By you, For you, With you – Access it all at your ease. From Minor to Vital our courses range will never be a disappointment. Scroll to choose from a swarm of courses.

Module 1: Installation

  • SQL Admin Intro
  • Installation

Module 2: Data Storage

  • Introduction to Data Storage with SQL Server
  • Managing Storage for System Databases
  • Managing Storage for User Databases
  • Moving Database Files

Module 3: Data Recover

  • Intro to Data Recovery
  • Understanding SQL Server Recovery Models
  • Planning a Backup Strategy
  • Backing up Databases and Transaction Logs
  • Using SSMS For Backup
  • Understanding the Restore Process
  • How to Restore a Database
  • Using SSMS For Restore
  • T-SQL Backup and Restore
  • Advanced Restore Scenarios
  • Introduction to Transferring Data
  • Importing and Exporting Table Data
  • Copying or Moving a Database

Module 4: Monitoring

  • Introduction to Monitoring SQL Server
  • Dynamic Management Views and Functions
  • Server Reports
  • System Performance Monitor
  • Tracing SQL Server Workload Activity
  • Extended Events
  • Database Tuning Advisor

Module 5: Security

  • Introduction to SQL Server Security
  • Managing Server-Level Security
  • Managing Database-Level Security
  • Row Level Security (RLS) Using Policies
  • Database Security Tools
  • Contained Database
  • Auditing Data Access in SQL Server
  • Implementing Transparent Data Encryption

Module 6: Maintenance

  • Introduction to Maintenance
  • Ensuring Database Integrity
  • Maintaining Indexes
  • Automating Routine Database Maintenance
  • Automating SQL Server Management
  • Monitoring SQL Server Errors
  • Configuring Database Mai

Module 1: What are Big Data Clusters?

  • 1.1 Introduction
  • 1.2 Linux, PolyBase, and Active Directory
  • 1.3 Scenarios

Module 2: Big Data Cluster Architecture

  • 2.1 Introduction
  • 2.2 Docker
  • 2.3 Kubernetes
  • 2.4 Hadoop and Spark
  • 2.5 Components
  • 2.6 Endpoints

Module 3: Deployment of Big Data Clusters

  • 3.1 Introduction
  • 3.2 Install Prerequisites
  • 3.3 Deploy Kubernetes
  • 3.4 Deploy BDC
  • 3.5 Monitor and Verify Deployment

Module 4: Loading and Querying Data in Big Data Clusters

  • 4.1 Introduction
  • 4.2 HDFS with Curl
  • 4.3 Loading Data with T-SQL
  • 4.4 Virtualizing Data
  • 4.5 Restoring a Database

Module 5: Working with Spark in Big Data Clusters

  • 5.1 Introduction
  • 5.2 What is Spark
  • 5.3 Submitting Spark Jobs
  • 5.4 Running Spark Jobs via Notebooks
  • 5.5 Transforming CSV
  • 5.6 Spark-SQL
  • 5.7 Spark to SQL ETL

Module 6: Machine Learning on Big Data Clusters

  • 6.1 Introduction
  • 6.2 Machine Learning Services
  • 6.3 Using MLeap
  • 6.4 Using Python
  • 6.5 Using R

Module 7: Create and Consume Big Data Cluster Apps

  • 7.1 Introduction
  • 7.2 Deploying, Running, Consuming, and Monitoring an App
  • 7.3 Python Example – Deploy with azdata and Monitoring
  • 7.4 R Example – Deploy with VS Code and Consume with Postman
  • 7.5 MLeap Example – Create a yaml file
  • 7.6 SSIS Example – Implement scheduled execution of a DB backup

Module 8: Maintenance of Big Data Clusters

  • 8.1 Introduction
  • 8.2 Monitoring
  • 8.3 Managing and Automation
  • 8.4 Course Wrap Up

Module 1 – Introduction to Business Intelligence and Data Modeling

  • 1.1 Course Introduction
  • 1.2 Module 1 Introduction
  • 1.3 Introduction to Business Intelligence
  • 1.4 The Microsoft Business Intelligence Platform
  • 1.5 Exploring a Data Warehouse
  • 1.6 Exploring a Data Model

Module 2 – Multidimensional Databases

  • 2.1 Module 2 Introduction
  • 2.2 Introduction to Multidimensional Analysis
  • 2.3 Overview of Cube Security
  • 2.4 Creating and Configuring a Cube
  • 2.5 Data Sources
  • 2.6 Data Source Views
  • 2.7 Adding a Dimension to a Cube

Module 3 – Cubes and Dimensions

  • 3.1 Module 3 Introduction
  • 3.2 Dimensions
  • 3.3 Attribute Hierarchies and Relationships
  • 3.4 Sorting and Grouping Attributes
  • 3.5 Slowly Changing Dimensions

Module 4 – Measures and Measure Groups

  • 4.1 Module 4 Introduction
  • 4.2 Measures
  • 4.3 Measure Groups and Relationships
  • 4.4 Measure Group Storage

Module 5 – Introduction to MDX

  • 5.1 Module 5 Introduction
  • 5.2 MDX Fundamentals
  • 5.3 Adding Calculations to a Cube
  • 5.4 Querying a cube using MDX

Module 6 – Customizing Cube Functionality

  • 6.1 Module 6 Introduction
  • 6.2 Key Performance Indicators
  • 6.3 Actions
  • 6.4 Perspectives
  • 6.5 Translations

Module 7 – Tabular Data Models

  • 7.1 Module 7 Introduction
  • 7.2 Introduction to Tabular Data Models
  • 7.3 Creating a Tabular Data Model
  • 7.4 Configure Relationships and Attributes
  • 7.5 Configuring Data Model for an Enterprise BI Solution

Module 8 – Data Analysis Expressions (DAX)

  • 8.1 Module 8 Introduction
  • 8.2 DAX Fundamentals
  • 8.3 Calculated Columns
  • 8.4 Relationships
  • 8.5 Measures
  • 8.6 Time Intelligence
  • 8.7 KPI
  • 8.8 Parent – Child Hierarchies

Module 9 – Data Mining

  • 9.1 Module 9 Introduction
  • 9.2 Overview of Data Mining
  • 9.3 Custom Data Mining Solutions
  • 9.4 Validating a Data Mining Model
  • 9.5 Consuming a Data Mining Model
  • 9.6 Course Wrap Up
Module 1 – Query Tools

  • 1.1 Course Introduction
  • 1.2 Module 1 Introduction
  • 1.3 Intro to Management Studio
  • 1.4 Intro to command-line query tools

Module 2 – Introduction to T-SQL Querying

  • 2.1 Module 2 Introduction
  • 2.2 Introducing T-SQL
  • 2.3 Understanding Sets
  • 2.4 Understanding the Logical Order of Operations in SELECT statements

Module 3 – Basic SELECT Queries

  • 3.1 Module 3 Introduction
  • 3.2 Writing Simple SELECT Statements
  • 3.3 Eliminate Duplicates with DISTINCT
  • 3.4 Using Column and Table Aliases
  • 3.5 Write Simple CASE Expressions

Module 4 – Querying Multiple Tables

  • 4.1 Module 4 Introduction
  • 4.2 Understanding Joins
  • 4.3 Querying with Inner Joins
  • 4.4 Querying with Outer Joins
  • 4.5 Querying with Cross Joins and Self Joins

Module 5 – Sorting and Filtering Data

  • 5.1 Module 5 Introduction
  • 5.2 Sorting Data
  • 5.3 Filtering Data with Predicates
  • 5.4 Filtering with the TOP and OFFSET-FETCH
  • 5.5 Working with Unknown Values

Module 6 – Working with SQL Server Data Types

  • 6.1 Module 6 Introduction
  • 6.2 Writing Queries that return Date and Time Data
  • 6.3 Writing Queries that use Date and Time Functions
  • 6.4 Writing Queries that return Character Data
  • 6.5 Writing Queries that use Character Functions

Module 7 – Using DML to Modify Data

  • 7.1 Module 7 Introduction
  • 7.2 Inserting Records with DML
  • 7.3 Updating Records Using DML
  • 7.4 Deleting Records Using DML

Module 8 – Using Built-In Functions

  • 8.1 Module 8 Introduction
  • 8.2 Writing Queries with Built-In Functions
  • 8.3 Using Conversion Functions
  • 8.4 Using Logical Functions
  • 8.5 Using Functions to Work with NULL

Module 9 – Grouping and Aggregating Data

  • 9.1 Module 9 Introduction
  • 9.2 Using Aggregate Functions
  • 9.3 Using the GROUP BY Clause
  • 9.4 Filtering Groups with HAVING

Module 10 – Using Subqueries

  • 10.1 Module 10 Introduction
  • 10.2 Writing Self-Contained Subqueries
  • 10.3 Writing Correlated Subqueries
  • 10.4 Using the EXISTS Predicate with Subqueries

Module 11 – Using Table Expressions

  • 11.1 Module 11 Introduction
  • 11.2 Using Views
  • 11.3 Using Inline Table-Valued Functions
  • 11.4 Using Derived Tables
  • 11.5 Using Common Table Expressions

Module 12 – Using Set Operators

  • 12.1 Module 12 Introduction
  • 12.2 Writing Queries with the UNION operator
  • 12.3 Using EXCEPT and INTERSECT
  • 12.4 Using APPLY

Module 13 – Using Window Ranking, Offset, and Aggregate Functions

  • 13.1 Module 13 Introduction
  • 13.2 Creating Windows with OVER
  • 13.3 Exploring Window Functions

Module 14 – Pivoting and Grouping Sets

  • 14.1 Module 14 Introduction
  • 14.2 Writing Queries with PIVOT and UNPIVOT
  • 14.3 Working with Grouping Sets

Module 15 – Implementing Error Handling

  • 15.1 Module Introduction
  • 15.2 Implementing T-SQL error handling
  • 15.3 Implementing structured exception handling

Module 16 – Managing Transactions

  • 16.1 Module 16 Introduction
  • 16.2 Transactions and the Database Engine
  • 16.3 Controlling Transactions
  • 16.4 Course Wrap Up
Module 1 – Query Tools

  • 1.1 Course Introduction
  • 1.2 Intro to Management Studio
  • 1.3 Intro to command-line query tools

Module 2 – Introduction to T-SQL Querying

  • 2.1 Introducing T-SQL
  • 2.2 Understanding Sets
  • 2.3 Understanding the Logical Order of Operations in SELECT statements

Module 3 – Basic SELECT Queries

  • 3.1 Writing Simple SELECT Statements
  • 3.2 Eliminate Duplicates with DISTINCT
  • 3.3 Using Column and Table Aliases
  • 3.4 Write Simple CASE Expressions

Module 4 – Querying Multiple Tables

  • 4.1 Understanding Joins
  • 4.2 Querying with Inner Joins
  • 4.3 Querying with Outer Joins
  • 4.4 Querying with Cross Joins and Self Joins

Module 5 – Sorting and Filtering Data

  • 5.1 Sorting Data
  • 5.2 Filtering Data with Predicates
  • 5.3 Filtering with the TOP and OFFSET-FETCH
  • 5.4 Working with Unknown Values

Module 6 – Introduction to Business Intelligence and Data Modeling

  • 6.1 Introduction to Business Intelligence
  • 6.2 The Microsoft Business Intelligence Platform
  • 6.3 Exploring a Data Warehouse
  • 6.4 Exploring a Data Model

Module 7 – Prepare Data

  • 7.1 Introduction to Power BI
  • 7.2 Get data from various data sources
  • 7.3 Preview source data

Module 8 – Clean, Transform, and Load Data

  • 8.1 Data Transformation Intro
  • 8.2 Transformation Example 1
  • 8.3 Transformation Example 2
  • 8.4 Transformation Example 3
  • 8.5 Transformation Example 4
  • 8.6 Transformation Example 5
  • 8.7 Transformation Example 6

Module 9 – Design a Data Model

  • 9.1 Introduction to Data Modeling
  • 9.2 Model Relationships
  • 9.3 Table Configuration
  • 9.4 Model interface
  • 9.5 Quick Measures
  • 9.6 Many-to-many relationships
  • 9.7 Row-level security

Module 10 – Create Model Calculations using DAX

  • 10.1 DAX context
  • 10.2 Calculated Tables
  • 10.3 Calculated Columns
  • 10.4 Managing Date Tables
  • 10.5 Measures
  • 10.6 Filter Manipulation
  • 10.7 Time Intelligence

Module 11 – Create Reports

  • 11.1 Basic Report Creation
  • 11.2 Example Page 1
  • 11.3 Example Page 2
  • 11.4 Example Page 3
  • 11.5 Report Publishing
  • 11.6 Enhancing Reports
  • 11.7 Drill-Through Pages
  • 11.8 Conditional Formatting
  • 11.9 Buttons and Bookmarks

Module 12 – Create Dashboards

  • 12.1 Dashboard Basics
  • 12.2 Real Time Dashboards
  • 12.3 Enhanced Dashboards

Module 13 – Create Paginated Reports

  • 13.1 Introduction to Power BI Report Builder
  • 13.2 Report Layouts
  • 13.3 Report Data
  • 13.4 Report Tables

Module 14 – Perform Advanced Analytics

  • 14.1 Introduction to Advanced Analytics
  • 14.2 Scatter Chart
  • 14.3 Forecast
  • 14.4 Decomposition Tree
  • 14.5 Key Influencers

Module 15 – Create and Manage Workspaces

  • 15.1 Introduction to Workspaces
  • 15.2 Working with Workspaces and the Portal

Module 16 – Create Power App Visuals

  • 16.1 Introduction to Power Apps Visual
  • 16.2 Creating the App
  • 16.3 Basic Power Apps Concepts
  • 16.4 Refreshing the Report

Module 17 – Analysis Services and Power BI

  • 17.1 Introduction to Analysis Services
  • 17.2 Connecting with Multidimensional Models
  • 17.3 Premium Workspaces and Analysis Services
  • 17.4 Course Wrap Up

Module 1 – Azure Overview

  • 1.0 Introduction to AZ-104
  • 1.1 Cloud Computing
  • 1.2 Cloud Services Benefits
  • 1.3 Cloud Service Types
  • 1.4 Azure Core Architectural Components
  • 1.4.1 ACTIVITY-Creating Management Groups and Subscriptions
  • 1.5 Azure Compute Services
  • 1.6 Azure Application Hosting Options
  • 1.7 Azure Networking Services
  • 1.8 Azure Storage Services
  • 1.9 Azure Identity, Access, and Security
  • 1.10 Azure Cost Management
  • 1.10.1 ACTIVITY- Checking Your Azure Balance
  • 1.11 Azure Governance and Compliance Tools
  • 1.11.1 ACTIVITY- Assign an Azure Policy

Module 2 – Azure Tools

  • 2.1 Azure Portal
  • 2.1.1 ACTIVITY- Exploring the Azure Portal
  • 2.2 Azure Monitoring Tools
  • 2.3 Azure PowerShell
  • 2.3.1 ACTIVITY- Using Azure PowerShell
  • 2.4 Azure CLI
  • 2.4.1 ACTIVITY- Using the Azure CLI
  • 2.5 Azure Cloud Shell
  • 2.6 ARM Templates
  • 2.6.1 ACTIVITY- Using Templates to Deploy Resources
  • 2.7 Azure Resource Manager
  • 2.8 Hybrid Tools

Module 3 – Azure Identities and Governance

  • 3.1 Azure AD Overview
  • 3.1.1 ACTIVITY- Exploring Azure Active Directory
  • 3.1.2 ACTIVITY- Adding a Custom Domain
  • 3.2 Subscriptions
  • 3.3 Users and Groups
  • 3.3.1 ACTIVITY- Adding Azure Active Directory User
  • 3.3.2 ACTIVITY- Bulk Inviting New Users
  • 3.3.3 ACTIVITY- Creating Azure AD Groups
  • 3.4 Authentication
  • 3.5 SSPR
  • 3.5.1 ACTIVITY- Implementing SSPR
  • 3.6 Devices
  • 3.7 Azure Roles
  • 3.7.1 ACTIVITY- Assigning Azure Roles
  • 3.8 Azure AD Roles
  • 3.8.1 ACTIVITY- Assigning Azure AD Roles
  • 3.9 Conditional Access
  • 3.10 Authorization
  • 3.10.1 ACTIVITY- Managing Licenses
  • 3.11 Azure Policy

Module 4 – Azure Storage

  • 4.1 Storage Accounts
  • 4.1.1 ACTIVITY- Creating a Storage Account
  • 4.2 Storage Types
  • 4.2.1 ACTIVITY- Creating Storage Types
  • 4.3 Azure Storage Tools
  • 4.3.1 ACTIVITY- Azure Storage Explorer
  • 4.4 Azure Files and File Sync
  • 4.4.1 ACTIVITY- Deploying an Azure Files Share
  • 4.5 Azure Storage Security

Module 5 – Azure Compute Resources

  • 5.1 Virtual Machines
  • 5.1.1 ACTIVITY- Create Virtual Machines
  • 5.1.2 ACTIVITY- Delete a Virtual Machine
  • 5.2 VM Availability
  • 5.2.1 ACTIVITY- Increasing VM Availability
  • 5.3 VM Extensions
  • 5.4 Azure App Service
  • 5.5 Azure Container Instances
  • 5.6 Kubernetes

Module 6 – Azure Virtual Networks

  • 6.1 Virtual Networks
  • 6.1.1 ACTIVITY- Create a VNet
  • 6.2 Network Security Groups-Part 1
  • 6.2.1 Network Security Groups-Part 2
  • 6.3 Azure Firewall
  • 6.3.1 ACTIVITY- Deploying a Firewall
  • 6.4 Azure DNS-Part 1
  • 6.4.1 Azure DNS-Part 2
  • 6.4.2 ACTIVITY- Implementing Azure DNS Zone6
  • 6.5 Virtual Network Peering
  • 6.5.1 ACTIVITY- VNet Peering
  • 6.6 Azure VPN Gateway
  • 6.7 ExpressRoute and Virtual WANs
  • 6.8 Azure Load Balancer
  • 6.9 Azure Application Gateway
  • 6.10 Azure Routes

Module 7 – Azure Monitoring and Backup

  • 7.1 Network Watcher
  • 7.2 Azure Monitor
  • 7.3 Azure Backup-Part 1
  • 7.4 Azure Backup-Part 2
  • 7.5 Azure Backup-Part 3
  • 7.6 Conclusion to AZ-104

Module 1: Introduction

  • Instructor Introduction
  • Course Overview
  • Expectations

Module 2: Cloud Fundamentals

  • What is the Cloud
  • Basic Terms
  • Types of cloud computing
  • Cloud Service Models

Module 3: Azure’s Architecture

  • Regions and Availability
  • Resource Groups and Management
  • Azure Marketplace
  • Demo- Azure Console Exploration

Module 4: Compute

  • Virtual Machines
  • Containers
  • Demo – Containers
  • Functions
  • Demo – Functions
  • Windows Virtual Desktop and App Services

Module 5: Networking and CDN

  • Virtual Networks
  • Load Balancers
  • Gateways
  • Content Delivery Network
  • Network Security
  • Demo – Connecting two VMs

Module 6: Storage

  • Storage
  • Big Data and Analytics
  • Databases
  • Demo – SQL Database
  • Database Migration

Module 7: Azure Solutions

  • IoT
  • Demo – IoT Hub
  • AI
  • Serverless Computing

Module 8: Administration

  • Security
  • Identity and Access Management
  • Demo – Adding Users and Groups
  • Governance
  • Demo – Resource Locks
  • Privacy and Compliance

Module 9: Pricing and Service Level Agreements

  • Managing Costs
  • Demo – Pricing Calculator
  • Service Level Agreements and Service Lifecycles

Module 10: Exam Preparation

  • Exam Layout
  • Best Practices and Study Tips
  • Overview and Conclusion

Module 11: Review Questions

  • Module 11 pt 1
  • Module 11 pt 2
  • Module 11 pt 3
  • Module 11 pt 4

Module 1: Implement VM Solutions

  • Intro
  • Implement VM Solutions Pt 1
  • Implement VM Solutions Pt 2
  • Implement VM Solutions Pt 3
  • Implement VM Solutions Pt 4
  • Implement Batch Jobs Using AZ Batch Services
  • Create Containerized Solutions Pt 1
  • Create Containerized Solutions Pt 2

Module 2: Develop Azure Platform as a Service

  • Develop Azure Platform as a Service (PaaS) Pt 1
  • Develop Azure Platform as a Service (PaaS) Pt 2
  • Develop Azure Platform as a Service (PaaS) Pt 3
  • Develop Azure Platform as a Service (PaaS) Demo Pt 1
  • Develop Azure Platform as a Service (PaaS) Demo Pt 2
  • Create Azure App Service Mobile Apps
  • Create Azure App Service API Apps
  • Implement Azure Functions Pt 1
  • Implement Azure Functions Pt 2

Module 3: Develop for Azure Storage

  • Develop for Azure Storage Pt 1
  • Develop for Azure Storage Pt 2
  • Develop for Azure Storage Pt 3
  • Develop Solutions that use Azure Cosmos DB Pt 1
  • Develop Solutions that use Azure Cosmos DB Pt 2
  • Develop Solutions that use Relational Database Pt 1
  • Develop Solutions that use Relational Database Pt 2
  • Develop Solutions that use Microsoft Blob Storage

Module 4: Implement Azure Security

  • Implement Azure Security Pt 1
  • Implement Azure Security Pt 2
  • Implement Azure Security Pt 3
  • Implementing Access Control Pt 1
  • Implementing Access Control Pt 2
  • Implementing Secure Data Solutions

Module 5: Monitor, Troubleshoot and Optimize Azure Solutions

  • Monitor, Troubleshoot and Optimize Azure Solutions Pt 1
  • Monitor, Troubleshoot and Optimize Azure Solutions Pt 2
  • Develop for Code Scalability
  • Instrument Solutions to Support Monitoring and Logging
  • Integrate Caching and Content Delivery Pt 1
  • Integrate Caching and Content Delivery Pt 2

Module 6: Connect to and Consume Azure and Third Party Services

  • Connect to and Consume Azure and Third Party Services Pt 1
  • Connect to and Consume Azure and Third Party Services Pt 2
  • Working with Azure Search
  • Azure API Management
  • Develop Event Based Solutions Pt 1
  • Develop Event Based Solutions Pt 2
  • Develop Message Based Solutions Pt 1
  • Develop Message Based Solutions Pt 2
  • Outro
Module 1 – Prepare Data

  • 1.1 Course Introduction
  • 1.2 Module 1 Introduction
  • 1.3 Introduction to Power BI
  • 1.4 Get data from various data sources
  • 1.5 Preview source data

Module 2 – Clean, Transform, and Load Data

  • 2.1 Module 2 Introduction
  • 2.2 DimEmployee Example
  • 2.3 DimEmployeeSalesTerritory Example
  • 2.4 DimReseller Example
  • 2.5 FactResellersSales Example
  • 2.6 ResellerSalesTargets Example
  • 2.7 Color Formats Example

Module 3 – Design a Data Model

  • 3.1 Module 3 Introduction
  • 3.2 Introduction to Data Modeling
  • 3.3 Model Relationships
  • 3.4 Table Configuration
  • 3.5 Model interface
  • 3.6 Quick Measures
  • 3.7 Many-to-many relationships
  • 3.8 Row-level security

Module 4 – Create Model Calculations using DAX

  • 4.1 Module 4 Introduction
  • 4.2 DAX context
  • 4.3 Calculated Tables
  • 4.4 Calculated Columns
  • 4.5 Managing Date Tables
  • 4.6 Measures
  • 4.7 Filter Manipulation
  • 4.8 Time Intelligence

Module 5 – Create Reports

  • 5.1 Module 5 Introduction
  • 5.2 Basic Report Creation
  • 5.3 Example Page 1
  • 5.4 Example Page 2
  • 5.5 Example Page 3
  • 5.6 Report Publishing
  • 5.7 Enhancing Reports
  • 5.8 Drill-Through Pages
  • 5.9 Conditional Formatting
  • 5.10 Buttons and Bookmarks

Module 6 – Create Dashboards

  • 6.1 Module 6 Introduction
  • 6.2 Dashboard Basics
  • 6.3 Real Time Dashboards
  • 6.4 Enhanced Dashboards

Module 7 – Create Paginated Reports

  • 7.1 Module 7 Introduction
  • 7.2 Introduction to Power BI Report Builder
  • 7.3 Report Layouts
  • 7.4 Report Data
  • 7.5 Report Tables

Module 8 – Perform Advanced AnalyticsModule 9 – Create and Manage Workspaces

  • 9.1 Introduction to Workspaces
  • 9.2 Working with Workspaces and the Portal

Module 10 – Create Power App Visuals

  • 10.1 Module 10 Introduction
  • 10.2 Introduction to Power Apps Visual
  • 10.3 Creating the App
  • 10.4 Basic Power Apps Concepts
  • 10.5 Refreshing the Report

Module 11 – Analysis Services and Power BI

  • 11.1 Module 11 Introduction
  • 11.2 Introduction to Analysis Services
  • 11.3 Connecting with Multidimensional Models
  • 11.4 Premium Workspaces and Analysis Services
  • 11.5 Course Wrap Up

