removal
- 3.4 Troubleshoot Mobile OS and Application
- 3.5 Troubleshoot Mobile OS and Application Security Issue
Module 4 – Operational Procedures
- 4.1 Operational Procedures
- 4.2 Implement Basic Change Management Best Practices
- 4.3 Implement Basic Disaster Prevention and Recovery Methods
- 4.4 Explain Common Safety Procedures
- 4.5 Explain Environmental Impacts and Appropriate Controls
- 4.6 Explain Processes for Addressing Prohibited Content-Activity & Privacy Licensing Policy Concepts
- 4.7 Using Proper Communication Techniques and Professionalism
- 4.8 Identify the Basic of Scripting
- 4.8 Identify the Basic of Scripting Demo
- 4.9 Use Remote Access Technologies
Module 1 – Risk Management
- Module 1 Notes
- Intro CASP
- CASP Introduction
- Mod 1.1 Exploring Cloud Services Act
- Mod 1.1 Acquisition Merger Demerger
- Mod 1.1 Acquisition Merger Demerger Part2
- Mod 1.2 Compare and Contrast
- Mod 1.3 Given Scenario Execute Risk
- Mod 1.3 Given Scenario Execute Risk Part2
- Mod 1.3 Continuing Terminology IT Governance
- Mod 1.4 Analyze Security Solution Metrics and Attributes
- Mod 1.4 Analyze Risk
- Mod 1.4 Trend Analysis Act
Module 2 – Enterprise Security Architecture
- Module 2 Notes
- Mod 2 Enterprise Security Architecture
- Mod 2.1 Network Device Security Act
- Mod 2.1 Application and Protocol
- Mod 2.1 Advanced Network Security Act
- Mod 2.1 Complex Network Security Solution
- Mod 2.1 Implementing VLANs Switchport Sec Act
- Mod 2.1 Implementing VLANs Switchport Sec Act Part2
- Mod 2.1 Distributed Denial of Service
- Mod 2.1 Exploring DoS Attacks Act
- Mod 2.1 Security Zones
- Mod 2.1 Network Access Control
- Mod 2.1 Searching for Vulnerablie ICS-SCADA Act
- Mod 2.2 Analyze a Scenario Integrate Security
- Mod 2.2 Configuring Windows Firewall Act
- Mod 2.2 Log Monitoring and Auditing
- Mod 2.2 Group Policy Act
- Mod 2.2 Patch Management
- Mod 2.2 Management Interface
- Mod 2.2 Measured Launch
- Mod 2.3 Analyze a Scenario to Integrate Security Controls
- Mod 2.3 Security Implications Privacy
- Mod 2.3 Baseband
- Mod 2.4 Given Software Vulnerabilty Scenarios
- Mod 2.4 SQL Injection Act
- Mod 2.4 Improper Error and Exception Handling
- Mod 2.4 Buffer Overflows Act
- Mod 2.4 Memory Leaks
- Mod 2.4 Researching Vulnerabilities Exploits Act
Module 3 – Enterprise Security Operations
- Module 3 Notes
- Mod 3 Enterprise Security Operations
- Mod 3 Runtime Debugging
- Mod 3.1 Fingerprinting an OS Services Act
- Mod 3.1 Code Review
- Mod 3.1 Conducting OSINT Act
- Mod 3.1 Types
- Mod 3.1 Conducting a Vulnerability Assessment Act
- Mod 3.2 Analyze a Scenario Output
- Mod 3.2 Network Sniffing Act
- Mod 3.2 Security Content Automation
- Mod 3.2 Using a SCAP Scanner Act
- Mod 3.2 Network Enumerator
- Mod 3.2 Password Cracking Act
- Mod 3.2 Host Vulnerability Scanner
- Mod 3.2 Using Command Line Tools Act
- Mod 3.2 OpenSSL
- Mod 3.2 Scanning for Heartbleed Act
- Mod 3.2 Local Exploitation Tools
- Mod 3.2 Verifying File Integrity with SFC Act
- Mod 3.2 Log Analysis Tools
- Mod 3.3 Given Scenario Implement Incident
- Mod 3.3 Facilitate Incident Detection Response
- Mod 3.3 Using Incident Response Support Tools Act
- Mod 3.3 Severity of Incident Detection Breach
Module 4 – Technical Integration of Enterprise Security
- Module 4 Notes
- Mod 4 Technical Integration of Enterprise
- Mod 4 Technical Integration of Enterprise Part2
- Mod 4.1 DataSecurity Considerations
- Mod 4.1 Examing Network Diagrams Act
- Mod 4.1 Security and Privacy Considerations of Storage integration
- Mod 4.1 Exploring Directory Services and DNS Act
- Mod 4.2 Given Scenario Integrate Cloud and Virtualization
- Mod 4.2 Taking Another Look at Cloud Services Act
- Mod 4.2 Security Advantages and Disadvanatges of Virtualization
- Mod 4.2 Using Virtualization Act
- Mod 4.2 Cloud Augmented Security
- Mod 4.3 Given Scenario Integrate and Troubleshoot Advanced Authentication
- Mod 4.4 Given Scenario Cryptographic
- Mod 4.4 Cryptographic Part2
- Mod 4.4 Mobile Device Encryption
- Mod 4.4 Cryptography Act
- Mod 4.5 Select the Appropriate Control
- Mod 4.5 Phising Act
- Mod 4.5 Telephony VoIP Integration
Module 5 – Research, Development and Collaboration
- Module 5 Notes
- Mod 5 Research Methods to Determine Industry Trends
- Mod 5.1 Practicing Threat Intelligence Act
- Mod 5.2 Scenario Implememt Security Activities Across
- Mod 5.2 Static Testing
- Mod 5.3 Explain the Importance of Interaction
- CASP Conclusion
Domain 1 – Characteristics of Cloud Services from a Business Perspect
- Overview
- History
- The Three Delivery Model Architecture
- SaaS
- Justification For Cloud
- Confidentiality And Availability
- Concepts From NIST
- On Demand Self-Service
- Broad Network Access
- Resource Pooling
- Measured Service
- Service Models
- Terms Of Service
- Recommendations
Domain 2 – Cloud Computing and Business Value
- Reasons For Cloud-Agility-Part1
- Reasons For Cloud-Agility-Part2
- New Business Opportunities
Domain 3 – Technical Perspectives/Cloud Types
- Technical Perspectives Cloud Types
- Sources
- Security Risk
- Technical Risk And Solutions
Domain 4 – Steps to Successful Adoption of Cloud
- Steps To Adopting Cloud-Part1
- Steps To Adopting Cloud-Part2
- Steps To Adopting Cloud-Part3
Domain 5 – Impact and Changes of Cloud Computing on IT Service Management
- Information Security Management System-Part1
- Information Security Management System-Part2
Domain 6 – Risks and Consequences of Cloud Computing
- Information Management And Security-Part1
- Information Management And Security-Part2
- The Data Security LifeCycle
- Governance
- Data Loss Prevention-Part1
- Data Loss Prevention-Part2
- Protecting Data
- Risk Management-Part1
- Risk Management-Part2
- Risk Management-Part3
- Risk Management-Part4
- Risk Management-Part5
- Recommendations-Part1
- Recommendations-Part2
- IT Governance
- Audit
- Recommendations For Audit-Part1
- Recommendations For Audit-Part2
Module 1
- Introduction
- Models-Part 1
- Models-Part 2
- Service And Delivery Models
- Terms And Characteristics
- Objects Storage Concepts
Module 2
- Virtualization
- Install Configure Manage VM And Devices
- Backups
- Virtual Disks
- Virtual Switches
- Virtual Resource Migration
- Benefits Of Virtualization In A Cloud Environment
- Compare And Contrast Virtua lEnvironment
Module 3
- Infrastructure
- Different Access Protocols
- Explain Storage Configuration
- File Systems Types
- Executing Storage Provisioning
- Network Share Demo
- Implement Appropriate Network Configurations
- Importance Of Network Optimization
- Troubleshoot Basic Network Configuration-Part 1
- Troubleshoot Basic Network Configuration-Part 2
- Troubleshoot Commands-Part 1
- Troubleshoot Commands-Part 2
- Troubleshoot Commands-Part 3
- Explain Common Network Protocols
- Common Hardware Resources
Module 4
- Resource Management-Part 1
- Resource Management-Part 2
- Establishing Baselines And Thresholds
- Appropriately Allocate Physical Host Resources-Part 1
- Appropriately Allocate Physical Host Resources-Part 2
- Appropriately Allocate Virtual Guest Resources-Part 1
- Appropriately Allocate Virtual Guest Resources-Part 2
- Use Appropriate Tools For Remote Access
Module 5
- Security-Part 1
- Security-Part 2
- Storage Security Concepts And Methods
- Different Encryption Technologies
- Identify Access Control Methods
Module 6
- Systems Management-Part 1
- Systems Management-Part 2
- Diagnose Remediate And Optimize-Part 1
- Diagnose Remediate And Optimize-Part 2
- Common Performance Concepts-Part 1
- Common Performance Concepts-Part 2
- Testing Techniques
Module 7
- Business Continuity In Cloud-Part 1
- Business Continuity In Cloud-Part 2
- Solutions To Meet Availability Requirements
- Conclusion
Module 1: Threat Management
- Introduction
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 1
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 2
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 3
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 4
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 5
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 6
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 7
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 8
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 9
- Given a scenario, analyze the results of a network reconnaissance Part 1
- Given a scenario, analyze the results of a network reconnaissance Part 2
- Given a scenario, analyze the results of a network reconnaissance Part 3
- Given a scenario, analyze the results of a network reconnaissance Part 4
- Given a scenario, analyze the results of a network reconnaissance Part 5
- Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 1
- Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 2
- Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 3
- Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 4
- Explain the purpose of practices used to secure a corporate environment Part 1
- Explain the purpose of practices used to secure a corporate environment Part 2
- Explain the purpose of practices used to secure a corporate environment Part 3
- Explain the purpose of practices used to secure a corporate environment Part 4
Module 2: Vulnerability Management
- Given a scenario, implement an information security vulnerability management process Part 1
- Given a scenario, implement an information security vulnerability management process Part 2
- Given a scenario, implement an information security vulnerability management process Part 3
- Given a scenario, implement an information security vulnerability management process Part 4
- Given a scenario, implement an information security vulnerability management process Part 5
- Given a scenario, implement an information security vulnerability management process Part 6
- Given a scenario, implement an information security vulnerability management process Part 7
- Given a scenario, analyze the output resulting from a vulnerability scan Part 1
- Given a scenario, analyze the output resulting from a vulnerability scan Part 2
- Compare and contrast common vulnerabilities found in the following targets within an organization Part 1
- Compare and contrast common vulnerabilities found in the following targets within an organization Part 2
- Compare and contrast common vulnerabilities found in the following targets within an organization Part 3
Module 3: Cyber Incident Response
- Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 1
- Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 2
- Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 3
- Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 1
- Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 2
- Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 3
- Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 4
- Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 5
- Explain the importance of communications during the incident response process
- Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 1
- Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 2
- Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 3
- Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 4
- Summarize the incident recovery and post-incident response process Part 1
- Summarize the incident recovery and post-incident response process Part 2
- Summarize the incident recovery and post-incident response process Part 3
- Summarize the incident recovery and post-incident response process Part 4
Module 4: Security Architecture and Tool Sets
- Explain the relationship between frameworks, common policies, controls, and procedures Part 1
- Explain the relationship between frameworks, common policies, controls, and procedures Part 2
- Explain the relationship between frameworks, common policies, controls, and procedures Part 3
- Explain the relationship between frameworks, common policies, controls, and procedures Part 4
- Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 1
- Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 2
- Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 3
- Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 4
- Given a scenario, review security architecture and make recommendations to implement compensating controls Part 1
- Given a scenario, review security architecture and make recommendations to implement compensating controls Part 2
- Given a scenario, review security architecture and make recommendations to implement compensating controls Part 3
- Given a scenario, use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 1
- Given a scenario, use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 2
- Overview
- Conclusion
Module 1: Threat and Vulnerability Management
- Instructor Intro
- About the Exam
- Test Taking Tips and Techniques
- Explain the importance of threat data and intelligence
- Given a scenario, utilize threat intelligence to support organizational security
- Given a scenario, perform vulnerability management activities Pt 1
- Given a scenario, perform vulnerability management activities Pt 2
- Given a scenario, analyze the output from common vulnerability assessment tools
- Explain the threats and vulnerabilities associated with specialized technology
- Explain the threats and vulnerabilities associated with operating in the Cloud
- Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 1
- Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 2
Module 2: Software and Systems Security
- Outline
- Given a scenario, apply security solutions for infrastructure management Pt 1
- Given a scenario, apply security solutions for infrastructure management Pt 2
- Flashcards
- Given a scenario, apply security solutions for infrastructure management Pt 3
- Explain software assurance best practices
- Scatter
- Explain hardware assurance best practices
- Learn
- Speller
- Workbook
Module 3: Security Operations and Monitoring
- Given a scenario, analyze data as part of security monitoring activities Pt 1
- Given a scenario, analyze data as part of security monitoring activities Pt 2
- Given a scenario, analyze data as part of security monitoring activities Pt 3
- Given a scenario, implement configuration changes to existing controls to improve security Pt 1
- Given a scenario, implement configuration changes to existing controls to improve security Pt 2
- Explain the importance of proactive threat hunting
- Compare and contrast automation concepts and technologies
Module 4: Incident Response
- Explain the importance of the incident response process
- Given a scenario, apply the appropriate the incident response procedure
- Given an incident, analyze potential indicators of compromise
- Given a scenario, utilize basic digital forensic techniques
Module 5: Compliance and Assessment
- Understand the importance of data privacy and protection
- Given a scenario, apply security concepts in support of organizational risk mitigation Pt 1
- Given a scenario, apply security concepts in support of organizational risk mitigation Pt 2
- Explain the importance of frameworks, policies, procedures, and controls Pt 1
- Explain the importance of frameworks, policies, procedures, and controls Pt 2
Module 6: Afterword
- Recap
- Review Questions
- Before the Exam
Module 1 – IT Concepts and Terminology
- 0.1 Instructor Intro
- 1.1 Compare and Contrast Notational Systems
- 1.1 Compare and Contrast Notational Systems Demo
- 1.2 Compare and Contrast Fundamentals Data Types and Their Characteristics
- 1.3 Illustrate the Basics of Computing and Processing
- 1.4 Explain the Value of Data and Information
- 1.5 Compare and Contrast Common Units of Measures
- 1.5 Compare and Contrast Common Units of Measures Demo
- 1.6 Explain the Troubleshooting Methodology
Module 2 – Infrastructure
- 2.1 Classify Common Types of Input-Output Device Interfaces
- 2.2 Given a scenario, set up & install Common Peripheral Devices to a PC
- 2.2 Given a scenario, set up & install Common Peripheral Devices to a PC Demo
- 2.3 Explain the Purpose of Common Internal Computing Components
- 2.4 Compare & Contrast Common Internet Service Types-
- 2.5 Compare & Contrast Storage Types
- 2.6 Compare & Contrast Common Computing Devices & Their Purposes
- 2.7 Explain Basic Networking Concepts
- 2.7 Explain Basic Networking Concepts Demo
- 2.7 Explain Basic Networking Concepts Part 2
- 2.7 Explain Basic Networking Concepts Part 3
- 2.7 Explain Basic Networking Concepts Part 4
- 2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network
- 2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network Demo
Module 3 – Applications and Software
- 3.1 Explain the Purpose of Operating Systems
- 3.1 Explain the Purpose of Operating Systems Demo
- 3.2 Compare & Contrast Components of an Operating System
- 3.2 Compare & Contrast Components of an Operating System Demo
- 3.3 Explain the Purpose & Proper Use of Software
- 3.4 Explain Methods of Application Architecture & Delivery Models
- 3.5 Given a Scenario Configure & Use Web Browsers
- 3.5 Given a Scenario Configure & Use Web Browsers FireFox
- 3.5 Given a Scenario Configure & Use Web Browsers Demo Chrome
- 3.5 Given a Scenario Configure & Use Web Browsers Demo Edge
- 3.6 Compare & Contrast General Application Concepts & Uses
Module 4 – Software Development
- 4.1 Compare & Contrast Programming Language Categories-
- 4.2 Given a Scenario Use Programming Organizational Techniques & Interpret Logic-
- 4.3 Explain the Purpose & Use of Programming Concepts-
- 4.3 HTML Demo
Module 5 – Database Fundamentals
- 5.1 Explain Database Concepts and the Purpose of Databases
- 5.2 Compare and Contrast Various Database Structures
- 5.3 Summarize Methods Used to Interface with Databases
- 5.3 Summarize Methods Used to Interface with Databases Demo
Module 6 – Security
- 6.1 Summarize Confidentiality, Integrity, and Availability Concerns
- 6.2 Explain Methods to Secure Devices and Best Practices
- 6.3 Summarize Behavioral Security Concepts
- 6.4 Compare & Contrast Authentication, Authorization, Accounting, & Repudiation Concepts
- 6.5 Explain Password Best Practices
- 6.6 Explain Common Uses of Encryption
- 6.7 Explain Business Continuity Concepts
- 6.8 Takeaways-
- 6.9 ITF Fundamentals Conclusion
Module 1: Intro & Performing Basic Linux Tasks
- Instructor Introduction
- Course Introduction
- Identify The Linux Design Philosophy
- Enter Shell Commands
- Shell Commands Activity
- Get Help with Linux
Module 2: Managing Users and Groups
- Assume Superuser and Groups
- Create, Modify, and Delete Users
- Create, Modify, and Delete Groups
- Query Users and Groups
- Configure Account Profiles
Module 3: Managing Permissions and Ownership
- Modify File and Directory Permissions
- Modify File and Directory Ownership
- Configure Special Permissions and Attributes
- Troubleshoot Permissions Issues
Module 4: Managing Storage
- Create Partitions
- Manage Logical Volumes
- Mount File Systems
- Manage File Systems
- Navigate the Linux Directory Structure
- Troubleshoot Storage Issues
Module 5: Managing Files and Directories
- Create and Edit Text Files
- Search for Files
- Perform Operations on Files and Directories
- Process Text Files
- Manipulate File Output
Module 6: Managing Kernel Modules
- Explore the Linux Kernel
- Install and Configure Kernel Modules
- Monitor Kernel Modules
Module 7: Managing the Linux Boot Process
- Configure Linux Boot Components
- Configure GRUB
Module 8: Managing System Components
- Configure Localization Options
- Configure GUIs
- Manage Services
- Troubleshoot Process Issues
- Troubleshoot CPU and Memory Issues
Module 9: Managing Devices
- Identify the Types of Linux
- Configure Devices
- Monitor Devices
- Troubleshoot Hardware Issues
Module 10: Managing Networking
- Identify TCP/IP Fundamentals
- Identify Linux Server Roles
- Connect to a Network
- Configure DHCP and DNS Client Services
- Configure Cloud and Virtualization Technologies
- Troubleshoot Networking Issues
Module 11: Managing Packages and Software
- Identify Package Managers
- Manage RPM Packages with YUM
- Manage Debian Packages with APT
- Configure Repositories
- Acquire Software
- Build Software from Source Code
- Troubleshoot Software Dependency Issues
Module 12: Securing Linux SystemsModule 13: Working with Bash Scripts
- Customize the Bash Shell Environment
- Identify Scripting and Programming Fundamentals
- Write and Execute a Simple Bash Script
- Incorporate Control Statements in Bash Scripts
Module 14: Automating Tasks
- Schedule Jobs
- Implement Version Control Using Git
- Identify Orchestration Concepts
Module 15: Installing Linux
- Prepare for Linux Installation
- Perform the Installation
Module 1: Instructions
- Introduction
- Introduction To Building Labs
- Things You Need To Do
- Install Demo Virtual Box
- Navigation
- Commands With LabDemo
- Internal And External Commands
- Overview Of Shell Commands Tricks
- Exploring Shell Configuration
- Stream Redirection
- Overview Of Processing Text Using Filters
- Overview File-Viewing Commands
- Overview Using Grep
- Sed Syntax And Summary
- Overview Of Exam Essentials
Module 2: Managing Software
- Managing Software
- Managing Software
- Overview Using RPM
- RPM-Part 2
- Overview Using Cpio
- Overview Using Debian And Apt Cache
- Using Apt-get
- Debian Tools
- Managing Shared Libraries
- Overview Locating Library Files
- Foreground and Background Processes
- Managing Software Summary
Module 3: Configuring Hardware
- Configuring Hardware
- Configuring Devices
- Configuring USB
- Configuring Hard Disk
- Designing Hard Disk Layout
- Logical Volume Management
- Overview Using Fdisk
- Overview Common File System Types
- Creating Filesystem
- Overview Maintaining File System Health
- Configuring Hardware Summary
Module 4: Managing Files
- Managing Files
- File Archiving Commands
- Managing Files Ownership
- Managing Disk Quotas
- Directories And Content
- Overview Tools For Locating Files
- Overview Of Exam Essentials
Module 5: Booting Files
- Booting Linux And Editing Files
- Boot And Reboot
- Understanding The Boot Process
- Run Levels Process
- Managing Run Level Services
- Editing With Vi
- Booting Summary
Module 6: X
- X Windows Systems
- X Configuration Options
- X Configuration Options-Part 2
- Untitled Media
- Configuring X Featuring Fonts
- Overview Managing GUI Logins
- Using X For Remote Access
- X Accessibility
- Addition Assistive Technologies
- Configuring Localization And Internationalization
- Querying And Setting Your Locale
- Configuring Printing-Part 1
- Configuring Printing-Part 2
- Using Web-Based CUPS Utilities
Module 7: Admin
- Administering
- Directly Modifying Account Configuration
- Components Of Account
- Adding Groups
- Tuning User And System Environments
- Reviewing Log File Contents
- Maintaining System Time
- Admin Summary
Module 8: Basic Networking
- Basic Networking
- Network Addressing-Part 1
- Network Addressing-Part 2
- DNS Data Flow Zone And Resolution
- Network Ports
- Connections
- Testing Connectivity
- Wireshark Demo
- Basic Networking Summary
Module 9: Scripts
- Scripts E-mail And Databases
- Writing Scripts-Part 1
- Writing Scripts-Part 2
- Managing E-mail
- Managing Data With SQL
- Advantages Of Database
- Scripts Summary
Module 10: Security
- Security
- Configuring Xinetd
- Uninstalling Or Reconfiguring Servers
- Tools For Managing Passwords
- Configuring SSH
- SSH Keys
- Controlling SSH Access
- Using GPG
- Security Summary
Module 1: Over-The-Air Technologies
- Introduction
- Over-The-Air-Technologies
- Wireless Technologies-Part 1
- Wireless Technologies-Part 2
- Radio Frequency
- RF Power Fun
- Antennas
- Issues With RF
- NON Wireless
- Governing Bodies And Regulations
Module 2: Network Infrastructure
- Network Foundations-Part 1
- Network Foundations-Part 2
- Network Foundations-Part 3
- Network Foundations-Part 4
- OSI Model Review
- Wireless Terms And Terminology-Part 1
- Wireless Terms And Terminology-Part 2
- Wireless Media And Communication
- Unified Wireless Architecture
- SSIDs And VLANs
Module 3: Mobile Device Manager
- Mobile Device Management-Part 1
- Profiles And Polices-Part 1
- Profiles And Polices-Part 2
- Enterprise Mail And Messaging
- Wireless Site Survey-Part 1
- Wireless Site Survey-Part 2
- Wireless Site Survey-Part 3
- Wireless Site Survey-Part 4
- Wireless Device Management-Part 1
- Wireless Device Management-Part 2
Module 4: Security
- Mobile Device Security
- Network Security 101
- Security Protocols-Part 1
- Security Protocols-Part 2
- Security Protocols-Part 3
- EAP Overview
- Encryption Overview-Part 1
- Encryption Overview-Part 2
- Common Security Troubleshooting
- Wireless Risks-Part 1
- Wireless Risks-Part 2
- Other Risks
Module 5: Troubleshooting
- Wireless Troubleshooting-Part 1
- Wireless Troubleshooting-Part 2
- Wireless Troubleshooting-Part 3
- Conclusion
Module 1 – Networking Concepts
- Module 1 Workbook
- Intro Network Plus N10 007
- Basic Networking
- Activity Basic Networking
- OSI Model
- Exploring the OSI Model- Act
- Protocol and Ports
- Activity Examining Protocols and Ports
- Connection-oriented vs. connectionless
- Activity Comparing TCP and UDP
- Internet Protocol (IP)
- Activity Examining the Lower Layer Protocols
- Layer 7 Remote Control Protocols
- Layer 7 File Transfer Protocols
- Layer 7 Messaging Protocols
- Activity Examining Messaging Protocols
- Layer 7 Web Traffic Protocols
- Layer 7 Streaming Media Protocols
- Layer 7 Infrastructure Management Protocols
- Switching
- Activity Creating Collision and Broadcast Domains
- Interface Properties and Segmentation
- Activity Creating a Basic Network Segment
- Switching prt 2
- Activity Switching
- Switching Loop Management
- Activity Managing Switching Loops
- VLANs
- Activity Creating VLANs
- routing
- Activity Examining ARP
- IP Addressing Basics
- Activity Configuring IP
- Routers
- Activity Setting Up a Router
- Routing Basics
- Activity Adding Static Routes
- VLAN Routing
- Activity Routing Between VLANs
- NAT/PAT
- Activity Configuring NAT/PAT
- Routing Protocols
- Activity Configuring a Routing Protocol
- Firewalls
- Activity Configuring Firewalls
- Advanced Switching and Routing Concepts
- Activity Exploring IPv6
- Performance Concepts
- IP Addressing
- Subnetting
- Activity Learning to Subnet
- Address Assignments
- Network Types and Topologies
- Wireless Topologies
- Network Types
- Technologies that Facilitate the Internet Of Things (IoT)
- Wireless Technologies
- 802.11 Standards
- Wi-Fi Frequencies
- Wi-Fi Antenna Concepts
- Bluetooth
- Cellular
- Activity Using an RF Spectrum Analyzer
- cloud concepts
- Activity Exploring Cloud Services
- Network Services
- Activity Setting up DNS
- DHCP Service
- Activity Setting Up DHCP
- NTP
Module 2 – Infrastructure
- Module 2 Workbook
- Module 2 – Infrastructure
- Activity Testing a Fiber Optic Cable
- Plenum vs. PVC
- Activity Crimping on an RJ-45 Connector
- Transceivers
- Activity Terminating Cable to a 110 Block
- Copper Cable Standards
- Activity Creating a Crossover Cable
- Ethernet Deployment Standards
- Network Device Placement and Installation
- Repeater
- Router
- Modem
- Activity Setting up a WAP
- Firewall
- Media Converter
- Advanced Network Devices
- Wireless Controller
- Proxy Server
- Activity Configuring Proxy Settings
- VPN Concentrator
- Virtual Networking Components
- Network Storage Types
- WAN Technologies
- Transmission Mediums
- Activity Configuring WAN Links
- Termination
Module 3 – Network Operation
- Module 3 Workbook
- Network Operations Documentation
- Standard Operation Procedures
- Logical vs Physical Diagrams
- Rack Diagrams
- Change Management
- Wiring and Ports Locations
- IDF-MDF Documentation
- Labeling
- Using Documentation Act
- Continuity and Disaster
- MTTR Mean Time Repair
- Recovery
- Backing Up Your Data Act
- Event Management
- Metrics
- Scanning Monitoring Patching
- Testing the Network Act
- HTTPS-Management
- Out-of-Band Management
- RDP
- Remote Access Methods
- Remote File Access
- Making Remote Connections Act
- SSH
- VNC
- Policies and Best Practices
- Creating Policies and Procedures Act
Module 4 – Network Security
- Module 4 Workbook
- Physical Security Devices
- Examining Security Devices Act
- Authentication and Access
- Access Controls Methods Act
- Multifactor Authentication
- Basic Wireless Network Security
- Demonstrating the Need for Wireless Act
- Common Network Attacks
- Conducting a Phishing Campaign Act
- Network Device Hardening
- Supporting Secure Authentication Encryption Act
- Updating Firmware
- Explain Common Mitigation Techniques
- Implementing a Honey Pot Act
Module 5 – Network Troubleshooting and Tools
- Module 5 Workbook