Module 1 Understanding Local Area Networking

  • Module 1 Notes
  • 1.0 Intro to Networking Fundamentals
  • 1.1 Exam Overview
  • 1.1 Examining Local Network Devices and Data Transfers 1a
  • 1.1 Examining Local Network Devices and Data Transfers 1b
  • 1.1 Examining Local Network Devices and Data Transfers 1c
  • 1.1 Examining Local Network Devices and Data Transfers 1d
  • 1.1 Examining Local Network Devices and Data Transfers 1e
  • 1.1 Examining Local Network Devices and Data Transfers 1f
  • 1.2 Examining Local Network Devices and Data Transfers Part 2a
  • 1.2 Examining Local Network Devices and Data Transfers Part 2b

Module 2 Defining Networks with the OSI Model

  • Module 2 Notes
  • 2.1 Defining Networks with OSI Model Part 1a
  • 2.2 Defining Networks with OSI Model Part 1b
  • 2.3 Defining Networks with OSI Model Part 1c
  • 2.4 Defining Networks with OSI Model Part 1d
  • 2.5 Defining Networks with OSI Model Part 1e
  • 2.6 Defining Networks with OSI Model Part 1f
  • 2.7 Defining Networks with OSI Model Part 1g
  • 2.8 Defining Networks with OSI Model Part 1h

Module 3 Understanding Wired and Wireless Networks

  • Module 3 Notes
  • 3.1 Understand Wired and Wireless Networks Part1
  • 3.2 Understand Wired and Wireless Networks Part2

Module 4 Understanding Internet Protocol

  • Module 4 Notes
  • 4.1 Understanding Internet Protocol Part1
  • 4.2 Understanding Internet Protocol Part2

Module 5 Implementing TCP-IP in the command line

  • Module 5 Notes
  • 5.1 Implementing TCPIP in the Command Line

Module 6 Working with Networking Services

  • Module 6 Notes
  • 6.1 Working with Networking Services

Module 7 Understanding Wide Area Networks

  • Module 7 Notes
  • 7.1 Understanding Wide Area Network Part1
  • 7.2 Understanding Wide Area Network Part2

Module 8 Defining Network Infrastructure and Security

  • Module 8 Notes
  • 8.1 Defining Network Infrastructure & Network Security Part1
  • 8.2 Defining Network Infrastructure & Network Security Part2

Module 9 Key Takeaways

  • Key Takeaway Notes
  • 1. Key Take Aways of Networking Fundamentals
  • 2. Key Take Aways Mod1
  • 3. Key Take Aways Mod2
  • 4. Key Take Aways Mod3
  • 5. Key Take Aways Mod4
  • 6. Key Take Aways Mod5
  • 7. Key Take Aways Mod6
  • 8. Key Take Aways Mod7

Module 10 Terms to Know

  • Terms to Know Notes
  • 1. Terms to Know Networking Fundamentals
  • 2. Terms to Know Mod1
  • 3. Terms to Know Mod2
  • 4. Terms to Know Mod3
  • 5. Terms to Know Mod4
  • 6. Terms to Know Mod5
  • 7. Terms to Know Mod6
  • 8. Terms to Know Mod7
  • 9. Terms to Know Mod8

Module 1 Understanding Local Area Networking

  • Module 1 Notes
  • 1.0 Intro to Networking Fundamentals
  • 1.1 Exam Overview
  • 1.1 Examining Local Network Devices and Data Transfers 1a
  • 1.1 Examining Local Network Devices and Data Transfers 1b
  • 1.1 Examining Local Network Devices and Data Transfers 1c
  • 1.1 Examining Local Network Devices and Data Transfers 1d
  • 1.1 Examining Local Network Devices and Data Transfers 1e
  • 1.1 Examining Local Network Devices and Data Transfers 1f
  • 1.2 Examining Local Network Devices and Data Transfers Part 2a
  • 1.2 Examining Local Network Devices and Data Transfers Part 2b

Module 2 Defining Networks with the OSI Model

  • Module 2 Notes
  • 2.1 Defining Networks with OSI Model Part 1a
  • 2.2 Defining Networks with OSI Model Part 1b
  • 2.3 Defining Networks with OSI Model Part 1c
  • 2.4 Defining Networks with OSI Model Part 1d
  • 2.5 Defining Networks with OSI Model Part 1e
  • 2.6 Defining Networks with OSI Model Part 1f
  • 2.7 Defining Networks with OSI Model Part 1g
  • 2.8 Defining Networks with OSI Model Part 1h

Module 3 Understanding Wired and Wireless Networks

  • Module 3 Notes
  • 3.1 Understand Wired and Wireless Networks Part1
  • 3.2 Understand Wired and Wireless Networks Part2

Module 4 Understanding Internet Protocol

  • Module 4 Notes
  • 4.1 Understanding Internet Protocol Part1
  • 4.2 Understanding Internet Protocol Part2

Module 5 Implementing TCP-IP in the command line

  • Module 5 Notes
  • 5.1 Implementing TCPIP in the Command Line

Module 6 Working with Networking Services

  • Module 6 Notes
  • 6.1 Working with Networking Services

Module 7 Understanding Wide Area Networks

  • Module 7 Notes
  • 7.1 Understanding Wide Area Network Part1
  • 7.2 Understanding Wide Area Network Part2

Module 8 Defining Network Infrastructure and Security

  • Module 8 Notes
  • 8.1 Defining Network Infrastructure & Network Security Part1
  • 8.2 Defining Network Infrastructure & Network Security Part2

Module 9 Key Takeaways

  • Key Takeaway Notes
  • 1. Key Take Aways of Networking Fundamentals
  • 2. Key Take Aways Mod1
  • 3. Key Take Aways Mod2
  • 4. Key Take Aways Mod3
  • 5. Key Take Aways Mod4
  • 6. Key Take Aways Mod5
  • 7. Key Take Aways Mod6
  • 8. Key Take Aways Mod7

Module 10 Terms to Know

  • Terms to Know Notes
  • 1. Terms to Know Networking Fundamentals
  • 2. Terms to Know Mod1
  • 3. Terms to Know Mod2
  • 4. Terms to Know Mod3
  • 5. Terms to Know Mod4
  • 6. Terms to Know Mod5
  • 7. Terms to Know Mod6
  • 8. Terms to Know Mod7
  • 9. Terms to Know Mod8

Module 1 Introducing Windows Server 2016

  • Module 1 Notes
  • 1. Windows Server 2016 Fundamentals Intro
  • 2. Mod 1 Introducing Windows Server 2016
  • 3. Mod 1a Introducing Windows Server 2016

Module 2 Managing Windows Server 2016

  • Module 2 Notes
  • 4. Mod 2 Managing Windows Server 2016
  • 5. Mod 2a Managing Windows Server 2016

Module 3 Managing Storage

  • Module 3 Notes
  • 6. Mod 3 Managing Storage
  • 7. Mod 3a Managing Storage

Module 4 Monitoring and Troubleshooting Servers

  • Module 4 Notes
  • 8. Mod 4 Monitoring and Troubleshooting Servers
  • 9. Mod 4a Monitoring and Troubleshooting Servers

Module 5 Essential Services

  • Module 5 Notes
  • 10. Mod 5 Essential Services
  • 11. Mod 5a Essential Services

Module 6 Understanding File and Print Services

  • Module 6 Notes
  • 12. Mod 6 Understanding File and Print Services

Module 7 Windows Network Services and Applications

  • Module 7 Notes
  • 13. Mod 7 Windows Network Services and Applications-
  • 14. Mod 7a Windows Network Services and Applications-

Mod 8 Key Takeaways

  • Key Takeaway Notes
  • 15. Key takeaways Intro
  • 16. Key takeaways – Module 1 Introducing Windows Server 2016
  • 17. Key takeaways – Module 2 Managing Windows Server 2016
  • 18 Key takeaways – Module 3 Storing Data in Windows Server 2016
  • 19. Key takeaways – Module 4 Monitoring and Troubleshooting Servers
  • 20. Key takeaways – Module 5 Essential Services
  • 21. Key takeaways – Module 6 Understanding File and Print Services
  • 22. Key takeaways – Module 7 Windows Network Services and Applications

Mod 9 Terms to Know

  • Terms to Know Notes
  • 23. Terms to Know Intro
  • 24. Terms to Know – Module 1 Introducing Windows Server 2016
  • 25. Terms to Know – Module 2 Managing Windows Server 2016
  • 26 Terms to Know – Module 3 Storing Data in Windows Server 2016
  • 27. Terms to Know – Module 4 Monitoring and Troubleshooting Servers
  • 28. Terms to Know – Module 5 Essential Services
  • 29. Terms to Know – Module 6 Understanding File and Print Services
  • 30. Terms to Know – Module 7 Windows Network Services and Applications

Mod 10 Hands on Labs

  • Hands on Labs Setup Notes
  • 01 MTA 98-365 Windows Server 2016 Administration Fundamentals Lab setup
  • 02 Step by Step Install VMware Player 15 in Windows 10 1
  • 03 Installing and Configuring DC1 Virtual Machine
  • 04 Installing and Configuring SRV-1 Virtual Machine
  • 05 Installing and Configuring Client 1 Virtual Machine
  • 06 Installing and Configuring the Router Virtual Machine
  • 07 Creating and Configuring SRV-2 Virtual Machine
  • 08 Working with Windows Server 2016 Desktop Experience
  • 09 Managing Organizational Units and Groups in AD DS

Module 1: Deploy a Microsoft Azure SQL Database

  • Introduction
  • Introducing the Azure SQL Database Part 1
  • Introducing the Azure SQL Database Part 2
  • Setting Up Azure Lab
  • Chose a Service Tier Part 1
  • Chose a Service Tier Part 2
  • Create Servers and Databases Part 1
  • Creating a Azure SQL Server and Database Lab
  • Create Servers and Databases Part 2
  • Create Servers and Databases Part 3
  • Connecting SSMS to Azure SQL Lab Part 1
  • Connecting SSMS to Azure SQL Lab Part 2
  • Create a Sysadmin Account
  • Creating Azure SQL Logins and Users Lab
  • Congure Elastic Pools
  • Creating and Conguring an Elastic Pool Lab

Module 2: Plan for SQL Server Installation

  • Plan for an IaaS or On-Premises Deployment Part 1
  • Plan for an IaaS or On-Premises Deployment Part 2
  • Select the Appropriate Size for a Virtual Machine
  • Plan Storage Pools Based on Performance Requirements Part 1
  • Plan Storage Pools Based on Performance Requirements Part 2
  • Evaluate Best Practices for Installation
  • Design a Storage Layout for a SQL Server Virtual Machine

Module 3: Deploy SQL Server Instances

  • Deploy a SQL Server Instance in IaaS and On-Premises
  • Restoring AdventureWorks 2016 Database Lab
  • Provision an Azure Virtual Machine to Host a SQL Server Instance
  • Provisioning an Azure Virtual Machine to Host a SQL Server Lab
  • Manually Install SQL Server on an Azure Virtual Machine
  • Installing SQL 2016 Lab Part 1
  • Installing SQL 2016 Lab Part 2
  • Automate the Deployment of SQL Server Databases
  • Exploring Azure SQL Database Automation Lab
  • Deploy SQL Server by Using Templates
  • Managing JSON Templates Lab

Module 4: Deploy SQL Server Databases to Azure Virtual Machines

  • Migrate an On-Premises SQL Server Database to an Azure Virtual Machine
  • Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 1
  • Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 2
  • Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 3
  • Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 4
  • Generate Benchmark Data for Performance Needs
  • Generating Benchmark Data Lab Part 1
  • Generating Benchmark Data Lab Part 2
  • Perform Performance Tuning on Azure IaaS
  • Perform Performance Tuning on Azure IaaS Lab Part 1
  • Perform Performance Tuning on Azure IaaS Lab Part 2
  • Support Availability Sets in Azure Part 1
  • Support Availability Sets in Azure Part 2
  • Manage High Availability Lab Part 1
  • Manage High Availability Lab Part 2
  • Manage High Availability Lab Part 3
  • Manage High Availability Lab Part 4
  • Manage High Availability Lab Part 5

Module 5: Configure Secure Access to Microsoft Azure SQL Databases

  • Configure Firewall Rules
  • Creating Firewall Rules Lab
  • Configure Always Encrypted for Azure SQL Database
  • Implementing Always Encrypted Lab
  • Configure Cell-Level Encryption
  • Cell-Level Encryption Lab
  • Configure Dynamic Data Masking
  • Dynamic Data Masking Lab
  • Configure Transparent Data Encryption (TDE)
  • Transparent Data Encryption (TDE) Lab

Module 6: Configure SQL Server performance settings

  • Configure SQL Performance Settings
  • Configuring SQL Performance Settings Lab
  • Configure Max Server Memory
  • Configuring SQL Memory Lab
  • Configure Database Performance Settings
  • Configure Database Performance Settings Lab
  • Configure Operators and Alerts
  • Configure alerts in Azure and On-Premise SQL Server Lab

Module 7: Manage SQL Server instances

  • Create Databases
  • Creating Databases Lab
  • Manage Files and File Groups
  • Managing Files and File Groups Lab
  • Manage System Database Files
  • Manage System Database Files Lab
  • Configure tempdb
  • Configure tempdb Lab

Module 8: Manage SQL Storage

  • Manage SMB File Shares
  • Manage SMB File Shares Lab
  • Manage Stretch Databases
  • Configure Azure Storage
  • Change Service Tiers
  • Change Service Tiers Lab Part 1
  • Review Wait Statistics
  • Manage Storage Pools
  • Recover from Failed Storage
  • Managing Storage Lab Part 1
  • Managing Storage Lab Part 2

Module 9: Perform Database Maintenance

  • Monitoring Tools
  • Using Monitoring Tools Lab Part 1
  • Using Monitoring Tools Lab Part 2
  • Azure Performance Tuning
  • Automate Maintenance Tasks
  • Update Statistics and Indexes
  • Update Statistics and Indexes Lab Part 1
  • Update Statistics and Indexes Lab Part 2
  • Verify Database Integrity
  • Verify Database Integrity Lab
  • Recover from Database Corruption
  • Recover from Database Corruption Lab
  • Conclusion

Module 1: Configure Encryption

  • Introduction
  • Exam Objectives and Lab Setup
  • Restoring AdventureWorks 2016 Database Lab Part 1
  • Restoring AdventureWorks 2016 Database Lab Part 2
  • Restoring AdventureWorks 2016 Database Lab Part 3
  • Configure Encryption
  • Cell-Level Encryption Part 1
  • Cell-Level Encryption Part 2
  • Cell-Level Encryption Lab Part 1
  • Cell-Level Encryption Lab Part 2
  • Transparent Data Encryption
  • Transparent Data Encryption Lab
  • Always Encrypted
  • Always Encrypted Lab
  • Backup Encryption
  • Backup Encryption Lab
  • Connection Encryption
  • Encryption Troubleshooting

Module 2: Configure Data Access and Permissions

  • Create and Maintain Users
  • Create and Maintain Users Lab Part 1
  • Create and Maintain Users Lab Part 2
  • Configure and Maintain Custom Roles
  • Configure and Maintain Custom Roles Lab
  • Manage Database Object Permissions Part 1
  • Manage Database Object Permissions Part 2
  • Manage Database Object Permissions Lab Part 1
  • Manage Database Object Permissions Lab Part 2
  • Configure User Options for Azure SQL Database
  • Configure Row-Level Security
  • Configure Dynamic Data Masking
  • Configure Dynamic Data Masking Lab

Module 3: Configure Auditing

  • Manage a SQL Server Audit
  • Manage a SQL Server Audit Lab
  • Query the SQL Server Audit Log
  • Manage an Azure SQL Server Audit

Module 4: Develop a Backup Strategy

  • Backup Types Part 1
  • Backup Types Part 2
  • Manage, Backup, and Restore Databases Lab Part 1
  • Manage, Backup, and Restore Databases Lab Part 2
  • Backup Very Large Databases Part 1
  • Backup Very Large Databases Part 2
  • Backup Very Large Databases Part 3
  • Backup Very Large Databases Part 4
  • 4.9 Managing Very Large Databases Lab Part 1
  • 4.10 Managing Very Large Databases Lab Part 2
  • 4.11 Managing Very Large Databases Lab Part 3
  • Configure Alerting for Failed Backups
  • Configure Alerting for Failed Backups Lab Part 1
  • Configure Alerting for Failed Backups Lab Part 2
  • Back up Databases to Azure
  • Manage Transaction Log Backups
  • Configure Database Recovery Models
  • Set Database Recovery Model Lab
  • Configure Backup Automation
  • Configure Backup Automation Lab

Module 5: Restore Databases

  • Perform Piecemeal Restores
  • Restore Databases Lab Part 1
  • Restore Databases Lab Part 2
  • Restore Databases Lab Part 3
  • Perform Page Recovery
  • Perform Point-in-Time Recovery
  • Perform Point-in-Time Recovery Lab
  • Restore File Groups
  • Develop a Plan to Automate and Test Restores

Module 6: Manage Database Integrity

  • Implement Database Consistency Checks
  • Implement Database Consistency Checks Lab
  • Identify Database Corruption
  • Recover From Database Corruption

Module 7: Monitor Database Activity

  • Monitor Current Sessions
  • Monitor Current Sessions Lab
  • Identify Sessions that Cause Blocking Activity
  • Identify Sessions that Consume tempdb Resources
  • Configure the Data Collector

Module 8: Monitor Queries

  • Manage the Query Store
  • Manage the Query Store Lab
  • Configure Extended Events and Trace Events
  • Identify Problematic Execution Plans

Module 9: Manage Indexes

  • Identify and Repair Index Fragmentation
  • Identify and Create Missing Indexes
  • Identify and Drop Underutilized Indexes
  • Manage Existing Columnstore Indexes Part 1
  • Manage Existing Columnstore Indexes Part 2
  • Partitioned Tables

Module 10: Monitor SQL Server Instances

  • Create and Manage Operators
  • Create and Manage SQL Agent Alerts
  • Configure Policy-Based Management
  • Configure Policy-Based Management Lab
  • Identify Available Space on Data Volumes
  • Identify the Cause of- Manage Performance Degradation
  • Identify the Cause of- Manage Performance Degradation Lab Part 1
  • Identify the Cause of- Manage Performance Degradation Lab Part 2

Module 11: Implement Log Shipping

  • Configure and Monitor Log Shipping
  • Configure and Monitor Log Shipping Lab Part 1
  • Configure and Monitor Log Shipping Lab Part 2

Module 12: Implement Failover Cluster Instances

  • Windows Server Failover Cluster
  • Manage Shared Disks
  • Configure Cluster Shared Volumes
  • Configuring WSFC Lab

Module 13: Implement Always On Availability Groups

  • Database Mirroring
  • Create an Availability Group
  • Manage Failover
  • Configure Read-Only Routing
  • Create Distributed Availability Groups
  • Configuring Always On Availability Group Lab Part 1
  • Configuring Always On Availability Group Lab Part 2
  • Conclusion

Module 1: Installing and Configuring Domain Controllers

  • Introduction
  • Overview of Identity Management Concepts Part 1
  • Overview of Identity Management Concepts Part 2
  • Active Directory Domain Services Components Part 1
  • Active Directory Domain Services Components Part 2
  • Active Directory Domain Services Components Part 3
  • Overview of ADDS Domain Services Part 1
  • Overview of ADDS Domain Services Part 2
  • Deploying Domain Controllers Part 1
  • Deploying Domain Controllers Part 2
  • Deploying Domain Controllers Part 3

Module 2: Managing AD DS Objects

  • Overview of Object Management Part 1
  • Overview of Object Management Part 2
  • Managing User Accounts Part 1
  • Managing User Accounts Part 2
  • Managing User Accounts Part 3
  • Managing User Accounts Part 4
  • Managing User Accounts Part 5
  • Managing Groups Part 1
  • Managing Groups Part 2
  • Managing Groups Part 3
  • Managing Computer Accounts Part 1
  • Managing Computer Accounts Part 2
  • Managing Organizational Units Part 1
  • Managing Organizational Units Part 2

Module 3: Securing Active Directory Domain Services

  • Managing Organizational Units Part 1
  • Managing Organizational Units Part 2
  • Implementing Account Security Part 1
  • Implementing Account Security Part 2
  • Auditing AD DS
  • Configuring Managed Service Accounts

Module 4: Working with Complex AD Infrastructures

  • Overview of Advanced AD DS Deployments
  • Deploying a Distributed AD DS Environment Part 1
  • Deploying a Distributed AD DS Environment Part 2
  • Deploying a Distributed AD DS Environment Part 3
  • Overview of AD DS Replication
  • Configuring AD DS Services Part 1
  • Configuring AD DS Services Part 2
  • Configuring AD DS Services Part 3

Module 5: Implementing Group Policy

  • Overview of Group Policy Part 1
  • Overview of Group Policy Part 2
  • Overview of Group Policy Part 3
  • Creating and Configuring GPOs Part 1
  • Creating and Configuring GPOs Part 2
  • Monitoring and Troubleshooting Group Policy
  • Managing Security Options for Computers using Group Policy Part 1
  • Managing Security Options for Computers using Group Policy Part 2
  • Managing User Environments Part 1
  • Managing User Environments Part 2
  • Managing User Environments Part 3

Module 6: Understanding Microsoft Azure AD and Directory Synchronization

  • Planning Directory Synchronization Part 1
  • Planning Directory Synchronization Part 2
  • Implementing Azure AD Connect Part 1
  • Implementing Azure AD Connect Part 2
  • Managing Identities with Directory Synchronization

Module 7: Monitoring and Recovering AD DS

  • Monitoring AD DS Part 1
  • Monitoring AD DS Part 2
  • Monitoring AD DS Part 3
  • Database Management
  • Backup and Recovery in AD DS Part 1
  • Backup and Recovery in AD DS Part 2

Module 8: Implementing Active Directory Certificate Services

  • Overview of Public Key Infrastructure and AD CS Part 1
  • Overview of Public Key Infrastructure and AD CS Part 2
  • Deploying Certificate Authority Hierarchy
  • Administering Certificate Authorities
  • Deploying and Managing Certificates Part 1
  • Deploying and Managing Certificates Part 2
  • Managing Revocation and Distribution
  • Configuring Certificate Recovery

Module 9: Implementing Active Directory Federation Services

  • Overview of AD FS
  • Planning and Deploying AD FS
  • Overview of Web Application Proxy
  • Module 10: Implementing Active Directory Rights Management Services
  • Overview of AD RMS
  • Deploying AD RMS
  • Protecting with AD RMS
  • Conclusion

Module 1: Plan and Implement IPv4 and IPv6 Networks

  • Introduction
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 1
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 2
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 3
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 4
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 5
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 6
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 7
  • Configuring IPv4 Hosts Part 1
  • Configuring IPv4 Hosts Part 2
  • Managing and Troubleshooting IPv4 Connectivity Part 1
  • Managing and Troubleshooting IPv4 Connectivity Part 2
  • Managing and Troubleshooting IPv4 Connectivity Part 3
  • Implementing IPV6 for Network Hosts Part 1
  • Implementing IPV6 for Network Hosts Part 2
  • Implementing IPV6 for Network Hosts Part 3
  • Implementing IPv6 Transitioning and Coexistence

Module 2: Installing and Configuring DHCP

  • Overview of DHCP Server Role Part 1
  • Overview of DHCP Server Role Part 2
  • Deploying DHCP Part 1
  • Deploying DHCP Part 2
  • Deploying DHCP Part 3
  • Deploying DHCP Part 4
  • Deploying DHCP Part 5
  • Managing and Troubleshooting DHCP Part 1
  • Managing and Troubleshooting DHCP Part 2
  • Managing and Troubleshooting DHCP Part 3
  • Managing and Troubleshooting DHCP Part 4
  • Managing and Troubleshooting DHCP Part 5

Module 3: Installing and Configuring DNS

  • Implementing DNS Servers Part 1
  • Implementing DNS Servers Part 2
  • Implementing DNS Servers Part 3
  • Creating and Configuring DNS Zones Part 1
  • Creating and Configuring DNS Zones Part 2
  • Creating and Configuring DNS Zones Part 3
  • Creating and Configuring DNS Zones Part 4
  • Understanding Active Directory Integration Part 1
  • Configuring Advanced DNS Settings Part 1
  • Configuring Advanced DNS Settings Part 2
  • Configuring Advanced DNS Settings Part 3
  • Troubleshooting DNS Name Resolution Part 1
  • Troubleshooting DNS Name Resolution Part 2

Module 4: Implementing and Managing IP Address Management

  • Overview of IPAM Part 1
  • Overview of IPAM Part 2
  • IPAM Deployment and Administration Part 1
  • IPAM Deployment and Administration Part 2
  • IPAM Deployment and Administration Part 3
  • Managing IP Address Spaces by Using IPAM

Module 5: Implementing Remote Access

  • Remote Access Overview Part 1
  • Remote Access Overview Part 2
  • Remote Access Overview Part 3
  • Implementing the Web Application Proxy
  • Planning and Implementing Virtual Private Networks Part 1
  • Planning and Implementing Virtual Private Networks Part 2
  • Planning and Implementing Virtual Private Networks Part 3
  • Planning and Implementing Virtual Private Networks Part 4
  • Planning and Implementing Virtual Private Networks Part 5
  • Overview of Direct Access Part 1
  • Overview of Direct Access Part 2
  • Implementing Direct Access Part 1
  • Implementing Direct Access Part 2
  • Implementing Direct Access Part 3