- Network Troubleshoot
- Using the Appropriate Tools
- Hardware Tools Analyzers
- Troubleshooting With Hardware Tools Act
- Software Tools
- Troubleshooting with Software Tools Act
- Software Tools Command Line
- Troubleshooting with Command Line Tools Act
- Troubleshoot Common Wired Connectivity
- Troubleshooting Signal Problems
- Physical Issues
- Transceiver Issues
- Troubleshooting Transceiver Problems
- Traffic Flow Issues
- Troubleshoot Common Wireless Connectivity
- Latency and Jitter
- Incorrect WAP Types
- Troubleshooting WAP Issues
- Troubleshooting Common Network
- DHCP Issues
- Firewall ACL Issues
- Advanced Network Issues
- Unresponsive Services
- Case Study Troubleshooting
- Outro N10 007
- Module 1 Notes
- 1.0 PenTest Plus Introduction
- 1.1 PenTest Plus Topics
- 1.2 PenTest Engagement
- 1.3 Threat Modeling
- 1.4 Technical Constraints
- 1.5 PenTest Engagement Review
- 1.6 Examining PenTest Engagement Documents Act
Module 2 – Passive Reconnaissance
- Module 2 Notes
- 2.1 Passive Reconnaissance part1
- 2.2 WHOIS Act
- 2.3 Passive Reconnaissance part2
- 2.4 Google Hacking Act
- 2.5 Passive Reconnaissance part3
- 2.6 DNS Querying Act
- 2.7 Passive Reconnaissance part4
- 2.8 Email Server Querying Act
- 2.9 SSL-TLS Cerfificates
- 2.10 Shodan Act
- 2.11 The Havester
- 2.12 TheHarvester Act
- 2.13 Recon-ng
- 2.14 Recon-g Act
- 2.14 Recon-ng-Part-2-API-key Act
- 2.15 Maltego
- 2.16 Have I been Pwned
- 2.17 Punked and Owned Pwned Act
- 2.18 Fingerprinting Organization with Collected Archives
- 2.19 FOCA Act
- 2.20 Findings Analysis Weaponization
- 2.21 Chp 2 Review
Module 3 – Active Reconnaissance
- Module 3 Notes
- 3.1 Active Reconnaissannce
- 3.2 Discovery Scans Act
- 3.3 Nmap
- 3.4 Nmap Scans Types Act
- 3.5 Nmap Options
- 3.6 Nmap Options Act
- 3.7 Stealth Scans
- 3.8 Nmap Stealth Scans Act
- 3.9 Full Scans
- 3.10 Full Scans Act
- 3.11 Packet Crafting
- 3.12 Packet Crafting Act
- 3.13 Network Mapping
- 3.14 Metasploit
- 3.15 Scanning with Metasploit Act
- 3.16 Enumeration
- 3.17 Banner Grabbing Act
- 3.18 Windows Host Enumeration
- 3.19 Winddows Host Enumeration Act
- 3.20 Linux Host Enumeration
- 3.21 Linux Host Enumeration Act
- 3.22 Service Enumeration
- 3.23 Service Enumeration Act
- 3.24 Network Shares
- 3.25 SMB Share Enumeration Act
- 3.26 NFS Network Share Enumeration
- 3.27 NFS Share Enumeration Act
- 3.28 Null Sessions
- 3.29 Null Sessions Act
- 3.30 Website Enumeration
- 3.31 Website Enumeration Act
- 3.32 Vulnerability Scans
- 3.33 Compliance Scans Act
- 3.34 Credentialed Non-credentialed Scans
- 3.35 Using Credentials in Scans Act
- 3.36 Server Service Vulnerability Scan
- 3.37 Vulnerability Scanning Act
- 3.38 Web Server Database Vulnerability Scan
- 3.39 SQL Vulnerability Scanning Act
- 3.40 Vulnerability Scan Part 2 OpenVAS Act
- 3.41 Web App Vulnerability Scan
- 3.42 Web App Vulnerability Scanning Act
- 3.43 Network Device Vulnerability Scan
- 3.44 Network Device Vuln Scanning Act
- 3.45 Nmap Scripts
- 3.46 Using Nmap Scripts for Vuln Scanning Act
- 3.47 Packet Crafting for Vulnerbility Scans
- 3.48 Firewall Vulnerability Scans
- 3.49 Wireless Access Point Vunerability
- 3.50 Wireless AP Scans Act
- 3.51 WAP Vulnerability Scans
- 3.52 Container Security issues
- 3.53 How to Update Metasploit Pro Expired Trial License
Module 4 – Physical Security
- Module 4 Notes
- 4.1 Physical Security
- 4.2 Badge Cloning Act
- 4.3 Physical Security Review
Module 5 – Social Engineering
- Module 5 Notes
- 5.1 Social Engineering
- 5.2 Using Baited USB Stick Act
- 5.3 Using Social Enginnering to Assist Attacks
- 5.4 Phishing Act
- 5.5 Social Engineering Review
Module 6 – Vulnerability Scan Analysis
- Module 6 Notes
- 6.1 Vulnerbility Scan Analysis
- 6.2 Validating Vulnerability Scan Results Act
- 6.3 Vulnerbility Scan Analysis Review
Module 7 – Password Cracking
- Module 7 Notes
- 7.1 Password Cracking
- 7.2 Brute Force Attack Against Network Service Act
- 7.3 Network Authentication Interception Attack
- 7.4 Intercepting Network Authentication Act
- 7.5 Pass the Hash Attacks
- 7.6 Pass the Hash Act
- 7.7 Password Cracking Review
Module 8 – Penetrating Wired Networks
- Module 8 Notes
- 8.1 Penetrating Wired Network
- 8.2 Sniffing Act
- 8.3 Eavesdropping
- 8.4 Eavesdropping Act
- 8.5 ARP Poisoning
- 8.6 ARP Poisoning Act
- 8.7 Man In The Middle
- 8.8 MITM Act
- 8.9 TCP Session HiJacking
- 8.10 Server Message Blocks SMB Exploits
- 8.11 SMB Attack Act
- 8.12 Web Server Attacks
- 8.13 FTP Attacks
- 8.14 Telnet Server Attacks
- 8.15 SSH Server Attacks
- 8.16 Simple Network Mgmt Protocol SNMP
- 8.17 Simple Mail Transfer Protocol SMTP
- 8.18 Domain Name System DNS Cache Poisoning
- 8.19 Denail of Service Attack DoS-DDoS
- 8.20 DoS Attack Act
- 8.21 VLAN Hopping Review
Module 9 – Penetrating Wireless Networks
- Module 9 Notes
- 9.1 Penetrating Wireless Networks
- 9.2 Jamming Act
- 9.3 Wireless Sniffing
- 9.4 Replay Attacks
- 9.5 WEP Cracking Act
- 9.6 WPA-WPA2 Cracking
- 9.7 WAP Cracking Act
- 9.8 Evil Twin Attacks
- 9.9 Evil Twin Attack Act
- 9.10 WiFi Protected Setup
- 9.11 Bluetooth Attacks
- 9.12 Penetrating Wireless Networks
Module 10 – Windows Exploits
- Module 10 Notes
- 10.1 Windows Exploits
- 10.2 Dumping Stored Passwords Act
- 10.3 Dictionary Attacks
- 10.4 Dictionary Attack Against Windows Act
- 10.5 Rainbow Table Attacks
- 10.6 Credential Brute Force Attacks
- 10.7 Keylogging Attack Act
- 10.8 Windows Kernel
- 10.9 Kernel Attack Act
- 10.10 Windows Components
- 10.11 Memory Vulnerabilities
- 10.12 Buffer Overflow Attack Act
- 10.13 Privilegde Escalation in Windows
- 10.14 Windows Accounts
- 10.15 Net and WMIC Commands
- 10.16 Sandboxes
Module 11 – Linux Exploits
- Module 11 Notes
- 11.1 Linux Exploits
- 11.2 Exploiting Common Linux Features Act
- 11.3 Password Cracking in Linux
- 11.4 Cracking Linux Passwords Act
- 11.5 Vulnerability Linux
- 11.6 Priviledge Escalation Linux
- 11.7 Linux Accounts
- 11.8 Linux Exploits Review
Module 12 – Mobile Devices
- Module 12 Notes
- 12.1 Mobile Devices
- 12.2 Hacking Android Act
- 12.3 Apple Exploits
- 12.4 Moblie Devices Review
Module 13 – Specialized Systems
- Module 13 Notes
- 13.1 Specialized Systems
- 13.2 Specialized Systems Review
Module 14 – Scripts
- Module 14 Notes
- 14.1 Scripts
- 14.2 Powershell
- 14.3 Python
- 14.4 Ruby
- 14.5 Common Scripting Elements
- 14.6 Scripts Review
- 14.7 Better Ping Sweep
- 14.8 Simple Port Scanner2
- 14.9 Multitarget Port Scanner
- 14.10 Port Scanner with Nmap
- 14.11 Scripts Review
Module 15 – Application Testing
- Module 15 Notes
- 15.1 Application Testing
- 15.2 Reverse Engineering
Module 16 – Web App Exploits
- Module 16 Notes
- 16.1 Webb App Exploits
- 16.2 Injection Attacks
- 16.3 HTML Injection
- 16.4 SQL Hacking – SQLmap Act
- 16.5 Cross-Site Attacks
- 16.6 Cross-Site Request Forgery
- 16.7 Other Web-based Attacks
- 16.8 File Inclusion Attacks
- 16.9 Web Shells
- 16.10 Web Shells Review
Module 17 – Lateral Movement
- Module 17 Notes
- 17.1 Lateral Movement
- 17.2 Lateral Movement with Remote Mgmt Services
- 17.3 Process Migration Act
- 17.4 Passing Control Act
- 17.5 Pivoting
- 17.6 Tools the Enable Pivoting
- 17.7 Lateral Movement Review
Module 18 – Persistence
- Module 18 Notes
- 18.1 Persistence
- 18.2 Breeding RATS Act
- 18.3 Bind and Reverse Shells
- 18.4 Bind Shells Act
- 18.5 Reverse Shells
- 18.6 Reverse Shells Act
- 18.7 Netcat
- 18.8 Netcat Act
- 18.9 Scheduled Tasks
- 18.10 Scheduled Tasks Act
- 18.11 Services and Domains
- 18.12 Persistence Review
Module 19 – Cover Your Tracks
- Module 19 Notes
- 19.1 Cover Your Tracks
- 19.2 Cover Your Tracks – Timestomp Files Act
- 19.3 Cover Your Tracks – Frame the Administrator Act
- 19.4 Cover Your Tracks – Clear the Event Log Act
- 19.5 Cover Your Tracks Review
Module 20 – The Report
- Module 20 Notes
- 20.1 The Report
- 20.2 The Report Review
Module 21 – Post Engagement Cleanup
- Module 21 Notes
- 21.1 Post Engagement Cleanup_1
- 21.3 Post Engagement Cleanup Review
- 21.4 PenTest Plus Conclusion
Module 1: Information Security Roles Security Control and Framework Types
- Introduction and Overview
- Compare and Contrast Information Security Roles
- Compare and Contrast Security Control and Framework Types
- Module Summary
Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources
- Explain Threat Actor Types and Attack Vectors
- Explain Threat Intelligence Sources
- Module Summary
Module 3: Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing
- Assess Organizational Security with Network Reconnaissance Tools
- Packet Capture and Replay Demo
- Explain Security Concerns with General Vulnerability Types
- Summarize Vulnerability Scanning Techniques
- Explain Penetration Testing Concepts
- Module Summary
Module 4: Social Engineering, Indicators of Malware Attacks
- Compare and Contrast Social Engineering Techniques
- Analyze Indicators of Malware-based Attacks
- Fork Bomb Malware Demo
- Module Summary
Module 5: Cryptography
- Compare and Contrast Cryptographic Ciphers
- Summarize Cryptographic Modes of Operation
- Summarize Cryptographic Use Cases and Weaknesses
- Summarize Other Cryptographic Technologies
- Module Summary
Module 6: Certificates and PKI
- Implement Certificates and Certificate Authorities
- Implement PKI Management
- Implementing a PKI Demo
- Module Summary
Module 7: Authentication
- Summarize Authentication Design Concepts
- Implement Knowledge-based Authentication
- Password Cracker Demo
- Implement Authentication Technologies
- Summarize Biometrics Authentication Concepts
- Module Summary
Module 8: Identity and Accounts, Authorization, Personnel Polices
- Implement Identity and Account Types
- Implement Account Policies
- Account Types and Polices Demo
- Implement Authorization Solutions
- Explain the Importance of Personnel Policies
- Module Summary
Module 9: Network Design and Hardware (Part 1)
- Implement Secure Network Designs
- Implement Secure Switching and Routing
- Various Types of Network Attacks Demo
- Implement Secure Wireless Infrastructure
- Implement Load Balancers
- Module Summary
Module 10: Network Hardware (Part 2)
- Implement Firewalls and Proxy Servers
- Implement Network Security Monitoring
- Summarize the Use of SIEM
- Module Summary
Module 11: Network Protocols
- Implement Secure Network Operations Protocols
- Implement Secure Application Protocols
- Implement Secure Remote Access Protocols
- Module Summary
Module 12: Endpoint Security
- Implement Secure Firmware
- Implement Endpoint Security
- Endpoint Protection Demo
- Explain Embedded System Security Implications
- Module Summary
Module 13: Mobile Devices
- Implement Mobile Device Management
- Implement Secure Mobile Device Connections
- Module Summary
Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation
- Analyze Indicators of Application Attack
- Analyze Indicators of Web Application Attacks
- Summarize Secure Coding Practices
- Implement Secure Script Environments
- Summarize Deployment and Automation Concepts
- Module Summary
Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualization
- Summarize Secure Cloud and Virtualization Services
- Apply Cloud Security Solutions
- Summarize Infrastructure as Code Concepts
- Module Summary
Module 16: Privacy and Data Protection
- Explain Privacy and Data Sensitivity Concepts
- Explain Privacy and Data Protection Controls
- Module Summary
Module 17: Incident Response
- Summarize Incident Response Procedures
- Utilize Appropriate Data Sources for Incident Response
- Apply Mitigation Controls
- Module Summary
Module 18: Forensics
- Explain Key Aspects of Digital Forensics Documentation
- Explain Key Aspects of Digital Forensics Evidence Acquisition
- Module Summary
Module 19: Risk Management and Business Impact Analysis
- Explain Risk Management Processes and Concepts
- Explain Business Impact Analysis Concepts
- Module Summary
Module 20: Redundancy and Backup Strategies
- Implement Redundancy Strategies
- Implement Backup Strategies
- Implement Cybersecurity Resiliency Strategies
- Module Summary
Module 21: Physical Security
- Explain the Importance of Physical Site Controls
- Explain the Importance of Physical Host Security Controls
- Module Summary
Module 22: Afterword
- Conclusion and General Exam Tips
Module 1: Threats, Attacks and Vulnerabilities
- Module 1 Workbook
- Introduction
- Types Of Malware-Part 1
- Types Of Malware-Part 2
- Types Of Attacks-Part 1
- Types Of Attacks-Part 2
- Types Of Attacks-Part 3
- Types Of Attacks-Part 4
- Types Of Attacks-Part 5
- Threat Actors-Part 1
- Threat Actors-Part 2
- Penetration Testing And Vulnerability Scanning-Part 1
- Penetration Testing And Vulnerability Scanning-Part 2
- Impact Of Vulnerabilities-Part 1
- Impact Of Vulnerabilities-Part 2
Module 2: Technologies and Tools
- Module 2 Workbook
- Networking Hardware And Software-Part 1
- Networking Hardware And Software-Part 2
- Networking Hardware And Software-Part 3
- Networking Hardware And Software-Part 4
- Networking Hardware And Software-Part 5
- Networking Hardware And Software-Part 6
- Security Assessment-Part 1
- Security Assessment-Part 2
- Troubleshooting Issues-Part 1
- Troubleshooting Issues-Part 2
- Securing Mobile Devices-Part 1
- Securing Mobile Devices-Part 2
- Securing Mobile Devices-Part 3
- Securing Mobile Devices-Part 4
- Secure Protocols-Part 1
- Secure Protocols-Part 2
Module 3: Architecture and Design
- Module 3 Workbook
- Secure Network Architecture-Part 1
- Secure Network Architecture-Part 2
- Secure System Designs-Part 1
- Secure System Designs-Part 2
- Secure Staging Deployment Concepts
- Embedded Systems-Part 1
- Embedded Systems-Part 2
- Application Development And Deployment-Part 1
- Application Development And Deployment-Part 2
- Application Development And Deployment-Part 3
- Physical Security Controls-Part 1
- Physical Security Controls-Part 2
- Physical Security Controls-Part 3
- Cloud Virtualization-Part 1
- Cloud Virtualization-Part 2
Module 4: Identity and Access Management
- Module 4 Workbook
- Identity And Access Management-Part1
- Identity And Access Management-Part2
- Identity And Access Services-Part1
- Identity And Access Services-Part2
- Management Controls-Part1
- Management Controls-Part2
- Account Management Practices-Part1
- Account Management Practices-Part2
- Account Management Practices-Part3
Module 5: Risk Management
- Module 5 Workbook
- Organizational Security-Part1
- Organizational Security-Part2
- Business Impact Analysis Concepts-Part1
- Business Impact Analysis Concepts-Part2
- Risk Management-Part1
- Risk Management-Part2
- Incident Response Procedures-Part1
- Incident Response Procedures-Part2
- Forensics-Part1
- Forensics-Part2
- Disaster Recovery-Part1
- Disaster Recovery-Part2
- Types Of Control-Part1
- Types Of Control-Part2
- Data Security And Privacy Practices-Part1
- Data Security And Privacy Practices-Part2
Module 6: Cryptography and PKI
- Module 6 Workbook
- Cryptographic Basics-Part1
- Cryptographic Basics-Part2
- Cryptographic Basics-Part3
- Cryptographic Algorithms-Part1
- Cryptographic Algorithms-Part2
- Wireless Security-Part1
- Wireless Security-Part2
- Implementing PKI-Part1
- Implementing PKI-Part2
- Implementing PKI-Part3
- Conclusion
- 1.1 Course Overview
- 1.2 Course PreReqs
Module 2: Kubernetes and Container Fundamentals
- 2.1 Core Concepts
- 2.2 What is the CKAD Exam
- 2.3 Why Get Certified
- 2.4 CKAD Exam Domains
- 2.5 APIs
- 2.6 Demo – Explore APIS
- 2.7 Pods
- 2.8 Whiteboard – Pod Creation Workflow
- 2.9 Create a Pod
- 2.10 Lifecycle Status
- 2.11 Inspecting Pods
- 2.12 Demo – Create a Pod and Inspect
Module 3: Configuration
- 3.1 Configuration
- 3.2 Understand Configmaps
- 3.3 Understand Security Contexts
- 3.4 Demo – Create a Security Context
- 3.5 Create and Consume Secrets
- 3.6 Understand Service Accounts
- 3.7 Demo – Create a Pod to Use a Secret
- 3.8 Demo – Define a Service Account
Module 4: Multi Container Pods
- 4.1 Multi Container Pods
- 4.2 Multi Container Pods Design and Patterns
- 4.3 Ambassador Containers
- 4.4 Connecting to Pods
- 4.5 Side Cars
- 4.6 Demo – Create an Init Container
Module 5: Observability
- 5.1 Observability
- 5.2 Container Health
- 5.3 Probes
- 5.4 Logging
- 5.5 Monitor Resources and Apps
- 5.6 Monitoring Pods
- 5.7 Demo – Monitoring and Logging
Module 6: Pod Design
- 6.1 Pod Design
- 6.2 Deployments
- 6.3 Rolling Updates
- 6.4 Pod Changes
- 6.5 Jobs and Crons
- 6.6 Labels and Annotations
- 6.7 Demo – Define and Query Labels
- 6.8 Scalability Options
Module 7: Services and Networking
- 7.1 Services and Networking
- 7.2 Understanding Networking, Routing and Services
- 7.3 Network Policies
- 7.4 Namespaces
- 7.5 Demo – Networking
Module 8: State Persistence
- 8.1 State Persistence
- 8.2 Storage Options
- 8.3 Volume Storage
- 8.4 Configure Pod Volumes
- 8.5 Configure Persistent Volumes
- 8.6 Whiteboard – Persistent Volumes
Module 9: CKA Practice Exams
- 9.1 CKAD Practice Preparation
- 9.2 Exam Prep Need to Know
- 9.3 Question 1 – Create a Pod and Inspect
- 9.4 Question 2 – Define a Pods Readiness
- 9.5 Question 3 – Create a Pod with a Secret
- 9.6 Question 4 – View Pods logs in Real Time
- 9.7 Question 5 – Define and query labels
- 9.8 Additional Questions
Module 10: Course Closeout
-
- 10.1 Course Closeout
- 10.2 Course Summary Review
- 10.3 Kubernetes Certifications
- 10.4 Additional Resources
- 10.5 Exam Review
- 10.6 Course Closeout
- 1.1 Course Overview
- 1.2 Course PreReqs
Module 2: Kubernetes and Container Fundamentals
- 2.1 Core Concepts
- 2.2 What is the CKA Exam
- 2.3 Why Get Certified
- 2.4 CKA Exam Domains
- 2.5 What is Kubernetes
- 2.6 What is a Container
- 2.7 What is Docker
- 2.8 Kubernetes Terminology
- 2.9 Kubernetes Components
- 2.10 Kubernetes Documentation
- 2.11 Whiteboard – Kubernetes Overview
Module 3: Kubernetes Installation
- 3.1 Kubernetes Installation
- 3.2 Installation Options
- 3.3 MiniKube
- 3.4 Demo – Install Minikube
- 3.5 Demo – Clusters
- 3.6 Kubectl Basics
- 3.7 Demo – Install Kubectl
Module 4: Working with Kubernetes Clusters and Nodes
- 4.1 Working with Kubernetes Clusters and Nodes
- 4.2 Understanding the Architecture
- 4.3 Understanding the nodes
- 4.4 Core Objects
- 4.5 API
- 4.6 Create a Cluster
- 4.7 Demo – Create a Cluster
- 4.8 Demo – YAML
- 4.9 Demo – Nodes
- 4.10 Demo – Kubectl Client Config
Module 5: API Access and Commands
- 5.1 API Access and Commands
- 5.2 About the API
- 5.3 Accessing the APIs
- 5.4 Demo – Exploring APIS
- 5.5 Kubectl
- 5.6 Using YAML for API Objects
- 5.7 Using Curl
- 5.8 Labels and Annotations
Module 6: Running Pods and Deployments
- 6.1 Running Pods and Deployments
- 6.2 Pods and Deployments
- 6.3 What is a Namespace
- 6.4 Scalability Options
- 6.5 Rolling Updates
- 6.6 Apply Changes to a Pod
- 6.7 Stateful Sets
- 6.8 Demo – Manage Deployments
Module 7: Configuring Storage
- 7.1 Configuring Storage
- 7.2 Storage options with Kubernetes
- 7.3 Configure Pod Volumes
- 7.4 Configure Persistent Volumes
- 7.5 Storage Classes
- 7.6 Whiteboard – Persistent Volumes
- 7.7 Demo – Configure Storage
Module 8: Kubernetes Networking
- 8.1 Kubernetes Networking
- 8.2 Understanding Networking
- 8.3 Services
- 8.4 Network Plugins
- 8.5 DNS
- 8.6 Network Policies
- 8.7 Namespaces
- 8.8 Demo – Networking
- 8.9 Manage High Availability
Module 9: Managing Security
- 9.1 Managing Security
- 9.2 Kubernetes Security
- 9.3 Container and Pod Security
- 9.4 Certificates
- 9.5 API Security
- 9.6 Configmaps and Secrets
- 9.7 Secure Images
- 9.8 Security Context
- 9.9 RBAC
Module 10: Managing Kubernetes In the Enterprise
- 10.1 Managing Kubernetes In the Enterprise
- 10.2 Cluster Management and Maintenance
- 10.3 Demo – Scale Deployment
- 10.4 Demo – Restart Cluster
- 10.5 Demo – Add or Remove Nodes
- 10.6 Demo – Create a Pod in the Background
- 10.7 Kubelet Restarts and Drains
- 10.8 UI Dashboard
- 10.9 Demo – Describe Resources
- 10.10 Kube-scheduler
- 10.11 Demo – Set-Up Alias
Module 11: Kubernetes Monitoring and Troubleshooting
- 11.1 Kubernetes Monitoring and Troubleshooting
- 11.2 Monitoring Resources
- 11.3 Monitoring Pods
- 11.4 Demo – Monitoring Pods
- 11.5 Logging
- 11.6 Demo – Logging
- 11.7 Troubleshooting
- 11.8 Affinity and Taints
Module 12: CKA Practice Exams
- 12.1 CKA Practice Exams
- 12.2 Exam Preparation Must Know
- 12.3 Question 1 – Create a Cluster, Deploy Pods and a Deployment
- 12.4 Question 2 – Create a Pod and Verify
- 12.5 Question 3 – Create a Pod with a Secret
- 12.6 Question 4 – Get Logs on a Pod and Send to File
- 12.7 Question 5 – Liveness Probe
- 12.8 Question 6 – Use Labels
- 12.9 Additional Questions
Module 13: Course Closeout
-
- 13.1 Course Closeout
- 13.2 Course Review
- 13.3 Kubernetes Certifications
- 13.4 Additional Resources
- 13.5 Exam Readiness
- 13.6 Course Closeout
- Course Overview
- Course PreReqs
Module 2: Basics of Kubernetes
- Basics of Kubernetes
- What is Kubernetes
- Business Value of Kubernetes
- What is a Container
- What is Docker
- Kubernetes History
- Kuberntes Terminology
- Kubernetes Components
- Whiteboard – Kubernetes Overview
Module 3: Kubernetes Design and Architecture
- Kubernetes Design and Architecture
- Kubernetes Design Fundamentals
- Whiteboard – Kubernetes Architecture
- Deployment – Nodes, Pods, and Clusters
- Etcd
- Kubectl
- Demo – Install Kubectl
- Demo – Kubernetes Commands
- Demo – Kubernetes Commands
Module 4: Deployments
- Deployments
- Options for Deployment
- Deploying a Containerized Application
- What is Minikube
- Demo – Deploy MiniKube
- Demo – Deploy Cluster Deployment
- Demo – Deploy Services
- Demo – Manage Application
Module 5: Course Closeout
-
- Course Closeout
- Course Review
- Kubernetes Certifications
- Additional Resources
- Kubernetes Job Outlook
- Course Closeout
- Course Overview
- Course Pre Reqs
Module 2: The Basics
- The Basics
- What is DevOps
- DevOps Building Blocks
- DevOps Best Practices
- Why Containers
- What is a Pipeline
- Continuous Integration and Continous Delivery
- Continuous Deployment
- Pipelines – Whiteboard
Module 3: Development
- Development Basics
- CICD Strategy
- Source Control Management
- Demo – Build Management
Module 4: Infrastructure
- Release and Deployments
- Release Management
- Demo – Release Management
- Reliability Engineering
- DevOps Tools
- Infrastructure as Code
- Automation
- Demo – (IaaC) CloudFormation
- Demo – Jenkins
- Demo – GitHub
Module 5: Key Performance Indicators (KPIs)
- Key Performance Indicators (KPI)
- KPI Metrics
- KPI Tools
- Monitoring Applications
- Demo – AWS CloudWatch
Module 6: Course Closeout
- Course Closeout
- 6.1 Module 6 Introduction
- 6.2 Course Review
- Summary Review
- 6.3 Blockchain Roles
- Additional Resources
- DevOps Job Outlook
- Course Closeout
Module 1: Introduction to AWS Basics
- 1.1 Instructor Intro
- 1.2 AWS Basic Intro
- 1.3 What Is AWS
- 1.4 Advantages of cloud computing
- 1.5 Types of cloud computing
Module 2: AWS Web Services and Cloud Platform Services
- 2.1 Console
- 2.2 CLI
- 2.3 Compute/EC2
- 2.4 Database-RDS
- 2.5 Networking and content delivery
- 2.6 Analytics
- 2.7 SQS-SNS
- 2.8 Workmail
- 2.9 SES
- 2.10 Systems manager
- 2.11 CloudTrail
- 2.12 Route53
- 2.13 Elastic Load Balancing (ELB)
- 2.14 Certificate manager
- 2.15 Directory service
- 2.16 Amazon Simple Storage Service (S3)
- 2.17 Identity and Access Management (IAM)
Module 3: AWS Basic Summary
- 3.1 AWS Basic Summary
Module 4: Introduction to AWS Deep Dive
- 4.1 AWS Deep Dive Intro
Module 5: AWS Management of Services and Features Deep Dive
- 5.1 VPC and Endpoint services pt 1
- 5.1 VPC and Endpoint services pt 2
- 5.2 DNS (Route 53)
- 5.3 Elastic Load Balancing (ELB) & Certificate manager pt 1
- 5.3 Elastic Load Balancing (ELB) & Certificate manager pt 2
- 5.4 Compute-EC2 Stand alone and SA with AR pt 1
- 5.4 Compute-EC2 Stand alone and SA with AR pt 2
- 5.5 ASG and Suspended ASG processes pt 1
- 5.5 ASG and Suspended ASG processes pt 2
- 5.6 Code deploy pt 1
- 5.6 Code deploy pt 2
- 5.7 Backups-Recovery of EC2 pt 1
- 5.7 Backups-Recovery of EC2 pt 2
- 5.7 Backups-Recovery of EC2 pt 3
- 5.8 RDS pt 1
- 5.8 RDS pt 2
- 5.8 RDS pt 3
- 5.9 Directory service
- 5.10 Identity and Access Management (IAM) pt 1
- 5.10 Identity and Access Management (IAM) pt 2
- 5.11 Amazon Simple Storage Service (S3)
- 5.12 SES
- 5.13 Cloudwatch
- 5.14 Cloudtrail
Module 6: AWS Deep Dive Summary
- 6.1 AWS Deep Dive Summary
Module 1: Introduction to Cloud Computing
- Welcome
- Why Cloud Computing
- What is Cloud Computing
- Cloud Computing Deployment Models
- Cloud Computing Types
- AWS Cloud Overview
- AWS Management Console Walk-Through
- AWS Shared Responsibility
- Summary
Module 2: Identity and Access Management IAM
- IAM Overview
- IAM Users & Groups Hands-On
- IAM Policies Hands-On
- MFA Overview
- MFA Hands-On
- AWS CLI
- AWS CLI Installation Hands-On
- AWS CLI Hands-On
- IAM Roles
- IAM Roles Hands-On
- IAM Security Tools
- IAM Security Tools Hands-On
- IAM Best Practices
- Shared Responsibility Model for IAM
- IAM Summary
Module 3: Elastic Cloud Computing EC2
- Budget Setup
- EC2 Overview
- EC2 Instance Hands-On
- Security Groups
- Security Groups Hands-On
- SSH Overview
- SSH Using Putty-Windows
- SSH Using CMD-Windows
- EC2 Instance Connect
- EC2 Instance Roles
- EC2 Launch Types
- Shared Responsibility Model for EC2
- EC2 Summary
Module 4: EC2 Storage
- Intro to EC2 Instance Storage
- EBS Volume Overview
- EBS Volume Hands-On
- EBS Snapshots
- EBS Snapshots Hands-On
- AMI Overview
- AMI Hands-On
- EC2 Instance Store
- EC2 Instance Store Hands-On
- Elastic File System – EFS
- Shared responsibility Model for EC2 Storage
- Section Cleanup
- EC2 Instance Storage Summary
Module 5: Elastic Load Balancer and Auto Scaling Group ELB and ESG
- Introduction to Scalability & High-Availability
- High Availability, Scalability and Elasticity
- ELB Overview
- ELB Hands-On
- ASG Overview
- ASG Hands-On
- Section Cleanup
- Summary
Module 6: Amazon S3
- S3 Introduction
- S3 Overview
- S3 Hands-On
- S3 Security
- S3 Bucket Policies Hands-On
- S3 Websites
- S3 Website Hands-On
- S3 Versioning
- S3 Versioning Hands-On
- S3 Access Logs
- S3 Access Logs Hands-On
- S3 Replication
- S3 Replication Hands-On
- S3 Storage Classes
- Snowball, Snowball Edge and SnowMobile
- S3 Summary
Module 7: Database and Analytics
- Database Introduction
- RDS & Aurora Overview
- RDS Database Hands-On
- ElastiCache Overview
- DynamoDB Overview
- DynamoDB Hands-On
- RedShift Overview
- Amazon EMR Overview
- Athena Overview
- AWS Glue
- DMS Overview
- Database & Analytics Summary
Module 8: Other Services
- Other Compute Introduction
- ECS-Fargate-ECR Overview
- What is Serverless
- AWS Lambda
- AWS Lambda Hands-On
- AWS Batch
- AWS LightSail
- AWS LightSail Hands-On
- Other Compute Summary
Module 9: Scaling Your Infrastructure
- CloudFormation Overview
- Cloud Formation Hands-On
- Elastic Beanstalk Overview
- Elastic Beanstalk Hands-On
- AWS CodeDeploy
- AWS SSM
- AWS OpsWorks
- Infrastructure at Scale Summary
Module 10: Global Applications
- Why Global Application
- Route 53
- Route 53 Hands-On
- CloudFront
- CloudFront Hands-On
- S3 Transfer Acceleration
- AWS Global Aceelerator
- Global Application Summary
Module 11: Cloud Integration
- Cloud Integration Introduction
- SQS Service
- SQS Service Hands-On
- SNS Service
- SNS Service Hands-On
- Cloud Integration Summary
Module 12: Cloud Monitoring
- CloudWatch Metrics and Alarms
- CloudWatch Metrics and Alarms Hands-On
- CloudWatch Logs
- CloudWatch Events and EventBridge
- CloudWatch Events and EventBridge Hands-On
- CloudTrail
- X-Ray
- Service Health Dashboard
- Personal Health Dashboard
- Monitoring Summary
Module 13: Virtual Private Network
- Settings the Expectations
- VPC and subnets, Internet Gateway and NAT Gateways
- VPC and subnets, Internet Gateway and NAT Gateways-Hands-On
- NACL and Security Groups
- NACL and Security Groups Hands-On
- VPC Flow Logs
- VPC Peering
- VPC Flow Logs and VPC Peering Hands-On
- VPC Endpoints
- VPC Endpoints Hands-On
- Site-to-Site VPNs and Direct Connect
- Transit Gateway
- VPC Summary
Module 14: Security and Compliance
- Introduction to Security and Compliance
- DDoS Mitigration
- Penetration Testing
- KMS and CloudHSM
- Secrets Manager
- AWS Artifact
- GuardDuty
- Inspector
- AWS Config
- AWS Macie
- Security and Compliance Summary
Module 15: Machine Learning
- Amazon Rekognition
- Amazon Transcribe
- Amazon Polly
- Amazon Translate
- Amazon Lex and Connect
- Amazon Comprehend
- Amazon SageMaker
- Machine Learning Summary
Module 16: Advanced Identity
- Amazon Cognito
- Directory Services
- Single Sign-On (SSO)
- Advanced Identity Summary
Module 17: Are You Well Architected?