Module 6: Securing the Network Infrastructure

  • Using the Windows Firewall with Advanced Security Part 1
  • Using the Windows Firewall with Advanced Security Part 2
  • Utilizing IP Security Part 1
  • Utilizing IP Security Part 2
  • Conclusion

Module 1: Installing Windows Server 2016 in Host and Compute Environments

  • Course Introduction
  • Determining Windows Server 2016-Part1
  • Determining Windows Server 2016-Part2
  • Determining Windows Server 2016-Part3
  • Determining Windows Server 2016-Part4
  • Determining Windows Server 2016-Part5
  • Installing Windows 2016-Part1
  • Installing Windows 2016-Part2
  • Installing Windows 2016-Part3
  • Installing Windows 2016-Part4
  • Installing Windows 2016-Part5
  • Managing Windows Installation With Windows PowerShell
  • Creating Managing And Maintaining Windows Images For Deployment-Part1
  • Creating Managing And Maintaining Windows Images For Deployment-Part2
  • Creating Managing And Maintaining Windows Images For Deployment-Part3
  • Creating Managing And Maintaining Windows Images For Deployment-Part4

Module 2: Configuring Active Directory Networks for Host and Compute Environments

  • Overview Of Active Directory Domain Services-Part1
  • Overview Of Active Directory Domain Services-Part2
  • Overview Of Active Directory Domain Services-Part3
  • Overview Of ADDS Domain Controllers-Part1
  • Overview Of ADDS Domain Controllers-Part2
  • Deploying Domain Controllers-Part1
  • Deploying Domain Controllers-Part2
  • Overview Of Group Policy Purpose Components And Processes-Part1
  • Overview Of Group Policy Purpose Components And Processes-Part2
  • Overview Of Group Policy Purpose Components And Processes-Part3
  • Creating And Configuring GPOs-Part1
  • Creating And Configuring GPOs-Part2
  • Security Management Using Group Policy-Part1
  • Security Management Using Group Policy-Part2
  • Security Management Using Group Policy-Part3

Module 3: Implementing Local and Enterprise Storage Solutions

  • Managing Disk And Volumes In Windows Server 2016-Part1
  • Managing Disk And Volumes In Windows Server 2016-Part2
  • Managing Disk And Volumes In Windows Server 2016-Part3
  • Managing Disk And Volumes In Windows Server 2016-Part4
  • Implementing And Managing Storage Spaces-Part1
  • Implementing And Managing Storage Spaces-Part2
  • Implementing And Managing Storage Spaces-Part3
  • Configuring Data Duplication-Part1
  • Configuring Data Duplication-Part2
  • Understanding Various Types Of Storage
  • Comparing SAN Options-Part1
  • Comparing SAN Options-Part2
  • Understanding ISNS DCB And MPIO
  • Configuring File And Folder Sharing In Windows Server-Part1
  • Configuring File And Folder Sharing In Windows Server-Part2
  • Configuring File And Folder Sharing In Windows Server-Part3
  • Configuring Advanced File Services With FSRM-Part1
  • Configuring Advanced File Services With FSRM-Part2
  • Configuring Advanced File Services With FSRM-Part3

Module 4: Implementing Hyper-V Virtualization and Containers

  • Installing Hyper-V Virtualization
  • Configuring Storage And Networking In Hyper-VHosts-Part1
  • Configuring Storage And Networking In Hyper-VHosts-Part2
  • Configuring And Managing Virtual Machines-Part1
  • Configuring And Managing Virtual Machines-Part2
  • Understanding Windows Server And Hyper-VContainers
  • Deploying Windows Server And Hyper-VContainers
  • Using Docker To Install Configure And Manage Containers

Module 5: Implementing High Availability

  • Overview Of High Availability And Disaster Recovery-Part1
  • Overview Of High Availability And Disaster Recovery-Part2
  • Implementing Network Load Balancing-Part1
  • Implementing Network Load Balancing-Part2
  • Planning And Configuring Failover Clustering-Part1
  • Planning And Configuring Failover Clustering-Part2
  • Planning And Configuring Failover Clustering-Part3
  • Managing A Failover Cluster
  • Integrating Failover Clustering And Hyper-V-Part1
  • Integrating Failover Clustering And Hyper-V-Part2
  • Configuring Site Availability

Module 6: Maintaining and Monitoring Windows Server 2016

  • Windows Server Update Services-Part1
  • Windows Server Update Services-Part2
  • Windows PowerShell Desired State Configuration
  • Windows Server 2016 Monitoring Tools-Part1
  • Windows Server 2016 Monitoring Tools-Part2
  • Conclusion

Module 1 : Prepare for installation requirements

  • Prep for Installation Windows 10
  • Clean Install or Upgrade Windows 10
  • Editions of Windows 10
  • What Features Do You Want
  • Installation Media
  • Looking at MS Application Compatibility Toolkit (ACT)

Module 2 : Install Windows

  • Installing Windows
  • Clean installation of Windows 10-Demo
  • Upgrade using Installation Media
  • Configure Native Boot and VHD
  • Migrating to Windows 10
  • Chp2 Booting from VHD
  • Creating a VHD-Demo
  • Installing Windows 10 to a VHD-Demo
  • Installing on Bootable USB
  • Using USMT User State Migration Tool-Demo
  • Additional Windows Features
  • Create an MBR-Partitioned VHD-Demo
  • Additional Regional and Language Support
  • Putting Win 10 on a VHD with DISM-Demo

Module 3 : Configure devices and device drivers

  • Configure Devices and Device Drivers
  • Resolve Driver Issues
  • Configuring Driver Settings
  • Manage Driver Packages
  • Download and Import Driver Packages
  • Using DISM
  • Installing o Updating Drivers using Device Manager-Demo
  • Roll Back Drivers-Demo
  • Using Sigverif-Demo
  • More on Device Manager-Demo

Module 4 : Perform post-installation configuration

  • Perform Post Installation Configuration
  • Configure Accessibilty Options
  • Configure Cortana
  • Configure Microsoft Edge
  • Configure Internet Explorer
  • Configure Client Hyper-V
  • Configure Power Settings
  • Customizing the Start Menu-Demo
  • Start Tiles-Demo
  • Desktop Customization-Demo
  • Action Center and Notifications-Demo
  • Hyper V-Demo
  • Power Settings-Demo

Module 5 : Implement Windows in an enterprise environment

  • Implement Windows in an Enterprise Enviornment
  • Implementing Active Directory
  • Implement Volume Activation Using a Key Mgmt Service
  • Query and Configure Activation State using Command line
  • Configure Active Directory Including Group Policies
  • Configure and Optimize User Account Control UAC
  • Using Software Licensing Manager; slmgr.vbs -dli-Demo
  • Taking a look at UAC-Demo

Module 6 : Configure networking

  • Configuring Networking
  • Configuring Name Resolution
  • Connect to a Network
  • Configure Network Locations
  • Configure Windows Firewall
  • Configure Windows Firewall with Advance Security
  • Configure Network Discovery
  • Configuring Wi-Fi Settings
  • Troubleshoot Network Issues
  • Configure VPNs
  • Configure IPsec
  • Configure DirectAccess
  • Configure IP Addresses Manually-Demo
  • DNS Settings-Demo
  • Looking at Network Locations and where to make Chpanges-Demo
  • Windows Firewall – Basic Settings-Demo
  • Windows Firewall – Advanced Settings-Demo
  • Troubleshooting Tools-Demo
  • Create a VPN Connection-Demo

Module 7 : Configure storage

  • Configure Storage
  • Create and Configure VHD
  • Configure Removable Devices
  • Create and Configure Storage Spaces
  • Troubleshoot Storage and Removable Device Issue
  • Steps to create a simple volume-Demo
  • Create VHD with Hyper-V Manager-Demo
  • Create VHD with PowerShell-Demo
  • Bitlocker to Go-Demo

Module 8 : Configure data access and usage

  • Configure Data Access and Usage File-Printer
  • Configure File System Permissions
  • Configure File Share Public Folders and OneDrive
  • Configure OneDrive usage including Files On Demand
  • Troubleshoot Data Access and Usage
  • File Sharing-Demo
  • Printer Sharing-Demo
  • Set Printer Security-Demo
  • File system permissions-Demo
  • Public Folder Sharing-Demo
  • OneDrive-Demo
  • Storage Sense-Demo
  • Disk Quotas-Demo

Module 9 : Implement Apps

  • Implement Apps
  • Configure Startup Options
  • Configure Windows Features
  • Configure Windows Stores
  • Implementing Windows Store Apps
  • Implement Windows Store for Business and Education
  • Provison Packages
  • Create Packages
  • Chpange Default Apps-Demo
  • Application Startup Options-Demo
  • Looking at Windows Features-Demo
  • Windows Store-Demo
  • Windows Imaging and Configuration Designer Tool ICD-Demo

Module 10 : Configure remote management

  • Configuring Remote Management
  • Configure Remote Management Settings
  • Configure Remote Desktop
  • Configure Remote Assistance
  • Modifying Using MMC or PS
  • Configure Remote PowerShell
  • Remote Management Settings-Demo
  • Allow through Windows Firewall-Demo
  • Remote Desktop-Demo
  • Remote Assistance-Demo
  • Remote with MMC-Demo
  • Windows PowerShell Remoting-Demo

Module 11 : Configure Updates

  • Configure Update Windows 10
  • Manage Update History
  • Roll Back Updates
  • Implement Insider Preview CB CBB and LTSB
  • Update Windows Store Apps
  • Windows Update Options-Demo
  • Update History-Demo
  • Rolling Back Updates-Demo
  • Update Windows Store apps-Demo

Module 12 : Monitor Windows

  • Monitor Windows
  • Configure Event Subscriptions
  • Monitor Performance Using Task Manager
  • Monitor System
  • Monitor and Manage Printers
  • Monitor Performance Using Performance Monitor Data Collectors
  • Monitor and Manage Printers
  • Configure Indexing Options
  • Manage Client Security by Using Windows Defender
  • Evaluate System Stability by Using Reliaability Monitor
  • Troubleshoot Performance Issues
  • Manage Security Using Windows Defender Security Center
  • Configure Windows Defender Advanced Threat Detection
  • Event Viewer-Demo
  • Creating Event Subscriptions-Demo
  • Task Manager-Demo
  • Performance Monitor-Demo
  • Resource Monitor-Demo
  • Managing the Printers with Print Management-Demo
  • Indexing-Demo
  • Windows Defender-Demo
  • Reliability Monitor-Demo

Module 13 : Configure System and Data Recovery

  • Configure System and Data Recovery
  • Configure System Restore
  • Configure Restore Points
  • Peform a Refresh or Recycle
  • Restore Previous Versions of Files and Folders
  • Configure File History
  • Recover Files from OneDrive
  • Use Windows Backup and Restore
  • Perform a Backup and Restore with WBAdmin
  • Perform Recovery Operations Windows Recovery
  • Configure a Recovery Drive-Demo
  • Configure System Restore-Demo
  • Configure Restore Points-Demo
  • Performing a Refresh or Recycle-Demo
  • Configure File History-Demo
  • Use Windows Backup & Restore-Demo

Module 14 : Configure Authorization and Authentication

  • Configure Authorization and Authentication
  • Configure Pictures Passwords and Biometrics
  • Configure Workgroups
  • Configure Domain Settings
  • Configue Homegroup Settings
  • Configure Credential Manager
  • Configure Local Accounts
  • Configure Microsoft Accounts
  • Configure Device Registration
  • Configure Windows Hello for Business
  • Configure Device Guard
  • Credential Guard
  • Configure Device Health Attestation
  • Configure UAC Behavior
  • Configure Dynamic Look
  • Picture Passwords-Demo
  • Workgroups-Demo
  • Domains-Demo
  • Credential Manager-Demo
  • Configure Local Accounts-Demo
  • Dynamic Lock-Demo

Module 15 : Configure Advanced Management Tools

  • Configure Advanced Management Tools
  • Configure Device Manager
  • Configure and use the MMC
  • Configure Task Schedule
  • Configure Automation of Mgmt Task Using Windows PowerShell
  • Convert Group Policy Objects to MDM Policies using the MDM
  • Services-Demo
  • Using the MMC-Demo
  • Task Scheduler-Demo
  • Opening PowerShell and the Integrated Scripting Environment-Demo

Module 1: Introducing Windows 10

  • Course Introduction
  • What Makes Windows 10 Different
  • Overview Of Windows 10 Features
  • Navigating And Using Windows 10-Part 1
  • Navigating And Using Windows 10-Part 2

Module 2: Installing Windows 10

  • Preparing For Installation
  • Installation Options
  • Upgrading And Migrating-Part 1
  • Upgrading And Migrating-Part 2

Module 3: Configuring Devices

  • Overview Of Configuration Tools
  • Common Configuration Options
  • Managing User Accounts-Part 1
  • Managing User Accounts-Part 2
  • Using Control Panel
  • Using Windows Administration Tools-Part 1
  • Using Windows Administration Tools-Part 2
  • Using Windows PowerShell-Part 1
  • Using Windows PowerShell-Part 2

Module 4: Configuring Network Connectivity

  • TCP IP Network Connectivity-Part 1
  • TCP IP Network Connectivity-Part 2
  • TCP IP Network Connectivity-Part 3
  • Name Resolution
  • Wireless
  • Remote Access Overview-Part 1
  • Remote Access Overview-Part 2
  • Troubleshooting Connectivity

Module 5: Managing Storage, Data, And Printers

  • Managing Hard Disks-Part 1
  • Managing Hard Disks-Part 2
  • Managing Hard Disks-Part 3
  • Creating And Managing Storage Spaces
  • Overview Of Data Access
  • Configuring And Managing File Access
  • Managing Shared Folder
  • Understanding Work Folder
  • Managing Printers

Module 6: Managing Apps

  • Installing And Configuring Applications
  • Managing Apps From The Windows Store
  • Managing Microsoft Edge Web Browser

Module 7: Managing Device Security

  • Configuring Network Security-Part 1
  • Configuring Network Security-Part 2
  • Configuring Local Security
  • Configuring Data Security-Part 1
  • Configuring Data Security-Part 2
  • Configuring Device Security

Module 8: Maintaining Windows 10

  • Updating Windows 10
  • Monitoring And Optimizing Windows 10-Part 1
  • Monitoring And Optimizing Windows 10-Part 2

Module 9: Troubleshooting And Recovery

  • Managing Devices And Drives
  • Recovery Files
  • Recovering Devices

Module 10: Deploying Windows 10 Enterprise Desktops

  • Overview Of Image Based Deployment
  • Automating Installations
  • Windows Activation

Module 11: Managing User Profiles And User State Virtualization

  • Managing User Profiles-Part 1
  • Managing User Profiles-Part 2
  • User State Virtualization
  • User Profile Migration

Module 12: Managing Desktop And Application Settings Using Group policy

  • Using Group Policy To Manage Windows 10 Devices Part 1
  • Using Group Policy To Manage Windows 10 Devices-Part 2
  • Using Group Policy To Manage Windows 10 Devices-Part 3
  • Using Group Policy To Manage Windows 10 Devices-Part 4
  • Using Group Policy To Manage Applications-Part 1
  • Using Group Policy To Manage Applications-Part 2

Module 13: Configuring And Managing Client Hyper-V

  • Introduction To Client Hyper-V
  • Creating Virtual Machines
  • Managing Virtual Machine Storage And Snapshot
  • Conclusion

Module 14: Configuring Windows Devices – December, 2017 Update – Part1

  • 1. Intro to Windows 10 Update 70-697-1D
  • 2. Mod 1 Win 10 Update
  • 3. Mod 1 Installing Windows 10
  • 4. Mod 1 Examining Windows 10 Act
  • 5. Mod 3 Configuring Devices
  • 6. Mod 3 Examining GPOs Act
  • 7. Mod 3.3 Display Options
  • 8. Mod 3 Examining One Drive Act
  • 9. Mod 4 Configuring Network Connectivity
  • 10. Mod 4 Powershell Networking Commands Act
  • 11. Mod 4.1 Network Mgmt Tools
  • 12. Mod 4.1 Command Prompt Networkiing Tools Act
  • 13. Mod 4.1 Network Mgmt Tools Part2
  • 14. Mod 4.2 DNS
  • 15. Mod 4.2 Name Resolution Act
  • 16. Mod 4.3 Direct Access
  • 17. Mod 5 Managing Storage
  • 18. Mod 5 Server Based Storage
  • 19. Mod 5 Storage Act
  • 20. Mod 5.5 Diskpart
  • 21. Mod 5.6 Powershell Disk Mgmt
  • 22. Mod 5.7 Storage Mgmt
  • 23. Mod 5 Storage Mgmt Act
  • 24. Mod 6 Managing Files and Printers
  • 25. Mod 6 CMD and PS Files System Commands Act
  • 26. Mod 6.2 Permissions Inheritance
  • 27. Mod 6.2 NTFS and Sharing Permissions Act
  • 28. Mod 6.3 Type 4 Printer Drivers
  • 29. Mod 6 Printing Mgmt Act
  • 30. Mod 7 Managing Apps
  • 31. Mod 7 Internet Explorer 11 Act
  • 32. Mod 8 Managing Device Security
  • 33. Mod 8.1 Security Compliance Toolkit
  • 34. Mod 9 Maintaining Windows 10
  • 35. Mod 9 Windows Update Settings Act
  • 36. Mod 10 Startup and Recovery
  • 37. Mod 10 Startup and Recovery settings Act
  • 38. Mod 11 Additional Skills
  • Windows Intro Update 70-697-2C

Module 15: Configuring Windows Devices – December, 2017 Update – Part2

  • 1. Mod 1 Developing Mgmt Win 10
  • 2. Mod 1 Windows Defender Act
  • 3. Mod 1.1 Developing Part2
  • 4. Mod 1 Applocker Act2
  • 5. Mod1.2 Managing a Mobile Workforce
  • 6. Mod 1 Remote Access Act2
  • 7. Mod 1.2 Managing a Mobile Workforce Part2
  • 8. Mod 1.3 Overview
  • 9. Mod 1 Microsoft Azure Act2
  • 10. Mod 2 Managing Win 10 Sign-in
  • 11. Mod 2 Microsoft Account Act2
  • 12. Mod 2.2 Overview of Azure AD
  • 13. Mod 2 Microsoft Azure AD Act2
  • 14. Mod 3 Managing User Profiles and User
  • 15. Mod 4 Managing Desktop and Apps
  • 16. Mod 5 Managing Devices in MS365
  • 17. Mod 5 Office 365 Act2
  • 18. Mod 6 Managing PCs Devices using Intune
  • 19. Mod 6 Intune Act2
  • 20. Mod 6.3 Intune App Mgmt
  • 21. Mod 6.4 Working with WIP
  • 22. Mod 7 Configuring and Using MS Store
  • 23. Mod 7 Microsoft Store for Business Act2
  • 24. Mod 7.2 Deploy Win 10 Auto-pilot
  • 25. Mod 8 Managing Data Access Windows
  • 26. Mod 8.4 Publishing and Using RemoteApp
  • 27. Mod 9 Configuring and Managing Client Hyper-V
  • 28. Mod 10 Additional Skills
  • 29. Outro to Windows 10 Update 70-697

Module 1: Introduction

  • Intro To Exam 70-688
  • Implementing A Methodology For Troubleshooting-Part1
  • Implementing A Methodology For Troubleshooting-Part2
  • Implementing A Methodology For Troubleshooting-Demo

Module 2: Troubleshooting Start Up Issues

  • Troubleshooting Start Up Issues-Part1
  • Troubleshooting Start Up Issues-Part2
  • Troubleshooting Start Up Issues-Part3
  • Troubleshooting Start Up Issues-Part4
  • Troubleshooting Start Up Issues-Demo

Module 3: ​Managing Drivers And Hardware

  • Managing Drivers And Hardware-Part1
  • Managing Drivers And Hardware-Part2
  • Managing Drivers And Hardware-Part3
  • Managing Drivers And Hardware-Demo

Module 4: Troubleshooting Remote Computers

  • Troubleshooting Remote Computers-Part1
  • Troubleshooting Remote Computers-Part2
  • Troubleshooting Remote Computers-Part3

Module 5: Resolving Problems With Network Connectivity

  • Resolving Problems With Network Connectivity-Part1
  • Resolving Problems With Network Connectivity-Part2
  • Resolving Problems With Network Connectivity-Part3
  • Resolving Problems With Network Connectivity-Part4
  • Resolving Problems With Network Connectivity-Part5

Module 6: Troubleshooting Group Policy

  • Troubleshooting Group Policy-Part1
  • Troubleshooting Group Policy-Part2
  • Troubleshooting Group Policy-Part3
  • Troubleshooting Group Policy-Part4

Module 7: Troubleshooting User Settings

  • Troubleshooting User Settings-Part1
  • Troubleshooting User Settings-Part2
  • Troubleshooting User Settings-Part3

Module 8: Configuring And Troubleshooting Remote Connectivity

  • Configuring And Troubleshooting Remote Connectivity-Part1
  • Configuring And Troubleshooting Remote Connectivity-Part2
  • Configuring And Troubleshooting Remote Connectivity-Part3
  • Configuring And Troubleshooting Remote Connectivity Demo-Part1
  • Configuring And Troubleshooting Remote Connectivity Demo-Part2
  • Configuring And Troubleshooting Remote Connectivity Demo-Part3

Module 9: ​Troubleshooting Resource Access In A Domain

  • Troubleshooting Resource Access In A Domain-Part1
  • Troubleshooting Resource Access In A Domain-Part2
  • Troubleshooting Resource Access In A Domain-Part3
  • Troubleshooting Resource Access In A Domain-Demo

Module 10: Configuring And Troubleshooting Resource Access For Non-Domain Members

  • Configuring And Troubleshooting Resource Access For Non-Domain Members-Part1
  • Configuring And Troubleshooting Resource Access For Non-Domain Members-Part2
  • Configuring And Troubleshooting Resource Access For Non-Domain Members-Part3
  • Configuring And Troubleshooting Resource Access For Non-Domain Members-Demo

Module 11: Troubleshooting Applications

  • Troubleshooting Applications-Part1
  • Troubleshooting Applications-Part2
  • Troubleshooting Applications-Part3
  • Troubleshooting Applications-Part4
  • Troubleshooting Applications-Demo

Module 12: Maintaining Windows 8.1

  • Maintaining Windows 8.1-Part1
  • Maintaining Windows 8.1-Part2
  • Maintaining Windows 8.1-Part3
  • Maintaining Windows 8.1-Part4
  • Maintaining Windows 8.1-Demo

Module 13: Recovering Windows 8.1

  • Recovering Windows 8.1
  • Conclusion

Lesson 1: Getting to Know PCs and the Windows 8 User Interface

  • Introduction
  • Identify Components of a Personal Computer
  • Sign in to Windows 8
  • Navigate the Desktop

Lesson 2: Using the Modern Apps and Navigation Features

  • Using the Modern Apps and Navigation Features

Lesson 3: Working with Desktop Applications

  • Navigate the Desktop

Lesson 4: Using Internet Explorer 10

  • Navigate Internet Explorer 10

Lesson 5: Customizing the Windows 8 Environment

  • Multitasking With Apps
  • Use the Control Panel and Task Manager-Part1
  • Use the Control Panel and Task Manager-Part2

Lesson 6: Using Windows 8 Security Features

  • Customizing the Windows 8 Environment
  • Security Features
  • Using Other Windows 8 Features-Part1
  • Using Other Windows 8 Features-Part2
  • Using Other Windows 8 Features-Part3

Module 1: Developing a Strategy for Windows® 7 Business Desktops Deployment

  • Introduction
  • Developing A Strategy-Part1
  • Developing A Strategy-Part2
  • Developing A Strategy-Part3
  • Developing A Strategy-Part4
  • Developing A Strategy Demo-Part1
  • Developing A Strategy Demo-Part2

Module 2: Evaluating Application Compatibility in Windows® 7

  • Evaluating Application Compatibility-Part1
  • Evaluating Application Compatibility-Part2
  • Evaluating Application Compatibility-Demo

Module 3: Assessing Deployment Methods for Windows® 7

  • Assessing Deployment Methods-Part1
  • Assessing Deployment Methods-Part2
  • Assessing Deployment Methods-Demo

Module 4: Designing Standard Images for Windows® 7

  • Designing Standard Images-Part1
  • Designing Standard Images-Part2
  • Designing Standard Images-Part3
  • Designing Standard Images-Demo

Module 5: Deploying Windows® 7 with Windows AIK

  • Deploying Windows With Windows AIK
  • Deploying Windows With Windows AIK-Demo

Module 6: Using Windows Deployment Services to Deploy Windows® 7

  • Using Windows Deployment Services-Part1
  • Using Windows Deployment Services-Part2
  • Using Windows Deployment Services-Demo

Module 7: Deploying Windows® 7 Using Lite Touch Installation

  • Deploying Windows 7 Using Lite Touch Installation
  • Deploying Windows 7 Using Lite Touch Installation-Demo

Module 8: Deploying Windows® 7 Using Zero Touch Installation

  • Deploying Windows 7 Using Zero Touch Installation
  • Deploying Windows 7 Using Zero Touch Installation-Demo

Module 9: Migrating User State Using USMT 4.0 and WET

  • Migrating User State Using USMT 4.0 And WET-Part1
  • Migrating User State Using USMT 4.0 And WET-Part2

Module 10: Planning, Configuring, and Managing the Client Environment

  • Planning Configuring And Managing The Client Environment-Part1
  • Planning Configuring And Managing The Client Environment-Part2
  • Planning Configuring And Managing The Client Environment-Part3
  • Planning Configuring And Managing The Client Environment-Part4
  • Planning Configuring And Managing The Client Environment-Demo

Module 11: Planning and Deploying Applications and Updates to Windows® 7 Clients

  • Planning And Deploying Applications And Updates To Windows 7 Clients-Part1
  • Planning And Deploying Applications And Updates To Windows 7 Clients-Part2
  • Planning And Deploying Applications And Updates To Windows 7 Clients-Part3
  • Planning And Deploying Applications And Updates To Windows 7 Clients-Demo

Module 1: Installing, Upgrading, and Migrating to Windows 7

  • Introduction To Exam 685 Windows 7 Enterprise Desktop Support Technician
  • Introduction To Installing Upgrading And Migrating To Windows 7
  • Windows 7 Pre-Installation Requirements
  • Installing Windows 7-Part1
  • Installing Windows 7-Part2
  • Installing Windows 7-Part3
  • Overview Of Image Based Installations-Part1
  • Overview Of Image Based Installations-Part2
  • Overview Of Image Based Installations-Part3
  • Configuring Application Compatibility
  • Chapter 1 Summary

Module 2: Configuring Disks And Device Drivers

  • Introduction To Configuring Disks And Device Drivers
  • Managing And Maintaining Disks-Part1
  • Managing And Maintaining Disks-Part2
  • Managing And Maintaining Disks-Part3
  • Installing And Configuring Device Drivers
  • Chapter 2 Summary

Module 3: Configuring File Access And Printers

  • Introduction To Configuring File Access And Printers
  • Overview Of Authentication And Authorization
  • Managing File Access-Part1
  • Managing File Access-Part2
  • Managing Shared Folders-Part1
  • Managing Shared Folders-Part2
  • Configuring File Compression
  • Managing Printing
  • Chapter 3 Summary

Module 4: Indentifying And Resolving Log on Problems

  • Introduction To Identifying And Resolving Logon Problems
  • Understanding Authentication
  • Managing Computer Accounts
  • Additional Network Services-Part1
  • Additional Network Services-Part2
  • Troubleshooting User Properties
  • Resolving Logon Issues
  • Chapter 4 Summary

Module 5: Configuring Network Connectivity

  • Introduction To Configuring Network Connectivity
  • Configuring TCPIP Connectivity-Part1
  • Configuring TCPIP Connectivity-Part2
  • Configuring TCPIP Connectivity-Part3
  • Automatic IP Address Allocation
  • Name Resolution
  • Wireless Networking-Part1
  • Wireless Networking-Part2
  • Wireless Networking-Part3
  • Chapter 5 Summary

Module 6: Troubleshooting Network Issues

  • Introduction To Troubleshooting Network Issues
  • Troubleshooting Network Connectivity-Part1
  • Troubleshooting Network Connectivity-Part2
  • Troubleshooting Network Connectivity-Part3
  • Troubleshooting Name Resolution-Part1
  • Troubleshooting Name Resolution-Part2
  • Troubleshooting Name Resolution-Part3
  • Troubleshooting Network Printing-Part1
  • Troubleshooting Network Printing-Part2
  • Troubleshooting Network Printing-Part3
  • Chapter 6 Summary

Module 7: Mobile Computing And Remote Access

  • Introduction To Mobile Computing And Remote Access
  • Configuring Mobile Computer And Device Settings
  • Using Remote Control Tools
  • Configuring And Troubleshooting Remote Access-Part1
  • Configuring And Troubleshooting Remote Access-Part2
  • Configuring And Troubleshooting Remote Access-Part3
  • Configuring And Troubleshooting Remote Access-Part4
  • Configuring Branch Cache Managing Computer Accounts
  • Chapter 7 Summary

Module 8: Securing Windows 7 Desktops

  • Introduction To Securing Windows 7 Desktops
  • Overview Of Security Management-Part1
  • Overview Of Security Management-Part2
  • Overview Of Security Management-Part3
  • User Account Control
  • Application Restrictions-Part1
  • Application Restrictions-Part2
  • Configuring The Windows Firewall-Part1
  • Configuring The Windows Firewall-Part2
  • Configuring The Windows Firewall-Part3
  • Configuring The Windows Firewall-Part4
  • Securing And Troubleshooting Internet Explorer-Part1
  • Securing And Troubleshooting Internet Explorer-Part2
  • Securing And Troubleshooting Internet Explorer-Part3
  • Chapter 8 Summary

Module 9: Optimizing And Troubleshooting Performance And Reliabilty

  • Introduction To Optimizing And Troubleshooting Performance And Reliability
  • Overview Of Performance And Reliability Tools-Part1
  • Overview Of Performance And Reliability Tools-Part2
  • Optimizing Performance-Part1
  • Optimizing Performance-Part2
  • Dealing With Hardware Failure
  • Chapter 9 Summary

Module 10: Maintaining Windows 7 Desktops

  • Introduction To Maintaining Windows 7 Desktops
  • Troubleshooting Utilities-Part1
  • Troubleshooting Utilities-Part2
  • Troubleshooting Utilities-Part3
  • Troubleshooting Utilities-Part4
  • Backing Up And Restoring Data
  • Using System Restore
  • Configuring Windows Update
  • Chapter 10 Summary
  • Conclusion

Module 1: Installing, Upgrading and Migrating Windows 7

  • Course And Instructor Introduction
  • Introducing Windows 7-Part1
  • Introducing Windows 7-Part2
  • Pre Installation Requirements-Part1
  • Pre Installation Requirements-Part2
  • Installing Windows 7-Part1
  • Installing Windows 7-Part2
  • Upgrading Windows 7
  • Migrating Windows 7

Module 2: Deploying Windows 7 in the Enterprise

  • Overview Of Image Based Installations-Part1
  • Overview Of Image Based Installations-Part2
  • Overview Of Image Based Installations Demo
  • Capturing System Images-Part1
  • Capturing System Images-Part2
  • Capturing System Images-Part3
  • Preparing Images For Deployment-Part1
  • Preparing Images For Deployment-Part2
  • Working With User State
  • Working With Virtual Drives
  • Activating Windows 7

Module 3: Enterprise Management in Windows 7

  • Automating Management Using Group Policy-Part1
  • Automating Management Using Group Policy-Part2
  • Automating Management Using Group Policy-Part3
  • Using Windows Powershell 2.0-Part1
  • Using Windows Powershell 2.0-Part2
  • Using Windows Powershell 2.0-Part3

Module 4: Configuring Hardware and Applications

  • Working With Device Drivers-Part1
  • Working With Device Drivers-Part2
  • Working With Hard Disks-Part1
  • Working With Hard Disks-Part2
  • Configuring Application Compatibility
  • Configuring Internet Explorer-Part1
  • Configuring Internet Explorer-Part2
  • Configuring Application Restrictions

Module 5: Configuring Network Connectivity

  • Configuring TCPIP-Part1
  • Configuring TCPIP-Part2
  • Configuring TCPIP-Part3
  • IP Address Assignment-Part1
  • IP Address Assignment-Part2
  • Name Resolution Services-Part1
  • Name Resolution Services-Part2
  • Wireless Networking-Part1
  • Wireless Networking-Part2
  • Remote Management
  • Troubleshooting Connectivity Issues

Module 6: Configuring Access to Resources

  • Authentication And Authorization-Part1
  • Authentication And Authorization-Part2
  • Managing Access To Files Using NTFS
  • Managing Sharing
  • Managing Shared Printers
  • Configuring Branch Cache

Module 7: Configuring Mobile Computing

  • Configuring Mobile Computer And Device Settings-Part1
  • Configuring Mobile Computer And Device Settings-Part2
  • Configuring Remote Access-Part1
  • Configuring Remote Access-Part2

Module 8: Configuring Security Options

  • User Account Control
  • Encrypting File Systems
  • Bit Locker Drive Encryption-Part1
  • Bit Locker Drive Encryption-Part2
  • Network Access Protection
  • Windows Firewall With Advanced Security
  • Configuring Anti-Malware
  • Auditing Network Access

Module 9: Monitoring And Maintaining Systems

  • Configuring Windows Updates
  • Event Monitoring
  • Performance Monitoring

Module 10: Configuring Backup and Recovery Options

  • Troubleshooting Startup Issues
  • Using Windows Backup
  • Using System Restore
  • Course Conclusion

Module 1: Planning Server Deployment

  • Introduction
  • Overview Of Windows Server 2008 Deployment-Part1
  • Overview Of Windows Server 2008 Deployment-Part2
  • Overview Of Windows Server 2008 Deployment-Part3
  • Overview Of Windows Server 2008 Deployment-Part4
  • Identifying Windows Server 2008 Compatibility Issues
  • Developing A Deployment Plan-Part1
  • Developing A Deployment Plan-Part2
  • Planning The Server Decommissioning
  • Commissioning Windows 2008 Server
  • Planning Server Deployment Summary

Module 2: Automating Server Deployment

  • Understanding Deployment Options-Part1
  • Understanding Deployment Options-Part2
  • Windows Automated Installation Kit-Part1
  • Windows Automated Installation Kit-Part2
  • Windows Automated Installation Kit-Part3
  • Working With Images
  • Using Windows Deployment Services-Part1
  • Using Windows Deployment Services-Part2
  • Using Windows Deployment Services-Part3
  • Using Windows Deployment Services-Part4
  • Automating Server Activation
  • Automating Server Deployment Summary

Module 3: Planning for Server Management

  • Introduction To Server Management
  • Remote Server Management-Part1
  • Remote Server Management-Part2
  • Remote Server Management-Part3
  • Decentralizing Server Management-Part1
  • Decentralizing Server Management-Part2
  • Planning For Server Management Summary

Module 4: Planning the Network Infrastructure

  • Planning An IPv4 Addressing Scheme-Part1
  • Planning An IPv4 Addressing Scheme-Part2
  • Planning An IPv4 Addressing Scheme-Part3
  • Planning An IPv6 Transition
  • Planning The DHCP Infrastructure-Part1
  • Planning The DHCP Infrastructure-Part2
  • Planning DHCP Configuration
  • Planning The Network Infrastructure Summary

Module 5: Planning Name Resolution Services

  • Gathering Information For The Name Resolution Design-Part1
  • Gathering Information For The Name Resolution Design-Part2
  • Designing A DNS Server Strategy-Part1
  • Designing A DNS Server Strategy-Part2
  • Designing DNS Zone Implementations-Part1
  • Designing DNS Zone Implementations-Part2
  • Optimizing DNS Servers
  • Designing DNS For High Availability And Security
  • Designing A WINS Name Resolution Strategy
  • Planning Name Resolution Services Summary

Module 6: Planning File and Print Services

  • Planning File Services-Part1
  • Planning File Services-Part2
  • Planning File Services-Part3
  • Planning File Services-Part4
  • Planning File Services-Part5
  • Planning For Storage Management
  • Planning Print Services-Part1
  • Planning Print Services-Part2
  • Planning Print Services-Part3
  • Planning File And Print Services Summary

Module 7: Planning Active Directory Domain Services

  • Planning ADDS Forests
  • Planning ADDS Domains
  • Planning ADDS Physical Structure-Part1
  • Planning ADDS Physical Structure-Part2
  • Planning Administrative Structures
  • Planning ADDS Maintenance Strategies
  • Planning Group Policy Implementations-Part1
  • Planning Group Policy Implementations-Part2
  • Planning Group Policy Implementations-Part3
  • Planning Group Policy Implementations-Part4
  • Planning ADDS Summary

Module 8: Planning Active Directory Certificate Services

  • Overview Of PublicKey Infrastructure And ADCS-Part1
  • Overview Of PublicKey Infrastructure And ADCS-Part2
  • Designing Certificate Authority Hierarchy
  • Design Certificate Template
  • Designing Certificate Distribution And Revocation
  • Planning AD Certificate Servers

Module 9: Planning High Availability

  • Overview Of High Availability
  • Planning Network Load Balancing
  • Planning Failover Clustering-Part1
  • Planning Failover Clustering-Part2
  • Planning High Availability Summary

Module 10: Planning Backups For Windows Server

  • Planning Backups For Windows Server-Part1
  • Planning Backups For Windows Server-Part2
  • Planning A Backup Policy
  • Planning Restore Policies For Windows Server 2008
  • Planning Business Continuity Summary

Module 11: Planning Server Monitoring and Maintenance

  • Planning Server Monitoring-Part1
  • Planning Server Monitoring-Part2
  • Planning Server Maintenance
  • Planning Server Monitoring And Maintenance Summary
  • Conclusion

Module 1: Installing and Configuring Windows Services

  • Introduction
  • Installing Windows Servers-Part1
  • Installing Windows Servers-Part2
  • Installing Windows Servers-Part3
  • Managing Server Roles And Features-Part1
  • Managing Server Roles And Features-Part2
  • Windows Server 2008 Server Care Installations-Part1
  • Windows Server 2008 Server Care Installations-Part2
  • Installing And Configuring Windows Services Summary

Module 2: TCP/IP Protocol Suite

  • Overview Of TCP IP-Part1
  • Overview Of TCP IP-Part2
  • TCP IP Addressing-Part1
  • TCP IP Addressing-Part2
  • Communication Types
  • Name Resolution-Part1
  • Name Resolution-Part2
  • Name Resolution-Part3
  • Name Resolution-Part4
  • Dynamic IP Addressing
  • TCP IP Tools
  • TCP IP Protocol Suite Summary

Module 3: Configuring IPv4 Addressing

  • Overview Of IPv4 Communication-Part1
  • Overview Of IPv4 Communication-Part2
  • Subnetting IPv4 Networks-Part1
  • Subnetting IPv4 Networks-Part2
  • Subnetting IPv4 Networks-Part3
  • Configuring IPv4 Addressing Summary

Module 4: Configuring IP Address Assignment Services

  • Overview Of DHC-Part1
  • Overview Of DHC-Part2
  • Configuring DHCP Scopes And Options-Part1
  • Configuring DHCP Scopes And Options-Part2
  • Configuring DHCP Scopes And Options-Part3
  • Managing The DHCP Database
  • Monitoring And Troubleshooting DHCP-Part1
  • Monitoring And Troubleshooting DHCP-Part2
  • Configuring IP Address Assignment Services Summary

Module 5: Configuring IPv6 Addressing

  • Introduction To IPv6-Part1
  • Introduction To IPv6-Part2
  • Unicast IPv6 Addresses
  • Configuring IPv6-Part1
  • Configuring IPv6-Part2
  • Configuring IPv6 Addressing Summary

Module 6: Configuring Name Resolution Services

  • Overview Of DNS-Part1
  • Overview Of DNS-Part2
  • Configuring The DNS Server Role-Part1
  • Configuring The DNS Server Role-Part2
  • Configuring The DNS Server Role-Part3
  • Configuring The DNS Server Role-Part4
  • Configuring The DNS Server Role-Part5
  • Manage And Troubleshooting DNS
  • Migrating From WIN To DNS
  • Configuring Name Resolution Services Summary

Module 1: Active Directory – An Identity And Access Solution

  • Introduction
  • Understanding The Purpose Of Identity And Access Control
  • Active Directory Server Roles For IDA Management-Part 1
  • Active Directory Server Roles For IDA Management-Part 2
  • Active Directory Server Roles That Support IDA Solutions
  • Active Directory Summary

Module 2: Introduction To Active Directory Domain Services

  • Overview Of Active Directory Identity And Access-Part 1
  • Overview Of Active Directory Identity And Access-Part 2
  • Overview Of Active Directory Identity And Access-Part 3
  • Active Directory Components And Concepts-Part 1
  • Active Directory Components And Concepts-Part 2
  • Active Directory Components And Concepts-Part 3
  • Active Directory Components And Concepts-Part 4
  • Active Directory Components And Concepts-Part 5
  • Implementing Active Directory-Part 1
  • Implementing Active Directory-Part 2
  • Implementing Active Directory-Part 3
  • Implementing Active Directory-Part 4
  • Implementing Active Directory-Part 5
  • Implementing Active Directory-Part 6
  • Implementing Active Directory-Part 7
  • Implementing Active Directory-Part 8
  • Overview Of Active Directory-Part1
  • Overview Of Active Directory-Part2
  • Overview Of Active Directory-Part3
  • Summary

Module 3: Configuring DNS To Support Active Directory Domain Services

  • Overview Of Active Directory And DNS Integration-Part 1
  • Overview Of Active Directory And DNS Integration-Part 2
  • Configure Active Directory Integrated Zones-Part 1
  • Configure Active Directory Integrated Zones-Part 2
  • Configure Dynamic Updates
  • Configure Read-Only Zones

Module 4: Active Directory Object Management

  • Overview Of Active Directory Objects
  • Configuring User And Computer Accounts-Part 1
  • Configuring User And Computer Accounts-Part 2
  • Configuring User And Computer Accounts-Part 3
  • Configuring Groups-Part1
  • Configuring Groups-Part2
  • Configuring Groups-Part3
  • Configuring Groups-Part4
  • Configuring Groups-Part5
  • Automating Object Management-Part1
  • Automating Object Management-Part2
  • Automating Object Management-Part3
  • Automating Object Management-Part4
  • Automating Object Management-Part5
  • Delegation Of Administrative Control-Part1
  • Delegation Of Administrative Control-Part2
  • Summary

Module 5: Managing Active Directory Replication Using Sites

  • Configuring Sites And Subnets-Part 1
  • Configuring Sites And Subnets-Part 2
  • Configuring Replication-Part 1
  • Configuring Replication-Part 2
  • Configuring Replication-Part 3
  • Configuring Replication-Part 4
  • Summary

Module 6: Configuration Management Using Group Policy

  • Understanding Group Policy-Part 1
  • Understanding Group Policy-Part 2
  • Understanding Group Policy-Part 3
  • Understanding Group Policy-Part 4
  • Understanding Group Policy-Part 5
  • Understanding Group Policy-Part 6
  • Working With GPOs-Part 1
  • Working With GPOs-Part 2
  • Working With GPOs-Part 3
  • Working With GPOs-Part 4
  • Troubleshooting Application Of GPO
  • Delegating Administrative Control Of Group Policy
  • Summary

Module 7: Desktop Environmental And Security Management

  • Configure Scripts And Folder Redirection-Part 1
  • Configure Scripts And Folder Redirection-Part 2
  • Deploying Software-Part 1
  • Deploying Software-Part 2
  • Deploying Software-Part 3
  • Delegating Computer Support
  • Managing Security Settings-Part 1
  • Managing Security Settings-Part 2
  • Managing Security Settings-Part 3
  • Managing Security Settings-Part 4
  • Managing Security Settings-Part 5
  • Utilizing Auditing-Part 1
  • Utilizing Auditing-Part 2
  • Summary

Module 8: Maintaining Active Directory

  • Monitoring Active Directory-Part 1
  • Monitoring Active Directory-Part 2
  • Monitoring Active Directory-Part 3
  • Monitoring Active Directory-Part 4
  • Managing The Active Directory Database
  • Disaster Recovery For Active Directory-Part 1
  • Disaster Recovery For Active Directory-Part 2
  • Disaster Recovery For Active Directory-Part 3
  • Disaster Recovery For Active Directory-Part 4
  • Maintaining Active Directory Domain Services Summary

Module 9: Deploy and Manage a Public Key Infrastructure

  • Overview Of Public Key Infrastructure And ADCS-Part 1
  • Overview Of Public Key Infrastructure And ADCS-Part 2
  • Overview Of Public Key Infrastructure And ADCS-Part 3
  • Deploying A Certificate Authority Hierarchy
  • Installing ADCS-Part 1
  • Installing ADCS-Part 2
  • Installing ADCS-Part 3
  • Installing ADCS-Part 4
  • Deploying And Managing Certificates-Part 1
  • Deploying And Managing Certificates-Part 2
  • Deploying And Managing Certificates-Part 3
  • Deploying And Managing Certificates-Part 4
  • Managing Revocation And Distribution-Part 1
  • Managing Revocation And Distribution-Part 2
  • Configuring Certificate Recovery-Part 1
  • Configuring Certificate Recovery-Part 2
  • Deploy And Manage A Public Key Infrastructure Summary

Module 10: Supporting Applications with AD LDS

  • ADLDS Overview-Part 1
  • ADLDS Overview-Part 2
  • Configuring ADLDS Instances
  • Configuring Replication
  • Understanding Integration With ADLDS
  • Supporting Applications With ADLDS Summary

Module 11: Deploying Active Directory Federated Services

  • ADFS Overview
  • ADFS Deployment Scenarios
  • Deploying ADFS-Part 1
  • Deploying ADFS-Part 2
  • Deploying ADFS-Part 3
  • Deploying Active Directory Federated Services Summary

Module 12: Deploying Active Directory Rights Management Services

  • ADRMS Overview
  • Understanding ADRMS
  • Managing ADRMS-Part 1
  • Managing ADRMS-Part 2
  • Managing ADRMS-Part 3
  • Managing ADRMS-Part 4
  • Deployment Active Directory Rights Management Services Summary
  • Active Directory Conclusion

Module 1: Introduction To Creating Efficient Apps For Sharepoint

  • Course And Instructor Introduction
  • Apps For SharePoint Part1
  • Apps For SharePoint Part2
  • Communication From Apps To SharePoint Part1
  • Communication From Apps To SharePoint Part2
  • Authentication And Authorization Part1
  • Authentication And Authorization Part2
  • Designing Apps For Performance Part1
  • Designing Apps For Performance Part2
  • Designing Apps For Performance Part3

Module 2: Working With Managed Metadata Solutions

  • Overview Of Managed Metadata Part1
  • Overview Of Managed Metadata Part2
  • Configuring Managed Metadata Term Sets Part1
  • Configuring Managed Metadata Term Sets Part2
  • Configuring Managed Metadata Term Sets Part3
  • Configuring Managed Metadata Term Sets Part4
  • Working With Managed Metadata Fields Part1
  • Working With Managed Metadata Fields Part2

Module 3: Working With The Search Service

  • Overview Of The SharePoint 2013 Search Service Part1
  • Overview Of The SharePoint 2013 Search Service Part2
  • Overview Of The SharePoint 2013 Search Service Part3
  • Building Search Queries
  • Using Code To Execute Search Queries Part1
  • Using Code To Execute Search Queries Part2
  • Customizing Query Processing Part1
  • Customizing Query Processing Part2
  • Customizing Search Results Part1
  • Customizing Search Results Part2
  • Customizing Content Processing Part1
  • Customizing Content Processing Part2

Module 4: Implementing Enterprise Content Management

  • Working With eDiscovery Part1
  • Working With eDiscovery Part2
  • Working With Content Management Part1
  • Working With Content Management Part2
  • Handling Automated Records Management Part1
  • Handling Automated Records Management Part2
  • Handling Automated Records Management Part3

Module 5: Developing Publishing Sites

  • Introduction To Developing Publishing Solutions
  • Developing Page Components For Web Content Publishing Part1
  • Developing Page Components For Web Content Publishing Part2
  • Developing Page Components For Web Content Publishing Part3
  • Website Structure And Navigation Part1
  • Website Structure And Navigation Part2
  • Website Structure And Navigation Part3
  • Publishing Content
  • Publishing To Mobile Devices
  • Optimizing For Search Engines Part1
  • Optimizing For Search Engines Part2
  • Optimizing Performance And Availability Part1
  • Optimizing Performance And Availability Part2

Module 6: Interacting With Business Connectivity Services

  • Overview Of Business Connectivity Services
  • Creating BDC Models
  • Creating An App Scoped External Content Type
  • Conclusion

Module 1: Overview of SharePoint Development

  • Course Introduction
  • Introduction To SharePoint Development Part1
  • Introduction To SharePoint Development Part2
  • Introduction To SharePoint Development Part3
  • Choosing A Development Approach Part1
  • Choosing A Development Approach Part2
  • SharePoint 2013 Deployment And Execution Models Part1
  • SharePoint 2013 Deployment And Execution Models Part2
  • SharePoint 2013 Deployment And Execution Models Part3

Module 2: Working With Objects, List, And Libraries

  • Introduction To The SharePoint Object Hierarchy Part1
  • Introduction To The SharePoint Object Hierarchy Part2
  • Working With Sites And Webs Part1
  • Working With Sites And Webs Part2
  • Working With Sites And Webs Part3
  • Working With Sites And Webs Part4
  • Managing Execution Contexts Part1
  • Managing Execution Contexts Part2
  • Using Lists And Library Objects Part1
  • Using Lists And Library Objects Part2
  • Querying And Retrieving Data From Lists Part1
  • Querying And Retrieving Data From Lists Part2
  • Querying And Retrieving Data From Lists Part3
  • Working With Large Lists Part1
  • Working With Large Lists Part2

Module 3: Working With Features and Solutions

  • Introduction To Features
  • Introduction To Solutions
  • Creating And Configuring Features And Solutions Part1
  • Creating And Configuring Features And Solutions Part2
  • Creating And Configuring Features And Solutions Part3
  • Creating And Configuring Features And Solutions Part4
  • Using Sandboxed Solutions