- Are You Well Architected
- Operational Excellence
- Security
- Reliability
- Performance Efficiency
- Cost Optimization
- Trusted Advisor
Module 18: Congratulations & Exam Preparation
- Exam Tips & Congratulations
Module 1: Introduction
- Instructor Introduction
- Course Introduction
- Exam Overview
Module 2: Information Security Governance
- Module Overview
- InfoSec Strategic Context Part 1
- InfoSec Strategic Context Part 2
- GRC Strategy and Assurance
- Roles and Responsibilities
- GMA Tasks Knowledge and Metrics
- IS Strategy Overview
- Strategy Implemenation
- Strategy Development Support
- Architecture and Controls
- Considerations and Action Plan
- InfoSec Prog Objectives and Wrap-Up
Module 3: Information Security Risk Management
- Module Overview
- Risk Identification Task and Knowledge
- Risk Management Strategy
- Additional Considerations
- Risk Analysis and Treatment Tasks & Knowledge
- Leveraging Frameworks
- Assessment Tools and Analysis
- Risk Scenario Development
- Additional Risk Factors
- Asset Classification and Risk Management
- Risk Monitoring and Communication
- Information Risk Management Summary
Module 4: InfoSec Prog Development and Management
- Module Overview
- Alignment and Resource Management – Task and Knowledge
- Key Relationships
- Standards Awareness and Training – Tasks and Knowledge
- Awareness and Training
- Building Security into Process and Practices – Tasks and Knowledge
- Additional Technology Infrastructure Concerns
- Security monitoring and reporting Overview Tasks and Knowledge
- Metrics and Monitoring
- Summary
Module 5: Information Security Incident Management
- Module Overview
- Planning and Integration Overview Task and Knowledge
- Incident Response Concepts and Process
- Forensics and Recovery
- Readiness and Assessment – Overview Tasks and Knowledge
- Identification and Response Overview Tasks and Knowledge
- Incident Processes
Module 6: Exam Prep
- Case Study – Security On a Shoestring Budget
- Case Study – APT In Action
- Summary
- Exam Prep
Domain 1: Information Security Governance
- CISM Introduction
- Information Security
- Business Goals, Objectives, and Functions
- Business Goals and Information Security
- Information Security Threats
- Information Security Management
- Identity Management
- Data Protection
- Network Security
- Personnel Security
- Facility Security
- Security Compliance and Standards
- Information Security Strategy
- Inputs and Outputs of the Informtion Security Strategy
- Processes in an Information Security Strategy
- People in an Information Security Strategy
- Technologies in an Indormation Security Strategy
- Logical and Physical Information Security Strategy Architectures
- Information Security and Business Functions
- Information Security Policies and Enterprise Objectives
- International Standards for the Security Management
- ISO/IEC 27000 Standards
- International Info Government Standards
- Information Security Government Standards in the United States
- Methods of Coordinating Information Security Activites
- How to Develop an Information Security Strategy
- Information Security Governance
- Role of the Security in Governance
- Scope of Information Security Governance
- Charter of Information Security Governance
- Information Security Governance and Enterprise Governance
- How to Align Information Security Strategy with Corporate Governance
- Regulatory Requirements and Information Security
- Business Impact of Regulatory Requirements
- Liability Management
- Liability Management Strategies
- How to Identify Legal and Regulatory Requirements
- Business Case Development
- Budgetary Reporting Methods
- Budgetary Planning Strategy
- How to Justify Investment in Info Security
- Organizational Drivers
- Impact of Drivers on Info Security
- Third Party Relationships
- How to Identify Drivers Affecting the Organization
- Purpose of Obtaining Commitment to Info Security
- Methods for Obtaining Commitment
- ISSG
- ISSG Roles and Responsibilities
- ISSG Operation
- How to Obtain Senior Management’s Commitment to Info Security
- Info Security Management Roles and Responsibilities
- How to Define Roles and Responsibilities for Info Security
- The Need for Reporting and Communicating
- Methods for Reporting in an Organization
- Methods of Communication in an Organization
- How to Establish Reporting and Communicating Channels
Domain 2: Risk Management
- Risk
- Risk Assessment
- Info Threat Types
- Info Vulnerabilities
- Common Points of Exposure
- Info Security Controls
- Types of Info Security Controls
- Common Info Security Countermeasures
- Overview of the Risk Assessment Process
- Factors Used in Risk Assessment and Analysis
- Risk Assessment Methodologies
- Quantitative Risk Assessment – Part 1
- Quantitative Risk Assessment – Part 2
- Qualitative Risk Assessment
- Hybrid Risk Assessment
- Best Practices for Info Security Management
- Gap Analysis
- How to Implement an Info Risk Assessment Process
- Info Classification Schemas
- Components of Info Classification Schemas
- Info Ownership Schemas
- Components of Info Ownership Schemas
- Info Resource Valuation
- Valuation Methodologies
- How to Determine Info Asset Classification and Ownership
- Baseline Modeling
- Control Requirements
- Baseline Modeling and Risk Based Assessment of Control Requirements
- How to Conduct Ongoing Threat and Vulnerability Evaluations
- BIA’s
- BIA Methods
- Factors for Determining Info Resource Sensitivity and Critically
- Impact of Adverse Events
- How to Conduct Periodic BIA’s
- Methods for Measuring Effectiveness of Controls and Countermeasures
- Risk Mitigation
- Risk Mitigation Strategies
- Effect of Implementing Risk Mitigation Strategies
- Acceptable Levels of Risk
- Cost Benefit Analysis
- How to Identify and Evaluate Risk Mitigation Strategies
- Life Cycle Processes
- Life Cycle-Based Risk Management
- Risk Management Life Cycle
- Business Life Cycle Processes Affected by Risk Management
- Life Cycled-Based Risk Management Principles and Practices
- How to Integrate Risk Management Into Business Life Cycle Processes
- Significant Changes
- Risk Management Process
- Risk Reporting Methods
- Components of Risk Reports
- How to Report Changes in Info Risk
Domain 3: Information Security Program
- Info Security Strategies
- Common Info Security Strategies
- Info Security Implementation Plans
- Conversation of Strategies Into Implementation Plans
- Info Security Programs
- Info Security Program Maintenance
- Methods for Maintaining an Info Security Program
- Succession Planning
- Allocation of Jobs
- Program Documentation
- How to Develop Plans to Implement an Info Security Strategy
- Security Technologies and Controls
- Cryptographic Techniques
- Symmetric Cryptography
- Public Key Cryptography
- Hashes
- Access Control
- Access Control Categories
- Physical Access Controls
- Technical Access Controls
- Administrative Access Controls
- Monitoring Tools
- IDS’s
- Anti-Virus Systems
- Policy-Compliance Systems
- Common Activities Required in Info Security Programs
- Prerequisites for Implementing the Program
- Implementation Plan Management
- Types of Security Controls
- Info Security Controls Development
- How to Specify info Security Program Activities
- Business Assurance Function
- Common Business Assurance Functions
- Methods for Aligning info Security Programs with Business Assurance Functions
- How to Coordinate Info Security Programs with Business Assurance Functions
- SLA’s
- Internal Resources
- External Resources
- Services Provided by External Resources – Part 1
- Services Provided by External Resources – Part 2
- Skills Commonly Required for Info Security Program Implementation
- Dentification of Resources and Skills Required for a Particular Implementation
- Resource Acquisition Methods
- Skills Acquisition Methods
- Info Security Architectures
- The SABSA Model for Security Architecture
- Deployment Considerations
- Deployment of Info Security Architectures
- How to Develop Info Security Architecture
- Info Security Policies
- Components of Info Security Policies
- Info Security Policies and the Info Security Strategy
- Info Security Policies and Enterprise Business Objectives
- Info Security Policy Development Factors
- Methods for Communicating Info Security Policies
- Info Security Policy Maintenance
- How to Develop Info Security Policies
- Info Security Awareness Program, Training Programs, and Education Programs
- Security Awareness, Training, and Education Gap Analysis
- Methods for Closing the Security Awareness, Training, and Education Gaps
- Security-Based Cultures and Behaviors
- Methods for Establishing and Maintaining a Security-Based Culture in the Enterprise
- How to Develop Info Security Awareness, Training, and Education Programs
- Supporting Documentation for Info Security Policies
- Standards, Procedures, Guidelines, and Baselines
- Codes of Conduct
- NDA’s
- Methods for Developing Supporting Documentation
- Methods for Implementing Supporting Documentation and for Communicating Supporting Documentation
- Methods for Maintaining Supporting Documentation
- C and A
- C and A Programs
- How to Develop Supporting Documentation for Info Security Policies
Domain 4: Information Security Program Implementation
- Enterprise Business Objectives
- Integrating Enterprise Business Objectives & Info Security Policies
- Organizational Processes
- Change Control
- Merges & Acquisitions
- Organizational Processes & Info Security Policies
- Methods for Integrating Info Security Policies & Organizational Processes
- Life Cycle Methodologies
- Types of Life Cycle Methodologies
- How to Integrate Info Security Requirements Into Organizational Processes
- Types of Contracts Affected by Info Security Programs
- Joint Ventures
- Outsourced Provides & Info Security
- Business Partners & Info Security
- Customers & Info Security
- Third Party & Info Security
- Risk Management
- Risk Management Methods & Techniques for Third Parties
- SLA’s & Info Security
- Contracts & Info Security
- Due Diligence & Info Security
- Suppliers & Info Security
- Subcontractors & Info Security
- How to Integrate Info Security Controls Into Contracts
- Info Security Metrics
- Types of Metrics Commonly Used for Info Security
- Metric Design, Development & Implementation
- Goals of Evaluating Info Security Controls
- Methods of Evaluating Info Security Controls
- Vulnerability Testing
- Types of Vulnerability Testing
- Effects of Vulnerability Assessment & Testing
- Vulnerability Correction
- Commercial Assessment Tools
- Goals of Tracking Info Security Awareness, Training, & Education Programs
- Methods for Tracking Info Security Awareness, Training, & Education Programs
- Evaluation of Training Effectiveness & Relevance
- How to Create Info Security Program Evaluation Metrics
Domain 5: Information Security Program Management
- Management Metrics
- Types of Management Metrics
- Data Collection
- Periodic Reviews
- Monitoring Approaches
- KPI’s
- Types of Measurements
- Other Measurements
- Info Security Reviews
- The Role of Assurance Providers
- Comparing Internal and External Assurance Providers
- Line Management Technique
- BudgetingStaff Management
- Facilities
- How to Manage Info Security Program Resources
- Security Policies
- Security Policy Components
- Implementation of Info Security Policies
- Administrative Processes and Procedures
- Access Control Types
- ACM
- Access Security Policy Principles
- Identity Management and Compliance
- Authentication Factors
- Remote Access
- User Registration
- Procurement
- How to Enforce Policy and Standards Compliance
- Types of Third Party Relationships
- Methods for Managing Info Security Regarding Third Parties
- Security Service Providers
- Third Party Contract Provisions
- Methods to Define Security Requirements in SLA’s, Security Provisions and SLA’s, and Methods to Monitor Security
- How to Enforce Contractual Info Security Controls
- SDLC
- Code Development
- Common Techniques for Security Enforcement
- How to Enforce Info Security During Systems Development
- Maintenance
- Methods of Monitoring Security Activities
- Impact of Change and Configuration Management Activities
- How to Maintain Info Security Within an Organization
- Due Diligence Activities
- Types of Due Diligence Activities
- Reviews of Info Access
- Standards of Managing and Controlling Info Access
- How to Provide Info Security Advice and Guidance
- Info Security Awareness
- Types of Info Security Stakeholders
- Methods of Stakeholder Education
- Security Stakeholder Education Process
- How to Provide Info Security Awareness and Training
- Methods of Testing the Effectiveness of Info Security Control
- The Penetration Testing Process
- Types of Penetration Testing
- Password Cracking
- Social Engineering Attacks
- Social Engineering Types
- External Vulnerability Reporting Sources
- Regulatory Reporting Requirements
- Internal Reporting Requirements
- How to Analyze the Effectiveness of Info Security Controls
- Noncompliance Issues
- Security Baselines
- Events Affecting the Security Baseline
- Info Security Problem Management Process
- How to Resolve Noncompliance Issues
Domain 6: Incident Management and Response
- Incident Response Capability
- Components of Incident Response
- BCP
- BIA Phase
- Coop
- DRP
- Alternate Sites
- Develop a BCP
- Develop a DRP
- MTD
- RPO
- RTO
- Data Backup Strategies
- Data Backup Types
- Data Restoration Strategies
- Info Incident Management Practices
- IRP
- Trigger Events and Types of Trigger Events
- Methods of Containing Damage
- How to Develop an IRP
- Escalation Process
- Notification Process
- IRT
- Crisis Communication
- How to Establish an Escalation Process
- Internal Reporting Requirements
- External Reporting Requirements
- Communication Process
- play_circle_outline
- IRP and DRP
- IRP and BCP
- Methods of Identifying Business Resources Essential to Recovery
- How to Integrate an IRP
- Role of Primary IRT Members and Role of Additional IRT Members
- Response Team Tools and Equipment
- How to Develop IRT’s
- BCP testing
- Disaster Recovery Testing
- Schedule Disaster Recovery Testing
- Refine IRP
- How to Test an IRP
- Damage Assessment
- Business Impacts Cause by Security Incidents
- How to Manage Responses to Info Security Incidents
- Computer and Digital Forensics
- Forensic Requirements for Responding to Info Security Incidents
- Evidence Life Cycle
- Evidence Collection
- Evidence Types
- Five Common Rules of Evidence
- Chain of Custody
- How to Investigate an Info Security Incident
- PIR Methods
- Security Incident Review Process
- Investigate Cause of a Security Incident
- Identify Corrective Actions
- Reassess Security Risks After a Security Incident
- How to Conduct a Post-Incident Review
- Outro – Pre Test/Test Strategy
- Post Test
Cloud Concepts, Architecture and Design
- Course Intro
- Cloud Concepts, Architecture and Design – Part 1
- Cloud Concepts, Architecture and Design – Part 2
- Cloud Concepts, Architecture and Design – Part 3
- Cloud Concepts, Architecture and Design – Part 4
- Cloud Concepts, Architecture and Design – Part 5
- Cloud Concepts, Architecture and Design – Part 6
- Cloud Concepts, Architecture and Design – Part 7
- Cloud Concepts, Architecture and Design – Part 8
- Cloud Concepts, Architecture and Design – Part 9
Legal, Risk and Compliance
- Legal, Risk and Compliance Part 1
- Legal, Risk and Compliance Part 2
- Legal, Risk and Compliance Part 3
- Legal, Risk and Compliance Part 4
- Legal, Risk and Compliance Part 5
- Legal, Risk and Compliance Part 6
- Legal, Risk and Compliance Part 7
Cloud Data Security
- Cloud Data Security – Part 1
- Cloud Data Security – Part 2
- Cloud Data Security – Part 3
- Cloud Data Security – Part 4
- Cloud Data Security – Part 5
- Cloud Data Security – Part 6
- Cloud Data Security – Part 7
Cloud Platform and Infrastructure Security
- Cloud Platform and Infrastructure Security – Part 1
- Cloud Platform and Infrastructure Security – Part 2
- Cloud Platform and Infrastructure Security – Part 3
- Cloud Platform and Infrastructure Security – Part 4
- Cloud Platform and Infrastructure Security – Part 5
- Cloud Platform and Infrastructure Security – Part 6
- Cloud Platform and Infrastructure Security – Part 7
- Cloud Platform and Infrastructure Security – Part 8
Cloud Application Security
- Cloud Application Security – Part 1
- Cloud Application Security – Part 2
- Cloud Application Security – Part 3
- Cloud Application Security – Part 4
- Cloud Application Security – Part 5
- Cloud Application Security – Part 6
- Cloud Application Security – Part 7
- Cloud Application Security – Part 8
- Cloud Application Security – Part 9
Cloud Security Operations
- Cloud Security Operations – Part 1
- Cloud Security Operations – Part 2
- Cloud Security Operations – Part 3
- Cloud Security Operations – Part 4
- Cloud Security Operations – Part 5
- Cloud Security Operations – Part 6
- Cloud Security Operations – Part 7
- Cloud Security Operations – Part 8
- Cloud Security Operations – Part 9
- Cloud Security Operations – Part 10
- Cloud Security Operations – Part 11
- Course Outro
Module 1 – Introduction to Ethical Hacking
- Introduction
- Introduction to Hacking
- Information Security Threats and Attack Vectors
- Hacking Concepts
- Ethical Hacking Concepts and Scope
- Information Security Controls Part 1
- Information Security Controls Part 2
- Information Security Laws and Standards
Module 2 – Footprinting and Reconnaissance
- Footprinting and Reconnaissance
- Footprinting Methodology
- Google Hacking
- FootPrinting Through Social Networking
- Website Foot Printing
- Email Foot Printing
- Competitive Intelligence Gathering
- WhoIs Foot Printing
- DNS Logical and Geographical Foot Printing
- Network Footprinting
- Foot Printing
- Foot Printing Tools
- Foot Printing Penetration Testing
- Conduct Recon with Ping Act
- Query DNS with NSLookUp Act
- Discover Website Subdomain with Sublist3r Act
- Obtain OSINT Information About a Person wit Pipl Act
- Gather Contact and Host Information with theHarvester Act
- Automate OSINT Research with Recon-ng Act
- Get Started with Metasploit Act
- Conduct Open Source Intelligence with OSR Framework Act
- Obtain Whois Information with Smart Whois Act
- Extract Links, URLs, and Emails from Websites with Web Data Extractor Act
- Create an Offline Copy of a Website with HTTrack Act
- Trace an Email with eMail Tracker Pro Act
Module 3 – Network Scanning
- Network Scanning
- Discovery Scans
- Port Scans
- Nmap
- Nmap Stealth Scans
- Nmap Options
- H-ping and Other Scanners
- SSDP Scanning
- Scanning Beyond IDS and Firewall
- Banner Grabbing
- Scanning Pen Testing
- Checking for Live Systems with Angry IP Scanner Act
- Network Scanning with MegaPing Act
- Advanced Scanning with nmap Act
- Packet Crafting with Hping3 Act
- Packet Crafting with Colasoft Packet Builder Act
Module 4 – Enumeration
- Enumeration
- Enumeration Technicques Tools
- NetBIOS Enumeration
- SNMP Enumeration
- LDAP Enumeration
- NTP Enumeration
- SMTP and DNS Enumeration
- Enumeration Countermeasures
- Enumeration Penetration Testing
- Enumerate NetBIOS Information with SuperScan Act
- Enumerate NetBIOS Information with NetBIOS Enumerator Act
- Enumerate NetBIOS and LDAP Information with Hyena Act
- Enumerate SNMP WMI and Other Information Using SoftPerfect Network Scanner Act
Module 5 – Vulnerability Analysis
- Vulnerability Analysis
- Vulnerability Assessment Solutions
- Vulnerability Scoring Systems
- Vulnerability Assessment Tools and Reports
- Perform a Vulnerability Scan and Analysis with Nessus Act
Module 6 – Malware Threats
- Malware Threats
- Trojan Concepts
- Trojan Types
- Trojan Tools
- Virus and Worm Concepts
- Virus Types
- Malware Analysis
- Malware Reverse Engineering
- Malware Detection
- Malware Countermeasures
- Malware Penetration Testing
- Infect a Victim with a Remote Access Trojan Act
Module 7 – Sniffing
- Sniffing Concepts
- DHCP Attacks
- MAC Attacks
- ARP Poisoning
- DNS Poisoning
- Sniffing Tools
- Sniffing Countermeasures
- Sniff a Clear Text HTTP Session with Wireshark Act
- Intercept and Crack a Network Login Act
Module 8 – Social Engineering
- Social Engineering
- Human Based Social Engineering
- Computer Based Social Engineering
- Additional Types of Social Enginnering
- Social Engineering Countermeasures
- Social Engineering Penetration Testing
- Fool a User with a Baited USB Stick Act
- Harvest Credentials with Spear Phishing Act
Module 9 – Denial of Service
- Denial of Service
- Common Dos-DDoS Attack Types
- Additional DoS Attack Types
- BotNets
- DoS Countermeasures
- Additional DoS Countermeasures
- DoS Penetration Testing
- Perform a DoS Attack With the Low Orbit ION Cannon Act
- Step Up the DoS Attack With the High Orbit ION Cannon Act
- Perform a Slowloris DoS Attack Act
Module 10 – Session Hijacking
- Session Hijacking
- Browser Session Hijacking
- Way to Compromise a Session Token
- Client Side Attacks
- Hijacking at the Network Level
- Session Hijacking Tools
- Session Hijacking Countermeasures
- Session Hijacking Testing
- Perform a MITM Attack with Ettercap Act
Module 11 – Hacking Webservers
- Hacking Web Servers
- Webserver Attacks
- Methodology of Webserver Attacks
- Webserver Attack and Defense Tools
- Webserver General Defense
- Webserver Specific Attack Countermeasures
- Webserver Patch Management
- Webserver Pen Testing
- Footprint a Web Server with IDServe Act
- Conduct a Simple Web Server Vulnerability Scan with Uniscan Act
- Conduct a Comprehensive Web Server Vulnerability Scan with Uniscan Act
- Brute Force a Web Server with Medusa Act
Module 12 – Hacking Web Applications
- Hacking Web Applications
- Web App Vulnerabilities and Exploits
- Web Application Threats
- Injection Attacks
- Hidden Fields and Clickjacking
- Cross Site Attacks
- Additional Web App Attacks
- Web Hacking Methodology
- Web App Hacking Countermeasures
- Web App Security Tools
- Web Application Penetration Testing
- Conduct a Simple Command Injection Attack Act
- Inject a Malicious Link with Cross Site Scripting Act
- Conduct a Cross Site Request Forgery Attack
Module 13 – SQL Injection
- SQL Injection
- Types of SQL Injection
- SQL Injection Methodology
- SQL Injection Tools
- SQL Injection Countermeasures
- SQL Injection Penetration Testing
- SQL Injection Act
Module 14 – Hacking Wireless Networks
- Hacking Wireless Networks
- Wireless Discovery and Mapping
- WiFi Sniffers
- WiFi Attacks
- WiFi Cracking
- Wireless Hacking Tools
- Bluetooth Hacking
- Wireless Hacking Countermeasures
- Wireless Security Tools
- Wireless Penetration Testing
- Crack a WEP Key with Aircrack-ng Act
- Crack a WPA Key with Aircrack-ng Act
Module 15 – System Hacking
- System Hacking Methodology
- Windows System Vulnerabilities and Exploits
- Linux System Vulnerablities and Exploits
- Password Cracking Methods
- Network Service Password Cracking
- Windows Password Cracking
- Linux Password Cracking
- Password Cracking Tools
- Other Methods of Obtaining Passwords
- Keylogging
- Spyware
- RootKits
- Hiding Files
- Steganography
- Privilege Escalation
- Creating and Maintaining Remote Access
- Hiding Evidence
- System Hacking Penetration Testing
- Spoof Name Resolution and Capture Credentials with Responder Act
- Dump and Crack Password Hashes with pwdump7 and Ophcrack Act
- Crack Passwords with L0pht7 Act
- Exploit Client Side Vulnerabilities Act
- Track User Activity with Spyware Act
- View and Clear Audit Policies with Auditpol Act
- Hide Data Using Whitespace Steganography Act
- Hide Data Using Least Significant Bit Steganography Act
- Cover Your Tracks Act
Module 16 – Hacking Mobile Platforms
- Hacking Mobile Platforms
- Hacking Android OS
- Rooting Android
- Securing Android
- Hacking iOS
- Jailbreaking iOS
- Securing iOS
- Hacking Windows Phone OS
- Hacking Blackberry
- Mobile Device Management
- Mobile Security Guidelines and Tools
- Mobile Penetration Testing
- Prepare Your Wireless Email Environment Act
- Pwn a Mobile Device with Metasploit Act
- Use a Mobile Device in a DDoS Campaign Act
- Return Your VMs to Original Configuration Act
- Uninstall Main Activity Malware from Android Act
Module 17 – Evading IDS, Firewalls, and Honeypots
- Evading IDS Firewalls and Honeypots
- Firewalls
- Honeypots
- IDS Firewalls and Honeypots Tools
- Evasion
- Evasion Countermeasures
- IDS Firewall Honeypot Penetration Testing
- Fly Below IDS Radar Act
- Test and Analyze a Honey Pot Act
- Bypass Windows Firewall Act
Module 18 – Cryptography
- Cryptography
- Encryption Algorithms
- Cryptography Tools
- Public key Infrastructure
- Email Encryption
- Disk Encryption
- Cryptography Attacks
- Crytography Penetration Testing
- Examine Hashing Algorithms Act
- Protect Data with Symmetric Encryption Act
- Protect Data with Asymmetric Encryption Act
Module 19 – Cloud Computing
- Cloud Computing
- Virtualization
- Cloud Computing Threats
- Countermeasures to Cloud Computing Threats
- Cloud Computing Attacks
- Cloud Security
- Cloud Security Best Practices
- Cloud Penetration Testing
Module 20 – IoT Hacking
- IoT Hacking
- IoT Vulnerabilities and Attacks
- IoT Hacking Methodology and Tools
- IoT Hacking Countermeasures
- IoT Penetration Testing
- Search the Internet for Vulnerable IoT Devices Act
- Conclusion
- Introduction
- Audit Process
- Auditing Standards
- Auditing Guidelines
- Cobit Model
- Audit Management
- Internal Control Classifications
- Planning
- Program
- Evidence
- Audit Control Evaluation
- CSA Control Self-Assessment
Lesson 2
- IT Governance
- Governance & Security Policies
- Outsourcing & Governance
- Outsourcing & Globalization
- Organizational Compliance
- IT Strategy
- IT Performance
Lesson 3
- System & Infrastructure
- Requirements
- Project Management Tools – Part 1
- Project Management Tools – Part 2
- Applications
- Agile Development
- Monitoring & Controlling
- Acquisition Process
- Testing Process
- Information Systems Maintenance Practices
- Data Conversion Tools
Lesson 4
- Media Disposal Process
- Post Implementation Review
- Periodic Review
- System Maintenance
Lesson 5
- IT Service Delivery and Support
- How to Evalutate Service Level Management Practices
- Operations Management
- Databases
- Structured Query Language (SQL)
- Monitoring Performance
- Source Code and Perfomance Monitoring
- Patch Management
- Incident Management
- Hardware Component Types
- Network Component Types
Lesson 6
- IS Auditor Technical Overview
- Security Design
- Monitoring Systems
- Types of Attacks
- Cryptography
- Encryption
- Asymmetric Encryption
- Digital Certificate
- Different Kinds of Attacks
- Access Controls
- Identification and Authenication
- Physical Access Exposure
- Environmental Security
- Network Security Devices and Network Components
- Network Address Translation
- Virtual Private Networks (VPNs)
- Voice System Risks
- Intrusion Detection
- Firewalls
- Firewall Implementation
- Network Access Protection
- HoneyPot
- Risks to Portable and Wireless Devices
- Bluetooth
- OSI Networking
- Managing Data
Lesson 7
- Business Continuity and Disaster Recovery
- Fault Tolerance
- Business Continuity and Disaster Recovery Regulations
Module 1: Security and Risk Management
- Introduction
- CIA Triad Security Governance – Part 1
- CIA Triad Security Governance – Part 2
- Compliance Legal And Regulatory Issues – Part 1
- Compliance Legal And Regulatory Issues – Part 2
- Understanding Professional Ethics – Part 1
- Understanding Professional Ethics – Part 2
- Risk Management – Part 1
- Risk Management – Part 2
- Threat Modeling Acquisition Strategy And Practice Security Awareness And Training – Part 1
- Threat Modeling Acquisition Strategy And Practice Security Awareness And Training – Part 2
Module 2: Asset Security
- Asset Security – Part 1
- Asset Security – Part 2
Module 3: Security Engineering
- Engineering And Management Of Security – Part 1
- Engineering And Management Of Security – Part 2
- Engineering And Management Of Security – Part 3
- Engineering And Management Of Security – Part 4
- Engineering And Management Of Security – Part 5
- Engineering And Management Of Security – Part 6
Module 4: Communication and Network Security
- Apply Secure Design Principles To Networks – Part 1
- Apply Secure Design Principles To Networks – Part 2
- Apply Secure Design Principles To Networks – Part 3
- Apply Secure Design Principles To Networks – Part 4
- Apply Secure Design Principles To Networks – Part 5
- Apply Secure Design Principles To Networks – Part 6
- Securing Network Components – Part 1
- Securing Network Components – Part 2
- Design And Establish Secure Communication Channels – Part 1
- Design And Establish Secure Communication Channels – Part 2
- Design And Establish Secure Communication Channels – Part 3
Module 5: Identity and Access Management
- Controlling Access And Managing Identity – Part 1
- Controlling Access And Managing Identity – Part 2
- Controlling Access And Managing Identity – Part 3
- Controlling Access And Managing Identity – Part 4
Module 6: Security Assessment Testing
- Designing Performing And Analyzing Security Testing
Module 7: Security Operations
- Foundational Concepts And Investigations – Part 1
- Foundational Concepts And Investigations – Part 2
- Incident Management And Preventative Measures – Part 1
- Incident Management And Preventative Measures – Part 2
- Disaster Recovery Process – Part 1
- Disaster Recovery Process – Part 2
Module 8: Software Development Security
- Understanding Applying And Enforcing Software Security – Part 1
- Understanding Applying And Enforcing Software Security – Part 2
- Conclusion
- Module 1 Notes
- Intro
- Security and Risk Management pt.1
- Security and Risk Management pt.2
- Security and Risk Management pt.3
- Security and Risk Management Summary
- Security and Risk Management Test Prep pt.1
- Security and Risk Management Test Prep pt.2
- Security and Risk Management Test Prep pt.3
- Security and Risk Management Test Prep pt.4
Module 2: Asset Security
- Module 2 Notes
- Asset Secutity pt.1
- Asset Security pt.2
- Asset Security Summary
- Asset Security Test Prep
Module 3: Security Architecture and Engineering
- Module 3 Notes
- Security Architecture and Engineering pt.1
- Security Architecture and Engineering pt.2
- Security Architecture and Engineering pt.3
- Security Architecture and Engineering Summary
- Security Architecture and Engineering Test Prep pt.1
- Security Architecture and Engineering Test Prep pt.2
- Security Architecture and Engineering Test Prep pt.3
Module 4: Communication and Network Security
- Module 4 Notes
- Communication and Network Security pt.1
- Communication and Network Security pt.2
- Communication and Network Security Summary
- Communication and Network Security Test Prep
Module 5: Identity and Access Management (IAM)
- Module 5 Notes
- Identity and Access Management (IAM)
- Identity and Access Management (IAM) Summary
- Identity and Access Management (IAM) Test Prep pt.1
- Identity and Access Management (IAM) Test Prep pt.2
- Identity and Access Management (IAM) Test Prep pt.3
- Identity and Access Management (IAM) Test Prep pt.4
Module 6: Security Assessment and Testing
- Module 6 Notes
- Security Assessment and Testing
- Security Assessment and Testing Summary
- Security Assessment and Testing Test Prep
Module 7: Security Operations
- Module 7 Notes
- Security Operations pt.1
- Security Operations pt.2
- Security Operations pt.3
- Security Operations pt.4
- Security Operations Summary
- Security Operations Test Prep
Module 8: Software Development Security
- Module 8 Notes
- Software Development Security pt.1
- Software Development Security pt.2
- Software Development Security pt.3
- Software Development Security pt.4
- Software Development Security pt.5
- Software Development Security Summary
- Software Development Security Test Prep
- Outro
Module 1: Computer Forensics Introduction
- Intro To Course-Part1
- Intro To Course-Part2
- Intro To Course-Part3
- Intro To Course-Part4
- Intro To Course-Part5
- Intro To Forensics-Part1
- Intro To Forensics-Part2
- Intro To Forensics-Part3
- Intro To Forensics-Part4
- Intro To Forensics-Part5
- Intro To Forensics-Part6
- Intro To Forensics-Part7
- Intro To Forensics-Part8
Module 2: Forensics Investigation Process
- Forensics Investigation Process-Part1
- Forensics Investigation Process-Part2
- Forensics Investigation Process-Part3
- Forensics Investigation Process-Part4
- Forensics Investigation Process-Part5
- Forensics Investigation Process-Part6
- Forensics Investigation Process-Part7
- Forensics Investigation Process-Part8
- Forensics Investigation Process-Part9
- Forensics Investigation Process-Part10
Module 3: Searching and Seizing
- Searching And Seizing-Part1
- Searching And Seizing-Part2
- Searching And Seizing-Part3
- Searching And Seizing-Part4
- Searching And Seizing-Part5
Module 4: Digital Evidence
- Digital Evidence-Part1
- Digital Evidence-Part2
- Digital Evidence-Part3
- Digital Evidence-Part4
- Digital Evidence-Part5
- Digital Evidence-Part6
- Digital Evidence-Part7
Module 5: First Responder Procedures
- First Responder Procedures-Part1
- First Responder Procedures-Part2
- First Responder Procedures-Part3
- First Responder Procedures-Part4
- First Responder Procedures-Part5
- First Responder Procedures-Part6
- First Responder Procedures-Part7
- First Responder Procedures-Part8
Module 6: Forensics Lab
- Forensic Lab-Part1
- Forensic Lab-Part2
- Forensic Lab-Part3
- Forensic Lab-Part4
- Forensic Lab-Part5
Module 7: Hard Disks and File Systems
- Hard Disks And File Systems-Part1
- Hard Disks And File Systems-Part2
- Hard Disks And File Systems-Part3
- Hard Disks And File Systems-Part4
- Hard Disks And File Systems-Part5
- Hard Disks And File Systems-Part6
- Hard Disks And File Systems-Part7
- Hard Disks And File Systems-Part8
- Hard Disks And File Systems-Part9
- Hard Disks And File Systems-Part10
Module 8: Windows Forensics
- Windows Forensics-Part1
- Windows Forensics-Part2
- Windows Forensics-Part3
- Windows Forensics-Part4
- Windows Forensics-Part5
- Windows Forensics-Part6
- Windows Forensics-Part7
- Windows Forensics-Part8
- Windows Forensics-Part9
- Windows Forensics-Part10
Module 9: Data Acquisition and Duplication
- Data Acquisition And Duplication-Part1
- Data Acquisition And Duplication-Part2
- Data Acquisition And Duplication-Part3
- Data Acquisition And Duplication-Part4
- Data Acquisition And Duplication-Part5
- Data Acquisition And Duplication-Part6
- Data Acquisition And Duplication-Part7
Module 10: Recovering Deleted Files and Partitions
- Recovering Deleted Files And Partitions-Part1
- Recovering Deleted Files And Partitions-Part2
Module 11: Using Access Data FTK
- Using Access Data FTK And Special Steps-Part1
- Using Access Data FTK And Special Steps-Part2
- Using Access Data FTK And Special Steps-Part3
- Using Access Data FTK And Special Steps-Part4
- Using Access Data FTK And Special Steps-Part5
- Using Access Data FTK And Special Steps-Part6
- Using Access Data FTK And Special Steps-Part7
- Using Access Data FTK And Special Steps-Part8
Module 12: Using EnCase
- EnCase-Part1
- EnCase-Part2
- EnCase-Part3
Module 13: Steganography
- Stenography-Part1
- Stenography-Part2
- Stenography-Part3
- Stenography-Part4
Module 14: Password Crackers
- Passwords-Part1
- Passwords-Part2
- Passwords-Part3
- Passwords-Part4
Module 15: Log Correlation
- Log Correlation-Part1
- Log Correlation-Part2
- Log Correlation-Part3
- Log Correlation-Part4
- Log Correlation-Part5
- Log Correlation-Part6
Module 16: Network Forensics
- Network Forensics-Part1
- Network Forensics-Part2
- Network Forensics-Part3
- Network Forensics-Part4
Module 17: Wireless Attacks
- Wireless Attacks-Part1
- Wireless Attacks-Part2
- Wireless Attacks-Part3
Module 18: Web Attacks
- Web Attacks-Part1
- Web Attacks-Part2
- Web Attacks-Part3
- Web Attacks-Part4
- Web Attacks-Part5
- Web Attacks-Part6
- Web Attacks-Part7
- Web Attacks-Part8
Module 19: Email Crimes
- Email Crimes-Part1
- Email Crimes-Part2
- Email Crimes-Part3
- Email Crimes-Part4
Module 20: Mobile Investigation
- Mobile Investigation-Part1
- Mobile Investigation-Part2
- Mobile Investigation-Part3
- Mobile Investigation-Part4
- Mobile Investigation-Part5
Module 21: Investigative Reports
- Investigation Reports-Part1
- Investigation Reports-Part2
- Investigation Reports-Part3
- Investigation Reports-Part4
Module 22: Expert Witness
- Expert Witness-Part1
- Expert Witness-Part2
- Expert Witness-Part3
Module 1: Cyber Security Awareness and Prevention
- Course Introduction
- Where We Are Today
- Areas Of Protection
- The Connection – Part 1
- The Connection – Part 2
- Network Protection
- Browsing Blunders – Part 1
- Browsing Blunders – Part 2
- Settings – Part 1
- Settings – Part 2
- Settings – Part 3
- Settings – Part 4
- Cookies
- Browsing Tips And Tricks
- Email Can’t Hurt You Right – Part 1
- Email Can’t Hurt You Right – Part 2
- Viruses – Part 1
- Viruses – Part 2
- Viruses – Part 3
Module 2: Managing Mobile Device Security
- Managing Mobile Device Security-Part1
- Managing Mobile Device Security-Part2
- Secure Access
- Secure Access iPhone Demo
- Secure Access Android Demo
- Protect The Digital
- Protect The Digital Android Demo
- Protect The Digital iPhone Demo
- Manage App Access
- Manage App Access iPhone Demo
- Manage App Access Android Demo
- Stay Up To Date
- Stay Up To Date Android Demo
- Stay Up To Date iPhone Demo
- Use Other Tools To Help
- Prepare For The Worst
- Prepare For The Worst-Android Demo
- Prepare For The Worst-iPhone Demo
- Best Practices
- Course Conclusion
- Course Introduction
- Treat And Cost
Module 2: Device Security Basics
- It’s All About YOU Part1
- It’s All About YOU Part2
Module 3: Avoiding Inadvertent Disclosure
- No More Oops Part1
- No More Oops Part2
Module 4: Physical And Technical Safeguards
- The DO Of Security Part1
- The DO Of Security Part2
- Course Conclusion
Module 1: What Is Agile
- Course And Instructor Introduction
- What Is Agile – Part1
- What Is Agile Part2 – Agile Manifesto Principles 1-6
- What Is Agile Part3 – Agile Manifesto Principles 7-12
- What Is Agile Part4 – Agile Manifesto Values
- What Is Agile Part5 – Why Agile?
- What Is Agile – Part6 – Misconceptions about Agile
- What Is Agile Part7 – Agile Lifecycle
- What Is Agile Part8 – Key Definitions
- What Is Agile – Part9
Module 2: Projects And Projects Management In An Agile World
- Projects And Project Management In An Agile World Part 1 – Historical Information
- Projects And Project Management In An Agile World Part 2 – Organizational Projects
- Projects And Project Management In An Agile World Part 3 – Traditional Projects
- Projects And Project Management In An Agile World Part 4 – Roles
- Projects And Project Management In An Agile World Part 5 – Roles 2
Module 3: Agile and Scrum
- Agile And Scrum Part1 – In Depth
- Agile And Scrum Part2 – Major Activities
- Agile And Scrum Part3 – 3 Questions
- Agile And Scrum Part4 – Sprints
Module 4: Common Scrum Terminology
- Common Scrum Terminology-Part1
- Common Scrum Terminology-Part2
Module 5: Other Iterative Methods
- Other Iterative Methods
Module 6: Communication Skills In Agile World
- Communication Skills In Agile World Part1 – Model
- Communication Skills In Agile World Part2 – Verbal vs. Nonverbal
- Communication Skills In Agile World Part3 – Learned Patterns
- Communication Skills In Agile World Part4 – Key Skills
- Communication Skills In Agile World Part5 – Key Skills
- Communication Skills In Agile World Part6 – Conflict Resolution
- Communication Skills In Agile World Part7 – Tuckman’s 5 Stages
Module 7: Using Agile Outside Software Development
- Using Agile Outside Software Development-Part1
- Using Agile Outside Software Development-Part2
Module 8: Case Studies Of Transitioning to Agile
- Case Studies Of Transitioning To Agile-Part1
- Case Studies Of Transitioning To Agile Part2 – Procurement
- Case Studies Of Transitioning To Agile Part3 – In an Agile World
- Case Studies Of Transitioning To Agile Part4 – Measurements
Module 9: Critique Of Agile
- Critique Of Agile-Part1
- Critique Of Agile-Part2
Module 10: Review Of Agile
- Review Of Agile-Part1
- Review Of Agile-Part2
- Review Of Agile-Part3
- Course Conclusion
Module 1 : Agile Principles and Mindset
- Agile Introduction Scrum
- Agile Core Principles Scrum
- Lean Product Development Scrum
- Agile Leadership Tasks Scrum
- Agile Communications Scrum
Module 2 : Value Driven Delivery
- Value Driven Delivery Scrum
- Value Driven Delivery Scrum Part2
Module 3 : Stakeholder Engagement
- Stakeholder Engagement Scrum
- Facilitation Tools Scrum
Module 4 : Team Performance
- Team Performance Scrum
- Digital Tools for Distibuted Teams Scrum
Module 5 : Adaptive Planning
- Adaptive Planning Scrum
- Adaptive Planning Scrum Part2
Module 6 : Problem Detection and Resolution
- Problem Detection and Resolution Scrum
Module 7 : Continuous Improvement
- Continuous Improvement Scrum
Module 1 : Agile Principles and Mindset
- Agile Introduction XP
- Agile Core Principles XP
- Lean Product Development XP
- Agile Leadership Tasks XP
- Agile Communications XP
Module 2 : Value Driven Delivery
- Value Driven Delivery XP
- Value Driven Delivery XP Part2
Module 3 : Stakeholder Engagement
- Stakeholder Engagement XP
- Facilitation Tools XP
Module 4 : Team Performance
- Team Performance XP
- Digital Tools for Distibuted Teams XP
Module 5 : Adaptive Planning
- Adaptive Planning XP
- Adaptive Planning Part2 XP
Module 6 : Problem Detection and Resolution
- Problem Detection and Resolution XP
Module 7 : Continuous Improvement
- Continuous Improvement XP
1.1 Instructor Introduction
1.2 Course Introduction
Module 2: Getting to Know Adobe Audition
- 2.1 Setting Up Your Workspace and Using Shortcuts
Module 3: The Interface
- 3.1 Setting Up and Adjusting Your Workspace
- 3.2 Navigating the Media Browser
- 3.3 Create a Short Cut to Media and Basic Dive into the Editor Panel
Module 4: Waveform Editing
- 4.1 Opening Audio and Video Files
- 4.2 Making a Basic Adjustment in the HUD
- 4.3 Skipping and Deleting Unwanted Portions of Audio
- 4.4 Quickly Insert Silence into an Audio Track
- 4.5 Using the Zero Crossing Tool to Remove Pops in Audio
- 4.6 Cut, Copy and Paste Phrases and Use Multiple Clipboards
- 4.7 Merge Sections of Audio with Mix Paste
- 4.8 Create a Loop
- 4.9 Add an Audio Fade
Module 5: Effects
- 5.1 Working With Effects
- 5.2 Gain Staging
- 5.3 Applying the Effect
- 5.4 Amplitude and Compression
- 5.5 Delay and Echo Effects
- 5.6 Filter and EQ Effects
- 5.7 Modulation Effects
- 5.8 Reverb Effects
- 5.9 Special Effects
- 5.10 Stereo Imagery Effects
- 5.11 Time and Pitch Effects
- 5.12 Audio Plugin Manager and Effects Menu vs Effects Rack
- 5.13 Invert, Reverse, Silence and Generate Effects
- 5.14 Match Loudness and Additional Effects
- 5.15 Create Effect Presets and Favorites
Module 6: Audio Restoration
- 6.1 Hiss Reduction
- 6.2 Crackle, Pop and Click Reduction
- 6.3 Broadband Noise Reduction
- 6.4 Hum Reduction
- 6.5 Removing Artifacts Manually
- 6.6 Automated Sound Removal
Module 7: Mastering
- 7.1 Parametric Equalizer and Equalization
- 7.2 Multi Band Compressor and Dynamic Processing
- 7.3 Reverb and Ambience
- 7.4 Stereo Imaging
- 7.5 Diagnostic Tools and Metering
Module 8: Sound Design
- 8.1 Generate Noise and Tones
- 8.2 Generate Speech Based on Text
- 8.3 Use a Sound File to Create Various Sound Effects Pt 1
- 8.4 Use a Sound File to Create Various Sound Effects Pt 2
- 8.5 Extracting Frequency Bands with the Frequency Band Splitter
Module 9: Creating and Recording Files
- 9.1 Create a Project and Record Into the Waveform Editor
- 9.2 Recording Into the MultiTrack Editor
- 9.3 Check Remaining Free Space for Recording on Hard Drive
- 9.4 Dragging Files Into Audition Directly From a Computer
- 9.5 Import Tracks from a CD
Module 10: Multitrack Sessions
- 10.1 Create a Multitrack session and Template
- 10.2 Multitrack and Waveform Editor Integration
- 10.3 Change Track Colors and Tracks Panel
- 10.4 Track Controls and Creating Busses
- 10.5 Channel Mapping in the Multitrack Editor
- 10.6 Multitrack Editor Effects Rack
Module 11: Multitrack Session Editing
- 11.1 Create a Session, Add Clips and Adjust Timing
- 11.2 Mix Down Session Into a New Audio Track
- 11.3 Adjusting the Timing of a Clip to Match a Specific Range of Time
- 11.4 Clip Editing Techniques and Effects
Module 12: Additional Features and Summary
- 12.1 Advanced Features to Consider and Conclusion
Module 1: Introduction to After Effects
- 1.1 Introduction
- 1.2 What is After Effects?
- 1.3 Creating a New Project in After Effects
- 1.4 Creating and Animating Primitive Shapes Demo – Part1
- 1.5 Creating and Animating Primitive Shapes Demo -Part2
- 1.6 Simply Bouncing Ball Demo -Part1
- 1.7 Simply Bouncy Ball Demo – Part2
- 1.8 Complex Bouncy Ball Demo – Part1
- 1.9 Complex Bouncing Ball Demo – Part2
- 1.10 Exporting from After Effects
- 1.11 Curves Editor Demo
- 1.12 Importing Footage – Part1
- 1.13 Importing Footage – Part2
- 1.14 Parenting – Part1
- 1.15 Parenting – Part2
Module 2: Intermediate Effects and Techniques in After Effects
- 2.1 3D Layers and Cameras Demo – Part1
- 2.2 3D Layers and Cameras Demo – Part2
- 2.3 Animating Text Demo – Part1
- 2.4 Animating Text Demo – Part2
- 2.5 Animating Text Demo – Part3
- 2.6 Animating Text Demo – Part4
- 2.7 Importing and Syncing Audio
- 2.8 Particles Demo – Part1
- 2.9 Particles Demo – Part2
- 2.10 Lights Demo
- 2.11 Common Effects in After Effects
Module 3: More Advanced Effects and Techniques in After Effects
- 3.1 Puppet Building Demo – Part1
- 3.2 Puppet Building Demo – Part2
- 3.3 Puppet Building Demo – Part3
Module 1: Getting Started
- 1.1 Course Introduction
- 1.2 Keyboard Shortcuts
- 1.3 Keyboard Tips
- 1.4 Things to Do Before Starting
Module 2: Getting to Know the Workflow
- 2.1 General Interface and Starting a Project
- 2.2 Basic Title Animation Using Keyframes
- 2.3 Keyframe Interpolation and Keyframe Assistan
- 2.4 Renaming a Composition
- 2.5 Soloing a Layer for Individual Edits
- 2.6 Interface Continued: Tool bar, Timeline panel, Preferences, Workspaces
- 2.7 Render and Export
Module 3: Creating a Basic Animation Using Effects and Presets
- 3.1 Importing Files from Bridge and Creating a New Composition
- 3.2 Horizontal Type Tool and Guides
- 3.3 Controls, Effects and Presets for Titles and Logos
Module 4: Animating Text
- 4.1 Create and Stylize a Text Layer With the Characters and Paragraph Panels
- 4.2 Preview and Apply Text Animation Presets and Use Keyframes
- 4.3 Animate Layers Using Parenting
- 4.4 Editing and Animating Imported Photoshop Text
- 4.5 Install Fonts Using Adobe Fonts
Module 5: Working With Shape Layers
- 5.1 Create and Customize a Shape with Shape Tool
- 5.2 Self Animating Shape with a Wiggle Path (green marker)
- 5.3 Create and Customize a Shape with Pen Tool
- 5.4 Snap Layers
- 5.5 Animating Shape Layers with Path Operations
- 5.6 Creating Nulls from Paths
Module 6: Animating a Multimedia Presentation
- 6.1 Animate Multiple Layers Using Parenting
- 6.2 Precomposing Layers
- 6.3 Keyframing a Motion Path
- 6.4 Animating a Character to Create Movement
- 6.5 Animating Precomposed Layers with Effects
Module 7: Animating Photoshop Layers
- 7.1 Animating Change in Light
- 7.2 Animating Birds Flying with a Track Mat
- 7.3 Animating Shadows and Using Corner Pin
- 7.4 Adding a Lens Flare Effect
- 7.5 Render Composition and Retime
- 7.6 Use the Graph Editor to Remap Time
Module 8: Working With Masks
- 8.1 Setup a Basic Mask
- 8.2 Refine and Apply Mask
- 8.3 Creating a Reflection with a Mask and Blending Modes
- 8.4 Create a Vignette
Module 9: Distorting Objects with the Puppet Tools
- 9.1 Puppet Position Pen Tool
- 9.2 Starch Pins
- 9.3 Manually Animate with Puppet Tool
- 9.4 Automate Animation Using Puppet Sketch Tool
Module 10: Using the Roto Brush Tool
- 10.1 Extract Foreground Object from Background and Create a Mat
- 10.2 Touch Up a Mat with the Refine Edge Tool
- 10.3 Edit or Replace the Separated Background
Module 11: Performing Color Correction
- 11.1 Set up Composition and Use Levels to Start Balancing the Color
- 11.2 Basic Color Grading with Lumetri Color Effects
- 11.3 Use Basic Masking, Tracking and Keying to Replace the Background
- 11.4 Use an Adjustment Layer to Create a Global Color Effect
- 11.5 Gaussian Blur Effect
Module 12: Creating Motion Graphics Templates
- 12.1 Add New Font with Adobe Fonts and Create a Title with Basic Effects
- 12.2 Using Adjustment Layers to Apply a Specific Effect
- 12.3 Use Essential Graphics Panel to Build Custom Controls and Share as a Template
- 12.4 Create Checkboxes to Toggle Visibility of a Background Image
- 12.5 Protect Portions of a Project from Time Stretching and Export Template
- Instructor Intro
- Course Intro
- Course pt.1
- Course pt.2
- Course pt.3
- Course pt.4
- Instructor Intro
- Course Intro
- Getting Images Ready for the Web
- Setting Up Your Workspace
- Creating a New Site
Module 2
- Using Spark Post pt.1
- Using Spark Post pt.2
- Linking Your Web Pages
- Adding Colors and Style
- Creating a Page Visually in Photoshop
- Importing Into Dreamweaver
- Export Site to Web
Module 1: Tools and Effects in Illustrator
- 1.1 Course Introduction
- 1.2 Introduction to Adobe Illustrator
- 1.3 Basic Tools in Illustrator
- 1.4 Working with Shapes
- 1.5 Fills and Strokes
- 1.6 Pencil Tool
- 1.7 Pen Tool
- 1.8 Brush Tool
- 1.9 Compound Path
- 1.10 Gradients
- 1.11 Layers and Grooves
- 1.12 Transparency and Graphic Style
- 1.13 Transforming, Moving and Rotating Objects
- 1.14 Type Tool
- 1.15 Blending Shapes and Colors
- 1.16 Basic Effects in Illustrator
- 1.17 Image Trace Tool
Module 2: Creating Projects in Illustrator
- 2.1 Creating a Caricature Part 1
- 2.2 Creating a Caricature Part 2
- 2.3 Creating a Caricature Part 3
- 2.4 Creating a Caricature Part 4
- 2.5 Recreating a Wonka Bar Logo Part 1
- 2.6 Recreating a Wonka Bar Logo Part 2
- 2.7 Creating a Logo
- 2.8 Recreating a Pablo Picasso Painting Part 1
- 2.9 Recreating a Pablo Picasso Painting Part 2
- 2.10 Recreating a Pablo Picasso Painting Part 3
- 2.11 Recreating a Pablo Picasso Painting Part 4
- 2.12 Recreating a Pablo Picasso Painting Part 5
- 2.13 Recreating a Pablo Picasso Painting Part 6
- 2.14 Exporting
- 2.15 Conclusion
Module 1
- Instructor Intro
- Course Intro
- Navigating the Interface
- Activating and Deactivating Fonts
- Font Packs
- Type Kit Web Fonts
- Course Conclusion
Module 1
- 1.1 Introduction
- 1.2 What is Flash Animate
- 1.3 Creating A New Document in Flash and Exploring the Interface
- 1.4 Drawing in Flash Part 1
- 1.5 Drawing in Flash Part 2
- 1.6 Frame by Frame Animating in Flash Part 1
- 1.7 Frame by Frame Animating in Flash Part 2
- 1.8 Saving, Rendering, and Exporting
- 1.9 Animating with Symbols Part 1
- 1.10 Animating with Symbols Part 2
- 1.11 Animating with Symbols Part 3
- 1.12 Different Types of Tweening Part 1
- 1.13 Different Types of Tweening Part 2
- 1.14 Nesting Symbols
- 1.15 Importing Graphics Part 1
- 1.16 Importing Graphics Part 2
- 1.17 Masking Part 1
- 1.18 Masking Part 2
- 1.19 Camera and Parallax Scrolling Part 1
- 1.20 Camera and Parallax Scrolling Part 2
- 1.21 Camera and Parallax Scrolling Part 3
- 1.22 Rotoscoping Part 1
- 1.23 Rotoscoping Part 2
- 1.24 Rotoscoping Part 3
- 1.25 Rotoscoping Part 4
- 1.26 Rotoscoping Part 5
- 1.27 Rotoscoping Part 6
- 1.28 Rotoscoping Part 7
- 1.29 Creating a Puppet Part 1
- 1.30 Creating a Puppet Part 2
- 1.31 Creating a Puppet Part 3
- 1.32 Creating a Puppet Part 4
- 1.33 Creating a Puppet Part 5
- 1.34 Creating a Puppet Part 6
- 1.35 Animating a Puppet Part 1
- 1.36 Animating a Puppet Part 2
- 1.37 Animating a Puppet Part 3
- 1.38 Animating a Puppet Part 4
- 1.39 Cycles
- 1.40 Interchangeable Parts
- 1.41 Interactivity
- 1.42 Text Part 1
- 1.43 Text Part 2
- 1.44 Animating with Code
- 1.45 Dialog Part 1
- 1.46 Dialog Part 2
- 1.47 Dialog Part 3
- 1.48 Dialog Part 4
- 1.49 Controlling the Timeline Part 1
- 1.50 Controlling the Timeline Part 1
- 1.51 Putting Together an Interactive eCard Part 1
- 1.52 Putting Together an Interactive eCard Part 2
- 1.53 Putting Together an Interactive eCard Part 3
- 1.54 Putting Together an Interactive eCard Part 4
- 1.55 Putting Together an Interactive eCard Part 5
- 1.56 Bone Tool
- 1.57 Conclusion
- 1.1 Introduction
- 1.2 What is InDesign
- 1.3 Creating a New Document
- 1.4 Importing Images – Part1
- 1.5 Importing Images – Part2
- 1.6 Vector vs. Pixels
- 1.7 Exploring the InDesign Work Area
- 1.8 Master Pages
Module 2
- 2.1 Typography – Part1
- 2.2 Typography – Part2
- 2.3 Creating Tables
- 2.4 Packaging
- 2.5 Principle of Design
- 2.6 Knowing Your Output
- 2.7 Advanced Techniques in InDesign
- 2.8 Using InDesign for Ineractivity
- 2.9 Scripts
- 2.10 Exporting
- 2.11 Conclusion
- 1.1 Instructor Bio
- 1.2 Course Intro
Module 2
- 2.1 Creating a New Document
- 2.2 Importing Images and Understanding Links
- 2.3 Basic Tools and Navigating the Interface
- 2.4 Properties Panel
- 2.5 Creating Your Own Graphics within InDesign-
- 2.6 Working with Layers
Module 3
- 3.1 Color Theory
- 3.2 Adding and Altering Fills, Strokes, Colors and Gradients
Module 4
- 4.1 Pages Panel
- 4.2 Master Pages
Module 5
- 5.1 Typography Terms and Definitions
- 5.2 Creating Text + Character and Paragraph Formatting
- 5.3 Character and Paragraph Styles
- 5.4 Wrapping Text Around an Image
- 5.5 Working with Tables
Module 6
- 6.1 Saving, Preflight and Packaging Your Document
- 6.2 Exporting a PDF
Module 7
- 7.1 Principles of Design
Module 8
- 8.1 Letterheads
- 8.2 Business Card
- 8.3 Brochure
- 8.4 Multi-Page Binded Document
- 8.5 Print Booklet
Module 9
- 9.1 Creating a Template in InDesign
- 9.2 Using Step and Repeat
- 9.3 Grouping Objects
- 9.4 Island Spread & Page Tool-
- 9.5 Scripts
- 9.6 Object Styles
- 9.7 Content Collector & Content Placer
- 9.8 Gap Tool
- 9.9 Pathfinder Pallet
Module 10
- 10.1 Considerations When Working with Interactive Documents
- 10.2 Web Docs, Hyperlinks, Buttons and Rollovers
- 10.3 Creating Your Own Path
- 10.4 Exporting
Module 11
- 11.1 Outro
- 1.1 Introduction
- 1.2 What is Animation – Part1
- 1.3 What is Animation – Part2
- 1.4 Bouncy Ball Demo – Part1
- 1.5 Bouncy Ball Demo – Part2
- 1.6 Bouncy Ball Demo – Part3
- 1.7 Pendulum Demo – Part1
- 1.8 Pendulum Demo – Part2
- 1.9 Platform Pendulum Demo – Part1
- 1.10 Platform Pendulum Demo – Part2
- 1.11 Principles of Animation – Part1
- 1.12 Principles of Animation – Part2
- 1.13 Bouncy Ball in Perspective Demo – Part1
- 1.14 Bouncy Ball in Perspective Demo – Part2
- 1.15 Flag Wave Demo – Part1
Module 2: Intermediate Animation Techniques
- 2.1 Weight Demo – Part1
- 2.2 Weight Demo – Part2
- 2.3 Weight Demo- Part3
- 2.4 Breaking a Character Down Into Basic Shapes – Part1
- 2.5 Breaking a Character Down Into Basic Shapes – Part2
- 2.6 Breaking a Character Down Into Basic Shapes – Part3
- 2.7 Boil Demo – Part1
- 2.8 Boil Demo – Part2
- 2.9 A Take Demo – Part1
- 2.10 A Take Demo – Part2
- 2.11 Staggering Demo – Part1
- 2.12 Staggering Demo – Part2
- 2.13 Staggering Demo – Part3
- 2.15 Head Turn Demo – Part1
- 2.16 Head Turn Demo – Part2
- 2.17 Head Turn Demo – Part3
- 2.18 Head Turn Demo – Part4
- 2.19 Walk Cycles Demo – Part1
- 2.20 Walk Cycles Demo – Part2
- 2.21 Walk Cycles Demo – Part3
- 2.22 Run Cycles Demo
- 2.23 Dialogue Demo – Part1
- 2.24 Dialogue Demo – Part2
- 2.25 Dialogue Demo – Part3
- 2.26 Dialogue Demo – Part4
- 2.27 Conclusion
Module 1: Welcome
- Welcome
- Welcome 2
Module 2: Why use Lightroom
- Why use Lightroom
Module 3: Lightroom library and organization
- Lightroom library and organization
- Lightroom library and organization 2
- Lightroom library and organization 3
- Lightroom library and organization 4
Module 4: Edit your photo – global adjustments
- Edit your photo – global adjustments
- Edit your photo – global adjustments 2
- Edit your photo – global adjustments 3
- Edit your photo – global adjustments 4
- Edit your photo – global adjustments 5
- Edit your photo – global adjustments 6
- Edit your photo – global adjustments 7
- Edit your photo – global adjustments 8
- Edit your photo – global adjustments 9
- Edit your photo – global adjustments 10
- Edit your photo – global adjustments 11
Module 5: Edit your photo – local adjustments
- Edit your photo – local adjustments
- Edit your photo – local adjustments 2
- Edit your photo – local adjustments 3
- Edit your photo – local adjustments 4
- Edit your photo – local adjustments 5
- Edit your photo – local adjustments 6
Module 6: Saving and exporting
- Saving and exporting
Module 7: Lightroom CC overview
- Lightroom CC overview
Module 8: Outro
- Outro
- 1.1 Introduction
- 1.2 Exploring the Tools and Work Area – Part1
- 1.3 Exploring the Tools and Work Area – Part2
- 1.4 Exploring the Tools and Work Area – Part3
- 1.5 Exploring the Tools and Work Area – Part4
- 1.6 Layers in Photoshop – Part1
- 1.7 Layers in Photoshop – Part2
- 1.8 Layers in Photoshop – Part3
- 1.9 Crop and Transform
- 1.10 Working with Text – Part1
- 1.11 Working with Text – Part2
- 1.12 Filters in Photoshop
- 1.13 Layer Styles
- 1.14 Adjustment Layers – Part1
- 1.15 Adjustment Layers – Part2
Module 2: Creating Projects in Photoshop
- 2.1 Photo Retouching Methods – Part1
- 2.2 Photo Retouching Methods – Part2
- 2.3 Creating a Poster Design – Part1
- 2.4 Creating a Poster Design – Part2
- 2.5 Creating a Poster Design – Part3
- 2.6 Creating a Poster Design – Part4
- 2.7 Coloring Digital Art – Part1
- 2.8 Coloring Digital Art – Part2
- 2.9 Coloring Digital Art – Part2
- 2.10 Colorizing a Black and White Photo – Part1
- 2.11 Colorizing a Black and White Photo – Part2
- 2.12 Creating a Website Design – Part1
- 2.13 Creating a Website Design – Part2
- 2.14 Creating a Website Design – Part3
- 2.15 Exporting in Photoshop
- 2.16 Conclusion
Module 1
- Instructor Intro
- Course Intro
- Course pt.1
- Course pt.2
- Course pt.3
- Course pt.4
Module 1: Introduction to Premiere and Getting Started on an Editing Project
- 1.1 Course Introduction
- 1.2 Introduction to Premiere Pro CC
- 1.3 Creating a New Project
- 1.4 Workspace Layout
- 1.5 Importing Media
- 1.6 Organizing Media
- 1.7 Monitoring Footage
- 1.8 Navigating the Source Monitor
- 1.9 Creating a Sequence
- 1.10 Editing Video Part 1
- 1.11 Editing Video Part 2
- 1.12 Editing with Multi Source Sequence Part 1
- 1.13 Editing with Multi Source Sequence Part 2
- 1.14 Editing with Multi Source Sequence Part 3
- 1.15 Adding Titles
Module 2: More Editing Techniques and Completing a Project
- 2.1 Editing Using Program Monitor
- 2.2 Advanced Editing Techniques
- 2.3 Inserting Graphics
- 2.4 Adding Music
- 2.5 Adjusting Audio
- 2.6 Using The Tools In Tool Panel
- 2.7 Trimming Using The Program Monitor
- 2.8 Track Monitoring And Algorithm
- 2.9 Transitions
- 2.10 Basic Effects
- 2.11 Manipulate Clip Speed
- 2.12 Color Correction
- 2.14 Exporting A Project
- 2.15 Conclusion
Module 1
- Instructor Intro
- Course Intro
- How Does Rush Differ
- Starting a New Project
- Video Resolution and Creating Content
- Finding and Importing Content
- Timeline Controls
- Importing Audio
Module 2
- General Editing
- Advanced Editing
- Color Grading
- Adding Titles
- Principles of Typography in Video
- Fixing Audio
- Video and Audio Transitions
- Exporting Finished Projects
- Instructor Intro
- Course Intro
- Web Based vs Mobile Device
- How to Access Spark
- Branding in Spark
Module 2
- Using Spark Post
- Uploading Content from Post for Exporting
- Using Spark Video
- Exporting Finished Videos
- Using Spark Page
- Putting Spark Pages on the Web
Module 1
- Instructor Info
- Course Info
- Interface and Features
- Images
- Videos and Licensing
- Templaes and Premium
- Contributing Content
- Best Practices when Contributing
Module 1 – Welcome to Adobe XD 2022
- 1.1 Welcome to Adobe XD 2022
- 1.2 What is Adobe XD 2022
Module 2 – Adobe XD 2022 Overview
- 2.1 Adobe XD 2022 Overview
Module 3 – Designing in a Project with Adobe XD 2022
- 3.1 Adobe XD 2022 Project Overview
- 3.2 Designing Your First Screen in Adobe XD 2022
Module 4 – Assets, Reusable Styles, and Responsive Resize in Adobe XD 2022
- 4.1 Assets and Reusable Styles in Adobe XD 2022
- 4.2 Responsive Resize in Adobe XD 2022
Module 5 – Images and Visual Effects in Adobe XD 2022
- 5.1 Imports, Images, and Masks in Adobe XD 2022
- 5.2 Special Visual Effects in Adobe XD 2022
Module 6 – Making Interactive Buttons in Adobe XD 2022
- 6.1 Plugins in Adobe XD 2022
- 6.2 Stacks in Adobe XD 2022
- 6.3 Components in Adobe XD 2022
- 6.4 Repeat Grid in Adobe XD 2022
Module 7 – Grouped Imports and Scroll Groups in Adobe XD 2022
- 7.1 Grouped imports in Adobe XD 2022
- 7.2 Scroll Groups in Adobe XD 2022
Module 8 – Prototyping and Animations in Adobe XD 2022
- 8.1 Prototyping with Adobe XD 2022
- 8.2 Animations in Adobe XD 2022
Module 9 – Exporting and Sharing with Adobe XD 2022
- 9.1 Exports in Adobe XD 2022
- 9.2 Adobe XD 2022 Conclusion
- Intro
Module 2: Camera Anatomy
- Camera Anatomy
- Camera Anatomy 2
Module 3: Scene Camera Modes
- Scene Camera Modules
Module 4: Achieve Exposure
- Achieve Exposure
- Achieve Exposure 2
Module 5: Filetypes
- Filetypes
Module 6: Sensor
- Sensor
Module 7: Resolution
- Resolution
Module 8: White Balance
- White Balance
- White Balance 2
Module 9: Color Theory
- Color Theory
Module 10: Depth of Field
- Depth of Field
Module 11: Focusing
- Focusing
Module 12: Lighting
- Lighting
- Lighting 2
Module 13: Metering
- Metering
Module 14: Composition
- Composition
- 1.1 Instructor Intro
- 1.2 Course Intro
Module 2: Getting Started
- 2.1 What are Vectors
- 2.2 Creating a New Document
- 2.3 Navigating the Interface
Module 3: Drawing
- 3.1 Drawing and Manipulating Primitive Shapes
- 3.2 Drawing Custom Shapes Part 1
- 3.2 Drawing Custom Shapes Part 2
- 3.2 Drawing Custom Shapes Part 3
- 3.3 Importing Images
- 3.4 Understanding Layers and Sublayers
- 3.5 Additional Drawing and Manipulation Tools
Module 4: Colors and Gradients
- 4.1 Color Theory
- 4.2 In-depth dive into Color Palette-
- 4.3 Creating Color Swatches
- 4.4 Creating and Manipulating Gradients Part 1
- 4.5 Creating and Manipulating Gradients part 2
- 4.6 Creating and Manipulating Gradients Part 3
Module 5: Intermediate Illustration
- 5.1 Appearance Palette
- 5.2 Pathfinder Palette
- 5.3 Drawing with Intent part 1
- 5.3 Drawing with Intent Part 2
- 5.4 Blending Modes & FX Part 1
- 5.5 Blending Modes & FX Part 2
Module 6: Typography
- 6.1. Introduction to Typography
- 6.2. Type Tools in Illustrator
- 6.3 Envelope Warp and Mesh
- 6.4 Breaking Text into Outlines
Module 7: Live Trace, Paint Brush and Blob Brush
- 7.1 Live Trace
- 7.2 Paint and Blob Brush
Module 8: Exporting
- 8.1 Difference Between File Formats and Exporting
- 8.2 Course Conclusion
Module 1: Getting Started
- 1.1 Instructor Intro
- 1.1 Course Intro
- 1.2 Open Images
- 1.3 Get Familiar with Work Space
- 1.4 Zoom and Pan
- 1.5 Undo and Save Pt 1