Module 4: Developing Server Side Code

  • Web Parts
  • Event Receivers Part1
  • Event Receivers Part2
  • Timer Jobs
  • Storing Configuration Data Part1
  • Storing Configuration Data Part2

Module 5: Managing Authentication And Authorization

  • Introduction To Identity Management
  • Managing Permissions
  • Configuring Forms Based Authentication
  • Working With Custom Authentication Part1
  • Working With Custom Authentication Part2
  • Working With Custom Authentication Part3

Module 6: Client Side SharePoint Development

  • Using The CSOM For Managed Code Part1
  • Using The CSOM For Managed Code Part2
  • Using The CSOM For Managed Code Part3
  • Using The CSOM For JavaScript
  • Using The Rest API With JavaScript Part1
  • Using The Rest API With JavaScript Part2

Module 7: Developing And Managing Apps

  • Overview Of Apps For SharePoint Part1
  • Overview Of Apps For SharePoint Part2
  • Developing Apps For SharePoint
  • Overview Of Remote Hosted Apps
  • Configuring Remote Hosted Apps
  • Developing Remote Hosted Apps Part1
  • Developing Remote Hosted Apps Part2
  • Publishing And Distributing Apps Part1
  • Publishing And Distributing Apps Part2
  • Publishing And Distributing Apps Part3

Module 8: Using Workflows To Automate Business Processes

  • Overview Of Workflows In SharePoint 2013
  • Building Workflows Part1
  • Building Workflows Part2
  • Developing Workflows Part1
  • Developing Workflows Part2

Module 9: Customizing SharePoint Interfaces

  • Working With Custom Actions
  • Using Client-Side Interface Components
  • Customizing The SharePoint List User Interface
  • Course Conclusion

Module 1: Accessing Data

  • Introduction To 70 – 487 Developing Microsoft Azure And Web Services
  • Overview Of Service And Cloud Technologies
  • Accessing Data Using ADO Dot NET Part1
  • Accessing Data Using ADO Dot NET Part2
  • Accessing Data From Web Service
  • SQL Server Database In Azure
  • Read And Write XML Data
  • Implementing Azure Storage
  • Managing Azure PowerShell
  • WCF Data Services Part1
  • WCF Data Services Part2
  • WCF With Client

Module 2: Designing And Implementing WCF Services

  • Create WCF Service And Client From Scratch Part1
  • Create WCF Service And Client From Scratch Part2
  • WCF Configuration Settings Part1
  • WCF Configuration Settings Part2
  • WCF And Azure SQL Database Part1
  • WCF And Azure SQL Database Part2
  • WCF And Azure SQL Database Part3
  • WCF Services And Azure Review

Module 3: Querying And Manipulating Data Using Entity Framework

  • Design And Implement An ERD
  • Introduction To Entity Framework
  • Introduction To LINQ
  • LINQ To SQL
  • LINQ To Entities
  • Introduction To Lambda Expressions
  • Introduction To Entity SQL
  • Profiling Queries Created By Entity Framework
  • Query Projections
  • Query With Navigation Properties
  • Bringing It All Together Part1
  • Bringing It All Together Part2
  • Using Entity Framework From Scratch
  • Entity Framework Review

Module 4: Creating And Consuming Web API Based Services

  • Introduction To Web API
  • First Web API App
  • Web API App Enhanced
  • Web API App Extended
  • Web API Using Standard Conventions
  • Debugging Our Web API App
  • Getting Data From Database In Web API App
  • Web API Standards
  • More On Web API Standards
  • Simple Web API CRUD App
  • Web API Example In Depth
  • Summarizing Web API

Module 5: Deploying Web Applications And Services

  • Introduction To Application Deployment Strategies Part1
  • Introduction To Application Deployment Strategies Part2
  • Introduction To Application Deployment Strategies Part3
  • Introduction To Application Deployment Strategies Part4
  • Deploying Web Applications ToIIs
  • Deploying Web Applications To Azure
  • Deployment Considerations
  • Deployment Design
  • Deployment Configurations

Module 6: Course Review

  • Accessing Data
  • Web Front End Options
  • Course Conclusion

Module 1: Intro To Business Intelligence

  • Introduction
  • The Business Intelligence Solution
  • Overview Of Business Intelligence
  • BI And Power Pivot Demo
  • ETL Intro
  • Designing Data Warehouses
  • Design For Speed
  • BI Semantic Model

Module 2: Database Essentials

  • Basic Database Objects Demo
  • Stored Procedures And Triggers Demo
  • Database Clusters Demo
  • SQL Server Management
  • Table Triggers
  • DB Config Options
  • DB Backup
  • DB Files And Restore

Module 3: Business Intelligence Development

  • Using SQL Server Data Tools Demo
  • Building An IS Integration Services Package Demo
  • Loading Data From Remote Sources Demo

Module 4: Business Intelligence Results

  • Report Building Intro Setup Demo
  • Using Report Builder Demo
  • Processing Data From Web Service Demo
  • Reporting From Multiple Tables Demo
  • Report Function And Matrix Demo
  • Interactive Reports Demo
  • Sorting Report Data Demo

Module 5: Advanced Reporting And Development

  • Drill Through Reports
  • Data Visualization
  • Creating Store Procedure From Scratch
  • Memory Optimize Table

Module 6: SQL Server Integration Services (SSIS)

  • Building Our First Integration Project
  • Data Transformation
  • Introduction To Big Data
  • Transformation Using Store Procedure
  • Transformation Using SSIS
  • Building Fact Table Using Store Procedure
  • Building Fact Table Using SSIS

Module 7: SQL Server 2014 New Features

  • Backup Enhancements
  • Index Enhancements
  • Online DB Enhancements
  • BackUp To The Cloud
  • Partition Data

Module 8: Course Review And Exam Prep

  • BI Review
  • SharePoint Overview
  • SharePoint Demo
  • Exam Prep
  • Before You Take The Exam
  • Conclusion

Module 1: Introduction To Business Intelligence And Data Modeling

  • Introduction To Business Intelligence and Data Modeling Part1
  • Introduction To Business Intelligence and Data Modeling Part2
  • The Microsoft Business Intelligence Platform Part 1
  • The Microsoft Business Intelligence Platform Part 2
  • The Microsoft Business Intelligence Platform Part 3
  • The Microsoft Business Intelligence Platform Part 4

Module 2: Implementing Reports The SQL Server Reporting Services

  • Implementing Reports the SQL Server Reporting Services Part 1
  • Implementing Reports the SQL Server Reporting Services Part 2
  • Implementing Reports the SQL Server Reporting Services Part 3
  • Implementing Reports the SQL Server Reporting Services Part 4
  • Implementing Reports the SQL Server Reporting Services Part 5
  • Implementing Reports the SQL Server Reporting Services Part 6
  • Implementing Reports the SQL Server Reporting Services Part 7
  • Implementing Reports the SQL Server Reporting Services Part 8

Module 3: Supporting Self Service Reporting

  • Supporting Self Service Reporting Part 1
  • Supporting Self Service Reporting Part 2

Module 4: Managing Report Execution And Delivery

  • Managing Report Execution And Delivery
  • Managing Report Execution
  • Subscriptions And Data Alerts

Module 5: Creating Multidimensional Databases

  • Creating Multidimensional Databases
  • Creating Data Sources And Data Source Views
  • Creating And Browsing a Cube

Module 6: Working With Cubes And Dimensions

  • Working with Cubes And Dimensions
  • Sorting And Grouping Attributes

Module 7: Working With Measures And Measure Groups

  • Working With Measures and Measure Groups

Module 8: Introduction To MDX

  • Introduction To MDX
  • Adding Calculations To A Cube

Module 9: Customizing Cube Functionality

  • Customizing Cube Functionality Part 1
  • Customizing Cube Functionality Part 2
  • Customizing Cube Functionality Part 3

Module 10: Implementing A Tabular Data Model

  • Implementing A Tabular Data Model Part 1
  • Implementing A Tabular Data Model Part 2

Module 11: Introduction To DAX

  • Introduction to DAX
  • Demonstration Making A Tabular Model Part 1
  • Demonstration Making A Tabular Model Part 2
  • Using DAX

Module 12: Implementing An Analysis Services Tabular Data Model

  • Implementing An Analysis Services Tabular Data Model Part 1
  • Implementing An Analysis Services Tabular Data Model Part 2
  • Deploying A Tabular Data Model

Module 13: SQL Analysis Services

  • SQL Analysis Services Part 1
  • SQL Analysis Services Part 2

Module 14: Creating Data Visualizations With Power View

  • Creating Data Visualizations With Power View

Module 15: Supporting Self Service Reporting

  • Supporting Self Service Reporting

Module 16: Performing Predictive Analysis With Data Mining

  • Performing Predictive Analysis With Data Mining
  • Using The Data Mining Wizard

Module 17: Predictive Analytics

  • Predictive Analytics Part 1
  • Predictive Analytics Part 2

Module 1: Designing A Database Server Infrastructure

  • Introduction
  • Designing A Database Server Infrastructure-Part1
  • Designing A Database Server Infrastructure-Part2
  • Designing A Database Server Infrastructure-Part3
  • Designing A Database Server Infrastructure-Part4
  • Considerations For Database Server Consolidation
  • Managing Server Resources

Module 2: Designing A Logical Database Scheme

  • Designing A Logical Database Scheme-Part1
  • Designing A Logical Database Scheme-Part2
  • Designing A Logical Database Scheme-Part3
  • Designing A Logical Database Scheme-Part4
  • Designing A Logical Database Scheme-Part5

Module 3: Designing A Physical Database Implementation

  • Designing A Physical Database Implementation-Part1
  • Designing A Physical Database Implementation-Part2
  • Designing A Physical Database Implementation-Part3

Module 4: Incorporating Data Files Into the Database

  • Incorporating Data Files Into The Database-Part1
  • Incorporating Data Files Into The Database-Part2
  • Incorporating Data Files Into The Database-Part3
  • Incorporating Data Files Into The Database Demo
  • Searching Data Files
  • Searching Data Files Demo

Module 5: Tuning Database Performance

  • Tuning Database Performance-Part1
  • Tuning Database Performance-Part2
  • Tuning Database Performance-Part3
  • Working With Query Plans-Part1
  • Working With Query Plans-Part2
  • Working With Query Plans-Part3
  • Working With Query Plans-Part4

Module 6: Designing Database Security

  • Designing Database Security-Part1
  • Designing Database Security-Part2
  • Contained Databases
  • Protecting Data With Encryption

Module 7: Policy Based Management

  • Policy Based Management
  • Policy Based Management Demo

Module 8: Monitoring Server Health

  • Monitoring Server Health
  • Monitoring Server Health Demo

Module 9: Designing Database Backup Solution

  • Designing Database Backup Solution-Part1
  • Designing Database Backup Solution-Part2
  • Designing Database Backup Solution-Part3
  • Designing Database Backup Solution-Part4
  • Disaster Recovery Plan-Part1
  • Disaster Recovery Plan-Part2

Module 10: Automating Multi Server Maintenance

  • Automating Multi Server Maintenance
  • Managing Multiple Servers

Module 11: Managing SQL Server With Windows Powershell

  • Managing SQL Server WIth Windows Powershell
  • Windows Powershell Lab

Module 12: Replicating Data

  • Replicating Data-Part1
  • Replicating Data-Part2
  • Replicating Data-Part3

Module 13: Planning High Availability

  • Planning High Availability-Part1
  • Planning High Availability-Part2

Module 14: Review of SQL Statements

  • Review Of SQL Statements-Part1
  • Review Of SQL Statements-Part2
  • Review Of SQL Statements-Part3

Module 15: Eleven Rules of Database Design

  • Eleven Rules Of Database Design
  • Conclusion

Module 1: SQL 2012 And The 464 Test

  • Introduction
  • Intro To SQL Server 2012-Part1
  • Intro To SQL Server 2012-Part2
  • Management Studio Demo-Part1
  • Management Studio Demo-Part2
  • Management Studio Demo-Part3
  • Other SQL Server Tools

Module 2: Working With Data Types

  • Working With Data Types-Part1
  • Working With Data Types-Part2
  • Working With Data Types-Part3
  • Other Data Types

Module 3: Tables

  • Tables
  • Creating Tables

Module 4: Data Constraints

  • Data Constraints-Part1
  • Data Constraints-Part2

Module 5: Planning In Indexing

  • Planning In Indexing-Part1
  • Planning In Indexing-Part2
  • Planning In Indexing-Part3
  • Planning In Indexing-Part4

Module 6: Table Structures

  • Table Structures
  • Working With Clustered Indexes
  • Clustered Indexes
  • Designing Effective Clustered Indexes

Module 7: Improving Performance with Non-Clustered Indexes

  • Improving Performance With Non-Clustered Indexes-Part1
  • Improving Performance With Non-Clustered Indexes-Part2
  • Improving Performance With Non-Clustered Indexes-Part3

Module 8: Using Indexes And Execution Plans

  • Using Indexes
  • Execution Plans-Part1
  • Execution Plans Demo
  • Execution Plans-Part2

Module 9: Working with Views

  • Working With Views-Part1
  • Working With Views-Part2

Module 10: Designing and Implementing Stored Procedures

  • Designing And Implementing Stored Procedures-Part1
  • Designing And Implementing Stored Procedures-Part2
  • Designing And Implementing Stored Procedures-Part3

Module 11: Merging Data and Passing Tables

  • Merging Data And Passing Tables-Part1
  • Merging Data And Passing Tables-Part2
  • Merging Data And Passing Tables-Part3

Module 12: Designing and Implementing User Functions

  • Designing And Implementing User Functions

Module 13: Creating Highly Concurrent SQL Server Applications

  • Creating Highly Concurrent SQL Server Applications-Part1
  • Creating Highly Concurrent SQL Server Applications-Part2
  • Creating Highly Concurrent SQL Server Applications-Part3

Module 14: Handling Errors in T-SQL

  • Handling Error InT-SQL-Part1
  • Handling Error InT-SQL-Part2

Module 15: Triggers

  • Triggers

Module 16: Implementing Managed Code

  • Implementing Managed Code-Part1
  • Implementing Managed Code-Part2
  • Implementing Managed Code-Part3
  • Implementing Managed Code-Part4

Module 17: Storing XML in SQL

  • Storing XML In SQL-Part1
  • Storing XML In SQL-Part2

Module 18: Querying XML

  • Querying XML-Part1
  • Querying XML-Part2

Module 19: Working with the Spatial Data

  • Working With Spatial Data-Part1
  • Working With Spatial Data-Part2
  • Working With Spatial Data-Part3

Module 20: Working With Full-Text Indexes and Queries

  • Working With Full-Text Indexes And Queries-Part1
  • Working With Full-Text Indexes And Queries-Part2
  • Working With Full-Text Indexes And Queries-Part3

Lesson 1: Introduction to Data Warehouse

  • Introduction
  • Introduction To Data Warehouse-Part1
  • Introduction To Data Warehouse-Part2
  • Introduction To Data Warehouse-Part3
  • Introduction To Data Warehouse-Part4
  • Introduction To Data Warehouse-Part5
  • Introduction To Data Warehouse-Part6

Lesson 2: Creating Dimensions and Changing Granularity of Dimensions

  • Creating Dimensions And Changing Granularity Of Dimensions-Part1
  • Creating Dimensions And Changing Granularity Of Dimensions-Part2
  • Creating Dimensions And Changing Granularity Of Dimensions-Part3
  • Creating Dimensions And Changing Granularity Of Dimensions-Part4
  • Creating Dimensions And Changing Granularity Of Dimensions-Part5
  • Creating Dimensions And Changing Granularity Of Dimensions-Part6

Lesson 3: Creating Fact Tables and ColumnStore Indexes

  • Creating Fact Tables And Column Store Indexes-Part1
  • Creating Fact Tables And Column Store Indexes-Part2
  • Creating Fact Tables And Column Store Indexes-Part3
  • Creating Fact Tables And Column Store Indexes-Part4
  • Creating Fact Tables And Column Store Indexes-Part5

Lesson 4: Implementing Data Warehouse in SQL Server 2012

  • Implementing Data Warehouse-Part1
  • Implementing Data Warehouse-Part2
  • Implementing Data Warehouse-Part3
  • Implementing Data Warehouse-Part4

Lesson 5: Working with Integration Services

  • Working With Integration Services-Part1
  • Working With Integration Services-Part2
  • Working With Integration Services-Part3
  • Working With Integration Services-Part4
  • Working With Integration Services-Part5
  • Working With Integration Services-Part6

Lesson 6: Managing Control Flow

  • Managing Control Flow-Part1
  • Managing Control Flow-Part2
  • Managing Control Flow-Part3
  • Managing Control Flow-Part4
  • Managing Control Flow-Part5

Lesson 7: Working with Dynamic Variables

  • Working With Dynamic Variables-Part1
  • Working With Dynamic Variables-Part2
  • Working With Dynamic Variables-Part3
  • Working With Dynamic Variables-Part4
  • Working With Dynamic Variables-Part5
  • Working With Dynamic Variables-Part6
  • Working With Dynamic Variables-Part7
  • Working With Dynamic Variables-Part8

Lesson 8: Implementing Data Flow

  • Implementing DataFlow-Part1
  • Implementing DataFlow-Part2
  • Implementing DataFlow-Part3
  • Implementing DataFlow-Part4
  • Implementing DataFlow-Part5
  • Implementing DataFlow-Part6
  • Implementing DataFlow-Part7
  • Implementing DataFlow-Part8

Lesson 9: Managing Data Flow

  • Managing DataFlow-Part1
  • Managing DataFlow-Part2
  • Managing DataFlow-Part3
  • Managing DataFlow-Part4

Lesson 10: Managing SSIS Package Execution

  • Managing SSIS Package Execution-Part1
  • Managing SSIS Package Execution-Part2
  • Managing SSIS Package Execution-Part3
  • Managing SSIS Package Execution-Part4
  • Managing SSIS Package Execution-Part5
  • Managing SSIS Package Execution-Part6

Lesson 11: Debugging and Troubleshooting

  • Debugging And Troubleshooting-Part1
  • Debugging And Troubleshooting-Part2
  • Debugging And Troubleshooting-Part3
  • Debugging And Troubleshooting-Part4

Lesson 12: Deploying Packages

  • Deploying Packages-Part1
  • Deploying Packages-Part2
  • Deploying Packages-Part3

Lesson 13: Securing Packages and Databases

  • Securing Packages And Databases-Part1
  • Securing Packages And Databases-Part2

Lesson 14: Working with MDS and Windows

  • Working With MDS And Windows Azure

Lesson 1: Identifying the SQL Server Platform

  • Overview
  • DataStorage-Part 1
  • DataStorage-Part 2

Lesson 2: Deploying SQL Server

  • Install-Part 1
  • Install-Part 2

Lesson 3: Configuring SQL Server

  • Configuring-Part 1
  • Configuring-Part 2
  • Changing Memory-Part 1
  • Changing Memory-Part 2
  • Email-Part 1
  • Email-Part 2

Lesson 4: Managing Databases in SQL Server 2012

  • User Databases-Part 1
  • User Databases-Part 2
  • User Databases-Part 3
  • User Databases-Part 4
  • User Databases-Part 5

Lesson 5: Managing SQL Server Security

  • Setting Security-Part 1
  • Setting Security-Part 2
  • Server Roles-Part 1
  • Server Roles-Part 2
  • Setting Permissions-Part 1
  • Setting Permissions-Part 2

Lesson 6: Implementing Advanced Security Settings

  • Querying Data From Multiple Tables-Part 1
  • Querying Data From Multiple Tables-Part 2
  • Querying Data From Multiple Tables-Part 3
  • Querying Data From Multiple Tables-Part 4

Querying Data From Multiple Tables-Part 5

Lesson 7: Applying Encryption and Compression

  • Encrypting And Compressing-Part 1
  • Encrypting And Compressing-Part 2
  • Encrypting And Compressing-Part 3

Lesson 8: Working with Indexes and Log Files

  • Functions-Part 1
  • Functions-Part 2
  • Functions-Part 3
  • Functions-Part 4
  • Functions-Part 5
  • Functions-Part 6

Lesson 9: Working with Backup and Restore

  • Managing Backups-Part 1
  • Managing Backups-Part 2
  • Managing Backups-Part 3
  • Managing Backups-Part 4
  • Managing Backups-Part 5
  • Managing Backups-Part 6
  • Managing Backups-Part 7

Lesson 10: Implementing High Availability

  • Stored Procedures-Part 1
  • Stored Procedures-Part 2
  • Stored Procedures-Part 3
  • Stored Procedures-Part 4

Lesson 11: Optimizing Server Performance

  • Managing SQL Performance-Part 1
  • Managing SQL Performance-Part 2
  • Managing SQL Performance-Part 3
  • Managing SQL Performance-Part 4
  • Managing SQL Performance-Part 5
  • Managing SQL Performance-Part 6
  • Managing SQL Performance-Part 7

Lesson 12: Troubleshooting Issues and Recovering Databases

  • Set Operators-Part 1
  • Set Operators-Part 2
  • Set Operators-Part 3
  • Set Operators-Part 4
  • Set Operators-Part 5

Lesson 13: Performing Advanced Database Management Tasks

  • Managing Database Infrastructures-Part 1
  • Managing Database Infrastructures-Part 2
  • Managing Database Infrastructures-Part 3

Lesson 1: Getting Started with SQL Server 2012

  • Course Introduction

Lesson 2: Working with T-SQL

  • Creating Queries-Part 1
  • Creating Queries-Part 2
  • Creating Queries-Part 3
  • Creating Queries-Part 4
  • Creating Queries-Part 5
  • Constraints-Part 1
  • Constraints-Part 2
  • Constraints-Part 3
  • Constraints-Part 4
  • Constraints-Part 5

Lesson 3: Writing SELECT Queries

  • Select Statement-Part 1
  • Select Statement-Part 2
  • Select Statement-Part 3
  • Select Statement-Part 4

Lesson 4: Working with SQL Data Types

  • Data Types-Part 1
  • Data Types-Part 2
  • Data Types-Part 3
  • Data Types-Part 4
  • Data Types-Part 5
  • Data Types-Part 6
  • Data Types-Part 7
  • Data Types-Part 8
  • Data Types-Part 9
  • Data Types-Part 10

Lesson 5: Sorting and Filtering Data

  • Sorting Results-Part 1
  • Sorting Results-Part 2
  • Sorting Results-Part 3
  • Sorting Results-Part 4
  • Sorting Results-Part 5
  • Sorting Results-Part 6

Lesson 6: Querying Data from Multiple Tables

  • Tables Part 1
  • Tables Part 2
  • Tables Part 3
  • Tables Part 4
  • Tables Part 5
  • Tables Part 6

Lesson 7: Modifying Data

  • Inserting Data-Part 1
  • Inserting Data-Part 2
  • Inserting Data-Part 3
  • Inserting Data-Part 4
  • Inserting Data-Part 5
  • Inserting Data-Part 6

Lesson 8: Working with SQL Server Built-in Functions

  • Functions
  • Parse
  • Logical Functions
  • Group By

Lesson 9: Programming in T-SQL

  • Programming-Part 1
  • Programming-Part 2
  • Programming-Part 3
  • Programming-Part 4
  • Programming-Part 5
  • Programming-Part 6

Lesson 10: Implementing Stored Procedures

  • Storage Procedures-Part 1
  • Storage Procedures-Part 2
  • Dynamic SQL-Part 1
  • Dynamic SQL-Part 2

Lesson 11: Working with Subqueries and Table Expressions

  • Sub-Queries And Table Expressions-Part 1
  • Sub-Queries And Table Expressions-Part 2
  • Sub-Queries And Table Expressions-Part 3
  • Sub-Queries And Table Expressions-Part 4

Lesson 12: Working with Set Operators, Conditional Operators, and Window Functions

  • Set Operators-Part 1
  • Set Operators-Part 2
  • Window Functions-Part 1
  • Window Functions-Part 2
  • User Defined Functions-Part 1
  • User Defined Functions-Part 2
  • Advanced Analytical Functions

Lesson 13: Working with PIVOT, UNPIVOT, and Grouping Sets

  • Pivot
  • Grouping Sets

Lesson 14: Managing Error Handling and Transactions

  • Error Handling-Part 1
  • Error Handling-Part 2
  • Manage Transactions-Part 1
  • Manage Transactions-Part 2
  • Manage Transactions-Part 3

Lesson 15: Querying SQL Server System

  • System Databases-Part 1
  • System Databases-Part 2
  • System Databases-Part 3
  • System Databases-Part 4

Lesson 16: Optimizing Query Performance

  • Query Planning-Part 1
  • Query Planning-Part 2
  • Index-Part 1
  • Index-Part 2
  • Index-Part 3

Module 1: SSIS Packages

  • Introduction
  • Creating SSIS Packages
  • Creating A New Package Lab
  • Data Sources Lab
  • Connections Lab
  • Control Flow
  • Creating And Editing Control Flow Lab
  • Data Flow
  • Data Flow Transformations
  • Data Flow Lab

Module 2: Debugging and Error Handling in SSIS

  • Debugging And Error Handling in SSIS-Part1
  • Enable Transactions And Observe Trans Rollback Lab
  • Set Checkpoints In A Package Lab
  • Debugging And Error Handling in SSIS-Part2
  • Setting Up Constraints Lab
  • Turn On Logging Lab
  • Debugging And Error Handling in SSIS-Part3
  • Identifying Data Flow Errors Lab