- 1.5 Undo and Save Pt 2
- 1.6 Resize and Resolution
- 1.7 Crop and Straighten
- 1.8 Expand the Canvas
- 1.9 Basic Image Corrections
Module 2: Layers and More
- 2.1 Layer Basics
- 2.2 Resizing Layers
- 2.3 Adding Text and Images
- 2.4 Layer Styles
- 2.5 Photo Merge and Panoramic Images
- 2.6 Camera Raw
- 2.7 Camera Raw Continued and Adjustment Layers
- 2.8 Selection Basics
Module 3: Editing, Techniques and More
- 3.1 Raw File XMP
- 3.2 Masks
- 3.3 Puppet Warp and Alpha Channel
- 3.4 Typography
- 3.5 Vector Drawing Techniques
- 3.6 Advanced Compositing
- 1.0 Course Intro
- 1.1 Touring Adobe PP
- 1.1 Touring Adobe PP pt.2
- 1.2 Setting Up a Project
- 1.3 Importing Media
- 1.4 Organizing Media
- 1.5 Mastering the Essentials of Video Editing
- 1.6 Working with Clips and Markers
- 1.7 Adding Transitions
- 1.8 Multicamera Editing
- 1.9 Advanced Editing Techniques
Module 2: Motion, Sound, and More
- 2.1 Putting Clips in Motion
- 2.2 Editing and Mixing Audio
- 2.3 Sweetening Sound
- 2.4 Adding Video Effects
- 2.5 Basic Color Correction
- 2.6 Compositing Techniques
- 2.7 Creating Graphics
- 2.8 Exporting Frames, Clips and Sequences
Module 1: Architecture
- Cloud Security Overview-Part1
- Cloud Security Overview-Part2
- Cloud Diagrams
- Cloud Services
Module 2: Governance and Enterprise Risk
- Risk Management
- Corporate Governance
- Enterprise Risk Management
- Risk Management Balance Process Supply Chain Security
- ERM Incidents Recommendations-Part1
- ERM Incidents Recommendations-Part2
- ERM Incidents Recommendations-Part3
Module 3: Legal Issues- Contracts and Electronic
- Cloud Legal Issues-Part1
- Cloud Legal Issues-Part2
- Cloud Legal Issues-Part3
Module 4: Compliance and Audit Management
- Audits
- Compliance And Audit
- Audit Recommendations
- Audit Requirements
Module 5: Information Management and Data Security
- Information And Security
- Storage
- Information Governance Classification
- Data Security
- Protecting Data Moving
- Client Database Encryption
- PaaS Encryption
Module 6: Interoperability and Portability
- Interoperability And Portability
- Interoperability Recommendations
- Portability Recommendations
- Recommendations SAAS
Module 7: Traditional Security, Business Continuity, and Disaster Recovery
- Business Continuity And Disaster Recovery
- Assessing CSP Security
- Equipment Maintenance
- Recommendations
Module 8: Data Center Operations
- Data Center Operations
Module 9: Incident Response
- Incident Response
- Testing
- IaaS
- C.E.R.- Containment, Eradication, And Recovery
Module 10: Application Security
- Application Security
- Security Testing
- Audit Compliance
- Security Assurance Recommendations
Module 11: Encryption and Key Management
- Encryption And Key Management
- Content Aware Encryption
- Storage Of Keys
Module 12: Identity, Entitlement, and Access Management
- Building Access Control
- Intro To Identity
- Entitlement Process
- Trust With Identity
- Recommendations For Identity Management
Module 13: Virtualization
- Virtualization
- Hypervisor And Virtual Machine
- Inter-Virtual Machine Attacks
- Virtual Machine Encryption
- Virtual Machine Recommendations And Requirements
Module 14: Security as a Service
- Security As A Service
- Security Offerings
- Intrusion Detection Prevention
- Business Continuity And Disaster Recovery
- European CCSK
- Top Security Benefits
- European Legal Based Issues
- EXIN Overview-Part 1
- EXIN Overview-Part 2
- EXIN Overview 2-Part 1
- EXIN Overview 2-Part 2
- The Basics
- History Of Cloud
- Delivery Model Architectures
- Software As A Service
- Justification For Cloud Computing
- Confidentiality And Availability
- Concepts From NIST
- Important Characteristics
- Broad Network Access
- Resource Pooling
- Measured Service
- Service Models
- Terms Of Service
- Recommendations
- Virtualization
- Virtualization Concepts
- Inter-Virtual Machine Attacks
- Virtual Machine Encryption
- Recommendations
- Service Models
- Business Process
- Outsourcing
- Software As A Service-Part 1
- Software As A Service-Part 2
- Risks And Recommendations
- Platform As A Service
- PaaS Considerations
- PaaS Issues
- Infrastructure As A Service
- Scope Of Control
- IaaS Benefits
- IaaS Issues And Concerns
- IaaS Recommendations
- Services Oriented Architecture
- Web Services
- Infrastructure On Demand
- Why Cloud
- Collaborative Working
- New Business Opportunities
Module 2: Implementing and Managing CC
- Implementing And Managing Cloud Computing
Module 3: Using the Cloud
- Relevent Technologies In Cloud
- Storage Devices-Part 1
- Storage Devices-Part 2
- Application Programming Interfaces
- Traditional Software Model
- Impact Of Cloud On Users
- Providing Cloud Services
- Developing Added Services-Part 1
- Developing Added Services-Part 2
- Using Cloud Services
Module 4: Security and Compliance
- Threats And Controls
- Malicious Insiders
- Insiders Remediation
Module 5: Evaluation of CC
- Why Cloud
- Resource Scaling
- Quality
- Thin Clients
- Buying Cloud Services
- Pay As You Go Vs Ownership
- Establishing Requirements
- Contract Terms
- 1.0 About Google Analytics 4
- 1.1 Course Intro Welcome
- 1.2 Instructor Intro
Module 2 – Fundamentals of Google Analytics
- 2.1 What is a Digital Product
- 2.2 Google Market Platform
- 2.3 Google Analytics Overview
- 2.4 Google Analytics 4 Overview
- 2.5 Whiteboad Discussion-How Does GA Work
- 2.6 Comparing GA3 to GA4
- 2.7 Whiteboard Compare Data Models
- 2.8 Demo- GA Console Walkthru
- 2.9 Admin Panel
- 2.10 Demo Admin Panel
- 2.11 Tag Manager
- 2.12 Demo Tag Manager
- 2.13 Segment Review
- 2.14 Segment Review Questions
Module 3 – Advanced Topics with Google Analytics
- 3.1 Upgrading and Running Parallel
- 3.2 Whiteboard Discussion – Parallel
- 3.3 Demo Console Parallel
- 3.4 Hands on Demo – Install GA4 on a Live Site
- 3.5 Understand Reporting Options, Lifecycle Collections
- 3.6 Hands on Demo – Exploring reports
- 3.7 Hands on Demo – Set up GA4 Custom Eventsmp4
- 3.8 Hands on Demo – Conversions, Audiences, DebugView
- 3.9 Hands on Demo – Advertising
- 3.10 Hands on Demo – Explorations:Insights
- 3.11 Hands on Demo – Lifecycle and Users
- 3.12 Google Big Query Connections
- 3.13 Demo – BigQuery Data Integrations
- 3.14 Google Ads
- 3.15 Demo – Google Ads
- 3.16 Google Signals
- 3.17 Demo – Google Signals
- 3.18 Certification Options
- 3.19 Segment Summary
- 3.20 Review Questions
- 3.21 Resources
- 3.22 Course Closeout
Module 1: Introduction to Google Analytics
- Intro Definitions-Part 1
- Intro Definitions-Part 2
- How Google Analytics Works
Module 2: Fundamentals of Google Analytics
- Build Analytics Infrastructure
- Setting Up Conversion Data
- Setting Up E-Commerce And Goal Tracking
- Cross Domain Tracking
- Input New Users
- Examine Data Points
Module 3: Basics of Google Anayltics
- Basic Features
- Dashboard
- Shortcuts
- Adding A Dashboard
- Sharing Reports
- Alerts
- Realtime Analytics
- Standard Reports
- Views
Module 4: Reports in Google Analytics
- Acquisitions Intro
- All Traffic Acquisitions
- Acquisitions Overview
- Acquisitions Channels
- All Referrals
- Campaign
- Keywords
- Social
- Webmaster Tools
Module 5: Behavioral Reports
- Behavioral Reports Intro
- Dimensions
- Content Drilldown
- Landing Pages
- Exit Pages
- Event Flow Report
- Working With Events
- Site Search Report-Part 1
- Site Search Report-Part 2
- Site Search Report-Part 3
- Site Search Report-Part 4
- Behavior Flow Report
- Site Speed
- Using Site Speed Search
- Page Timings
- Speed Suggestions
- User Timing Adsense
- Experiments
- Inpage Analytics
Module 6: Audience
- Audience Reports
- Location Report
- Language
- Behavior
- Frequency Recency
- Engagement Report
- Technology Reports
- Mobile Reporting
- Demographic Report
- Interests
- Visitor Flow Chart
Module 7: Conversions
- Intro To Module 7
- Funnel Visualization
- Goal Flow Report
- Reverse Goal Path
- Goal URLs
- E-commerce Reports
- Product Performance Reports
- Transactions Report
- Time To Purchase Report
- Multi-Channels Funnels Report
- Assisted Conversion Report
- Top Conversion Paths Report
- Time Log And Path Length Report
- Attribution Report And Model Comparison Tool
- Conclusion
- 1.1 Course Overview
- Course Overview
- 1.2 Course PreReqs
- Course PreReqs
Module 2: DevOps Basics
- DevOps Fundamentals
- What is DevOps
- What are Pipelines
- Continuous Integration and Delivery
- Continuous Deployment
- Whiteboard Build Services
- Demo – DevOps Services on GCP
Module 3: App Engine PaaS
- App Engine
- App Engine Basics
- App Engine Demo
- App Engine Security Scanner Demo
- App Engine or Kubenetes Engine
Module 4: Kubenetes Engine Overview
- Kubenetes Engine
- Kubernetes Basics
- What is Kubenetes Engine
- Demo – Kubenetes Engine Clusters Demo
- Kubenetes Engine Application Demo
- Kubenetes Engine Whiteboard
Module 5: DevOps Developer Tools
- DevOps Services & Tools
- Demo – Cloud SDK
- Demo – Cloud Shell
- Demo – Cloud Build
- Demo – Container Registry
- Demo – Cloud Source Repositories
- Demo – Private Catalog
- Demo – Artifact Registry
Module 6: Microservices
- Microservices
- Demo – Cloud Watch
- Cloud Functions-Cloud Run
- Demo – Cloud Functions
- Demo – Cloud Run
Module 7: Management of your DevOps Services
- Management and Monitoring
- Cloud Operations
- Demo – Cloud Operations
- Service Accounts
- Cloud Endpoints and Apigee
- Demo – Workflows and Cloud Tasks
- Demo – Recommendation Engine
- Infrastructure as Code (IaaC)
- Deployment Manager
- Demo – Deployment Manager
- Demo – Cloud Marketplace
Module 8: Resources and Closeout
- Resources and Closeout
- Course Summary
- DevOps Roles and Salary Demand
- Additional Resources
- Google Cloud Platform Certification
- Course Closeout
Module 1: Foundations (Beginner)
- Introduction
- History Of Computer Programming
- Categories Of Programming Languages
- Condensed History Of Java
- Software Life Cycle
Module 2: Terms and Tools (Beginner)
- Programming General Terms
- Downloading And Installing Java
- Programmer Editors And Integrated Development Environments Part 1
- Programmer Editors And Integrated Development Environments Part 2
- Installing Eclipse
Module 3: Identifiers, Variables, and Data Types (Beginner)
- Understanding Identifiers
- Unicode And Java Syntax
- Variables Constants And Literals
- Field Member And Variable Components
- Primitive Data Types Part 1
- Primitive Data Types Part 2
- Primitive Data Types Part 3
- Operators Part 1
- Operators Part 2
- Escape Characters
- Type Conversions And Type Casting
- Java Reserved Words
- Commenting
- Abstract Data Types
Module 4: Object-Orientated Programming (Intermediate)
- Object Oriented Programming
- What Is An Object?
- Eclipse Lab
Module 5: Predefined Classes (Intermediate)
- String Class Part 1
- String Class Part 2
- String Class Part 3
- Date Class
- Simple Date Format Class
- Scanner Class Part 1
- Scanner Class Part 2
- Decimal Format Class Part 1
- Decimal Format Class Part 2
- JFrame Class
- Container Class Part 1
- Container Class Part 2
Module 6: Methods Part 1 (Intermediate)
- Methods
- Naming Methods
- Implementation Method Hiding
- Method Variables And Literals
- Invoking A Method
Module 7: Methods Part 2 (Advanced)
- Methods And Multiple Arguments
- Methods Lab
- Method Overloading
Module 8: Constructors (Advanced)
- Creating Objects
- Constructor Declarations
- Overloading And Default Constructors
Module 9: Control of Flow (Advanced)
- While Loop
- While Statement
- For Loop
Module 10: Arrays and Exceptions (Advanced)
- Array Structures
- Constants And Array Sizes Part 1
- Constants And Array Sizes Part 2
- Exceptions And The Try Catch Block
- Conclusion
- Introduction
- Java Script From The Dawn Of The Web Part 1
- Java Script From The Dawn Of The Web Part 2
- Getting The Right Tools
- Creating Your First JavaScript Program Part 1
- Creating Your First JavaScript Program Part 2
Module 2: Core Concepts And Syntax
- The Structure And Content Part 1
- The Structure And Content Part 2
- Naming And Casing Best Practices
- Understanding Variables Part 1
- Understanding Variables Part 2
- Understanding Variables Part 3
- Working With Operators Part 1
- Working With Operators Part 2
- Working With Loops Part 1
- Working With Loops Part 2
- Creating Functions Part 1
- Creating Functions Part 2
- Understanding Types And Objects Part 1
- Understanding Types And Objects Part 2
- Understanding Types And Objects Part 3
- Understanding Types And Objects Part 4
- Understanding Types And Objects Part 5
Module 3: Getting A Handle On The DOM
- Introduction To The HTML Document Object Model
- Accessing DOM Elements
- Changing DOM Elements
- Creating DOM Elements
- Responding To Events Part 1
- Responding To Events Part 2
Module 4: Working With Libraries
- Introduction To Libraries
- Installing And Using jQuery Part 1
- Installing And Using jQuery Part 2
- Modifying Web Pages Using jQuery Part 1
- Modifying Web Pages Using jQuery Part 2
- Conclusion
Module 1: The ITIL Qualification Scheme
- Intro
- About Scheme
- Levels Of Qualifications
- Qualification Bodies
- The I T I L Foundation Certification Stubble
Module 2: Introduction to Service Management
- Service And Service Management- Part 1
- Service And Service Management- Part2
- Service Management Processes- Part 1
- Service Management Processes- Part 2
- Service Management Best Practices And Summary
Module 3: ITIL and the Service Lifecycle
- Service Management Practices
- Why ITIL
- The Service Lifecycle
Module 4: Service Strategy
- Service Strategy Purpose And Objectives
- Service Strategy Scope
- Business Value Stubble
- Key Principles- Part1
- Key Principles- Part2
- Service Stragey Processes
Module 5: Service Design
- Service Design Purpose And Objectives
- Scope Of Service Design
- Business Value Service Design
- Service Design Key Principles
- Service Design Processes- Part 1
- Service Design Processes- Part 2
- Service Design Processes- Part 3
- Service Design Processes- Part 4
Module 6: Service Transition
- Service Transition Purpose And Objectives
- Service Transition Scope And Business Value
- Service Transition Key Principles
- Service Transition Processes- Part 1
- Service Transition Processes- Part 2
- Service Transition Processes- Part 3
- Service Transition Processes- Part 4
Module 7: Service Operation
- Intro To Service Operation
- Service Operation Basic Concepts
- Service Operation Processes-Part 1
- Service Operation Processes-Part 2
- Service Operation Access Management
- Service Operation Functions
Module 8: Continual Service Improvement
- Continual Service Improvement Purpose Objectives And Scope
- Continual Service Improvement Key Principles
- Continual Service Improvement Processes
Module 9: Service Management Technology
- SMT
- SMT Service Automation
- SMT Service Analytics
Module 10: How it all Fits Together
- How It All Fits Together
- Outro
Module 11: Bonus Material
- Lifecycle Stages Flow-Part 1
- Lifecycle Stages Flow-Part 2
- Lifecycle Stages Breakdown-Part 1
- Lifecycle Stages Breakdown-Part 2
- Lifecycle Stages Breakdown-Part 3
- Function Reviews-Part 1
- Function Reviews-Part 2
- Service Support Function
- Service Delivery Function-Part 1
- Service Delivery Function-Part 2
- Test Taking Tips
- Practice Questions
Module 1: Service Operation Introduction
- Introduction
- Syllabus Exam Overview And Testing Tips
- Service Operation Introduction Part 1
- Service Operation Introduction Part 2
- Service Operation Introduction Part 3
- Service Operation Introduction Part 4
- Service Operation Introduction Part 5
Module 2: Service Management As a Practice
- Service Management As A Practice Part 1
- Service Management As A Practice Part 2
- Service Management As A Practice Part 3
Module 3: Service Operation Principles
- Service Operation Principles Part 1
- Service Operation Principles Part 2
- Service Operation Principles Part 3
- Service Operation Principles Part 4
Module 4: Service Operation Process
- Service Operation Process Part 1
- Service Operation Process Part 2
- Service Operation Process Part 3
- Incident Management Part 1
- Incident Management Part 2
- Problem Management
- Request Fulfillment
- Access Management
Module 5: Common Service Operation Activities
- Common Service Operation Activities Part 1
- Common Service Operation Activities Part 2
- Common Service Operation Activities Part 3
- Common Service Operation Activities Part 4
Module 6: Organizing For Service Operation
- Organizing For Service Operation Part 1
- Organizing For Service Operation Part 2
- Organizing For Service Operation Part 3
- Roles Part 1
- Roles Part 2
Module 7: Technology Considerations
- Technology Considerations
Module 8: Service Operation
- Implementation Of Service Operation
- Challenges Risks And Critical Success Factors
- Conclusion
Module 1: Introduction To Oracle 12c SQL Fundamentals
- Introduction
- Intro To Oracle 12c-SQL Fundamentals
- Structure Of SQL
- Basic Select Statements
- Basic Select Statements Demo
Module 2: Retrieving Data
- Modifying Reported Output
- The Where Clause
- The Order By Clause
- Left And Right Outer Joins
- The Where Clause Demo
- Multi-Table Selection Demo
Module 3: SQL Functions
- Single Row Functions
- Aggregate Functions
- Single Row Functions Demo
- Muiltrow Functions Demo
- Group By
- Grouping Demo
- Conversion Functions
- Conversion Functions Demo
- Datetime Functions
- Datetime Functions Demo
Module 4: Subqueries
- Single-Row Subqueries
- Single-Row Subqueries Demo
- Multi-Row Subqueries
- Multi-Row Subqueries Demo
- Other Subquery Types
- Other Subquery Types Demo
Module 5: Data Manipulation Language
- Adding Data
- Changing Data
- Deleting Data
- DML Demo
Module 6: Data Control Language
- Security
- Object Privileges
- DCL Demo
Module 7: Data Definition Language
- Creating Objects In The Database
- Creating Objects In The Database Demo
- Sequences
- Sequenced Demo
- Indexes
- Views
Module 8: Combining Queries
- Combining Queries
Module 9: Oracle 12C SQL Fundamentals Review
- Oracle 12c SQL Fundamentals Review – Part 1
- Oracle 12c SQL Fundamentals Review – Part 2
- Oracle 12c SQL Fundamentals Review – Part 3
- Conclusion
Module 1: Database Concepts And Tools
- Instructor And Course Introduction
- Database Concepts And Tools – Part 1
- Database Concepts And Tools – Part 2
Module 2: Memory Structure
- Memory Structure – Part 1
- Memory Structure – Part 2
Module 3: Tables
- Tables – Part 1
- Tables – Part 2
Module 4: Indexes
- Indexes – Part 1
- Indexes – Part 2
Module 5: Constraints And Triggers
- Constraints And Triggers – Part 1
- Constraints And Triggers – Part 2
Module 6: Users
- Users
- Profiles
- Privileges
- Roles
Module 7: Internal Structures
- Storage Structures – Part 1
- Storage Structures – Part 2
- Internal Memory Structures – Part 1
- Internal Memory Structures – Part 2
- Background Processes – Part 1
- Background Processes – Part 2
Module 8: Starting Up and Shutting Down Database
- Starting And Stopping DataBase – Part 1
- Starting And Stopping DataBase – Part 2
Module 9: Critical Storage Files
- Critical Storage Files – Part 1
- Critical Storage Files – Part 2
Module 10: Data Manipulation Language
- DML Atomicity – Part 1
- DML Atomicity – Part 2
- DML Insert
- DML Update – Part 1
- DML Update – Part 2
- DML Delete And Review Of DML Statements – Part 1
- DML Delete And Review Of DML Statements – Part 2
Module 11: Data Concurrency
- Data Concurrency – Part 1
- Data Concurrency – Part 2
Module 12: BackUp And Recovery
- Back Up – Part 1
- Back Up – Part 2
- Back Up – Part 3
- RMAN Catalog
- RMAN BackUps – Part 1
- RMAN BackUps – Part 2
- Disaster Preparedness
- Recovery
- Flashback Recovery
Module 13: Installation
- Installation – Part 1
- Installation – Part 2
Module 14: Course Review
- Course Review – Part 1
- Course Review – Part 2
- Course Review – Part 3
- Course Review – Part 4
- Course Review – Part 5
- Course Outro
Module 1: Database Admininstration
- Intro to Oracle
- Database Administration
- Installing Oracle – Part 1
- Installing Oracle – Part 2
- Post Setup Overview – Part 1
- Post Setup Overview – Part 2
- SQLplus – Part 1
- SQLplus – Part 2
- SQLplus Demo – Part 1
- SQLplus Demo – Part 2
- SQLplus Demo – Part 3
- Startup and Shutdown – Part 1
- Startup and Shutdown – Part 2
Module 2: Oracle Architecture
- Oracle Architecture
- Schema Objects
- Data Access
- Architecture
Module 3: Database Schema
- Database Schema
- Create Table & Tablespace – Part 1
- Create Table & Tablespace – Part 2
- Create View
- Create Index
- Create Sequence
Module 4: Recovery Manager
- Recovery Manager
- What is RMAN
- RMAN Demo
- Restore – Part 1
- Restore – Part 2
Module 5: Introduction to SQL
- SQL – Part 1
- SQL – Part 2
- Parts of SQL Statement
- Select Statement
Module 6: Filtering and Sorting Data
- Build ERD – Part 1
- Build ERD – Part 2
- Build ERD – Part 3
Module 7: Functions
- Functions
- More Functions
- Group Functions
- Custom Functions
Module 8: SET Operators and Subqueries
- SET Operations
- Subqueries
Module 9: Regular Expressions and SQL Loader
- Regular Expressions
- SQL Loader
Module 1: What Is Microsoft 365
- Introduction To 365
- A Little Background On MS Office
- Office 365 Versions And Features-Part1
- Office 365 Versions And Features-Part2
- Online Sign Up
Module 2: Word Online
- Word Online Overview
- Starting A Document In Word Online
- Word Saved To One Drive
- Navigating Word
- Tools And Features
- Fonts Attributes-Part1
- Fonts Attributes-Part2
- Lines And Paragraphs-Part1
- Lines And Paragraphs-Part2
- Bullets Numbering And Styles-Part1
- Bullets Numbering And Styles-Part2
- Inserts Pictures And Tools-Part1
- Inserts Pictures And Tools-Part2
- Tables And Formatting-Part1
- Tables And Formatting-Part2
- Sharing And Templates-Part1
- Sharing And Templates-Part2
Module 3: Excel Online
- Excel Online Overview
- Getting Started With Excel
- Data Entry And Navigation
- Data Entry-Part1
- Data Entry-Part2
- Data Entry And Formatting-Part1
- Data Entry And Formatting-Part2
- Intro To Formulas
- Formulas-Part1
- Formulas-Part2
- Formulas-Part3
- Intermediate Formula And Table Format-Part1
- Surveys
- More Formula And Charts-Part1
- More Formula And Charts-Part2
- Charts
- Sheets And Templates
Module 4: Powerpoint Online
- What Is Powerpoint
- Screen Layout
- Entering And Formatting Text
- Layouts And Designs Part 1
- Layouts And Designs Part 2
- Inserting Objects
- Objects And Transitions
- Animations
- Smart Art
- Notes Printing And Templates
Module 5: Outlook Online
- Intro To Outlook Online
- Intro To Email Accounts Screen Layout
- Configuring Outlook Online
- Sending Emails Outlook Online
- Organization Outlook Online
- Mail Rules In Outlook Online
- Additional Mail Options In Outlook Online
- Spam And Junk Outlook Online
Module 6: One Note Online
- What Is OneNote
- OneNote Screen Overview
- OneNote Desktop
- Drawing Tools With OneNote
- Send To OneNote
- Media With OneNote
- 1.01 Instructor Intro
- 1.02 Course Intro
- 1.1 Explaining the Ribbon
- 1.2 Creating a Document
- 1.3 Saving Files
- 1.4 Page Views
- 1.5 Formatting Text
- 1.6 Ruler, Margins and Tab Stops
- 1.7 Moving and Duplicating Text
- 1.8 Line Spacing and Paragraph Formatting
- 1.9 Basic Editing
- 1.10 Insert a Basic Table and Graphics
- 1.11 Working with Styles
Module 2: Intermediate
- 2.1 Intermediate Intro
- 2.2 Collaboration & Co-Authorship
- 2.3 Tracking and Viewing Changes
- 2.4 Commenting
- 2.5 Templates & Layouts
- 2.6 Layout Functions on the Ribbon
- 2.7 Customize, Format and Convert Tables and Use as a Page Layout
- 2.8 Insert and Edit a Cover Page
- 2.9 Insert and Customize Headers and Footers
- 2.10 Insert and Customize Endnotes and Footnotes
- 2.11 Creating Sections in a Long Document
- 2.12 Using Sections to Format a Document
- 2.13 Deleting a Section
- 2.14 Reviewing, Inserting and Updating TOC
- 2.15 Creating a Data Source and Linking a Mailing List
- 2.16 Print Settings for Mail Merge
Module 3: Advanced
- 3.1 Adding the Developer Tab
- 3.2 Functionality Among Microsoft Office Products
- 3.3 Using Formulas in Word
- 3.4 Citing Sources in Word
- 3.5 Reviewing and Merging Versions of the Same Document
- 3.6 Creating a Master Document
- 3.7 Creating Sub Documents and Editing Master and Sub Docs
- 3.8 Controlling Editable Content
- 3.9 Form Creation Using the Developer Tab
- 3.10 Macros
Module 1: Beginner
- 1.0 Intro
- 1.1 The Ribbon
- 1.2 Saving Files
- 1.3 Entering and Formatting Data
- 1.4 Printing from Excel & Using Page Layout View
- 1.5 Formulas Explained
- 1.6 Working with Formulas and Absolute References
- 1.7 Specifying and Using Named Range
- 1.8 Correct a Formula Error
- 1.9 What is a Function
- 1.10 Insert Function & Formula Builder
- 1.11 How to Use a Function- AUTOSUM, COUNT, AVERAGE
- 1.12 Create and Customize Charts
Module 2: Intermediate
- 2.0 Recap
- 2.1 Navigating and editing in two or more worksheets
- 2.2 View options – Split screen, view multiple windows
- 2.3 Moving or copying worksheets to another workbook
- 2.4 Create a link between two worksheets and workbooks
- 2.5 Creating summary worksheets
- 2.6 Freezing Cells
- 2.7 Add a hyperlink to another document
- 2.8 Filters
- 2.9 Grouping and ungrouping data
- 2.10 Creating and customizing all different kinds of charts
- 2.11 Adding graphics and using page layout to create visually appealing pages
- 2.12 Using Sparkline formatting
- 2.13 Converting tabular data to an Excel table
- 2.14 Using Structured References
- 2.15 Applying Data Validation to cells
- 2.16 Comments – Add, review, edit
- 2.17 Locating errors
Module 3: Advanced
- 3.1 Recap
- 3.2 Conditional (IF) functions
- 3.3 Nested condition formulas
- 3.4 Date and Time functions
- 3.5 Logical functions
- 3.6 Informational functions
- 3.7 VLOOKUP & HLOOKUP
- 3.8 Custom drop down lists
- 3.9 Create outline of data
- 3.10 Convert text to columns
- 3.11 Protecting the integrity of the data
- 3.12 What is it, how we use it and how to create a new rule
- 3.13 Clear conditional formatting & Themes
- 3.14 What is a Pivot Table and why do we want one
- 3.15 Create and modify data in a Pivot Table
- 3.16 Formatting and deleting a Pivot Table
- 3.17 Create and modify Pivot Charts
- 3.18 Customize Pivot Charts
- 3.19 Pivot Charts and Data Analysis
- 3.20 What is it and what do we use it for
- 3.21 Scenarios
- 3.22 Goal Seek
- 3.23 Running preinstalled Macros
- 3.24 Recording and assigning a new Macro
- 3.25 Save a Workbook to be Macro enabled
- 3.26 Create a simple Macro with Visual Basics for Applications (VBA)
- 3.27 Outro
- Introduction To Word Interface Part1
- Introduction To Word Interface Part2
- Introduction To Word Interface Part3
- View
- Typing Part1
- Typing Part2
- Typing Part3
- Typing Part4
- Resume Part1
- Resume Part2
- Bullet List
Word 2016 Intermediate
- Menus And Keyboard Shortcuts Part1
- Menus And Keyboard Shortcuts Part2
- Tabs
- Tables Part1
- Tables Part2
- Tables Part3
- Styles Part1
- Styles Part2
- Styles Part3
- Page Formatting Part1
- Page Formatting Part2
- Page Formatting Part3
Word 2016 Advanced
- Creating An Outline
- Inserting Images Part1
- Inserting Images Part2
- Tracking Changes
- Mail Merge Part1
- Mail Merge Part2
- Large Documents Part1
- Large Documents Part2
- Other Word Functions Part1
- Other Word Functions Part2
- Document Comparison
- Tabs And Ribbons Part1
- Tabs And Ribbons Part2
- Cells Part1
- Cells Part2
- Cells Part3
- Cells Part4
- Calculations Part1
- Calculations Part2
- Calculations Part3
- Printing Part1
- Printing Part2
Excel 2016 Intermediate
- Menus And Keyboard Shortcuts Part1
- Menus And Keyboard Shortcuts Part2
- Menus And Keyboard Shortcuts Part3
- Tabs Part1
- Tabs Part2
- Formulas And Calculations Part1
- Formulas And Calculations Part2
- Formulas And Calculations Part3
- Formulas And Calculations Part4
- Importing Data Part1
- Importing Data Part2
- Invoices
Excel 2016 Advanced
- Advanced Invoice Part1
- Advanced Invoice Part2
- Advanced Invoice Part3
- Advanced Invoice Part4
- Number Crunching
- Creating A Pivot Table From Scratch
- Smaller Excel Components Part1
- Smaller Excel Components Part2
- Smaller Excel Components Part3
Basic Microsoft PowerPoint 2016
- What Is PowerPoint Part 1
- What Is PowerPoint Part 2
- New Presentation
- Viewing Presentation
- Inserting Transitions
- More Visual Designs Part 1
- More Visual Designs Part 2
- More Visual Designs Part 3
- More Visual Designs Part 4
- Notes
Intermediate Microsoft PowerPoint 2016
- Visual Designs With Logos And Animation Part1
- Visual Designs With Logos And Animation Part2
- Visual Designs With Logos And Animation Part3
- Visual Designs With Logos And Animation Part4
- Visual Designs With Logos And Animation Part5
- Exit Animation Part1
- Exit Animation Part2
- Exit Animation Part3
- Navigation Buttons
- Layout Options Part1
- Layout Options Part2
Advanced Microsoft PowerPoint 2016
- Master Pages Part1
- Master Pages Part2
- Software Simulation Part1
- Software Simulation Part2
- Setting Pictures To Music
- Advanced Animation Techniques
- Triggers
- Motion Path Animation
- Video In PowerPoint
- PowerPoint Review Part1
- PowerPoint Review Part2
- Additional Options
Outlook 2016 Basic
- Introduction Part 1
- Introduction Part 2
- Options For Displaying Email Messages
- Create And Send An Email
- Receive An Email
- Calendar Part 1
- Calendar Part 2
- Contacts Part 1
- Contacts Part 2
- Tasks
Outlook 2016 Intermediate
- Folder Structure Part
- Folder Structure Part 2
- Multiple Email Accounts Part 1
- Multiple Email Accounts Part 2
- Create A New Email Part 1
- Create A New Email Part 2
- Signatures
- Calendars Part 1
- Calendars Part 2
- Contacts
- Outlook Settings Part 1
- Outlook Settings Part 2
Outlook 2016 Advanced
- One Note Introduction Part 1
- One Note Introduction Part 2
- One Note And PowerPoint
- One Note And Word
- One Note And Outlook
- Sharing Information
- OneNote And Mobile Devices
- Additional Elements Part 1
- Additional Elements Part 2
Access 2016 Basic
- Introduction Part1
- Introduction Part2
- Elements Part1
- Elements Part2
- Reviewing Data
- Queries Part1
- Queries Part2
- Tracking Time Part1
- Tracking Time Part2
- Tracking Time Part3
- Design Work With Forms
Access 2016 Intermediate
- Relationships Part1
- Relationships Part2
- Changing Information
- Loading Tables
- Relating Invoices Part1
- Relating Invoices Part2
- Relating Invoices Part3
- Relating Invoices Part4
- Time Entry Form
Access 2016 Advanced
- Queries Part1
- Queries Part2
- Queries Part3
- Queries Part4
- Reports Based On Queries
- Adding Additional Information
- Update Query Part1
- Update Query Part2
- Creating A Report From Scratch Part1
- Creating A Report From Scratch Part2
- Creating A Report From Scratch Part3
Word 2013 Basic
- Intro To Word
- Screen Layout
- Page Setup And Text Entry
- Auto-correct Text Formatting
- More Font Formatting
- Fonts-Part 3
- Font Attributes Using Right Click
- Paragraph Attributes
- Customizing Bullets And Numbers
- Reveal Codes Putting It All Together And Saving
- Viewing Rulers
- Formatting Images
- Inserting Images
- Tabs
- Window Views And Putting It All Together-Part 1
- Window Views And Putting It All Together-Part 2
Word 2013 Intermediate
- Intro To Word 2013 Intermediate
- Review Introduction To Styles
- Headers And Footers
- Section Breaks Section Footers
- More Objects Word Intermediate
- Tables In Word Intermediate
- Inserting Text Boxes Word Intermediate
- Additional Page Attributes Word Intermediate
- Intro To Customizing Attributes
- Continuing Auto-correct Options
- View Options In Navigation Pane
- Mail Merge-Part 1
- Mail Merge-Part 2
- Mail Merge-Part 3
- Table Of Contents
- Columns
- Working With Outlines
Word 2013 Advanced
- Word Advanced Introduction
- End Notes Foot Notes
- Captions
- Citations
- Table Of Authorities
- Reference Page Index Table
- Track Changes
- Compare
- Advance Mail Merge-Part 1
- Advance Mail Merge-Part 2
- Advance Smart Art
- Templates
- Custom Configuration
Excel 2013 Basic
- Intro To Excel Overview Of Screen
- Ribbon Elements
- Entering Data And Editing Font Attributes
- Number Formats
- Formatting Cells
- Printing
- Formulas – Part 1
- Formulas – Part 2
- Rearranging Data
- More Formulas – Part 1
- More Formulas – Part 2 Review And Sort
- More Formulas – Part 3 Concatenate
- Chart – Part 1
- Chart – Part 2
- Chart – Part 3
- Summary
Excel 2013 Intermediate
- Introduction
- Review
- Formulas Across Worksheets – Part 1
- Formulas Across Worksheets – Part 2
- Conditional Formatting
- Data Validation
- Names Ranges
- CSV Files
- Text To Column
- Grouping Data
- More Charts Beyond Building Blocks
- Working With Windows – Part 1
- Working With Windows – Part 2
- Headers Footers And Protecting Data
Excel 2013 Advanced
- Pivot Tables – Part 1
- Pivot Tables – Part 2
- Sparklines
- Trancing Formulas
- What If Scenario
- External Data Sources
- Customizing Menus And Options – Part 1
- Customizing Menus And Options – Part 2
- Macros
Powerpoint 2013 Basic
- What Is PowerPoint
- Screen Elements
- Starting A New Presentation
- Layouts
- Objects-Part1
- Objects-Part2
- Objects-Part3
- Slide Design
- Slide Transitions
- Animations-Part1
- Animations-Part2
- View And Slideshow
Powerpoint 2013 Intermediate
- Understanding Slide Masters
- Slide Masters
- Animations-Part1
- Animations-Part2
- Hotspots And Actions
- Views
- Printing Options
Powerpoint 2013 Advanced
- Introduction To Advanced And Inserting Charts
- Setting Up Slide Shows-Part1
- Setting Up Slide Shows-Part2
- Advanced Animations
- Templates Vs Shows
- Reviewing Information And Compare
- Copy And Paste Across Presentations
- Customizing Powerpoint
- Adding Media Video
- Adding Media Audio-Part1
- Adding Media Audio-Part2
- Outlook 2013 Basic
- Introduction To Outlook
- Understanding Email Setting Outlook
- Configuring Interface-Part1
- Configuring Interface-Part2
- Email Window-Part1
- Email Window-Part2
- Managing The Inbox
- Using The Calendar-Part1
- Using The Calendar-Part2
- Contacts-Part1
- Contacts-Part2
- Task List
Outlook 2013 Intermediate
- Adding An Account From Scratch
- Multiple Email Accounts In One Window
- Searching For Mail
- Managing The Folders Views In Inbox
- Using Priority And Receipts
- Calendars
- Contacts-Part1
- Contacts-Part2
Outlook 2013 Advanced
- Mail Part 1 Auto-Replies
- Mail Part 2 Signatures
- Views and Options Part 1
- Views and Options Part 2
- Calendar Part 1
- Calendar Part 2
- Calendar Options
- Contacts
- Contacts Options
- Advanced Options Part 1
- Advanced Options Part 2
Access 2013 Introduction
- Access 2013 Introduction
- What Are Databases
- The Interface Window
- Setting Up The Database-Part1
- Setting Up The Database-Part2
- Creating Forms
- Understanding Table Relationships
- Introduction To Queries
- Introduction To Reports
Access 2013 Intermediate
- Introduction to Table Tools Part 1
- Table Tools-Part2
- Table Tools-Part3
- Forms And Design Intermediate-Part1
- Forms And Design Intermediate-Part2
- Forms Data Entry-Part1
- Forms Data Entry-Part2
- Queries
- Reports From Queries-Part1
- Reports From Queries-Part2
- Reports From Queries-Part3
- Specialized Form
Access 2013 Advanced
- Advance Introduction And Sub-forms
- Sub-forms
- Additional Types Of Queries
- Form And Macros-Part1
- Form And Macros-Part2
- Advance Forms
- Reports Advance-Part1
- Reports Advance-Part2
- Updating Reports
- Customization And Conclusion
- Intro to the Word Interface
- Working with Templates
- Creating a New Blank Document
- Formatting a Document
- More Formatting Options
- Adding Shapes, Clipart, & Pictures
- Page Layout
- Conclusion
Word 2010 Intermediate
- Introduction
- Tracking Changes in a Document
- Customizing the Interface
- Working with Styles
- Tables in Word
- Endnotes, Footnotes, & Captions
- Cover Pages, Headers, & Footers
- Working with Sections
- Headers & Footers
- Cover Sheet & Table of Contents
- Cover Letters & Mail Merge
- Conclusion
Word 2010 Advanced
- Introduction to the Word Interface
- Customizing the Ribbon
- Embedding Non-Word Documents
- Working with Formulas
- Citations
- Comparing Documents
- Forms & Content Controls
- Master Documents & Subdocuments
- Conclusion
Excel 2010 Basic
- Intro to Excel Basic
- Interface and Functions
- Cells
- Entering Data Into Cells
- Basic Formatting in Excel
- Creating a Worksheet
- The Intelligence Of Excel
- Customizing Rows and Columns
- Creating Formulas
- Summary Pages and Moving Workbook to Workbook
- The Function Builder
- Conditional Formatting
- Sorting and Filtering Data
- Printing with Excel
- Conclusion
Excel 2010 Intermediate
- Intro to Excel Intermediate
- Charts
- Headers Footers and Layout Options
- What If
- Basic Tables in Excel
- Pivot Tables
- Manipulating Data Within the Pivot Tables
- Pivot Table Charts
- Data Validation
- Conclusion
Excel 2010 Advanced
- Intro to Excel Advanced
- Customizing the Ribbon and Cells
- Creating and Managing Ranges
- More Formulas
- Data Analysis
- Data From an Outside Source
- Spark Lines
- Macros
- Conclusion
- Intro To PowerPoint Basic
- The PowerPoint Interface
- Creating A New Presentation With Templates
- Slide Layout
- Visually Appealing Presentations
- Preview Mode And Page Setup
- Transitions
- Creating Custom Slides
- Animating Text
- Animating Objects
- Animation Timing
- Conclusion
Powerpoint 2010 Intermediate
- Introduction To PowerPoint Intermediate
- Sections And Organizing Slides
- Adding Autoshapes
- Inserting And Editing Pictures
- Inserting And Editing Video
- Inserting And Editing Tables
- SmartArt
- Animating Smart Art And Inserting Audio
- Headers And Footers In PowerPoint
- Setup Slideshow And Rehearsal Timing
- Conclusion
Powerpoint 2010 Advanced
- Intro To PowerPoint Advanced
- Master Slides
- Styles
- More Functions With Video In PowerPoint
- Transitions And Action Buttons
- Customizing The Show
- Printing In PowerPoint
- Conclusion
Outlook 2010 Basic
- Intro To Outlook Basic
- Interface
- Customizing Interface
- E-mail 101
- Organizing Inbound E-mails
- Calendar Function
- Task Lists
- Contact List
- Multiple Accounts
- Conclusion
Outlook 2010 Intermediate
- Intro To Outlook Intermediate
- Message Functions
- Calendar
- More In-Depth Contact Functions
- Email Message Options
- Mail Rules
- Customizing Options
- Conclusion
Outlook 2010 Advanced
- Intro To Outlook Advanced
- Send And Receive
- Account Settings
- Calendars
- Quick Actions Within Messages
- Quick Steps
- Conclusion
Access 2010 Basic
- Introduction
- Databases And The Access Interface
- Spreadsheets And Tables
- Entering Data In A Table
- Relationships Between Tables
- Editing A Form
- Queries
- Across The Tables
- Creating Forms
- Conclusion
Access 2010 Intermediate
- Introduction
- Primary Key
- Multiple Table Query
- Creating Forms
- Validation Within Forms
- Adding Related Fields
- Forms Created With Design View
- Find Functionality
- Creating Report
- Conclusion
Access 2010 Advanced
- Introduction
- Customizing Access With Back Stage Options
- Mailing Labels
- Macros-Part1
- Macros-Part2
- Queries-Part1
- Queries-Part2
- Joining In Sequel
- Navigation
- Adding Chart With Specific Data
- Action Query
- Security
- Conclusion
- Introduction
- The Advantages Of Style Sheets
- Discovering Cascading Style Sheets
- CSS Structure And Syntax Part1
- CSS Structure And Syntax Part2
- CSS Structure And Syntax Part3
- Using Different Kinds Of Style Sheets
Module 2: Understanding The CSS Box Model
- What Is The Box Model
- Height And Width
- Margin And Padding
- Working With Borders
Module 3: Working With Page Layouts
- Positioning Elements
- Floating Elements
- Controlling Display And Visibility
Module 4: Using Colors And Backgrounds
- Working With Colors
- Working With Backgrounds
Module 5: Web Typography
- Understanding Fonts
- Working With Text Properties
- Text And Shadow Effects Part1
- Text And Shadow Effects Part2
Module 6: Links, Lists, And Tables
- Working With Lists
- Using Navigation Bars
- Working With Tables Part1
- Working With Tables Part2
Module 7: Dynamic CSS3 Properties
- Using Transforms Part1
- Using Transforms Part2
- Using Transitions
- Using Animations
- CSS Project Part1
- CSS Project Part2
- Course Conclusion
Module 1: What Is HTML?
- Introduction
- What Is HTML
- HTML Resources
- Choosing A Code Editor
- The Relationship Of HTML, CSS And JavaScript
Module 2: The Structure And Components
- The HTML Document
- DOCTYPE Declaration
- The Head
- The Body
- The Footer
Module 3: Formatting The Page
- Using Headings
- Creating Paragraphs
- Emphasizing Text
- Controlling Line Breaks And Whitespace
- Creating Lists
- Working With Tables
Module 4: Structuring Content
- Why Structure Matters
- Controlling Document Outlines
- Structure Elements Part 1
- Structure Elements Part 2
Module 5: Adding Links, Images And Other Media
- Working With Links Part 1
- Working With Links Part 2
- Working With Images Part 1
- Working With Images Part 2
Module 6: Styling Web Pages
- HTML And CSS
- Creating Inline Styles
- Controlling Typography
- Adding Color
- Externalizing Styles
Module 7: Creating Your Own Website
- Creating A Website Part 1
- Creating A WebsitIntroduction to Pythone Part 2
- Conclusion
Module 1: Introduction to CSS3
- Introduction
- The Advantages Of Style Sheets
- Discovering Cascading Style Sheets
- CSS Structure And Syntax Part1
- CSS Structure And Syntax Part2
- CSS Structure And Syntax Part3
- Using Different Kinds Of Style Sheets
Module 2: Understanding The CSS Box Model
- What Is The Box Model
- Height And Width
- Margin And Padding
- Working With Borders
Module 3: Working With Page Layouts
- Positioning Elements
- Floating Elements
- Controlling Display And Visibility
Module 4: Using Colors And Backgrounds
- Working With Colors
- Working With Backgrounds
Module 5: Web Typography
- Understanding Fonts
- Working With Text Properties
- Text And Shadow Effects Part1
- Text And Shadow Effects Part2
Module 6: Links, Lists, And Tables
- Working With Lists
- Using Navigation Bars
- Working With Tables Part1
- Working With Tables Part2
Module 7: Dynamic CSS3 Properties
- Using Transforms Part1
- Using Transforms Part2
- Using Transitions
- Using Animations
- CSS Project Part1
- CSS Project Part2
- Course Conclusion
- Introduction
- What Is HTML
- HTML Resources
- Choosing A Code Editor
- The Relationship Of HTML, CSS And JavaScript
Module 2: The Structure And Components
- The HTML Document
- DOCTYPE Declaration
- The Head
- The Body
- The Footer
Module 3: Formatting The Page
- Using Headings
- Creating Paragraphs
- Emphasizing Text
- Controlling Line Breaks And Whitespace
- Creating Lists
- Working With Tables
Module 4: Structuring Content
- Why Structure Matters
- Controlling Document Outlines
- Structure Elements Part 1
- Structure Elements Part 2
Module 5: Adding Links, Images And Other Media
- Working With Links Part 1
- Working With Links Part 2
- Working With Images Part 1
- Working With Images Part 2
Module 6: Styling Web Pages
- HTML And CSS
- Creating Inline Styles
- Controlling Typography
- Adding Color
- Externalizing Styles
Module 7: Creating Your Own Website
- Creating A Website Part 1
- Creating A Website Part 2
- Conclusion
Module 1: Getting Started with Python
- Intro to Course and Instructor
- Getting Started with Python
Module 2: Working with Primitive Data Types
- Working with Primitive Data Types
- Working with Primitive Data Types Part 2
- Working with Primitive Data Types Part 3
- Working with Primitive Data Types Part4
- Working with Primitive Data Types Part4 Answers
Module 3: Working with Multiple Assignments Statements
- Working with Multiple Assignments Statements
Module 4: Convert Types in Python
- Convert Types in Python
Module 5: Creating Lists
- Creating Lists
Module 6: Modifying Lists
- Modifying Lists
Module 7: Sorting and Reversing Lists
- Sorting and Reversing Lists
Module 8: Slicing Lists
- Slicing Lists
Module 9: Working With Operators
- Working With Operators
- Working With Operators Part2
- Working With Operators Part3
Module 10: Determining Operator Precedence
- Determining Operator Precedence
Module 11: Working with IF Statements
- Working with IF Statements
Module 12: Working With For Loops
- Working With For Loops
Module 13: Working With While Loops
- Working With While Loops
Module 14: Nesting for Loops
- Nesting for Loops
Module 15: Reading Files
- Reading Files Part1
- Reading Files Part2
Module 16: More on Files
- More on Files
Module 17: Merging Emails
- Merging Emails
Module 18: Reading Console Inputs and Formatting Outputs
- Reading Console Inputs and Formatting Outputs
Module 19: Reading Command Line Argument
- Reading Command Line Argument
Module 20: Defining Functions
- Defining Functions
Module 21: Using Default Argument
- Using Default Argument
Module 22: Using Keyword and Positional Arguments
- Using Keyword and Positional Arguments
Module 23: Handling Exceptions
- Handling Exceptions
Module 24: Using Math and Random Modules
- Using Math and Random Modules
Module 25: Displaying Daytime Working Directory and File Metadata
- Displaying Daytime Working Directory and File Metadata
Module 1
- Introduction and Developing in HTML5 with Javascript and CSS3
- Intro to HTML 5
- Examples of Browsers Using Codes
- Using HTML5 Codes and Utilizing Virtual Studio – Part 1
- Using HTML5 Codes and Utilizing Virtual Studio – Part 2
- Using HTML5 Codes and Utilizing Virtual Studio – Part 3
- Using HTML5 Codes and Utilizing Virtual Studio – Part 4
Module 2
- HTML5 Code Walk through – Part 1
- HTML5 Code Walk through – Part 2
- HTML5 Code Walk through – Part 3
- CSS3 Selectors and Style Properties – Part 1
- CSS3 Selectors and Style Properties – Part 2
- CSS3 Selectors and Style Properties – Part 3
- CSS3 Selectors and Style Properties – Part 4
- CSS3 Selectors and Style Properties – Part 5
- CSS3 Selectors and Style Properties – Part 6
Module 3
- Developer Tool Support
- Browse-Specific Feature Detection
- HTML Form Examples – Part 1
- HTML Form Examples – Part 2
- HTML Form Examples – Part 3
- HTML Form Examples – Part 4
Module 4
- HTML Form Enhancements – Part 1
- HTML Form Enhancements – Part 2
- HTML Form Enhancements – Part 3
- HTML Form Enhancements – Part 4
- HTML Form Enhancements – Part 5
- HTML Form Enhancements – Part 6
Module 5
- Building Websites – Part 1
- Building Websites – Part 2
- Building Websites – Part 3
- Building Websites – Part 4
Module 6
- More HTML5
- More HTML5 – Information Tags
- More HTML5 – Codes
- More HTML5 – Java Script
- Course Outro
Microsoft 70-480: Programming In HTML5 With JavaScript And CSS3
- Creating document structure
- Writing code that interacts with UI controls
- Applying styles to HTML elements
- Implementing HTML5 APIs
- Establishing the scope of objects and variables
- Creating and implementing objects and methods
- Implementing program flow
- Raising and handling an event
- Implementing exception handling
- Implementing a callback
- Creating a web worker process
- Validating user input with HTML5 elements
- Validating user input with JavaScript
- Consuming data
- Serializing, de-serializing, and transmitting data
- Stylizing HTML text and box properties
- Creating a flexible content layout
- Creating an animated and adaptive UI
- Finding elements by using CSS selectors and JQuery
- Structuring a CSS file using CSS selectors
Module 1: Introduction to Web Development
- Course And Instructor Introduction
- Net Using Visual Studio
- Net Tools In Visual Studio
- Net Data Validation-Part1
- Net Data Validation-Part2
- Net Web User Control
- Net Creating Web Service
- Net Web Service Explained
- Classes Defined
Module 2: C Sharp
- Intro To C Sharp
- Functions In C Sharp
- If Statements In C Sharp
- Static Variables In C Sharp
- Loops In C Sharp
- Debugging In C Sharp
- Introduction To Windows Forms In C Sharp
- More Windows Forms In C Sharp
- Windows Forms Controls In C Sharp
- Object Oriented Programming In C Sharp
- Constructors And Destructors In C Sharp
- Members Of A Class In C Sharp
- Class Inheritance In C Sharp
- Abstract Classes In C Sharp
- Enumerations In C Sharp
- Exception Handling In C Sharp
- Creating XML Documents In C Sharp
- Putting It All Together In A File In C Sharp
Module 3: HTML and CSS Comprehensive Review
- Intro To HTML
- HTML Markup
- Lists In HTML
- Links In HTML
- Tables In HTML
- Forms In HTML
- Intro To CSS
- CSS Color Properties
Module 4: Intro to SQL Server
- Databases Defined
- Tables Defined
- Basic Query Optimization
- Defining And Using Store Procedures
- Creating Stored Procedure
- Executing Store Procedure From C Sharp
- Executing Store Procedure From ASP.Net
- Changing ASP.Net Interface To Retrieve Data-Part1
- Changing ASP.Net Interface To Retrieve Data-Part2
Module 5: Java Script A Comprehensive Introduction
- Intro To JavaScript
- Using JavaScript For Data Validation
- Using JavaScript To Manipulate Documents
- Variables In JavaScript
- If Statements In JavaScript
- Logical Operators In JavaScript
- If Else Statements In JavaScript
- Switch Statements In JavaScript
- For Loops In JavaScript
- For And While Loops In JavaScript
Module 6: Object Based Java Script
- Working With String Object
- More On String Object
- The Math Object
- Creating Your Own Objects
- String Manipulation In JavaScript
- Programming The Browser In JavaScript
- Browser Versions In JavaScript
- Working With Forms In JavaScript
Module 7: Model View and Controller
- MVC Mindset
- MVC Defined
- Create An MVC Project
- MVC Project Initial Walkthrough
- MVC Building Routes
- MVC Approach
- Controllers
- Controllers From Scratch
- MVC Routing
- MVC Routing Constraints
- Routing Constraint Attributes