Module 3: Deploying and Configuring SSIS Packages

  • Lesson1-Part1 Deploying
  • Lesson1-Part2 Sharing Ordering And Configuring
  • Create An XML Configuration Lab
  • Create A SQL Server Configuration Lab
  • Use A Property Expression To Update A Connection Lab
  • Deploying An SSIS Package
  • Create And Deploy An Installer Kit Lab

Module 4: Securing and Executing SSIS Packages; Service Administration

  • Lesson1-Part1 Securing And Executing SSIS Packages
  • Lesson1-Part2 SSIS Package Security
  • Turn On Package Encryption Lab
  • Change Security Roles Lab
  • Lesson2 Executing And Administration
  • Create And Execute A Command-Line Statement Lab
  • Execute A Package Through SQL Server Agent Lab

Module 5: Data Analysis

  • Lesson1 SSAS Cube Development
  • Create SSAS Project Lab
  • Create A Data Source Lab
  • Create A Data Source View Lab
  • Lesson2 Creating And Modifying SSAS Cube
  • Creating A Cube Lab
  • Using Cube Designer To Edit A Cube Structure Lab
  • Lesson3 Creating A Dimension
  • Create A New Dimension Lab
  • Lesson4 Creating Measure Groups And Measures
  • Add Measure Groups Lab
  • Configure Measure Groups And Measures Lab

Module 6: Extending SSAS Cubes

  • Lesson1 Extending SSAS Cubes-Part1
  • Define Attribute Relationships Lab
  • Define User Hierarchy Lab
  • Lesson2 Extending SSAS Cube-Part3
  • Implement The Reseller Sales KPI Lab
  • Lesson3 Extending SSAS Cube-Part3
  • Turn On Proactive Caching Lab

Module 7: Extending SSAS Cubes

  • Lesson1-Part1 SSAS Storage Processing And Deployment
  • Lesson1-Part2 Aggregating And Enabling Proactive Caching
  • Turning On Proactive Caching Lab
  • Lesson2 SSAS Deployment
  • Deploy Database With Deployment Wizard Lab
  • Lesson3 Processing
  • Processing Scripts Using SQL Server Agent Lab

Module 8: Securing and Administering SSAS

  • Lesson1 SSAS Security
  • Create A Role And Set Security Lab
  • Lesson2 Backing Up SSAS
  • Backing Up And Maintain Management Studio Lab
  • Lesson3 Managing SSAS Turning And Logging
  • Turning On Query Logging Lab
  • Lesson4 SSAS Administering
  • Turn On And Use SQL Server Profiler Lab
  • Monitor SSAS Performance Lab

Module 9: Working With SSAS Data Mining

  • Lesson1-Part1 Prepare And Creating Data Mining Structures
  • Lesson1-Part2 Data Mining Algorithms And Usage
  • Data Mining Wizard Lab
  • Lesson2 Mapping Mining Structure Attributes To Source Columns
  • Create A Model From A Cube Lab
  • Lesson3 Predictive Models
  • Lesson4 Data Mining Security
  • Managing Permissions Lab

Module 10: Developing SSAS Reports

  • Lesson1 Understanding SSRS Reports
  • Creating Reports Lab
  • Lesson2 Creating A New Report Database
  • Generate More Reports Lab
  • Lesson3 Advanced Report Object Properties-Part1
  • Lesson4 Advanced Report Object Properties-Part2

Module 11: Extending and Deploying SSRS Reports

  • Lesson1 SSRS Report Parameters
  • Create A Report Without Using Wizard Lab
  • Lesson2 Extending SSRS Reports
  • Lesson3 Deploying SSRS Reports

Module 12: Scheduling Deployed Reports and Data Sources

  • Lesson1 Scheduling Reports And Subscriptions
  • Creating A New Role For SSRS Lab
  • Lesson2 SSRS And Data Sources
  • Set Up Shared Schedule Lab

Module 13: Configuring And Administering the SSRS Server

  • Installing And Configuring SSRS Server
  • Changing Settings In Configuration Manager Lab
  • Lesson2 Administering The SSES Server And Command-Line Utilities
  • Backing Up And Restoring Encryption Keys Lab
  • Conclusion

Installing on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance

  • Introduction
  • Installing Part 1
  • Installing Part 2
  • Installing Part 2 Demo 1
  • Installing Part 2 Demo 2

Getting familiar with SQL on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance

  • Getting Familiar With SQL Part 1
  • Getting Familiar With SQL Part 1 Demo
  • Getting Familiar With SQL Part 2
  • Getting Familiar With SQL Part 2 Demo
  • Getting Familiar With SQL Part 3
  • Getting Familiar With SQL Part 3 Demo

Types of Data on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance

  • Data Types
  • Data Types Demo

Databases on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance

  • Databases Part 1
  • Databases Part 1 Demo
  • Databases Part 2
  • Databases Part 2 Demo
  • Databases Part 3

Looking at Tables on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance

  • Tables
  • Tables Demo

Module 6: Looking at Views

  • Views Part 1
  • Views Part 1 Demo
  • Views Part 2
  • Views Part 2 Demo
  • Views Part 3

Module 7: About Constraints

  • Constraints Part 1
  • Constraints Part 1 Demo
  • Constraints Part 2

Module 8: Looking at Stored Procedures

  • Stored Procedures Part 1
  • Stored Procedures Part 1 Demo
  • Stored Procedures Part 2

Module 9: Functions

  • Functions
  • Functions Demo

Modules 10: About Service Broker

  • Service Broker Part 1
  • Service Broker Part 2

Modules 11: Integrity

  • Data Integrity Part 1
  • Data Integrity Part 2

Modules 12: Permissions in SQL

  • Permissions Part 1
  • Permissions Part 1 Demo
  • Permissions Part 2

Modules 13: Accounts

  • Logins Roles And Credentials
  • Logins Roles And Credentials Demo

Modules 14: Security

  • Additional Security Tools
  • Additional Security Tools Demo

Modules 15: Backups/Restores

  • Backing Up And Restoring Databases Part 1
  • Backing Up And Restoring Databases Part 2
  • Backing Up And Restoring Databases Demo

Modules 16: Endpoints

  • Endpoints

Modules 17: Servers working together

  • Linking Servers

Modules 18: Triggers in SQL

  • Triggers

Modules 19: Replication between servers

  • Replication Part 1
  • Replication Part 2

Modules 20: Indexes

  • Performing Indexing And Full Text Searching

Modules 21: Transactions in SQL

  • Transaction And Locks

Modules 22: Data moves

  • Moving Data

Modules 23: Data specialties in SQL

  • Handling Specialty Data

Modules 24: Fault Tolerance

  • High-Availability Methods Part 1
  • High-Availability Methods Part 2

Modules 25: SQL Management

  • Maintaining And Automating SQL Server

Modules 26: SQL Management Monitoring

  • Monitoring And Optimizing SQL Server
  • Monitoring And Optimizing SQL Server Demo

Modules 27: SQL Management tools

  • SQL Server Management Tools

Module 28: Troubleshooting

  • Troubleshooting Techniques
  • Troubleshooting Techniques Demo

Module 29: Course Review

  • Course Review Part 1
  • Course Review Part 2
  • Course Review Part 3
  • Course Review Part 4
  • Course Review Part 5

Module 30: Common Questions

  • Common Student Questions Part 1
  • Common Student Questions Part 2

Module 31: Real World Scenarios

  • Real World Scenarios Part 1
  • Real World Scenarios Part 2

Module 1: Manage and Maintain a Server Infrastructure

  • Introduction
  • Manage And Maintain A Server Infrastructure-Part1
  • Manage And Maintain A Server Infrastructure-Part2
  • Design A Monitoring Strategy-Part1
  • Design A Monitoring Strategy-Part2
  • Plan And Implement Automated Remediation-Part1
  • Plan And Implement Automated Remediation-Part2
  • Plan And Implement Automated Remediation-Part3

Module 2: Plan and Implement a Highly Available Enterprise Infrastructure

  • Plan And Implement A Highly Available Enterprise Infrastructure-Part1
  • Plan And Implement A Highly Available Enterprise Infrastructure-Part2
  • Highly Available Network Services-Part1
  • Highly Available Network Services-Part2
  • Plan And Implement Highly Available Storage Solutions-Part1
  • Plan And Implement Highly Available Storage Solutions-Part2
  • Plan And Implement Highly Available Roles-Part1
  • Plan And Implement Highly Available Roles-Part2
  • Business Continuity And Disaster Recovery Solution

Module 3: Plan and Implement a Server Virtualization Infrastructure

  • Plan And Implement Virtual Hosts – Part 1
  • Plan And Implement Virtual Hosts-Part2
  • Plan And Implement Virtual Machines
  • Plan And Implement Virtualization Networking-Part1
  • Plan And Implement Virtualization Networking-Part2
  • Plan And Implement Virtualization Storage
  • Plan And Implement Virtual Machine Movement
  • Manage And Maintain A Server Virtualization Infrastructure

Module 4: Design and Implement Identity and Access Solutions

  • Design And Implement Identity And Access Solutions-Part1
  • Design And Implement Identity And Access Solutions-Part2
  • Implement And Manage Certificates
  • Design And Implement A Federated Identity Solution
  • Design And Implement AD Rights Management Services
  • Conclusion

Module 1: Plan and Deploy Infrastructure

  • Introduction
  • Plan And Deploy Infrastructure-Part 1
  • Plan And Deploy Infrastructure-Part 2
  • Plan And Deploy Infrastructure-Part 3

Module 2: Planning and Implementing

  • Planning And Implementing-Part 1
  • Multicast Deployment Wizard Demo
  • Planning And Implementing-Part 2
  • Pre-staging Clients Demo
  • Planning And Implementing-Part 3
  • Configuring Windows Deployment Services Demo
  • Planning And Implementing-Part 4

Module 3: Planning and Implementing Server Upgrade and Migration

  • Planning And Implementing Server Upgrade And Migration-Part 1
  • Planning And Implementing Server Upgrade And Migration-Part 2
  • Planning And Implementing Server Upgrade And Migration-Part 3

Module 4: Planning and Deploying Virtual Machine Manager Resources

  • Planning And Deploying Virtual Machine Manager Resources-Part 1
  • Planning And Deploying Virtual Machine Manager Resources-Part 2
  • Planning And Deploying Virtual Machine Manager Resources-Part 3
  • Planning And Deploying Virtual Machine Manager Resources-Part 4

Module 5: Planning and Implementing File and Storage Services

  • PlanningAnd Implementing File And Storage Services-Part 1
  • Planning And Implementing File And Storage Services-Part 2
  • Configuring The iSCSI Target Server Demo
  • Planning And Implementing File And Storage Services-Part 3
  • Configuring Internet Storage Name Server Demo
  • Planning And Implementing File And Storage Services-Part 4

Module 6: Design and Implement Network Infrastructure Services

  • Design And Implement Network Infrastructure Services

Module 7: Design and Maintain a Dynamic Host Configuration Protocol Solution

  • Design And Maintain A Dynamic Host Configuration Protocol Solution-Part 1
  • Configuring Split Scope In DHCP Demo
  • Design And Maintain A Dynamic Host Configuration Protocol Solution-Part 2
  • Design And Maintain A Dynamic Host Configuration Protocol Solution-Part 3

Module 8: Design a Name Resolution Solution Strategy

  • Design A Name Resolution Solution Strategy-Part 1
  • Design A Name Resolution Solution Strategy-Part 2
  • Configuring Global Names Zone Demo
  • Design A Name Resolution Solution Strategy-Part 3

Module 9: Design and Manage an IP Address Management Solution

  • Design And Manage An IP Address Management Solution-Part 1
  • Design And Manage An IP Address Management Solution-Part 2

Module 10: Design and Implement Network Access Services

  • Design And Implement Network Access Services

Module 11: Design a VPN Solution

  • Design A VPN Solution-Part 1
  • Design A VPN Solution-Part 2

Module 12: Design a DirectAccess Solution

  • Design A Direct Access Solution-Part 1
  • Design A Direct Access Solution-Part 2

Module 13: Implement a Scalable Remote Access Solution

  • Implement A Scalable Remote Access Solution-Part 1
  • Implementing Packet Tracing Demo
  • Implement A Scalable Remote Access Solution-Part 2
  • Implement A Scalable Remote Access Solution-Part 3
  • Looking At Setting In Direct Access Demo
  • Implement A Scalable Remote Access Solution-Part 4

Module 14: Design and Implement a Network Protection Solution

  • Design And Implement A Network Protection Solution-Part 1
  • Design And Implement A Network Protection Solution-Part 2
  • Design And Implement A Network Protection Solution-Part 3
  • Looking At Multiple RADIUS Servers Demo
  • Design And Implement A Network Protection Solution-Part 4
  • Taking A Look At IP Sec Policy Enforcement Demo
  • Showing 802.1X Policy Enforcement Demo
  • Design And Implement A Network Protection Solution-Part 5

Module 15: Design and Implement an Active Directory Infrastructure

  • Design And Implement An Active Directory Infrastructure

Module 16: Design a Forest and Domain Infrastructure

  • Design A Forest And Domain Infrastructure

Module 17: Implement a Forest and Domain Infrastructure

  • Implement A Forest And Domain Infrastructure-Part 1
  • Steps To Perform A Realm Trust Demo
  • Implement A Forest And Domain Infrastructure-Part 2

Module 18: Design a Group Policy Strategy

  • Design A Group Policy Strategy

Module 19: Design an Active Directory Permission Model

  • Design An Active Directory Permission Model-Part 1
  • Taking A Look At The Security Tab Or Lack Of Demo
  • Design An Active Directory Permission Model-Part 2
  • Taking A Look At The Delegation Or Control Wizard Demo
  • Design An Active Directory Permission Model-Part 3
  • Taking A Look At Kerberos Delegation Demo
  • Design An Active Directory Permission Model-Part 4

Module 20: Design and Implement an Active Directory Infrastructure (Physical)

  • Design And Implement An Active Directory Infrastructure Physical

Module 21: Design an Active Directory Site Topology

  • Design An Active Directory Site Topology

Module 22: Design an Active Directory Site Topology

  • Design A Domain Controller Strategy

Module 23: Design and Implement a Branch Office Infrastructure

  • Design And Implement A Branch Office Infrastructure-Part 1
  • Design And Implement A Branch Office Infrastructure-Part 2
  • Taking A Look At Password Replication Policy Tab Demo
  • Design And Implement A Branch Office Infrastructure-Part 3
  • Conclusion

Module 1: Configuring Advanced DNS Services

  • Introduction
  • DNSSEC
  • Socket Pool And Cache Locking
  • Advanced DNS Settings
  • Questions

Module 2: Advanced DHCP Services

  • DHCP Scopes
  • High Availability
  • Policy-Based Assignments
  • DHCPv6
  • Questions

Module 3: Active Directory Forest Configuration

  • Active Directory Forests
  • Active Directory Sites
  • Active Directory Trusts
  • Active Directory Read Only Domain Controllers
  • Active Directory Replication

Module 4: Active Directory Certificate Services

  • ADCS Overview
  • ADCS Management

Module 5: ISCSI And ISNS

  • ISCSI And ISNS
  • ISCSI And ISNS Demo
  • Questions

Module 6: Configuring IPAM

  • Install And Configure IPAM
  • IPAM Demo
  • Questions

Module 7: Network Balancing

  • Install And Configure NLB
  • NLB Demo
  • Questions

Module 8: Failover Clusters

  • Cluster Overview
  • Cluster Aware Updating
  • Failover Clusters Demo
  • Questions

Module 9: Configuring Hyper_V Virtual Machines

  • Create VM Replicas In Hyper-V And Migrate VMs
  • Hyper V Virtual Machines Demo
  • Questions

Module 10: Dynamic Access Control

  • DAC Overview And Configure
  • DAC Demo
  • Questions

Module 11: Active Directory Rights Management Services

  • Install ADRMS
  • Manage ADRMS
  • ADRMS Demo
  • Questions

Module 12: Active Directory Federation Services

  • Configure And Manage ADFS
  • ADFS Demo
  • Questions

Module 13: Disaster Recovery

  • Configure And Restore Windows Server Backup
  • Configure And Restore Windows Server Backup Demo
  • Questions

Module 14: Configuring Additional Services

  • Configuring Additional Services
  • Configuring Additional Services Demo-Part1
  • Configuring Additional Services Demo-Part2
  • Questions
  • Conclusion

Module 1: Managing User and Service Accounts

  • Introduction
  • User Accounts-Part 1
  • User Accounts-Part 2
  • User Accounts-Part 3
  • Service Accounts-Part 1
  • Service Accounts-Part 2
  • Questions

Module 2: Administer Group Policy

  • Group Policy
  • User Configuration-Part 1
  • User Configuration-Part 2
  • User Configuration-Part 3
  • Computer Configurations
  • Group Policy Management-Part 1
  • Group Policy Management-Part 2
  • Group Policy Management-Part 3
  • Questions

Module 3: Managing Network File Services

  • File System Resource Manager
  • Distributed File System
  • Encrypting File System
  • Auditing Resources
  • Questions

Module 4: Domain Name System

  • DNS Functionality-Part 1
  • DNS Functionality-Part 2
  • DNS and Active Directory
  • DNS Server Configuration-Part 1
  • DNS Server Configuration-Part 2
  • Questions

Module 5: Windows Deployment Services

WDS Overview

  • Creating Images

Module 6: Windows Server Update Services

  • WSUS-Part 1
  • WSUS-Part 2

Module 7: Remote Access

  • Implement Remote Access-Part 1
  • Implement Remote Access-Part 2
  • Implement Remote Access-Part 3
  • Offline Domain Join
  • Implement Network Policy Server-Part 1
  • Implement Network Policy Server-Part 2
  • Implement Network Policy Server-Part 3

Module 8: Monitoring System

  • Monitoring System Resources-Part 1
  • Monitoring System Resources-Part 2

Module 9: Managing Active Directory Services

  • Managing Active Directory Services-Part 1
  • Managing Active Directory Services-Part 2
  • Managing Active Directory Services-Part 3
  • Conclusion

Module 1: Installing And Configuring Windows Server 2012 R2

  • Course And Instructor Introduction
  • Overview-Part1
  • Overview-Part2
  • Overview-Part3
  • Management-Part1
  • Management-Part2
  • Management-Part3
  • Management-Part4
  • Management-Part5
  • Installation-Part1
  • Installation-Part2
  • Installation-Part3
  • Questions-Part1
  • Questions-Part2

Module 2: Installing and Configuring an Active Directory Domaine Control

  • Active Directory Design-Part1
  • Active Directory Design-Part2
  • Active Directory Design-Part3
  • Installing Active Directory Domain Services-Part1
  • Installing Active Directory Domain Services-Part2
  • Installing Active Directory Domain Services-Part3
  • Installing Active Directory Domain Services-Part4
  • Questions

Module 3: Administering Active Directory Objects

  • Design And Create An Active Directory Hierarchy-Part1
  • Design And Create An Active Directory Hierarchy-Part2
  • Manage Users-Part1
  • Manage Users-Part2
  • Manage Users-Part3
  • Manage Computers-Part1
  • Manage Computers-Part2
  • Manage Computers-Part3
  • Questions

Module 4: Automating Administration Tasks

  • Powershell Overview And Object Command-Part1
  • Powershell Overview And Object Command-Part2
  • Powershell Overview And Object Command-Part3
  • Command Line Object Management And Bulk Operations-Part1
  • Command Line Object Management And Bulk Operations-Part2
  • Questions

Module 5: Configuring IPv4

  • TCP IP Overview
  • IPv4 Addressing-Part1
  • IPv4 Addressing-Part2
  • Subnetting And Supernetting
  • Configure And Troubleshoot IPv4-Part1
  • Configure And Troubleshoot IPv4-Part2
  • Questions-Part1
  • Questions-Part2

Module 6: Configuring IPv6

  • Configuring IPV6-Part1
  • Configuring IPV6-Part2
  • Questions

Module 7: Installing and Configuring DHCP

  • DHCP Overview Database Security-Part1
  • DHCP Overview Database Security-Part2
  • Questions

Module 8: Installing and Configuring DNS

  • Installing And Configuring DNS-Part1
  • Installing And Configuring DNS-Part2
  • Installing And Configuring DNS-Part3
  • Installing And Configuring DNS-Part4
  • Installing And Configuring DNS-Part5
  • Questions

Module 9: Configuring Storage Spaces And File And Print Services

  • Design And Implement Storage Spaces-Part1
  • Design And Implement Storage Spaces-Part2
  • Design And Implement Storage Spaces-Part3
  • Secure Files And Folders Configure Offline Files And Shadow Copies
  • Implement Network Printing
  • Questions

Module 10: Configuring Group Policy

  • Create Group Policy Objects
  • Configure Group Policy Settings-Part1
  • Configure Group Policy Settings-Part2
  • Implement A Central Store And Questions

Module 11: Securing Windows Servers

  • Securing Windows Servers-Part1
  • Securing Windows Servers-Part2
  • Questions

Module 12: Installing and Configuring Virtual Servers and Clients

  • Virtualization Solution
  • Hyper V-Part1
  • Hyper V-Part2
  • Network Virtualization And Questions-Part1
  • Network Virtualization And Questions-Part2
  • Conclusion

Module 1: Understanding Microsoft Applications

  • Introduction To Exam 70-409
  • Introduction To Microsoft Virtualization-Part1
  • Introduction To Microsoft Virtualization-Part2
  • Introduction To System Center 2012 R2 Components
  • Evaluate The Existing Environment For Virtualization
  • Module 1 Review Questions

Module 2: Installing And Configuring The Hyper-V Role

  • Install The Hyper-V Role
  • Manage Hyper-V
  • Configure Hyper-V Settings
  • Introduction To Hyper-V Host Storage And Networking
  • Module 2 Review Questions
  • Installing Hyper-V-Demo

Module 3: Creating And Managing Virtual Hard Disks, Virtual Machines, And Virtual

  • Create And Configure Virtual Hard Disks
  • Create And Configure Virtual Machines
  • Install And Import Virtual Machines
  • Manage Virtual Machine Checkpoints
  • Monitor Hyper-V
  • Design Virtual Machines For Server Roles-Services
  • Module 3 Review Questions
  • Creating A Virtual Machine-Demo

Module 4: Producing And Configuring Virtual Machine Networks

  • Generate And Utilize Hyper-V Virtual Switches-Part1
  • Generate And Utilize Hyper-V Virtual Switches-Part2
  • Introduction To Advanced Hyper-V Networking Features
  • Configure And Utilize Hyper-V Network Virtualization
  • Module 4 Review Questions
  • Controlling The VM Demo

Module 5: Virtual Machine Movement And Hyper-V Replicas

  • Deliver High Availability And Redundancy For Virtualization
  • Implement Virtual Machine Movement
  • Implement And Manage Hyper-V Replica
  • Module 5 Review Questions

Module 6: Implementing Failover Clustering Using Hyper-V

  • Introduction To Failover Clustering-Part1
  • Introduction To Failover Clustering-Part2
  • Configure And Utilize Shared Storage
  • Implement And Manage Failover Clustering Using Hyper-V
  • Module 6 Review Questions
  • Exploring Clustering-Demo

Module 7: Installing And Configuring Microsoft System Center 2012 R2 Virtual

  • Integrated System Center And Server Virtualization
  • Virtual Machine Manager
  • Install VMM And Add Hosts And Manage Host Groups
  • Module 7 Review Questions
  • Exploring SCVMM

Module 8: Managing The Network And Storage Infrastructure In Microsoft System

  • Managing Networking Infrastructure
  • Managing Storage Infrastructure And Infrastructure Updates
  • Module 8 Review Questions

Module 9: Creating And Managing Virtual Machines Using Microsoft System Center 2012 R2Virtual Machine Manager

  • Introduction To Virtual Machine Management Tasks In VMM
  • Create Clone And Convert Virtual Machines
  • Introduction To Virtual Machine Updating
  • Module 9 Review Questions

Module 10: Configuring And Managing The Microsoft System Center 2012 R2 Virtual Machine Manager Library

  • Introduction To The Virtual Machine Manager Library
  • Working With Profiles And Templates
  • Module 10 Review Questions

Module 11: Managing Clouds In Microsoft System Center 2012 R2 Virtual Machine

  • Introduction To The Cloud
  • Produce And Manage A Cloud And User Role Utilization In VMM
  • Module 11 Review Questions

Module 12: Managing Services In Microsoft System Center 2012 R2 Virtual

  • Managing Service In MSC 2012 R2 VMM And Application Controller-Part1
  • Managing Service In MSC 2012 R2 VMM And Application Controller-Part2
  • Module 12 Review Questions

Module 13: Protecting And Monitoring Virtualization Infrastructure

  • Introduction To Backup And Restore Options For Virtual Machines
  • Protecting Virtualization Infrastructure By Using DPM-Part1
  • Protecting Virtualization Infrastructure By Using DPM-Part2
  • Utilize Operations Manager For Monitoring And Reporting
  • Integrate VMM With Operations Manager
  • Module 13 Review Questions
  • Exploring DPM-Demo

Module 14: Hyper-V And SCVMM Review

  • Hyper-V And SCVMM Review-Part1
  • Hyper-V And SCVMM Review-Part2
  • Hyper-V And SCVMM Review-Part3
  • Hyper-V And SCVMM Review-Part4
  • Exam 70-409 Conclusion

Module 1: Technology Review

  • Introduction
  • Active Directory Install And Configure
  • PowerShell Primer
  • Microsoft Exchange Server Install And Configure – Part 1
  • Microsoft Exchange Server Install And Configure – Part 2
  • Review Cloud Computing – Part 1
  • Review Cloud Computing – Part 2
  • Review Virtualization And The Cloud – Part 1
  • Review Virtualization And The Cloud – Part 2
  • Review Virtualization And The Cloud – Part 3

Module 2: Device Management

  • Client Devices
  • Demo Client Device Setup – Part 1
  • Demo Client Device Setup – Part 2
  • Office 365 Client Deployment
  • Office 365 Components
  • Office 365 Deployment Methods
  • Office 365 Cloud Deployment Methods
  • Office 365 Deployment Prerequisites
  • Office 365 Deployment Readiness
  • Office 365 Deployment Network Environment

Module 3: Office 365 Deployment Plan

  • Network Planning
  • Internet Network Usage Planning
  • Network Device Planning
  • Account Management Planning – Part 1
  • Account Management Planning – Part 2
  • Migration And Coexistence Options
  • Single Sign On Architecture
  • Demo Server 2012 Core With Active Directory Role

Module 4: Windows Azure

  • SharePoint 2013 Using Windows Azure – Part 1
  • SharePoint 2013 Using Windows Azure – Part 2
  • SharePoint 2013 Capabilities

Module 5: PowerShell

  • Scripting And PowerShell – Part 1
  • Scripting And PowerShell – Part 2
  • PowerShell Scripting Techniques – Part 1
  • PowerShell Scripting Techniques – Part 2
  • Enterprise Ready Scripts – Part 1
  • Enterprise Ready Scripts – Part 2
  • PowerShell Scripting Syntax – Part 1
  • PowerShell Scripting Syntax – Part 2
  • PowerShell Scripting Active Directory – Part 1
  • PowerShell Scripting Active Directory – Part 2
  • PowerShell Remoting
  • PowerShell Adding Bulk Users In AD

Module 6: SQL Server

  • Introduction To SQL Queries
  • SQL Queries – Part 1
  • SQL Queries – Part 2
  • DML And DDL – Part 1
  • DML And DDL – Part 2
  • DDL
  • SQL Server And PowerShell
  • SQL Server PowerShell And AD
  • Logging Data In SQL Server Using PowerShell

Module 7: Azure Lync and SharePoint

  • Azure Active Directory Fundamentals – Part 1
  • Azure Active Directory Fundamentals – Part 2
  • Deploying Lync Server – Part 1
  • Deploying Lync Server – Part 2
  • Deploying Lync Server – Part 3
  • SharePoint Designer
  • Backup And Restore Share Point
  • Windows PowerShell And SharePoint
  • Identity Service With Active Directory
  • Setup And Deploy Exchange

Module 8: Course Review

  • Review Virtualization
  • Review Cloud
  • Review Automation Using PowerShell
  • Review Desktop Applications
  • Move To Office 365
  • Conclusion

Module 1: Introduction To Office 365

  • Course Introduction
  • Introduction To Office 365 – Part 1
  • Introduction To Office 365 – Part 2
  • Planning A Pilot Implementation – Part 1
  • Planning A Pilot Implementation – Part 2
  • Planning A Pilot Implementation – Part 3
  • Planning A Pilot Implementation – Part 4
  • Provisioning Tenant Accounts – Part 1
  • Configuring A Test Lab
  • Provisioning Tenant Accounts – Part 2

Module 2: Administration In Office 365

  • Introduction To Administration In Office 365 – Part 1
  • Introduction To Administration In Office 365 – Part 2
  • Introduction To Administration In Office 365 – Part 3Introduction To Administration In Office 365 – Part 4
  • Introduction To Administration In Office 365 – Part 5
  • Managing Users And Licenses – Part 1
  • Managing Users And Licenses – Part 2
  • Managing Users And Licenses – Part 3
  • Managing Security And Distribution Groups – Part 1
  • Managing Security And Distribution Groups – Part 2

Module 3: Managing Clients

  • Planning For Office Clients – Part 1
  • Planning For Office Clients – Part 2
  • Planning For Office Clients – Part 3
  • Managing User – Driver Client Deployments
  • IT Managed Deployments – Part 1
  • IT Managed Deployments – Part 2
  • IT Managed Deployments – Part 3
  • Office Telemetry And Reporting

Module 4: Planning DNS And Exchange Migrations

  • Working With Custom Domains – Part 1
  • Working With Custom Domains – Part 2
  • Working With Custom Domains – Part 3
  • Working With Custom Domains – Part 4
  • Planning To Migrate Mailboxes
  • Choosing A Migration Method – Part 1
  • Choosing A Migration Method – Part 2
  • Choosing A Migration Method – Part 3

Module 5: Planning And Configuring Exchange Online

  • Planning For Exchange Online – Part 1
  • Planning For Exchange Online – Part 2
  • Planning For Exchange Online – Part 3
  • Planning For Exchange Online – Part 4
  • Planning For Exchange Online – Part 5
  • Planning For Exchange Online – Part 6
  • Planning For Exchange Online – Part 7
  • Managing Recipients – Part 1
  • Managing Recipients – Part 2
  • Managing Recipients – Part 3
  • Managing Recipients – Part 4
  • Managing Anti-Malware And Anti-Spam
  • Managing Message Retention Recovery – Part 1
  • Managing Message Retention Recovery – Part 2

Module 6: Configuring Sharepoint Online

  • Managing Site Collections – Part 1
  • Managing Site Collections – Part 2
  • Configuring Sharing With External Users
  • Planning For Users Collaboration

Module 7: Configuring Lync Online

  • Plan For Lync Online
  • Configuring Lync Online Settings

Module 8: Implementing Coexistence Technologies

  • Implementing Directory Synchorization – Part 1
  • Implementing Directory Synchorization – Part 2
  • Implementing Directory Synchorization – Part 3
  • Implementing Organizational Federation
  • Course Outro

Module 1: Overview

  • Intro
  • Overview Of Advanced Solutions – Part 1
  • Overview Of Advanced Solutions – Part 2
  • Test Connectivity Demo
  • Web Based Outlook Demo – Part 1
  • Web Based Outlook Demo – Part 2

Module 2: Beginning Powershell

  • Beginning Powershell
  • New Mail Contact Demo
  • New Mail Contacts Powershell Demo

Module 3: Exhange Control Panel

  • Exchange Control Panel

Module 4: Create A New Mailbox with Powershell

  • Create A New Mailbox With Powershell
  • New Mailbox With Powershell Demo – Part 1
  • New Mailbox With Powershell Demo – Part 2

Module 5: Mailbox Statistics With Powershell

  • Mailbox Statistics With Powershell
  • Get Mailbox Statistics Demo

Module 6: Intermediate Powershell

  • Intermediate Powershell
  • Wrap Up Of Intermediate Powershell
  • Creating A New Accepted Domain Demo – Part 1
  • Creating A New Accepted Domain Demo – Part 2

Module 7: Unified Messaging

  • Unified Messaging – Part 1
  • Unified Messaging – Part 2
  • UM Dial Plan Demo
  • UM Dial Plan Powershell Demo

Module 8: Installation and Configuration

  • Installation And Configuration – Part 1
  • Installation And Configuration – Part 2
  • Build Exchange From Scratch Demo – Part 1
  • Build Exchange From Scratch Demo – Part 2
  • Build Exchange From Scratch Demo – Part 3
  • Build Exchange From Scratch Demo – Part 4
  • Build Exchange From Scratch Demo – Part 5
  • Build Exchange From Scratch Demo – Part 6
  • Confirming Installation Demo
  • Scheme Changes – Part 1
  • Scheme Changes – Part 2
  • Required Software For Exchange
  • Powershell Add Features – Part 1
  • Powershell Add Features – Part 2
  • Installation – Part 1
  • Installation – Part 2
  • Installation – Part 3

Module 9: Exchange Online

  • Exchange Online – Part 1
  • Exchange Online – Part 2
  • Exchange Online Demo

Module 10: Advanced Design

  • Advanced Design – Part 1
  • Advanced Design – Part 2
  • Advanced Design – Part 3
  • Deployment Assistant Demo
  • Ports And Protocols For Exchange Demo
  • Outro

Module 1: Overview

  • Introduction
  • Overview Of Exchanger Server 2013 – Part 1
  • Overview Of Exchanger Server 2013 – Part 2
  • Overview Of Exchanger Server 2013 – Part 3
  • Overview Of Exchanger Server 2013 – Part 4
  • Overview Of Exchanger Server 2013 – Part 5
  • Overview Of Exam – Part 1
  • Overview Of Exam – Part 2

Module 2: Exchange Server 2013 Administration

  • Exchange Server 2013 Administration – Part 1
  • Exchange Server 2013 Administration – Part 2
  • Exchange Server 2013 Administration – Part 3
  • Exchange Server 2013 Administration – Part 4
  • Exchange Server 2013 Administration – Demo 1
  • Exchange Server 2013 Administration – Demo 2
  • Exchange Server 2013 Administration – Demo 3

Module 3: Fundamentals of Exchange Administration

  • Fundamentals Of Exchange Administration – Part 1
  • Fundamentals Of Exchange Administration – Demo

Module 4: Archive Mailboxes

  • Archive Mailboxes – Part 1
  • Archive Mailboxes – Part 2
  • Archive Mailboxes – Part 3
  • Archive Mailboxes – Demo

Module 5: Properties of User Mailboxes

  • Properties Of User Mailboxes
  • Properties Of User Mailboxes – Demo

Module 6: Distribution Groups

  • Distribution Groups
  • Distribution Groups – Demo

Module 7: Outlook and Outlook Web Apps

  • Outlook And Outlook Web Apps – Part 1
  • Outlook And Outlook Web Apps – Part 2
  • Outlook And Outlook Web Apps – Demo

Module 8: Preparation Prerequisites

  • Preparation Prerequisites – Part 1
  • Preparation Prerequisites – Part 2
  • Preparation Prerequisites – Part 3
  • Preparation Prerequisites Demo – Part 1
  • Preparation Prerequisites Demo – Part 2
  • Preparation Prerequisites Demo – Part 3

Module 9: Installation of Exchange 2013

  • Installation Of Exchange 2013
  • Installation Of Exchange 2013 – Demo

Module 10: Exchange 2013 Design

  • Exchange 2013 Design – Part 1
  • Exchange 2013 Design – Part 2
  • Exchange 2013 Design – Part 3
  • Exchange 2013 Design Demo – Part 1
  • Exchange 2013 Design Demo – Part 2
  • Exchange 2013 Design Demo – Part 3
  • Exchange 2013 Design Demo – Part 4
  • Exchange 2013 Design Demo – Part 5
  • Exchange 2013 Design Demo – Part 6

Module 11: Labs and Demos

  • Building Home Lab (setup)
  • Creating A Win Server Virtual Machine
  • Signing On To Server
  • Configuration (Joining Domain)
  • Installing Domain Controller – Part 1
  • Installing Domain Controller – Part 2
  • Checking The Domain Controller
  • Setting Up DNS For Exchange
  • Schema Updates
  • Prerequisite For Exchange 2013
  • Installing Exchange
  • Confirmation Of Exchange
  • How Exchange Is Installed
  • Setting Up A Send Connector
  • Outro

Module 1: Handling Design And Architecture For Microsoft Lync Server 2013

  • Course And Instructor Introduction
  • Introduction To Lync Server 2013 Architecture – Part 1
  • Introduction To Lync Server 2013 Architecture – Part 2
  • Introduction To Lync Server 2013 Architecture – Part 3
  • Introduction To Lync Server 2013 Architecture – Part 4
  • Introduction To Lync Server 2013 Architecture – Part 5
  • Introduction To Lync Server 2013 Architecture – Part 6
  • Introduction To Lync Server 2013 Core Capabilites
  • Introduction To Lync Server 2013 Design Process
  • Evaluate Infrastructure Requirements And Update The Design
  • Plan For All Phases Of Microsoft Solutions Framework – Part 1
  • Plan For All Phases Of Microsoft Solutions Framework – Part 2
  • Plan For All Phases Of Microsoft Solutions Framework – Part 3
  • Module 1 Questions

Module 2: Designing A Lync Server 2013

  • Plan Infrastructure Requirements For Lync Server 2013 – Part 1
  • Plan Infrastructure Requirements For Lync Server 2013 – Part 2
  • Use The Lync Server 2013 Planning Tool
  • Use The Topology Builder – Part 1
  • Use The Topology Builder – Part 2
  • Plan The Server Infrastructure
  • Design Documentation With The Use Of Microsoft Office – Part 1
  • Design Documentation With The Use Of Microsoft Office – Part 2 And Module 2 Questions

Module 3: Installing Lync

  • Prepare For Installation
  • Install Lync – Part 1
  • Install Lync – Part 2
  • Module 4: Using Management Tools And RBAC
  • Using Management Tools – Part 1
  • Using Management Tools – Part 2
  • Using Management Tools – Part 3
  • Using Management Tools – Part 4
  • Using Management Tools – Part 5
  • Using Management Tools – Part 6
  • Introduction To Role-Based Access Control

Module 4 Questions

Module 5: Deploying And Managing Clients And Devices

  • Prepare For Client Deployment
  • Deploy And Manage Lync 2013 Clients
  • Prepare For Device Deployment And Module 5 Questions

Module 6: Conferencing In Lync Server 2013

  • Introduction To Conference In Lync Server 2013 – Part 1
  • Introduction To Conference In Lync Server 2013 – Part 2
  • Design For Web And Audio-Video Conferencing
  • Introduction To Dial-In Conferencing In Lync Server 2013
  • Manage And Administer Conferencing And Module 6 Questions

Module 7: Designing And Deploying External Access

  • Introduction To Lync 2013 External Capabilities – Part 1
  • Introduction To Lync 2013 External Capabilities – Part 2
  • Plan For IM And Presence Federation
  • Design Edge Requirements – Part 1
  • Design Edge Requirements – Part 2
  • Module 7 Questions

Module 8: Deploying Microsoft Lync Server 2013 Persistant Chat

  • Introduction To Persistent Chat Architecture And Design Considerations In Lync Server 2013
  • Deploy And Configure Lync Server 2013 Persistent Chat And Module 8 Questions

Module 9: Archiving And Monitoring

  • Introduction To The Archiving And Monitoring Services
  • Configure Archiving And Monitoring And Module 9 Questions

Module 10: Administering And Maintaining Lync Server 2013

  • Administering And Maintaining Lync Server 2013 – Part 1
  • Administering And Maintaining Lync Server 2013 – Part 2

Module 11: Configuring And Managing High Availability In Lync Server 2013

  • Introduction To High Availability In Lync Server 2013
  • Design Load Balancing – Part 1
  • Design Load Balancing – Part 2

Module 12: Understanding Disaster Recover In Lync Server 2013

  • Understanding Disaster Recover In Lync Server 2013 – Part 1
  • Understanding Disaster Recover In Lync Server 2013 – Part 2
  • Module 12 Real World Scenarios And Questions

Module 13: Planning a Migration to Lync Server 2013

  • Introduction To Coexistence And Migration – Part 1
  • Introduction To Coexistence And Migration – Part 2
  • Introduction To Coexistence And Migration – Part 3
  • Introduction To Migration Steps – Part 1
  • Introduction To Migration Steps – Part 2
  • Plan For Clients And Devices And Design Client Migration And Device Migration Strategy
  • Course Outro

Module 1: Understanding Voice Architecture

  • Course Introduction
  • Introduction To Architecture And Server Roles – Part 1
  • Introduction To Architecture And Server Roles – Part 2
  • Introduction To Architecture And Server Roles – Part 3
  • Introduction To Architecture And Server Roles – Part 4
  • Introduction To Architecture And Server Roles – Part 5

Module 2: Configuring Key Enterprise Voice Functionality

  • Introduction To Lync Voice Routing
  • Configure Enterprise Voice – Part 1
  • Configure Enterprise Voice – Part 2
  • Configure Enterprise Voice – Part 3
  • Define Voice Policies – Part 1
  • Define Voice Policies – Part 2

Module 3: Designing Exchange Server 2013 Unified Messaging Intergration with

  • Introduction To Exchange 2013 Unified Messaging – Part 1
  • Introduction To Exchange 2013 Unified Messaging – Part 2
  • Configure Exchange UM To Work With Lync 2013 – Part 1
  • Configure Exchange UM To Work With Lync 2013 – Part 2
  • Configure Exchange UM To Work With Lync 2013 – Part 3
  • Configure Exchange UM To Work With Lync 2013 – Part 4
  • Configuring Exchange And Lync Feature Integration – Part 1
  • Configuring Exchange And Lync Feature Integration – Part 2
  • Configuring Exchange And Lync Feature Integration – Part 3
  • Configuring Exchange And Lync Feature Integration – Part 4
  • Configuring Exchange And Lync Feature Integration – Part 5

Module 4: Understanding Voice Applications

  • Introduction To Response Group Services – Part 1
  • Introduction To Response Group Services – Part 2
  • Introduction To Response Group Services – Part 3
  • Introduction To Response Group Services – Part 4

Module 5: Configuring and Deploying Emergency Calling

  • Introduction To Location Information Server – Part 1
  • Introduction To Location Information Server – Part 2
  • Introduction To Set Up And Call Flow – Part 1
  • Introduction To Set Up And Call Flow – Part 2
  • E911 User Experience

Module 6: Integrating the PSTN

  • Connect To The PSTN – Part 1
  • Connect To The PSTN – Part 2
  • Connect To The PSTN – Part 3
  • Connect To The Existing PBX
  • Intro To M-N Interworking Routing
  • Introduction To Call Routing Reliability

Module 7: Understanding Lync Server 2013 and Networking

  • Plan For Media Requirements – Part 1
  • Plan For Media Requirements – Part 2
  • Plan For Call Admission Control – Part 1
  • Plan For Call Admission Control – Part 2
  • Introduction To Media Bypass

Module 8: Understanding Phones and Devices

  • Introduction To Phones And Devices Deploy Device – Part 1
  • Introduction To Phones And Devices Deploy Device – Part 2
  • Introduction To Phones And Devices Deploy Device – Part 3
  • Lync Server 2013 Phones Management – Part 1
  • Lync Server 2013 Phones Management – Part 2

Module 9: Configuring And Migrating Lync Online

  • Introduction To Office 365 Architecture
  • Deploy Lync Online
  • Introduction To Lyncy brid Scenerios

Module 10: Monitoring

  • Introduction To Voice Quality Concepts
  • Explore Lync Monitoring Server Components
  • Explore Lync Monitoring Server Reports

Module 11: Understanding Lync Server2013 Voice Resiliency

  • Introduction To Voice Resilience
  • Introduction Lync Pool Resilience
  • Introduction Branch Office Resilience
  • Course Outro

Module 1: Business Continuity

  • Course Intro
  • Intro to Plan Business Continuity Management – Part 1
  • Intro to Plan Business Continuity Management – Part 2
  • Describe High Availability
  • Degraded Availability
  • Qualifying Downtime
  • Qualifying Downtime Demo – Part 1
  • Qualifying Downtime Demo – Part 2
  • Qualifying Downtime Demo – Part 3
  • Qualifying Downtime Demo – Part 4
  • Qualifying Downtime Demo – Part 5
  • Qualifying Downtime Demo – Part 6
  • Disaster Recovery Plan (DRP) – Part 1
  • Disaster Recovery Plan (DRP) – Part 2
  • Measure Availability – Part 1
  • Measure Availability (Demo) – Part 2
  • Measure Availability – Part 3
  • Downtime Metrics – Part 1
  • Downtime Metrics – Part 2
  • Performance to Availability Relationship
  • Costs of HA
  • HA Supports in a Farm
  • Fault Tolerant in your HA Solution
  • Backup and Recovery in SharePoint 2013
  • Summary

Module 2: Model, Design, and Test

  • Intro
  • Plan for Success
  • Model – Part 1
  • Model – Part 2
  • Model – Part 3
  • Model – Part 4
  • Model – Part 5
  • Model – Part 6
  • Model – Part 7
  • Model – Part 8
  • Design – Part 1
  • Design – Part 2
  • Design – Part 3
  • Design – Part 4
  • Design – Part 5
  • Design – Part 6
  • Design – Part 7
  • Test – Part 1
  • Test – Part 2
  • Test – Part 3
  • Test – Part 4
  • Test – Part 5
  • Test – Part 6
  • Test – Part 7
  • Deploy
  • Monitor and Maintain

Module 3: Upgrade and Migrate

  • Intro to Upgrade and Migrate to SharePoint 2013
  • Upgrading to SharePoint 2013 – Part 1
  • Upgrading to SharePoint 2013 – Part 2
  • Upgrading to SharePoint 2013 – Part 3
  • Upgrading to SharePoint 2013 – Part 4
  • Upgrading to SharePoint 2013 – Part 5
  • Upgrading to SharePoint 2013 – Part 6
  • Upgrading to SharePoint 2013 – Part 7

Module 4: Create and Configure Service Applications

  • Intro to Create and Configure Service Applications
  • Create and Configure Service Applications
  • Create and Configure Service Applications Demo
  • Create and Configure Service Applications Summary

Module 5: SharePoint Management

  • Intro to Manage SharePoint Solution, BI, and System Integration
  • Manage SP Solutions, BI, and System Integration

Module 1: Comprehensive Introduction to Sharepoint

  • Course Intro
  • Social Media
  • Moblie Access
  • Business Intelligence – Part 1
  • Business Intelligence – Part 2
  • Sharepoint Licensing Overview
  • Organize Info
  • Share Your Insights
  • Minimal Download Strategy
  • Enhances Social and Collaboration Features
  • Enhanced Search
  • Workflow
  • Enterprise Content Management
  • Web Content Management

Module 2: Installing SharePoint

  • What We Will Cover – Part 1
  • What We Will Cover – Part 2
  • What We Will Cover – Part 3
  • What We Will Cover – Part 4
  • What We Will Cover – Part 5
  • What We Will Cover – Part 6
  • What We Will Cover – Part 7
  • What We Will Cover – Part 8
  • What We Will Cover – Part 9
  • Software Requirements
  • Service and Accounts

Module 3: SharePoint Architecture, Logical & Physical

  • Physical Architecture
  • Physical Architecture – Traditional Topologies
  • Physical Architecture – Streamlined Topologies
  • Physical Architecture – Search Architectures
  • Physical Architecture – Enterprise Search Architecture
  • Physical Architecture – Multi – Farm
  • Logical Architecture
  • Logical Architecture – Host Names Based Sites
  • Logical Architecture – Path – Based
  • Logical Architecture – Extranet
  • Logical Architecture – Mobile
  • Logical Architecture – Single Farm Deployment
  • Databasis
  • Summary

Module 4: Web Applications and Site Collections

  • Web Applications and Site Collections Intro
  • Logical Structure and Web Applications
  • Demo
  • Site Collections
  • Demo – Part 1
  • Demo – Part 2
  • Application Pools and Summary

Module 5: Configure Service Applications

  • Intro
  • Service Applications
  • Demo of Configuring Excel Services
  • Sharepoint Management Shell Demo
  • Summary

Module 6: Permissions

  • Intro
  • Site Permissions
  • Terms
  • Demo
  • Authentication Modes
  • O Auth
  • Summary

Module 7: Search

  • Intro
  • Intro to Search
  • Search Logical Architecture
  • Crawling the Content
  • Conent Processing
  • Analytics Processing Component
  • Summary

Module 8: User Profiles

  • Intro
  • User Profile Service
  • User Profile Demo
  • Profile Synchronization Goals
  • Profile Synchronization Demo
  • Sync Performance Changes
  • Sync Performance Changes Demo
  • Profile Import Options

Module 9: Ongoing Support and Maintenance

  • Intro
  • What To Look For

Module 1: Designing For The Cloud

  • Introduction
  • Designing The Cloud
  • Reason For Using The Cloud
  • Choosing The Right Cloud Model
  • Designing Private Clouds
  • Overview Of Virtualization Components
  • Windows Server 2012 R2 And Hyper-V
  • System Center 2012 R2 – Part 1
  • System Center 2012 R2 – Part 2
  • Deploying Highly Available Hyper-V Hosts

Module 2: Using System Center Virtual Machine Manager R2

  • Overview Of Virtual Machine – Part 1
  • Overview Of Virtual Machine – Part 2
  • Deploying VMM
  • Configuring Role Based Access Control
  • Managing Hosts
  • Configuring Networking – Part 1
  • Configuring Networking – Part 2
  • Configuring Storage

Module 3: Deploying And Maintaining Fabric Resources

  • Extending And Maintaining The Cloud Infrastructure
  • Deploying Hyper-V Host Servers – Part 1
  • Deploying Hyper-V Host Servers – Part 2
  • Providing Patch Management For Fabric Resources – Part 1
  • Providing Patch Management For Fabric Resources – Part 2

Module 4: Building The Private Cloud

  • Creating Building Blocks For The Private Cloud – Part 1
  • Creating Building Blocks For The Private Cloud – Part 2
  • Creating Virtual Machine Templates
  • Creating A Private Cloud
  • Creating And Deploying Applications – Part 1
  • Creating And Deploying Applications – Part 2
  • Creating And Deploying Applications – Part 3
  • Creating And Configuring Services – Part 1
  • Creating And Configuring Services – Part 2
  • Configuring Access To The Private Cloud