- MVC Attribute Routing
Module 8: A Comprehensive Introduction to jQuery
- What Is jQuery
- jQuery Effects
- Get And Set Elements In jQuery
- Add And Remove Elements In jQuery
- CSS In jQuery
- Ancestors And Descendants
Module 9: Course Review
- MVC Best Practices
- Testing The Application
- Writing For Production
- Review Web Development
- Review C Sharp
- Review HTML And CSS
- Review SQL Server
- Review JavaScript
- Review Software Development Lifecycle
- Review Design Patterns
- Review jQuery
- Conclusion
Module 1
- Exploring ASP Dot NET MVC 4 – Part 1
- Exploring ASP Dot NET MVC 4 – Part 2
- Exploring ASP Dot NET MVC 4 – Part 3
- Exploring ASP Dot NET MVC 4 – Part 4
Module 2
- Designing Web Applications – Part 1
- Designing Web Applications – Part 2
- Designing Web Applications – Part 3
- Designing Web Applications – Part 4
- Designing Web Applications – Part 5
Module 3
- Developing ASP Dot NET MVC 4 Models – Part 1
- Developing ASP Dot NET MVC 4 Models – Part 2
- Developing ASP Dot NET MVC 4 Models – Part 3
Module 4
- Developing ASP Dot NET MVC 4 Controllers – Part 1
- Developing ASP Dot NET MVC 4 Controllers – Part 2
- Developing ASP Dot NET MVC 4 Controllers – Part 3
- Developing ASP Dot NET MVC 4 Controllers – Part 4
Module 5
- Applying Styles to ASP Dot NET MVC 4 Web Applications – Part 1
- Applying Styles to ASP Dot NET MVC 4 Web Applications – Part 2
- Applying Styles to ASP Dot NET MVC 4 Web Applications – Part 3
- Applying Styles to ASP Dot NET MVC 4 Web Applications – Part 4
- Applying Styles to ASP Dot NET MVC 4 Web Applications – Part 5
Module 6
- Testing and Debugging ASP Dot NET MVC 4 Web Applications – Part 1
- Testing and Debugging ASP Dot NET MVC 4 Web Applications – Part 2
- Testing and Debugging ASP Dot NET MVC 4 Web Applications – Part 3
- Testing and Debugging ASP Dot NET MVC 4 Web Applications – Part 4
- Testing and Debugging ASP Dot NET MVC 4 Web Applications – Part 5
Module 7
- Structuring ASP Dot NET MVC 4 Web Applications – Part 1
- Structuring ASP Dot NET MVC 4 Web Applications – Part 2
- Structuring ASP Dot NET MVC 4 Web Applications – Part 3
Module 8
- Troubleshooting ASP Dot NET MVC 4 Web Applications
Module 1: Preparing for and Taking the Exam
- Preparing to Take the Exam and Instructor Introduction
- Getting Certified to take the Examination
- Examination Characteristics
- Test Taking Tips and Techniques
- Question Formats
- Post Certification Requirements
Module 2: Process Domain
- Process Domain and Framework defined
- Predictive, Iterative, Incremental and Adaptive Project Life Cycles
- Framework Definitions
- Project Manager Skills
- Framework Key Points to Remember
- Framework Example Questions Review
- Project Integration Management Knowledge Area Defined
- Knowledge Area Process Mapping and Definitions
- Develop Project Charter and Develop Project Management Plan
- Direct and Manage Project Work, Manage Project Knowledge, and Monitor and Control Project Work
- Perform Integrated Change Control
- Close Project or Phase
- Integration Key Points to Remember
- Integration Example Questions Review
- Project Scope Management Knowledge Area Defined
- Plan Scope Management and Collect Requirements
- Nominal Group Technique (Delphi-Opinion Technique)
- Define Scope and Create WBS
- Breakdown Structures used in WBS Dictionary
- Validate Scope and Control Scope
- Defining Requirements in Agile
- Prioritizing requirements in Agile, Definition of Done and Rolling Wave Planning
- Scope Key Points to Remember
- Scope Example Questions Review
- Project Schedule Management Knowledge Area Defined
- Plan Schedule Management, Define Activities, and Sequence Activities
- Dependencies, Predecessors, Leads, and Lags
- Estimate Activity Durations
- Develop Schedule
- Critical Path Method
- Schedule Compression
- Resource Leveling, Schedule Format, and Control Schedule
- Agile Estimating
- Agile Schedule Planning and Reporting
- Schedule Key Points to Remember and Example Question review
- Project Cost Management Knowledge Area Defined
- Plan Cost Management and Estimate Cost
- Types of Cost, Expected Present Value, Sunk Costs, and Depreciation
- Life Cycle Costing, Status Reporting, and Determine Budget
- Control Costs, and Earned Value Management
- Earned Schedule, and Agile Cost Control
- Cost Key Points to Remember
- Cost Example Questions Review
- Project Quality Management Knowledge Area Defined
- Plan Quality Management
- Manage Quality
- Control Quality
- Continuous Improvement in Agile-Adaptive Life Cycles – Kaizen and Process Analysis
- Continuous Improvement in Agile-Adaptive Life Cycles – Retrospectives
- Quality Key Points to Remember
- Quality Example Questions Review
- Project Risk Management Knowledge Area Defined
- Risk Management Plan and Identify Risks
- Risk Register and Issues Vs Risk
- Perform Qualitative and Quantitative Risk Analysis
- Plan Risk Responses
- Implement Risk Responses and Monitor Risks
- Agile Risk Tools and Risk Key Points to Remember
- Risk Example Questions Review
- Project Procurement Management Knowledge Area Defined
- Plan Procurement Management and Conduct Procurements
- Contracts
- Share and Point of Total Assumption
- Procurement Documents
- Non-Competitive Awards and Control Procurements
- Agile Contracts
- Procurement Key Points to Remember and Example Questions Review
Module 3: People Domain
- People Domain and Project Communications Management Knowledge Area Defined
- Plan Communications Management
- Manage and Monitor Communications
- Agile Communications
- Communications Key Points to Remember
- Communications Example Question Review
- Project Stakeholder Management Knowledge Area Defined
- Stakeholder Position Descriptions
- Identify Stakeholders
- Plan Stakeholder Engagement and Manage Stakeholder Engagement
- Monitor Stakeholder Engagement and Agile Stakeholder Engagement Techniques
- Stakeholder Management Key Points to Remember
- Stakeholder Management Example Question Review
- Resource Management Knowledge Area Defined
- Plan Resource Management and Estimate Activity Resources
- Acquire Resources and Develop Team
- Manage Team
- Control Resources and Agile Teaming Concepts
- Other Agile Teaming Concepts
- Agile Team Roles and Troubleshooting Agile team issues
- Resources Key Points to Remember
- Resources Example Question Review
Module 4: Business Environment Domain
- Business Environment Domain Defined
- Project Selection Tools
- PMO, Organizational Structure, and Reports
- Agile in the Business Environment
- Business Environment Key Points to Remember and Example Question Review
- Course Closing
Module 1 : Getting Certified to take the Examination
- Intro
Module 2 : Techniques for Preparing for and Taking the Examination
- Getting Certified to take the Exam
- Techniques for Preparing for the Exam
Module 3 : Project Management Framework
- PMBOK Framework prt1
- PMBOK Framework prt2
- PMBOK Framework prt3
Module 4 : Project Integration Management
- Project Integration Mgmt
- Project Integration Mgmt prt2
- Integration Questions
Module 5 : Project Scope Management
- Project Scope Mgmt
- Project Scope Mgmt prt2
- Scope Questions
Module 6 : Project Schedule Management
- Project Schedule Mgmt
- Project Schedule Mgmt prt2
- Project Schedule Mgmt prt3
- Schedule Knowledge Questions
Module 7 : Project Cost Management
- Project Cost Mgmt
- Earned Value Mgmt
- Trend Analysis
- Cost Questions
Module 8 : Project Quality Management
- Project Quality Mgmt
- Quality Zero Defects
- Control Quality
- Quality Questions
Module 9 : Project Resource Management
- Project Resource Mgmt
- Estimate Activity Resources
- Manage Team
- Resource Histogram
- Resource Questions
Module 10 : Project Communications Management
- Project Communication Mgmt
- Communication Methods
- Communications
- Communication Questions
Module 11 : Project Risk Management
- Project Risk Mgmt
- Identify Risk
- Quantitive Risk Analysis
- Plan Risk Responses
- Risk Questions
Module 12 : Project Procurement Management
- Project Procurement
- Make or Buy
- Share
- Procurement Documents
- Negotiations
- Procurement Questions
Module 13 : Project Stakeholder Management
- Project Stakeholder Mgmt
- Plan Stakeholder Engagement
- Project Stakeholder Questions
- CAPM Conclusion
Module 1: Introduction
- Introduction
- Overview – Part 1
- Overview – Part 2
- Overview – Part 3
- Overview – Part 4
- Overview – Part 5
Module 2: Risk Management Concepts
- Risk Definition And Project Risk Management – Part 1
- Risk Definition And Project Risk Management – Part 2
- Critical Success Factors For Project Risk Management
- Overall And Individual Risks-Roles And Responsibilities
Module 3: Risk Management Environment
- Organizational Risk Attitudes
- Organizational Structures
- Stakeholder Identification And Analysis
- Stakeholder Risk Tolerances And Risk Attitudes
Module 4: Project Definition
- Defining The Project And Project Management Plan
- Scope Management – Part 1
- Scope Management – Part 2
- Scope Management – Part 3
- Schedule Management – Part 1
- Schedule Management – Part 2
- Schedule Management – Part 3
- Cost Management – Part 1
- Cost Management – Part 2
- Quality Management
Module 5: Risk Management Planning
- Risk Management Planning
- Critical Success Factors
Module 6: Risk Identification
- Risk Identification
- Project Scope Risk
- Project Schedule Risk
- Resource Risk
- Tools And Techniques – Part 1
- Tools And Techniques – Part 2
- Tools And Techniques – Part 3
- Tools And Techniques – Part 4
Module 7: Qualitative Risk Analysis
- Qualitative Risk Analysis
- Tools And Techniques – Part 1
- Tools And Techniques – Part 2
Module 8: Quantitative Risk Analysis
- Quantitative Risk Analysis
- Tools And Techniques – Part 1
- Tools And Techniques – Part 2
- Tools And Techniques – Part 3
Module 9: Risk Response Planning
- Risk Response Planning
- Risk Responses
- Negative And Positive Risk Responses
- Tools And Techniques – Part 1
- Tools And Techniques – Part 2
- Results
Module 10: Risk Monitoring And Controlling
- Risk Monitoring And Controlling
- Tools And Techniques
- Conclusion
Module 1: Risk Management Fundamentals
- Instructor Intro
- Course Intro
- Risk Management Fundamentals Pt 1
- Risk Management Fundamentals Pt 2
Module 2: Test Requirements
- Test Requirements
Module 3: Test Domains
- Test Domains Pt 1
- Test Domains Pt 2
Module 4: Risk Strategy and Planning
- Risk Strategy and Planning Pt 1
- Risk Strategy and Planning Pt 2
Module 5: Stakeholder Engagement
- Stakeholder Engagement Pt 1
- Stakeholder Engagement Pt 2
- Stakeholder Engagement Pt 3
- Stakeholder Engagement Pt 4
Module 6: Risk Process Facilitation
- Risk Monitoring and Reporting Pt 1
- Risk Monitoring and Reporting Pt 2
- Risk Monitoring and Reporting Pt 3
Module 7: Risk Monitoring and Reporting
- Risk Monitoring and Reporting Pt 1
- Risk Monitoring and Reporting Pt 2
- Risk Monitoring and Reporting Pt 3
Module 8: Specialized Risk Analyses
- Specialized Risk Analyses Pt 1
- Specialized Risk Analyses Pt 2
- Specialized Risk Analyses Pt 3
Module 9: RMP Recap
- RMP Recap
Module 10: RMP Review Questions
- RMP Review Questions Pt 1
- RMP Review Questions Pt 2
- RMP Review Questions Pt 3
- RMP Review Questions Pt 4
- RMP Review Questions Pt 5
Module 1 : Getting Certified to take the Examination
- 1.1 Intro
- 1.2 Getting Certified to take the Exam
- 1.3 Techniques for Preparing for the Exam
Module 2 : Project Management Framework
- 2.1 PMBOK Framework prt1
- 2.2 PMBOK Framework prt2
- 2.3 PMBOK Framework prt3
Module 3 : Project Integration Management
- 3.1 Project Integration Mgmt
- 3.2 Project Integration Mgmt prt2
- 3.3 Integration Questions
Module 4 : Project Scope Management
- 4.1 Project Scope Mgmt
- 4.2 Project Scope Mgmt prt2
- 4.3 Scope Questions
Module 5 : Project Schedule Management
- 5.1 Project Schedule Mgmt
- 5.2 Project Schedule Mgmt prt2
- 5.3 Project Schedule Mgmt prt3
- 5.4 Schedule Knowledge Questions
Module 6 : Project Cost Management
- 6.1 Project Cost Mgmt
- 6.2 Earned Value Mgmt
- 6.3 Trend Analysis
- 6.4 Cost Questions
Module 7 : Project Quality Management
- 7.1 Project Quality Mgmt
- 7.2 Quality Zero Defects
- 7.3 Control Quality
- 7.4 Quality Questions
Module 8 : Project Resource Management
- 8.1 Project Resource Mgmt
- 8.2 Estimate Activity Resources
- 8.3 Manage Team
- 8.4 Resource Histogram
- 8.5 Resource Questions
Module 9 : Project Communications Management
- 9.1 Project Communication Mgmt
- 9.2 Communication Methods
- 9.3 Communications
- 9.4 Communication Questions
Module 10 : Project Risk Management
- 10.1 Project Risk Mgmt
- 10.2 Identify Risk
- 10.3 Quantitive Risk Analysis
- 10.4 Plan Risk Responses
- 10.5 Risk Questions
Module 11 : Project Procurement Management
- 11.1 Project Procurement
- 11.2 Make or Buy
- 11.3 Share
- 11.4 Procurement Documents
- 11.5 Negotiations
- 11.6 Procurement Questions
Module 12 : Project Stakeholder Management
- 12.1 Project Stakeholder Mgmt
- 12.2 Plan Stakeholder Engagement
- 12.3 Project Stakeholder Questions
Module 13 : Review
- 13.1 Review for Exam Prep
- 13.2 Project Mgmt vs Program Mgmt vs Portfolio Mgmt
- 13.3 Knowledge Areas review
- 13.4 Project Scope Management Review
- 13.5 Project Schedule Management Review
- 13.6 Project Cost Management Review
- 13.7 Project Quality Management Review
- 13.8 Project Resource Management Review
- 13.9 Project Communications Mgmt Review
- 13.10 Project Risk Management Review
- 13.11 Project Procurement Management
- 13.12 Project Stakeholder Management
Module 1: Organization – Wide Planning and Deployment
- Introduction
- Wide Planning And Deployment-Part 1
- Wide Planning And Deployment-Part 2
- Wide Planning And Deployment-Part 3
Module 2: Leadership
- Leadership-Part 1
- Leadership-Part 2
Module 3: Organizational Process Measures and Management
- Organizational Process Measures And Management-Part 1
- Organizational Process Measures And Management-Part 2
Module 4: Team Management
- Team Management-Part 1
- Team Management-Part 2
- Team Management-Part 3
- Team Management-Part 4
Module 5: Define Phase – Overview of the Define Phase and the Voice of the Customer
- Overview Of The Define Phase And The Voice Of The Customer-Part 1
- Overview Of The Define Phase And The Voice Of The Customer-Part 2
- Overview Of The Define Phase And The Voice Of The Customer-Part 3
Module 6: Define Phase – Business Case and Project Charter
- Business Case And Project Charter-Part 1
- Business Case And Project Charter-Part 2
Module 7: Define Phase – Analytical Tools
- Analytical Tools
Module 8: Measure Phase – Process Analysis and Documentation
- Process Analysis And Documentation-Part 1
- Process Analysis And Documentation-Part 2
- Process Analysis And Documentation-Part 3
Module 9: Measure Phase – Data Collection
- Data Collection
Module 10: Measure Phase – Measurement Systems
- Measurement Systems-Part 1
- Measurement Systems-Part 2
Module 11: Measure Phase – Basic Statistics
- Basic Statistics-Part 1
- Basic Statistics-Part 2
Module 12: Measure Phase – Probability
- Probability
Module 13: Measure Phase – Process Capability
- Process Capability
Module 14: Analyze Phase – Measuring and Modeling Relationships
- Measuring And Modeling Relationships
Module 15: Analyze Phase – Hypothesis Testing
- Hypothesis Testing
Module 16: Analyze Phase – FEMA and Additional Analysis Methods
- FMEA And Additional Analysis Methods-Part 1
- FMEA And Additional Analysis Methods-Part 2
- FMEA And Additional Analysis Methods-Part 3
- FMEA And Additional Analysis Methods-Part 4
Module 17: Improve Phase – Design of Experiments (DOE)
- Design Of Experiments-Part 1
- Design Of Experiments-Part 2
Module 18: Improve Phase – Lean Method
- Lean Method-Part 1
- Lean Method-Part 2
- Lean Method-Part 3
Module 19: Improve Phase - Implementation
- Implementation
Module 20: Control Phase – Statistical Process Control (SPC)
- Statistical Process Control
Module 21: Control Phase – Other Controls
- Other Controls
Module 22: Control Phase – Maintain Controls and Sustain Improvements
- Maintain Controls And Sustain Improvements
Module 23: DFSS
- DFSS
Module 24: Exam Review – Prep and Key Concepts
- Prep And Key Concepts-Part 1
- Prep And Key Concepts-Part 2
- Prep And Key Concepts-Part 3
- Prep And Key Concepts-Part 4
- Prep And Key Concepts-Part 5
- Conclusion
Module 1: Six Sigma And The Organization
- Introduction
- Six Sigma And The Organization Goals-Part 1
- Six Sigma And The Organization Goals-Part 2
- Lean Principles In The Organization
- Design For Six Sigma
Module 2: Define Phase Project Identification
- Define Phase-Project Identification-Part 1
- Define Phase-Project Identification-Part 2
- Define Phase-Project Identification-Part 3
Module 3: Define PhaseVoice Of The Customer
- Define Phase-Voice Of The Customer-Part 1
- Define Phase-Voice Of The Customer-Part 2
Module 4: Define Phase Project Management Basics on Six Sigma Green Belt
- Define Phase-Project Management Basics-Part 1
- Define Phase-Project Management Basics-Part 2
Module 5: Define PhaseManagement And Planning Tools
- Define Phase-Management And Planning Tools-Part 1
- Define Phase-Management And Planning Tools-Part 2
Module 6: Define PhaseBusiness Results For Projects
- Define Phase-Business Results For Projects-Part 1
- Define Phase-Business Results For Projects-Part 2
Module 7: Define PhaseTeam Dynamics And Define Phase Summary Review Questions
- Define Phase-Team Dynamics And Review Questions
- Define Phase-Summary And Review Questions
Module 8: Measure PhaseProcess Analysis And Documentation
- Measure Phase-Process Analysis And Documentation
Module 9: Measure PhaseProbability And Statistics
- Measure Phase-Probability And Statistics
Module 10: Measure PhaseStatistical Distributions
- Measure Phase-Statistical Distributions
Module 11: Measure PhaseCollecting And Summarizing Data
- Measure Phase-Collecting And Summarizing Data-Part 1
- Measure Phase-Collecting And Summarizing Data-Part 2
Module 12: Measure PhaseMeasurements System Analysis (MSA)
- Measure Phase-Measurements System Analysis(MSA)
Module 13: Measure PhaseProcess And Performance Capability And Measure Phase Summary And Review
- Measure Phase-Process And Performance Capability And Measure Phase Summary And Review
Module 14: Analyze PhaseExploratory Data Analysis And Hypothesis Testing
- Analyze Phase-Exploratory Data Analysis And Hypothesis Testing-Part1
- Analyze Phase-Exploratory Data Analysis And Hypothesis Testing-Part2
- Analyze Phase-Exploratory Data Analysis And Hypothesis Testing-Part3
Module 15: Analyze Phase Process Drivers
- Analyze Phase-Process Drivers-Part 1
- Analyze Phase-Process Drivers-Part 2
- Analyze Phase-Process Drivers-Part 3
- Analyze Phase-Process Drivers-Part 4
- Analyze Phase-Process Drivers-Part 5
Module 16: Improve PhaseDesign Of Experiment (DOE)
- Improve Phase-Design Of Experiment(DOE)-Part 1
- Improve Phase-Design Of Experiment(DOE)-Part 2
Module 17: Improve PhaseRoot Cause Analysis
- Improve Phase-Root Cause Analysis-Part 1
- Improve Phase-Root Cause Analysis-Part 2
- Improve Phase-Root Cause Analysis-Demo
Module 18: Improve PhaseLean Tools
- Improve Phase-Lean Tools-Part 1
- Improve Phase-Lean Tools-Part 2
- Improve Phase-Lean Tools-Part 3
- Improve Phase-Lean Tools-Part 4
Module 19: Control Phase Statistical Process Control
- Control Phase-Statistical Process Control
Module 20: Control PhaseLean Tools For Process Control
- Control Phase-Lean Tools For Process Control-Part 1
- Control Phase-Lean Tools For Process Control-Part 2
- Control Phase-Lean Tools For Process Control-Part 3
Module 21: Review ExamPrep And Key Concepts
- Exam Review And Key Concepts-Part 1
- Exam Review And Key Concepts-Part 2
- Exam Review And Key Concepts-Part 3
- Exam Review And Key Concepts-Part 4
- Exam Review And Key Concepts-Part 5
- Exam Review And Key Concepts-Part 6
- Exam Review And Key Concepts-Part 7
- Exam Review-Flash Cards
- Conclusion

Module 1: Virtual Box
- Virtual Box-Part 1
- Virtual Box-Part 2
- Virtual Box-Part 3
- Virtual Box-Part 4
- Virtual Box-Part 5
- Virtual Box-Part 6
Module 2: Basic Commands
- Basic Commands-Part 1
- Basic Commands-Part 2
- Basic Commands-Part 3
- Basic Commands-Part 4
- Basic Commands-Part 5
- Basic Commands-Part 6
- Basic Commands-Part 7
- Basic Commands-Part 8
- Basic Commands-Part 9
- Basic Commands-Part 10
Module 3: Special Characters
- Special Characters-Part 1
- Special Characters-Part 2
- Special Characters-Part 3
Module 4: File Editing
- File Editing-Part 1
- File Editing-Part 2
- File Editing-Part 3
- File Editing-Part 4
- File Editing-Part 5
- File Editing-Part 6
- File Editing-Part 7
Module 5: File System Structure
- File System Structure-Part 1
- File System Structure-Part 2
- File System Structure-Part 3
- File System Structure-Part 4
Module 6: Finding Files
- Finding Files-Part 1
- Finding Files-Part 2
- Finding Files-Part 3
Module 7: Shell Special Characters
- Shell Special Characters-Part 1
- Shell Special Characters-Part 2
- Shell Special Characters-Part 3
Module 8: Regular Expressions
- Regular Expressions-Part 1
- Regular Expressions-Part 2
- Regular Expressions-Part 3
- Regular Expressions-Part 4
- Regular Expressions-Part 5
- Regular Expressions-Part 6
Module 9: Process Management
- Process Management-Part 1
- Process Management-Part 2
- Process Management-Part 3
- Process Management-Part 4
- Process Management-Part 5
- Process Management-Part 6
- Process Management-Part 7
- Process Management-Part 8
Module 10: Job Scheduling
- Job Scheduling-Part 1
- Job Scheduling-Part 2
- Job Scheduling-Part 3
- Job Scheduling-Part 4
- Job Scheduling-Part 5
- Job Scheduling-Part 6
Module 11: Customizing Your Account
- Customizing Your Account-Part 1
- Customizing Your Account-Part 2
- Customizing Your Account-Part 3
- Customizing Your Account-Part 4
- Customizing Your Account-Part 5
- Customizing Your Account-Part 6
Module 12: Unix Printing
- Unix Printing-Part 1
- Unix Printing-Part 2
- Unix Printing-Part 3
- Unix Printing-Part 4
Module 13: Networking
- Networking-Part 1
- Networking-Part 2
- Networking-Part 3
- Networking-Part 4
- Networking-Part 5
- Networking-Part 6
- Networking-Part 7
- Networking-Part 8
- Networking-Part 9
- Networking-Part 10
Module 14: X Windows
- X Windows-Part 1
- X Windows-Part 2
- X Windows-Part 3
- X Windows-Part 4
- X Windows-Part 5
Module 15: Back Up And Compression
- Back Up And Compression-Part 1
- Back Up And Compression-Part 2
- Back Up And Compression-Part 3
- Back Up And Compression-Part 4
Module 16: Text Utility
- Text Utility-Part 1
- Text Utility-Part 2
- Text Utility-Part 3
- Text Utility-Part 4
- Text Utility-Part 5
Module 17: Shell Scripting
- Shell Scripting-Part 1
- Shell Scripting-Part 2
- Shell Scripting-Part 3
- Shell Scripting-Part 4
- Shell Scripting-Part 5
- Shell Scripting-Part 6
- Shell Scripting-Part 7
- Shell Scripting-Part 8
- Shell Scripting-Part 9
- Shell Scripting-Part 10
- Shell Scripting-Part 11
Module 18: System Administration Basics
- System Administration Basics-Part 1
- System Administration Basics-Part 2
- System Administration Basics-Part 3
- System Administration Basics-Part 4
- System Administration Basics-Part 5
Module 1: Development Methods
- Introduction To Scrum Master
- Development Methods
Module 2: Agile Manifesto Principles
- Agile Manifesto Principles
Module 3: Scrum
- Scrum
- Scrum Summary
Module 4: Why Scrum
- Why Scrum?
Module 5: Scrum-Roles Overview
- Scrum – Roles Overview
Module 6: Product Owner
- Product Owner
Module 7: Scrum Master
- Scrum Master
Module 8: Scrum Team
- Scrum Team
Module 9: Scrum Process
- Scrum Process
Module 10: Scrum Project Phase
- Scrum Project Phase
Module 11: Plan and Estimate
- Plan And Estimate
Module 12: Implement
- Implement
Module 13: Review and Retrospect
- Review And Retrospect
Module 14: Release
- Release
Module 15: Project Vision
- Project Vision
Module 16: Scrum Master and Stake Holder(s)
- Scrum Master And Stake Holders
Module 17: Form Scrum Team
- Form Scrum Team
Module 18: Develop Epics
- Develop Epics
Module 19: User Stories
- User Stories
Module 20: Justifications and Sample Change(s)
- Justifications And Sample Changes
Module 21: Creating a Prioritized Backlog
- Creating A Prioritized Backlog
Module 22: Conduct Release Planning
- Conduct Release Planning
Module 23: Sprints
- Sprints
Module 24: Scrum Framework
- Scrum Framework – Part 1 Roles
- Scrum Framework – Part 2 Ceremonies
- Scrum Framework – Part 3 Artifacts
Module 25: Scrum of Scrums
- Scrum Of Scrums
Module 26: Scrum Demo
- Scrum Demo
Module 27: Review
- Review
- Outro
Module 1: Development Methods
- Introduction To Certified Scrum Master
- Development Methods
Module 2: Agile Manifesto Principles
- Agile Manifesto Principles
Module 3: Scrum
- Scrum
- Scrum Summary
Module 4: Why Scrum
- Why Scrum?
Module 5: Scrum-Roles Overview
- Scrum – Roles Overview
Module 6: Product Owner
- Product Owner
Module 7: Scrum Master
- Scrum Master
Module 8: Scrum Team
- Scrum Team
Module 9: Scrum Process
- Scrum Process
Module 10: Scrum Project Phase
- Scrum Project Phase
Module 11: Plan and Estimate
- Plan And Estimate
Module 12: Implement
- Implement
Module 13: Review and Retrospect
- Review And Retrospect
Module 14: Release
- Release
Module 15: Project Vision
- Project Vision
- Module 16: Scrum Master and Stake Holder(s)
- Scrum Master And Stake Holders
Module 17: Form Scrum Team
- Form Scrum Team
Module 18: Develop Epics
- Develop Epics
Module 19: User Stories
- User Stories
Module 20: Justifications and Sample Change(s)
- Justifications And Sample Changes
Module 21: Creating a Prioritized Backlog
- Creating A Prioritized Backlog
Module 22: Conduct Release Planning
- Conduct Release Planning
Module 23: Sprints
- Sprints
Module 24: Scrum Framework
- Scrum Framework – Part 1 Roles
- Scrum Framework – Part 2 Ceremonies
- Scrum Framework – Part 3 Artifacts
Module 25: Scrum of Scrums
- Scrum Of Scrums
Module 26: Scrum Demo
- Scrum Demo
Module 27: Review
- Review
- Outro
Module 1: Introduction To Application Virtualization
- Course Introduction
- Introduction To Virtualization
- Introduction To Desktop Virtualization
- Introduction To Application Virtualization
- The XenApp Blue Print
- Building The Lab Environment
Module 2: XenApp Server Setup
- Configure XenApp Server After Initial Install
- Configuration Updates And Virtual Delivery Agent Install
- Build Master Image For Machine Catalog
- Complete Master Image Build
- Setup Delivery Group
- Test XenApp Application Delivery
Module 3: Plan For High Availability
- High Availability Explained-Part1
- High Availability Explained-Part2
- Windows Failover Cluster-Part1
- Windows Failover Cluster-Part2
- Complete Failover Cluster Configuration
- Complete Basic Cluster Configuration-Part1
- Complete Basic Cluster Configuration-Part2
Module 4: Scripting Primer
- Windows Batch Files-Part1
- Windows Batch Files-Part2
- Windows Batch Files-Part3
- Power Shell Scripts-Part1
- Power Shell Scripts-Part2
- Error Handling In PowerShell Scripts
- Scripts Explained
Module 5: Using VMware vSphere
- Introduction To VMware
- Configuring Windows 7 And Installing VMware Tools
- Power CLI Scripting In VMware
Module 6: Virtualization Using Microsoft Hyper-V
- Introduction To Hyper-V
- Introduction To Hyper-V Continued
- Windows Server Core Install And Configure-Part1
- Windows Server Core Install And Configure-Part2
- Install And Configure DHCP Server
- Hyper-V Virtual Networking
Module 7: Course Review
- Active Directory Fundamentals
- Permissions In Active Directory
- Logon Scripts In Windows
- Review Virtualization
- Review Application Virtualization
- Review High Availability
- Review Scripting
- Review XenApp Blue Print
- Course Conclusion
Module 1: Introduction To Virtualization
- Introduction
- Intro To Virtualization-Part1
- Virtualization Demo-Part1
- Virtualization Demo-Part2
- Intro To Virtualization-Part2
Module 2: Introduction To Desktop Virtualization
- Into To Desktop Virtualization
Module 3: XenDesktop 7.6 Requirements and Implementations
- Intro To Xen Desktop Concepts And Components
- Xen Desktop Implementations-Part1
- Xen Desktop Implementations-Part2
Module 4: Plan and Design XenDesktop Infrastructure
- Intro To Plan And Design-Part1
- Intro To Plan And Design-Part2
- Active Directory Permissions Demo
- Customize The Desktop Demo
- Customize Environment Demo
- Folder Redirection Demo
- Custom Scripts Demo
- Dynamic VM Demo
- Network Design Considerations
- VM From Scratch Demo
- Access And Optimize
- Cloud Considerations Demo
- Design Monitoring
Module 5: Data And Network Redundancy
- Intro To Network Redundancy
- Intro To Data Redundancy
- VM Availability Demo-Part1
- VM Availability Demo-Part2
- VM Availability Demo-Part3
- Citrix Linux VM And Citrix Xendesktop Site Configuration Demo
Module 6: Automating Using Powershell
- Intro To Powershell-Part1
- Intro To Powershell-Part2
- Powershell Scripting Demo
- Creating Functions In Powershell
Module 7: Virtualizing Using Hyper-V
- Introduction To Hyper-V Installtion
- Introduction To Hyper-V VM Build
- Automating Admin In Hyper-V
Module 8: Build Test And Deploy VM To Xen Desktop
- Customize Client OS Demo
- Customize User Profiles Demo
- Installing XenDesktop Client Components For Pooled Desktops Demo
- Installing XenDesktop Client Components For Remote Desktops Demo
- Deploy XenDesktop Client After VDA Install Demo
- Test Client Deployment Demo
Module 9: Internet Information Services
- Intro And Install Of Information Services-Part1
- Intro And Install Of Information Services-Part2
- Creating Websites And Managing Application Pools
- Backup And Restore WebServer
Module 10: Course Review
- Active Directory Domain
- Windows Permissions And Configurations
- Configure Citrix XenDesktop Studio
- Failover Cluster Demo
- Citrix Authentication And Troubleshooting
- XenDesktop Technical Overview
- SQL Server Database Overview Demo
- SQL Server DBA Tasks
- Conclusion
Module 1: Intro To XenServer And Virtualization
- Intro To Virtual Computing
- Hypervisors-Part1
- Hypervisors-Part2
- Installing Your First VM
- Creating An Active Directory Domain In The VM
- Adding VM And Host To Domain
- Virtual Networks Explained
Module 2: Comprehensive Introduction To Linux
- Intro And Demo Of Linux
- Configuring Linux VM
- Network Configuration
- Linux Scripting And File Permissions
- Advanced Linux Permissions
- Linux DHCP And Disks Explained
- Install And Configure DHCP
Module 3: Hosts, Storage, And Networking
- Storage Access And Configuration
- iCSI Configuration And Access
- Storage Repository
- Subnets Explained
- Subnets Example
- More Subnetting
- Building A Linux Based VM Router
Module 4: Comprehensive Introduction To Powershell
- Why Powershell
- Using Powershell
- Pipelines And WMI
- More WMI And Scripting Using Powershell
- Advanced Powershell Scripting
Module 5: XenServer Components And Features
- Critical Components
- VM Templates
- Virtual Networking
- Automation Explained
- Automation Using XenServer CLI Demo
- Automation Using Powershell Demo
- Powershell Script Completion And Execution
- Protecting Your Virtual Environment Explained
- Protecting Your Virtual Environment Demo
- XenCenter Comprehensive Walk Through
Module 6: Problem Resolution
- Troubleshooting Explained
- VM Migration
Module 7: Review
- XenServer Exam Objectives
- PXE Server Explained
- PXE Server Demo
- XenServer Product Review
- AD Using Command Line And PowerShell
- Conclusion
- Social Media Introduction
- Creating A Google Account
- Setting Up Your Twitter Account
- Getting Your Twitter House In Order
- Why Facebook For Your Business
- Using Facebook As A Business
- Setting Up Your Business Page
- Setting Your Cover Photo
- Tying It All Together
- Tip-Adding Admins In Facebook
- Adjusting Your Settings- Part 1
- Adjusting Your Settings- Part 2
- Adjusting Your Settings- Part 3
- Updating Your Page Info- Part 1
- Updating Your Page Info- Part 2
- Tips For Getting 25 Likes
- Using Facebook As Your Business Page
- What Kind Of Person Would Your Business Be
- How To Post To Facebook
- What To Post
- Sharing Posts
- Sharing Links
- Pinning And Highlighting With Posts
- Tips For Generating Traffic
- Getting Notifications And Staying In Clients News Feed
- Comment Moderation
- The Activity Log- Where Do Hidden Posts Go
- Scheduling Posts
- Intro To Facebook Advertising
- Setup Advertising Account
- Types Of Advertising On Facebook
- Ad Testing
- Choosing Our Audience-Location
- Choosing Our Audience-Age And Gender
- Choosing Our Audience-Precise Interests
- Choosing Our Audience-Broad Categories
- Choosing Our Audience-Connections
- Choosing Our Audience-Advanced Targeting Options
- Choosing Our Audience-Campaign And Budget
- Other Types Of Ads-Part 1
- Other Types Of Ads-Part 2
- Ad Campaign Manager-Part 1
- Ad Campaign Manager-Part 2
- Outside URLs
- Building Ad Text
- News Feed Format And Creating Your Audience
- Campaign Pricing And Schedule
- Ad Campaign Tracker
- Facebook Insights-Overview Intro
- Analyzing Page Posts
- Engaged Users
- Talking About This
- Virality
- Likes
- Reach
- Reach And Frequency
- Page Visits
- Talking About This
- Conclusion
- Introduction To LinkedIn
- Overview Of The Interface And Settings
- Open Link Settings
- LinkedIn Groups
- Adding And Removing Applications
- Basic Account Settings
- Updating Your Public Profile
- LinkedIn Connections Groups And Pages
- LinkedIn Channels And Today
- Advertising on LinkedIn
- Determine Your Goals
- Create Your Persona Or Voice
- Decide On Your Platforms
- Establishing A Social Media Manager
- Coordinate With Customer Service
- Create A Predetermined Crisis Management Plan
- Stick To The Script
- Building Relationships With The Media
- Find Your Evangelist
- Stay Informed Part 1
- Stay Informed Part 2
- Bitly
- Woobox Part 1
- Woobox Part 2
- HootSuite Part 1
- HootSuite Part 2
- Storify
- Social Media Rules And Tips
- Social Media Conclusion
- Tweetdeck-Boolean Search
- Introduction To Google Plus
- Overview Of The Interface
- Setting Up A Google Plus Page
- Linking Your Other Social Networks
- Linking Your Website To Your Google Plus Page
- Review Of Your Google Plus Dashboard
- Notification Settings For Google Plus
- Photo Settings In Google Plus
- Google Plus And YouTube
- YouTube Advanced Settings
- Interface For Uploaded Videos
- Sharing Videos Across Your Social Network
- Updating Your About Section
- Quick Recap Of Everything Covered So Far
- Overview Of Pinterest
- How Does Pinterest Relate To Your Business
- Industry Specific Sites
- The Uses of Pinterest
- Conclusion Of Pinterest
- Introduction to Reddit
- The Rules of Reddit
- Module 1.0 Introduction
- Social Media Introduction
- Creating A Google Account
- Setting Up Your Twitter Account
- Getting Your Twitter House In Order
- Why Facebook For Your Business
- Using Facebook As A Business
- Setting Up Your Business Page
- Setting Your Cover Photo
- Tying It All Together
- Tip-Adding Admins In Facebook
Module 2.0 Adjusting Your Facebook Settings
- Adjusting Your Settings-Part1
- Adjusting Your Settings-Part2
- Adjusting Your Settings-Part3
- Updating Your Page Info-Part1
- Updating Your Page Info-Part2
- Tips For Getting 25 Likes
- Using Facebook As Your Business Page
Module 3.0 Posting on Facebook
- What Kind Of Person Would Your Business Be
- How To Post To Facebook
- What To Post
- Sharing Posts
- Sharing Links
- Pinning And Highlighting With Posts
- Tips For GeneratingTraffic
- Getting Notifications And Staying In Clients News Feed
- Comment Moderation
- The Activity Log-Where Do Hidden Posts Go
- Scheduling Posts
Module 7.0 Twitter
- Limiting the Number Of Actions
- Setting Your Twitter Preferences
- Finish Setting Up Your Profile
- Twitter Widgets
- Who To Follow
- Connect
- Bringing Followers From Facebook
- Intro To Hashtags
- Examples Of Hashtags
- Monitoring Whats Going On
- Using Twitter For Social Listening
- Social Media Tips
- Hashtags Across Social Media
Module 8.0 Pinterest
- Overview Of Pinterest
- How Does Pinterest Relate To Your Business
- Industry Specific Sites
- The Uses of Pinterest
- Conclusion Of Pinterest
Module 9.0 Reddit
- Introduction To Reddit
- The Rules Of Reddit
Module 11.0 LinkedIn
- Introduction To LinkedIn
- Overview Of The Interface And Settings
- Open Link Settings
- LinkedIn Groups
- Adding And Removing Applications
- Basic Account Settings
- Updating Your Public Profile
- LinkedIn Connections Groups And Pages
- LinkedIn Channels And Today
- Advertising On LinkedIn
Module 12.0 Google+ and Youtube
- Introduction To Google Plus
- Overview Of The Interface
- Setting Up A Google Plus Page
- Linking Your Other Social Networks
- Linking Your Website To Your Google Plus Page
- Review Of Your Google Plus Dashboard
- Notification Settings For Google Plus
- Photo Settings In Google Plus
- Google Plus And YouTube
- YouTube Advanced Settings
- Interface For Uploaded Video
- Sharing Videos Across Your Social Network
- Updating Your About Section
- Quick Recap Of Everything Covered So Far
Module 14.0 Additional Tools
- Bitly
- Woobox-Part1
- Woobox-Part2
- Hoot Suite-Part1
- Hoot Suite-Part2
- Storify
- Social Media Rules And Tips
- Tweet deck-Boolean Search
- Social Media Conclusion
Module 4.0 Facebook Advertising
- Intro To Facebook Advertising
- Setup Advertising Account
- Types Of Advertising On Facebook
- Ad Testing
- Choosing Our Audience-Location
- Choosing Our Audience-Age And Gender
- Choosing Our Audience-Precise Interests
- Choosing Our Audience-Broad Categories
- Choosing Our Audience-Connections
- Choosing Our Audience-Advanced Targeting Options
- Choosing Our Audience-Campaign And Budget
- Other Types Of Ads-Part1
- Other Types Of Ads-Part2
- Ad Campaign Manager-Part1
- Ad Campaign Manager-Part2
- Outside URLs
- Building Ad Text
- News Feed Format And Creating Your Audience
- Campaign Pricing And Schedule
- Ad Campaign Tracker
Module 5.0 Facebook Insights
- Facebook Insights-Overview Intro
- Analyzing Page Posts
- Engaged Users
- Talking About This
- Virality
- Likes
- Reach
- Reach And Frequency
- Page Visits
- Talking About This
- Conclusion
Module 6.0 Facebook Analytics
- 0 New Facebook Analytics Overview
- 1 Page Likes
- 2 Post Reach
- 3 Page Visits
- 4 Posts
- 5 People
- New Facebook Analytics Overview
- Page Likes
- Post Reach
- Page Visits
- Posts
- People
Module 10.0 Tumblr
- Tumblr Introduction
- Setting Up A Tumblr
- Dashboard
- Posting To Tumblr
- Testing Your Post
- URL Post
- Chat Post
- Audio On Tumblr
- Video On Tumblr
- Tumblr Conclusion
Module 13.0 Best Practices
- Determine Your Goals
- Create Your Persona Or Voice
- Decide On Your Platforms
- Establishing A Social Media Manager
- Coordinate With Customer Service
- Create A Predetermined Crisis Management Plan
- Stick To The Script
- Building Relationships With The Media
- Find Your Evangelist
- Stay Informed-Part1
- Stay Informed-Part2
- Module 1 Online Lead Generation
- Intro to Social Media Digital Marketing
- Online Lead Generation prt1
- Online Lead Generation prt2
- Lead Examples
- Live Streaming Video for Leads
- Lead Generation
- Using Your Customers
- Be Ready
Module 2 Facebook, LinkedIn, and YouTube 101
- Create a Facebook Business Page
- Facebook Setup
- Marketing in Facebook Groups
- Messenger Bots
- More on Messenger
- Facebook Video using InShot
- Repurposing
- Setting Up LinkedIn Pro le
- Benefits of YouTube
Module 3 List Building & Email Marketing
- Email List prt1
- Email List prt2
- MailChimp prt1
- MailChimp prt2
- Email Content Ideas
- Email summary
Module 4 Creating Social Media Content and Marketing Materials with Canva and other Apps
- Canva Image Creation
- Making a video with your phone
- InShot video
- Purpose Video Marketing
- Transcribing Video
- Word Swag
- Ripl
- Instagram prt1
- Instagram prt2
- Instagram prt3
Module 5 Sales Funnels
- Click Funnel prt1
- Click Funnel prt2
- Funnel Building prt1
- Funnel Building prt2
Module 6 Apps & Tools Review
- Social Media apps
- Podcasting
- Customer Value Letter
- Tips and Tricks
- Fiverr
- Outro
- Module 1: Social Media Marketing
- Course Intro
- How to Utilize Social Media
- Client Briefs
- Target Markets
- Personas Pt 1
- Personas Pt 2
- Personas Pt 3
- Competitive Analysis Pt 1
- Competitive Analysis Pt 2
- Competitive Analysis Pt 3
Module 2: Social Media Marketing
- What is the Right Content for You
- Images Pt 1
- Images Pt 2
- Images Pt 3
- Images Pt 4
- Images Pt 5
- Video Pt 1
- Video Pt 2
- Video Pt 3
- Video Pt 4
- Live Videos and Engagement Pt 1
- Live Videos and Engagement Pt 2
Module 3: Social Media Marketing
- What are Analytics and How to Use Them
- Free Analytic Tools Available
- Paid Services to Consider Pt 1
- Paid Services to Consider Pt 2
- Finding the Right Hashtags
- What is Automation
- How to Best Use Automation
- Course Outro
-
- Tumblr Introduction
- Setting Up A Tumblr
- Dashboard
- Posting To Tumblr
- Testing Your Post
- URL Post
- Chat Post
- Audio On Tumblr
- Video On Tumblr
- Tumblr Conclusion
-
- Limiting the Number Of Actions
- Setting Your Twitter Preferences
- Finish Setting Up Your Profile
- Twitter Widgets
- Who To Follow
- Connect
- Bringing Followers From Facebook
- Intro To Hashtags
- Examples Of Hashtags
- Monitoring What’s Going On
- Using Twitter For Social Listening
- Hashtags Across Social Media
- Introduction
- Business Entities
- Beginning Your Business
- Financial Basics Part 1
- Financial Basics Part 2
- Employees Payroll
- Getting Your Business Out There
- SEO
- Other Topics
- Closing
- Module 1: Setup and Maintenance
- Course Introduction
- Knowing Which Account is Right for You
- Getting Started
- User Setup
- Access Rights
- User Setup Completion
- Adding Employees to Payroll
- Inviting Your Accountant
- Dashboard and 3 Ways to Navigate QBO
- Commonly Used Forms
- Module 1 Summary
Module 2: List Management
- Defining Lists
- Importing Lists
- Employees vs 1099
- Adding and Removing Entries
- Updating Entries
- Editing and Managing List Elements Demo
- Merging Items (entries)
- Form Requirements
- Summary
Module 3: Sales (Money-In)
- Product and Service Setup
- Customer Setup Demo
- Invoicing Workflows
- Recording Sales
- Customer Statements
- Tracking Audit History Demo
- Sales Reciept Workflow
- Undeposited Funds Account
- Accounts Receivable Impact
- Impact of Connecting Your Bank Account to QBO
- Billable Expense Invoicing
- Recording a Customer Credit
- Delayed Charges
- Estimates
- Summary
Module 4: Purchased (Money-Out)
- Product and Service Setup on Purchase Forms
- Vendor Setup
- Purchase Order Transactions
- Entering and Paying Bills
- Recording Checks
- Recording Credit and Debit Card Transactions
- Recording EFTs, Online Payments, and Wire Transfers
- Recording Vendor Credits
- Voiding vs Deleting Checks
- Vendor Page and Report Insights
- Summary
Module 5: Accounting
- Basic financial statements (Balance sheet, income statement, and statement of cash flows)
- Financial Statements Expanded
- Cash and Accrual Accounting Differences
- Difference Between Cash and Accrual Reporting
- Setting a Closing Date
- Balancing Your Books aka Reconciling Demo
- Journal Entries
- Audit Log Insights
- Project Profitability Demo
- Summary
Module 6: Reports
- Customized Reports
- Commonly Used Reports Demo
- Setup Automatic Report Emails
- Collapse and Expand Report Function
- Exporting and Importing Reports
- Summary
Module 7: Customizations and Time Savers
- Tracking Income and Expenses for Multiple Locations
- Organizing your Chart of Accounts
- Custom Fields on Invoices
- Recurring Transactions
- Customizing a Sales Form
- Keyboard Shortcuts
- QBO Mobile App Preview
- Connecting Third Party Apps to QBO
- Summary
Module 8: Extra
- Common Mistakes QBO Users Make
- Final Note on Bookkeeping Best Practices
- Why QBO is Awesome
- Course Outro
- Defining Terms and Sample Quiz Questions
- Module 1: Creating and Setting Up Your Point of Sale Company File
- Intro To Point Of Sale
- Creating And Setting Up Point Of Sale
Module 2: Installing your System
- Determining Your Point Of Sale Additions
Module 3: Navigating and Customizing the Home Page
- Navigating And Customizing The Homepage
Module 4: Company Preferences
- Company Preferences
Module 5: Financial- Setting up QuickBooks Connection
- Setting Up Quickbooks Connection
Module 6: Setting up Sales Tax
- Setting Up Sales Tax
Module 7: Workstation Preferences
- Workstation Preferences
Module 8: Additional Features
- Additional Features
Module 9: Employees and Security
- Employees And Security
Module 10: Customers
- Customers
Module 11: Rewards Program
- Reward Programs
Module 12: Vendors
- Vendors
Module 13: Setting Up Your Inventory
- Setting Up Inventory
Module 14: Item Styles, Assemblies, and Group
- Adding Styles Assemblies And Groups
Module 15: Working with Inventory
- Working With Inventory
Module 16: Sales
- Sales
Module 17: Working with Price Levels and Discounts
- Working With Price Level And Discounts
Module 18: Collecting Sales Tax
- Collecting Sales Tax
Module 19: Adding Shipping Information (Pro/MS)
- Adding Shipping Info
Module 20: Tracking Sales Commissions
- Tracking Sales And Commission
Module 21: Taking Payment and Giving Change
- Taking Payments And Giving Change
Module 22: Recording Tips
- Recording Tip
Module 23: Handling Tricky Sales Returns
- Handling Tricky Sales And Returns
Module 24: Working with Sales Orders, Work Orders, and Layaways
- Working With Sales And Work Orders
Module 25: Purchasing Merchandise
- Purchasing Merchandise
Module 26: Receiving from a PO
- Receiving Purchase Orders
Module 27: Managing Inventory
- Managing Inventory
Module 28: Reporting
- Reporting Point Of Sales
Module 29: QuickBooks Financial
- Quickbooks Financial
Module 30: Multi-Store
- Multi-Store
Module 31: Protect your data
- Protecting Your Data
Module 32: Adding Third Party Applications
- Adding 3rd Party Apps
- Summary of Point of Sale
- Module 1: Intro and Setup
- Intro To Quickbooks
- Setup Quickbooks
Module 2: Tools
- Tools-Part 1
- Tools-Part 2
- Tools-Part 3
Module 3: Preferences
- Preferences
- Email Preferences
Module 4: Security & Users
- Security And Users
Module 5: Estimates
- Estimates
Module 6: Sales Orders
- Sales And Orders
Module 7: Receiving Money
- Account Receivable
- Batch Invoicing
- Customer Deposits
Module 8: Bounced Checks
- Bounced Checks
Module 9: Specific Tracking
- Vehicle Mileage
- Class Tracking Transactions
Module 10: Receiving and Depositing
- Receiving Payments
- Making Deposits
Module 11: Credit Cards and Bank Accounts
- Credit Cards
- Bank Accounts
Module 12: Payroll
- Payroll Preferences
- Employee Setup
- Processing Payroll
- Payroll Tax Forms
- Job Costing With Payroll
- Payroll Setup Advance
- Workers Compensation
Module 13: Transactions
- Special Transactions
- Memorized Transactions
Module 14: Accounts and Reports
- Other Account Types
- Quickbooks Reporting
- Advance Reporting
- Budgets And Forecast
Module 15: Integrating with Word
- Writing Letters In Microsoft Word
Module 16: Data Types
- Converting Importing And Exporting
- Quickooks Backup Data Integrity
- Multi-Currencies
Module 17: Conclusion
- Advance Features
- Update Or Upgrade
- Summary Of Quickbooks
- Module 1: Sage 50 2013
- Course Overview-Part1
- Course Overview-Part2
- Course Overview-Part3
- Course Overview-Part4
- New Features-Part1
- New Features-Part2
- New Features-Part3
- Quick Tab Menu Overview
- Business Status-Part1
- Business Status-Part2
- Customer And Sales
- Vendors And Purchases
- Inventory And Services
- Employees And Services
- Banking
- System-Part 1
- System-Part2
- Quick Tab Menu Review
- Sage 50 Menu Overview-Part1
- Sage 50 Menu Overview-Part 2
- Sage 50 Menu Overview-Part3
- Sage 50 Menu Overview-Part 4
- Sage 50 Menu Overview-Part5
- Sage 50 Menu Overview-Part6
- Sage 50 Menu Overview-Part7
Module 2: Sage 50 Basics
- Sage 50 Available Products
- Accounts Payable Features
- Vendors And Purchases-Part 1
- Vendors And Purchases-Part 2
- Vendors And Purchases-Part 3
- Vendors And Purchases-Part 4
- Vendors And Purchases-Part 5
- Vendors And Purchases-Part 6
- Accounts Payable Review
- Accounts Receivable Review
- Customer And Sales Menu
- Customers
- Jobs
- Sales Taxes
- Quotes And Proposals
- Sales Orders
- Invoices
- Finance Charges Basics
- Receive Money
- Bank Accounts
- Printing Statements
- Credits And Returns
- Accounts Receivable Report
- Basics Review
Module 3: Inventory
- Inventory And Services Overview
- Inventory Items-Part 1
- Inventory Items-Part 2
- Company Services
- Assemblies and Prices
- Purchase Orders
- Receiving Inventory Shipping And Tracking
- Inventory Count And Adjustments
- Inventory Reports
- Inventory Review
Module 4: Employee
- Employees And Payroll Overview
- Employees And Users-Part 1
- Employees And Users-Part 2
- 1099’s
- Payroll Setup
- Time And Expense Tickets
- Direct Deposit And Printing Payroll Checks
- Forms And Void Checks
- Employees Module Review
Module 5: Banking
- Banking Features Overview
- Write Checks
- Account Register
- Analysis Tools-Part 1
- Analysis Tools-Part 2
- Chart Of Accounts
- Receive Money And Bank Deposits-Part 1
- Receive Money And Bank Deposits-Part 2
- Enter Bills Pay Bills And Electronic Bill Pay
- Reconcile Accounts
- General Journal Entries
- Void Checks And Reports
- Banking Module Review
Module 6: Maintenance
- Automatic Backup
- BackUp Data-Part 1
- BackUp Data-Part 2
- Automatic Backup
- Restore Data
- Data Maintenance
- System Checks
- Company Maintenance
- Data Integrity
- Maintenance Review
Module 7: File Handling
- Attaching Documents
- Attaching And Managing Documents
- File Handling Review
Module 8: Manager
- Analysis Managers
- Cash Flow Manager-Part 1
- Cash Flow Manager-Part 2
- Cash Flow Manager-Part 3
- Collection Manager
- Payment Manager
- Financial Manager
- Manager Review
Module 9: Jobs
- MaintainingJobs
- CreatingJobs-Part 1
- Creating Jobs-Part 2
- Managing Jobs
- Jobs Review
Module 10: Budgets
- Maintain Budgets
- Creating And Managing Budgets-Part 1
- Creating And Managing Budgets-Part 2
- Budgets Module Review
Module 11: Charts of Accounts
- Maintain Chart Of Accounts
- Creating Accounts
- Accounts List-Part 1
- Accounts List-Part 2
- Chart Of Accounts Review
Module 12: Accounts Management
- Maintain Customers And Prospects
- Adding Customers And Prospects
- Accounts Aging
- Payment Methods
- Managing A Customer Account
- Accounts Management Review
Module 13: Customer Setup
- Customer Setup Guide
- Customer Setup-Part 1
- Customer Setup-Part 2
- Customer Setup-Part 3
- Customer Beginning Balance
- Customer Account Defaults
- Sales Tax
- Statement And Invoice Defaults
- Customer Setup Review
Module 14: Jobs Setup
- Jobs Setup Guide
- Jobs Setup
- Jobs Change Order
- Job Ledger
- Job Profitability Report-Part 1
- Job Profitability Report-Part 2
- Job Defaults
- Jobs Beginning Balances
- Jobs Setup Review
Module 15: Vendor Setup
- Vendors Setup Guide
- Vendor Setup-Part 1
- Vendor Setup-Part 2
- Vendor Setup-Part 3
- Vendor Setup-Part 4
- Vendor Beginning Balances
- Vendor Default
- Vendor Setup Review
Module 16: Inventory Setup
- Inventory And Services Items Setup
- Adding And Managing Inventory And Service Items-Part 1
- Adding And Managing Inventory And Service Items-Part 2
- Adding And Managing Inventory And Service Items-Part 3
- Adding And Managing Inventory And Service Items-Part 4
- Quantities On Hand
- Inventory And Service Items Default Setup
- Inventory Setup Review
Module 17: Employee Setup
- Employees Setup Guide
- Employee Payroll Settings
- Payroll Options Settings
- Company Information Setting
- Benefits Settings-Part 1
- Benefits Settings-Part 2
- Payroll Taxes And Place Order Settings
- Employee Setup
- Salary History Setup
- Employees Default Setup
- Employee Setup Review
Module 18: Security Setup
- Security Setup Guide
- Setup Security
- Set Up Users
- User Security Setup
- User List Rights And Permissions
- Setup Guide Next Steps
- Security Review
Module 19: ACTI Link
- Sage 50 ACT
- Sage ACT Link
- ACT Accounting Link Setup
- Creating And Editing Contact Links-Part 1
- Creating And Editing Contact Links-Part 2
- Creating And Editing Contact Links-Part 3
- Contact Link Updates Options
- ACT! Link Review
Module 20: Task Overview
- Tasks Menu
- Quotes Sales Orders And Proposals-Part 1
- Quotes Sales Orders And Proposals-Part 2
- Quotes Sales Orders And Proposals-Part 3
- Sales Invoicing And Time Expenses
- Shipments
- Receipts
- Finance Charges
- Select For Deposit
- Credit Memos
- Select For Purchase Orders-Part 1
- Select For Purchase Orders-Part 2
- Bills And Payments-Part 1
- Bills And Payments-Part 2
- Account Register
- Time And Expense
- Select For Payroll Entry
- General Journal Entry
- Asemblies
- Account Reconciliation And Void Checks
- Write Letters And Action Items
- System Tasks
- Tasks Overview Review
Module 21: Forms, Reports, and Recap
- Reports And Forms
- Form Types And Sample Forms-Part 1
- Form Types And Sample Forms-Part 2
- Form Types And Sample Forms-Part 3
- Reports-Part 1
- Reports-Part 2
- Reports-Part 3
- Reports-Part 4
- Reports-Part 5
- Services
- Program Review
- Module 1: Intro to SalesForce Automation
- Course And Instructor Introduction
- What Is Salesforce Automation
- Sales Force Automation System Overview
- Why Salesforce
Module 2: Working With The SalesForce System
- Creating Accounts And Contacts
- Creating Leads And Opportunities
- Sales Process-Part 1
- Sales Process-Part 2
- Sales Process-Part 3
- Sales Process-Part 4
- Leads Through Social Channels
Module 3: SalesForce Solution
- Core Problems
- Managing Accounts
- Badges And Campaigns
- Custom Apps
Module 4: SalesForce Admin
- Introduction To RDBMS
- Introduction To The Cloud
- Introduction To Virtual Machines-Part1
- Introduction To Virtual Machines-Part2
- Salesforce Development
- Introduction To Building In The Cloud
- Salesforce Set Up
Module 5: Migrating To SalesForce
- Tasks To Complete Before Migration-Part 1
- Tasks To Complete Before Migration-Part 2
- Frequently Asked Questions-Part 1
- Frequently Asked Questions-Part 2
- Frequently Asked Questions-Part 3
- Frequently Asked Questions-Part 4
- Frequently Asked Questions-Part 5
- Frequently Asked Questions-Part 6
- Frequently Asked Questions-Part 7
- Frequently Asked Questions-Part 8
- Frequently Asked Questions-Part 9
Module 6: Course Conclusion
- The Salesforce Solution
- Conclusion
- Module 1: The Phone
- Introduction
- Buttons
Module 2: The Screen
- Gestures
Module 3: The Keyboard
- Keypad
Module 4: Contacts
- Contacts
- Groups
Module 5: Phone Calls
- Phone
- Call Customization
Module 6: Messaging
- Messages-Part 1
- Messages – Part 2
- Messages – Part 3
- Messages – Part 4
- Customizing Messages
Module 7: Internet
- Internet – Part 1
- Internet – Part 2
- Internet Settings
Module 8: Email
- Email-Part1
- Email-Part 2
- Setup Email
Module 9: Music
- Music
Module 10: Android Specifics
- Google Voice
- Customization
- Lock Screen
- Stylus
Module 11: Photos & Video
- Camera-Part1
- Camera-Part2
- Taking Photos-Part1
- Taking Photos-Part2
- Editing Photos
- Capturing Video
Module 12: Conclusion
- Wrap Up
- Module 1: iPhone Basics
- Iphone Intro
- Iphone The Basics
Module 2: The Screen
- 2.1 The Screen Pt. 1
- 2.2 The Screen Pt. 2
- 2.3 The Screen Pt. 3
- 2.4 The Screen Pt. 4
Module 3: The Keyboard
- Basic Keyboard
- Advanced Keyboard
Module 4: Basic Calls and Settings
- Making A Call
- Settings-Part 1
- Settings-Part 2
Module 5: Contacts
- Contacts-Part 2
- Contacts-Part 2
Module 6: Phone Calls
- Phone Calls-Part 1
- Phone Calls-Part 2
- Phone Calls-Part 3
- Advanced Phone Calls
Module 7: Messaging
- Texting-Part 1
- Texting-Part 2
- Advanced Texting-Part 1
- Advanced Texting-Part 2
- Message Settings
Module 8: Web
- Web-Part 1
- Web-Part 2
- Web-Part 3
Module 9: Email
- Email-Part 1
- Email-Part 2
- Multiple Email Accounts
- Email Settings
Module 10: Siri
- SIRI
Module 11: Music
- Music-Part 1
- Music-Part 2
Module 12: Photos and Video
- Camera Functions
- Photography Settings
- Edit Photos
- Share Photos
- Video Functions
Module 13: Maps
- Apple Maps
Module 14: Conclusion
- Application Management
- Misc-Part 1
- Misc-Part 2
- Conclusion
- Aerobic Bootcamp
- Baking Cupcakes
- Chess
- Cooking
- Cooking with Children
- DIY Home Improvement Basics
- Harassment in the Workplace
- HIPAA, Fraud, and Abuse
- Holiday Baking
- How to Become a Personal Trainer
- How to Handle Stress in the Workplace
- ICD 10 & 11 Medical Coding and Billing
- Jewelry
- Juicing and Blending
- Managing Different Personality Types
- Marketing Tools and Tips for Success
- Massage Therapy
- Mastering Bartending in a Week or Less
- Mastering Beer Brewing
- Mastering Makeup Application Techniques at Home
- Medical Coding and Billing ICD 10
- Medical Coding and Billing ICD-9
- OSHA Training
- Photography Basics
- Special Effects (fx) Makeup Level 1
- Special Effects (fx) Makeup Level 2
- Starting Your Own YouTube Channel 101
- The Key to Nutrition and Wellness
- Ultimate Resume Building
- Wedding Makeup and Hair
- Weight Loss
- Wine Making
- Wine Pairing and Tasting
- Yoga