Module 5: Monitoring And Optimizing The Private Cloud

  • Overview Of Operations Manager
  • Installing Operations Manager
  • Deploying Monitoring Agents
  • Configuring Access To Operations Manager
  • Creating And Configuring Management Packs
  • Configuring System Center Integration
  • Extending And Optimizing Monitoring – Part 1
  • Extending And Optimizing Monitoring – Part 2

Module 6: Planning And Deploying Service Management

  • Overview Of Service Manager
  • Deploying Service Manager
  • Service Manager Work Items – Part 1
  • Service Manager Work Items – Part 2
  • Service Manager Work Items – Part 3
  • Service Manager Notifications
  • System Center Integration – Part 1
  • System Center Integration – Part 2

Module 7: Automating And Standardizing The Private Cloud

  • Overview Of Orchestrator
  • Deploying Automation Using Orchestrator
  • Configuring Integration Packs
  • Configuring And Managing Runbooks

Module 8: Disaster Recovery And High Availability For The Private Cloud

  • Overview Of Data Protection Manager
  • Planning For Data Protection Manager
  • Deploying Data Protection Manager
  • Configuring Protection For The Private Cloud
  • Configuring Protection For Applications – Part 1
  • Configuring Protection For Applications – Part 2
  • Hyper-V Recovery Manager

Module 9: Implementing Self­Service Multi­Tenant Private Clouds

  • Implementing The Cloud Services Process Pack – Part 1
  • Implementing The Cloud Services Process Pack – Part 2
  • Service Provider Foundation
  • Configuring The Windows Azure Pack
  • Conclusion

Module 1: Introducing The Cloud Model

  • Course And Instructor Introduction
  • Overview Of Cloud Computing
  • Dissecting Hybrid Cloud Environments
  • Requirements For Cloud Implementation
  • Using System Center To Operate The Cloud – Part 1
  • Using System Center To Operate The Cloud – Part 2
  • Using System Center To Operate The Cloud – Part 3
  • Ongoing Cloud Maintenance
  • System Center Component Integration
  • Verifying The Cloud Infrastructure Demo

Module 2: Configuring The Private Cloud Environment

  • Overview Of Virtual Machine Manager
  • Managing Virtual Environments
  • Creating Private Cloud
  • Configuring And Optimizing The Private Cloud

Module 3: Deploying Services For The Private Cloud

  • Understanding Service Templates
  • Configuring Profiles – Part 1
  • Configuring Profiles – Part 2
  • Using Web Deploy Packages
  • Configuring Server App-V
  • Using Data Tier Applications
  • Using App Controller To Deploy Services
  • Deploying Cloud Services Demo

Module 4: Monitoring Cloud Based Applications

  • Overview Of Operations Manager
  • Deploying Monitoring Agents
  • Customizing Monitoring Solutions
  • Monitoring The Network Infrastructure
  • Distributed Application Monitoring
  • Application Performance Monitoring – Part 1
  • Application Performance Monitoring – Part 2
  • Application Performance Monitoring – Part 3
  • Application Performance Monitoring – Part 4
  • Application Performance Monitoring – Part 5

Module 5: Service Management For The New Cloud

  • Configuring Service Manager – Part 1
  • Configuring Service Manager – Part 2
  • Configuring Service Manager – Part 3
  • Configuring Service Manager – Part 4
  • Automating Service Management – Part 1
  • Automating Service Management – Part 2
  • Automating Service Management – Part 3
  • Managing Incidents And Problems

Module 6: High Availability And Disaster Recovery For The Private Cloud

  • High Availability For The Private Cloud – Part 1
  • High Availability For The Private Cloud – Part 2
  • High Availability For The Private Cloud – Part 3
  • High Availability For The Private Cloud – Part 4
  • Protecting Data In The Private Cloud – Part 1
  • Protecting Data In The Private Cloud – Part 2
  • Recovering Data In The Private Cloud – Part 1
  • Recovering Data In The Private Cloud – Part 2

Module 7: Optimizing The Private Cloud Infrastructure

  • Applying Infrastructure Updates
  • Applying Updates To Virtual Machines
  • Extending The Private Cloud Infrastructure
  • Optimizing The Cloud Infrastructure With System Center Advisor
  • Using PRO-Tips To Optimize The Cloud

Module 8: Configuring Multi­Tenant Self­Service Using Windows Azure Pack

  • Understanding Windows Azure Pack
  • Windows Azure Pack Administration
  • Windows Azure Pack Providers

Module 9: Configuring And Monitoring The Private Cloud Review

  • Configuring And Monitoring The Private Cloud Review
  • Conclusion

Module 1: Planning Configuration Manager Infrastructure

  • Intro
  • Planning Configuration Manager Infrastructure – Part 1
  • Planning Configuration Manager Infrastructure – Part 2
  • Planning Configuration Manager Infrastructure – Part 3
  • Planning Configuration Manager Infrastructure – Part 4
  • Planning Configuration Manager Infrastructure – Part 5

Module 2: Migrating To Configuration Manager 2012

  • Migrating To Configuration Manager 2012

Module 3: Installations and Site Role Configuration

  • Installation And Site Role Configuration – Part 1
  • Installation And Site Role Configuration – Part 2
  • Installation And Site Role Configuration – Lab 1
  • Installation And Site Role Configuration – Lab 2

Module 4: Cloud Integration

  • Cloud Integration

Module 5: Installing The Client

  • Installing The Client – Part 1
  • Installing The Client – Part 2
  • Installing The Client – Part 3
  • Installing The Client Lab

Module 6: Client Health

  • Client Health

Module 7: Application Deployment

  • Application Deployment
  • Application Deployment Lab

Module 8: Software Updates

  • Software Updates – Part 1
  • Software Updates – Part 2
  • Software Updates Lab

Module 9: Operating System Deployment

  • Operating System Deployment – Part 1
  • Operating System Deployment – Part 2
  • Operating System Deployment – Part 3

Module 10: Inventory and Software Metering

  • Inventory And Software Metering
  • Inventory And Software Metering Lab

Module 11: Asset Intelligence

  • Asset Intelligence

Module 12: Reporting

  • Reporting
  • Reporting Lab

Module 13: Compliance Settings

  • Compliance Settings

Module 14: Endpoint Protection

  • Endpoint Protection

Module 15: Mobile Device Management

  • Mobile Device Management – Part 1
  • Mobile Device Management – Part 2

Module 16: Role-Based Administration

  • Role Based Administration

Module 17: Disaster Recovery

  • Disaster Recovery

Module 18: Troubleshooting

  • Troubleshooting
  • Outro

Module 1: Getting Started With Windows 10

  • Introduction
  • First Steps
  • Navigating The Desktop
  • Using Cortana To Search

Module 2: Using File Explorer

  • File Explorer
  • Understanding File And Folder Basics
  • Work With Libraries
  • Creating A Home Group

Module 3: Using Windows Applications

  • Opening And Using Applications
  • Installing New Applications From The Windows Store
  • Using Default Applications

Module 4: Browsing the Web With Microsoft Edge

  • Examining The Edge Window
  • Searching The Web With Edge
  • Bookmarking Important Sites
  • Using The Reading List
  • Marking A Page With Web Notes
  • Conclusion

Module 5: Customizing Windows

  • Introduction
  • Customizing The Display
  • Customizing File Explorer
  • Configuring Cortanas Notebook Feature
  • Customizing Privacy Settings
  • Customizing Microsoft Edge

Module 6: Connecting Devices And Devices

  • Connecting Printers
  • Connecting And Using A Flash Drive
  • Connect A Phone

Module 7: Managing User Accounts

  • Create Additional Users
  • Understanding User Profiles
  • Sharing Data Between Profiles

Module 8: Backing Up Important Data

  • Using File History
  • Using Windows Backup
  • Using System Restore

Module 9: Maintaining Windows

  • Windows Updates
  • Working With The Action Center
  • Using Disk Defragmenter
  • Managing Storage And Apps Using Settings
  • Conclusion

Module 10: Protecting Windows

  • Introduction
  • Using Windows Defender
  • Using Windows Firewall
  • Using Bit Locker
  • Windows Hello

Module 11: Monitoring Performance

  • Using Task Manager
  • Using Resource Monitor

Module 12: Working With Control Panel And Settings

  • Control Panel Part 1
  • Control Panel Part 2
  • Settings App
  • Using Device Manager
  • Using Remote Desktop
  • Conclusion

Module 1: Introduction and Deploy Windows

  • 1.1 Instructor and Course Introduction
  • 1.2 Exam Overview
  • 1.3 Deploy Windows Intro
  • 1.4 Deploy Windows 10
  • 1.5 Deploy Windows 10 Pt 2
  • 1.6 Preparing Virtual Lab Setup for the Client 1
  • 1.7 Installation of Windows 10 Enterprise
  • 1.8 Troubleshooting Failed Installations with Setup Logs
  • 1.9 Configuring Locales
  • 1.10 Perform Post-Installation Configuration
  • 1.11 Navigating Microsoft Edge
  • 1.12 Modifying Microsoft Edge Settings
  • 1.13 Customizing Your Computer Setting

Module 2: Manage Devices and Data

  • 2.1 Manage devices and data intro
  • 2.2 Manage local users, groups, and devices
  • 2.3 Configure data access and protection
  • 2.4 Adding and accessing local users and groups
  • 2.5 Managing NTFS permissions in Windows 10
  • 2.6 Configure devices by using local policies
  • 2.7 Configuring Audit Policies on Windows 10
  • 2.8 Manage Windows security
  • 2.9 How to change user account settings

Module 3: Configure Connectivity

  • 3.1 Configure connectivity intro
  • 3.2 Configure networking
  • 3.3 Configuring network adapter advanced properties
  • 3.4 Configuring a static TCP/IP address
  • 3.5 Viewing the networking connection details
  • 3.6 Setting up a VPN connection
  • 3.7 Configure remote connectivity
  • 3.8 Configure remote management

Module 4: Maintain Windows

      • 4.1 Maintain Windows intro
      • 4.2 Configure system and data recovery
      • 4.3 Backing up files in Windows 10
      • 4.4 Using the recycle bin
      • 4.5 Manage updates
      • 4.6 Check for updates in Windows 10
      • 4.7 Configuring hardware in Windows 10
      • 4.8 Monitor and manage Windows
      • 4.9 Configuring Windows 20 desktop options
      • 4.10 Installing new features
Module 1: Introduction and Deploy Windows

  • 1.1 Instructor and Course Introduction
  • 1.2 Exam Overview
  • 1.3 Deploy Windows Intro
  • 1.4 Deploy Windows 10
  • 1.5 Deploy Windows 10 Pt 2
  • 1.6 Preparing Virtual Lab Setup for the Client 1
  • 1.7 Installation of Windows 10 Enterprise
  • 1.8 Troubleshooting Failed Installations with Setup Logs
  • 1.9 Configuring Locales
  • 1.10 Perform Post-Installation Configuration
  • 1.11 Navigating Microsoft Edge
  • 1.12 Modifying Microsoft Edge Settings
  • 1.13 Customizing Your Computer Setting

Module 2: Manage Devices and Data

  • 2.1 Manage devices and data intro
  • 2.2 Manage local users, groups, and devices
  • 2.3 Configure data access and protection
  • 2.4 Adding and accessing local users and groups
  • 2.5 Managing NTFS permissions in Windows 10
  • 2.6 Configure devices by using local policies
  • 2.7 Configuring Audit Policies on Windows 10
  • 2.8 Manage Windows security
  • 2.9 How to change user account settings

Module 3: Configure Connectivity

  • 3.1 Configure connectivity intro
  • 3.2 Configure networking
  • 3.3 Configuring network adapter advanced properties
  • 3.4 Configuring a static TCP/IP address
  • 3.5 Viewing the networking connection details
  • 3.6 Setting up a VPN connection
  • 3.7 Configure remote connectivity
  • 3.8 Configure remote management

Module 4: Maintain Windows

  • 4.1 Maintain Windows intro
  • 4.2 Configure system and data recovery
  • 4.3 Backing up files in Windows 10
  • 4.4 Using the recycle bin
  • 4.5 Manage updates
  • 4.6 Check for updates in Windows 10
  • 4.7 Configuring hardware in Windows 10
  • 4.8 Monitor and manage Windows
  • 4.9 Configuring Windows 20 desktop options
  • 4.10 Installing new features

Lesson 1: Getting to Know PCs and the Windows 8 User Interface

  • Introduction
  • Identify Components of a Personal Computer
  • Sign in to Windows 8
  • Navigate the Desktop

Lesson 2: Using the Modern Apps and Navigation Features

  • Using the Modern Apps and Navigation Features

Lesson 3: Working with Desktop Applications

  • Navigate the Desktop

Lesson 4: Using Internet Explorer 10

  • Navigate Internet Explorer 10

Lesson 5: Customizing the Windows 8 Environment

  • Multitasking With Apps
  • Use the Control Panel and Task Manager-Part1
  • Use the Control Panel and Task Manager-Part2

Lesson 6: Using Windows 8 Security Features

  • Customizing the Windows 8 Environment
  • Security Features
  • Using Other Windows 8 Features-Part1
  • Using Other Windows 8 Features-Part2
  • Using Other Windows 8 Features-Part3

Module 1: Exploring the Functions of Networking

  • Course Introduction
  • Instructor Introduction
  • Exploring the Functions of Networking Pt 1
  • Exploring the Functions of Networking Pt 2

Module 2: Introducing the Host-To-Host Communications Model

  • Introducing the Host-To-Host Communications Model Pt 1
  • Introducing the Host-To-Host Communications Model Pt 2

Module 3: Introducing LANs

  • Introducing LANs
  • Get Started with CLI Demo Pt 1
  • Get Started with CLI Pt Demo 2
  • Adding Descriptions to Interfaces Demo
  • Configure Gateway on a Switch Demo
  • Visualize Interfaces and Statistics Demo
  • Show Version Command Demo
  • CDP Demo

Module 4: Exploring the TCP/IP Link Layer

  • Exploring the TCP-IP Link Layer Pt 1
  • Exploring the TCP-IP Link Layer Pt 2

Module 5: Subnetting

  • Subnetting Pt 1
  • Subnetting Pt 2
  • Subnetting Pt 3
  • Subnetting Pt 4
  • Subnetting Pt 5
  • Subnetting Pt 6

Module 6: Explaining the TCP/IP Transport Layer and Application Layer

  • Explaining the TCP-IP Transport Layer and Application Layer Pt 1
  • Explaining the TCP-IP Transport Layer and Application Layer Pt 2
  • Explaining the TCP-IP Transport Layer and Application Layer Pt 3

Module 7: Exploring the Functions of Routing

  • Exploring the Functions of Routing Pt 1
  • Exploring the Functions of Routing Pt 2
  • Exploring the Functions of Routing Pt 3
  • Configuring RIP Demo
  • EIGRP Demo Pt 1
  • EIGRP Demo Pt 2

Module 8: Exploring the Packet Delivery Process

  • Exploring the Packet Delivery Process

Module 9: Troubleshooting a Simple Network

  • Troubleshooting a Simple Network

Module 10: Introducing Basic IPv6

  • Introducing Basic IPv6 Pt 1
  • Introducing Basic IPv6 Pt 2
  • Introducing Basic IPv6 Pt 3
  • Introducing Basic IPv6 Pt 4
  • Introducing Basic IPv6 Pt 5
  • Introducing Basic IPv6 Pt 6
  • Introducing Basic IPv6 Pt 7
  • Introducing Basic IPv6 Pt 8
  • IPV6 Basic Configuration and SLAAC Demo Pt 1
  • IPV6 Basic Configuration and SLAAC Demo Pt 2
  • IPV6 Routing Demo Pt 1
  • IPV6 Routing Demo Pt 2
  • IPV6 Static Routes Demo

Module 11: Configuring Static Routing

  • Configuring Static Routing
  • Static Routes Demo

Module 12: Implementing VLANs and Trunks

  • Implementing VLANs and Trunks Pt 1
  • Implementing VLANs and Trunks Pt 2
  • Implementing VLANs and Trunks Pt 3
  • Implementing VLANs and Trunks Pt 4
  • Spanning-tree Protocol Demo Pt 1
  • Spanning-tree Protocol Demo Pt 2
  • Spanning-tree Protocol Demo Pt 3

Module 13: Routing Between VLANs

  • Routing Between VLANs
  • Inter VLAN Routing Demo

Module 14: Introducing OSPF

  • Introducing OSPF Pt 1
  • Introducing OSPF Pt 2
  • Introducing OSPF Pt 3
  • Introducing OSPF Pt 4
  • OSPF Single Area Demo Pt 1
  • OSPF Single Area Demo Pt 2
  • OSPF Multiple Area Demo Pt 1
  • OSPF Multiple Area Demo Pt 2

Module 15: Building Redundant Switched Topologies

  • Building Redundant Switched Topologies Pt 1
  • Building Redundant Switched Topologies Pt 2

Module 16: Improving Redundant Switched Topologies with EtherChannel

  • Improving Redundant Switched Topologies with Ether Channel Pt 1
  • Improving Redundant Switched Topologies with Ether Channel Pt 2
  • Configuring Ether Channel Demo

Module 17: Exploring Layer 3 Redundancy

  • Exploring Layer 3 Redundancy

Module 18: Introducing WAN Technologies

  • Introducing WAN Technologies Pt 1
  • Introducing WAN Technologies Pt 2
  • Introducing WAN Technologies Pt 3
  • Introducing WAN Technologies Pt 4
  • Introducing WAN Technologies Pt 5
  • Introducing WAN Technologies Pt 6

Module 19: Explaining Basics of ACL

  • Explaining Basics of ACL Pt 1
  • Explaining Basics of ACL Pt 2
  • Explaining Basics of ACL Pt 3

Module 20: Enabling Internet Connectivity

  • Enabling Internet Connectivity
  • DHCP Demo
  • Static NAT Demo
  • PAT Using Specific IP Demo
  • PAT Using IP of Interface Demo

Module 21: Introducing QoS

  • Introducing QoS Pt 1
  • Introducing QoS Pt 2
  • Introducing QoS Pt 3
  • Introducing QoS Pt 4
  • Introducing QoS Pt 5

Module 22: Introducing Architectures and Virtualization

  • Introducing Architectures and Virtualization Pt 1
  • Introducing Architectures and Virtualization Pt 2
  • Introducing Architectures and Virtualization Pt 3
  • Introducing Architectures and Virtualization Pt 4

Module 23: Introducing System Monitoring

  • Introducing System Monitoring Pt 1
  • Introducing System Monitoring Pt 2
  • Introducing System Monitoring Pt 3

Module 24: Managing Cisco Devices

  • Managing Cisco Devices Pt 1
  • Managing Cisco Devices Pt 2
  • NTP Demo
  • Syslog Demo

Module 25: Examining the Security Threat Landscape

  • Examining the Security Threat Landscape Pt 1
  • Examining the Security Threat Landscape Pt 2

Module 26: Implementing Threat Defense Technologies

  • Implementing Threat Defense Technologies Pt 1
  • Implementing Threat Defense Technologies Pt 2
  • Implementing Threat Defense Technologies Pt 3
  • Implementing Threat Defense Technologies Pt 4
  • Implementing Threat Defense Technologies Pt 5
  • Authentication Protocols Demo Pt 1
  • Authentication Protocols Demo Pt 2
  • Device Hardening Demo Pt 1
  • Device Hardening Demo Pt 2
  • Device Hardening Demo Pt 3
  • Port Security Demo

Module 27: Exam Preparation

  • Exam Prep Tips

Module 28: Practice Demos

  • Get Started with CLI Demo Pt 1
  • Get Started with CLI Pt Demo 2
  • Adding Descriptions to Interfaces Demo
  • Configure Gateway on a Switch Demo
  • Visualize Interfaces and Statistics Demo
  • Show Version Command Demo
  • CDP Demo
  • Static Routes Demo
  • DHCP Demo
  • Static NAT Demo
  • PAT Using Specific IP Demo
  • PAT Using IP of Interface Demo
  • Configuring RIP Demo
  • Configuring Ether Channel Demo
  • Inter VLAN Routing Demo
  • Spanning-tree Protocol Demo Pt 1
  • Spanning-tree Protocol Demo Pt 2
  • Spanning-tree Protocol Demo Pt 3
  • EIGRP Demo Pt 1
  • EIGRP Demo Pt 2
  • Authentication Protocols Demo Pt 1
  • Authentication Protocols Demo Pt 2
  • NTP Demo
  • Syslog Demo
  • Device Hardening Demo Pt 1
  • Device Hardening Demo Pt 2
  • Device Hardening Demo Pt 3
  • Port Security Demo
  • OSPF Single Area Demo Pt 1
  • OSPF Single Area Demo Pt 2
  • OSPF Multiple Area Demo Pt 1
  • OSPF Multiple Area Demo Pt 2
  • IPV6 Basic Configuration and SLAAC Demo Pt 1
  • IPV6 Basic Configuration and SLAAC Demo Pt 2
  • IPV6 Routing Demo Pt 1
  • IPV6 Routing Demo Pt 2
  • IPV6 Static Routes Demo

Module 1: Architecture

  • 1.1 About Your Instructor
  • 1.2 Course Introduction
  • 1.3 Welcome to the Architecture Domain
  • 1.4 Classic 3 and 2 Tier Models
  • 1.5 2 Tier Spine Leaf
  • 1.6 Fabric Capacity Planning
  • 1.7 High Availability
  • 1.8 Designing a WLAN Deployment
  • 1.9 Cloud vs On-Prem
  • 1.10 The Cisco SD-WAN
  • 1.11 Cisco SD-Access
  • 1.12 QoS
  • 1.13 Hardware vs Software Switching

Module 2: Virtualization

  • 2.1 Welcome to the Virtualization Domain
  • 2.2 Device Virtualization Technologies
  • 2.3 Data Path Virtualization
  • 2.4 Network Virtualization Concepts

Module 3: Infrastructure

  • 3.1 Welcome to the Infrastructure Domain
  • 3.2 Trunking – VTP – EtherChannel
  • 3.3 RSTP and MST
  • 3.4 EIGRP vs OSPF
  • 3.4 OSPF
  • 3.5 eBGP
  • 3.6 eBGP Part 2
  • 3.7 WLANs
  • 3.8 NTP NAT PAT
  • 3.9 HSRP VRRP GLBP
  • 3.10 Multicast

Module 4: Network Assurance

  • 4.1 Welcome to the Network Assurance Module
  • 4.2 Diagnose Network Issues
  • 4.3 NetFlow
  • 4.4 SPAN
  • 4.5 IP SLA
  • 4.6 DNA Center

Module 5: Security

  • 5.1 Welcome to the Security Module
  • 5.2 Device Access Control
  • 5.3 ACLs and CoPP
  • 5.4 Wireless Security
  • 5.5 Components in Security Design

Module 6: Automation

  • 6.1 Welcome to the Automation Module
  • 6.2 Python
  • 6.3 JSON
  • 6.4 YANG
  • 6.5 NETCONF-RESTCONF
  • 6.6 APIs
  • 6.7 EEM
  • 6.8 Orchestration Tools

Module 1: Networking Fundamentals

  • Introduction
  • Introduction To TCPIP Networking- Part 1
  • Introduction To TCPIP Networking- Part 2
  • Introduction To TCPIP Networking- Part 3
  • Introduction To TCPIP Networking- Part 4
  • Ethernet LAN Fundamentals- Part 1
  • Ethernet LAN Fundamentals- Part 2
  • Ethernet LAN Fundamentals- Part 3
  • Wide Area Networks- Part 1
  • Wide Area Networks- Part 2
  • IPv4 Addressing And Routing Fundamentals- Part 1
  • IPv4 Addressing And Routing Fundamentals- Part 2
  • IPv4 Addressing And Routing Fundamentals- Part 3
  • TCPIP Transport And Applications- Part 1
  • TCPIP Transport And Applications- Part 2

Module 2: Basic Ethernet LAN Implementation

  • Command Line Essentials- Part 1
  • Command Line Essentials- Part 2
  • Command Line Essentials- Part 3
  • Ethernet LAN Switching
  • Managing Ethernet Switches- Part 1
  • Managing Ethernet Switches- Part 2
  • Configuring Switch Interfaces

Module 3: Designing Ethernet LANS

  • Understanding LAN Design Options- Part 1
  • Understanding LAN Design Options- Part 2
  • Understanding LAN Design Options- Part 3
  • Implementing And Configuring Ethernet VLANS- Part 1
  • Implementing And Configuring Ethernet VLANS- Part 2

Module 4: Understanding IPv4

  • IPv4 Subnetting- Part 1
  • IPv4 Subnetting- Part 2
  • IPv4 Subnetting- Part 3
  • IPv4 Subnetting- Part 4
  • Analyzing Classful IPv4 Networks- Part 1
  • Analyzing Classful IPv4 Networks- Part 2
  • Analyzing Classful IPv4 Networks- Part 3
  • Analyzing Subnet Masks- Part 1
  • Analyzing Subnet Masks- Part 2
  • Analyzing Existing Subnets

Module 5: Working With Cisco Routers

  • Implementing IPv4- Part 1
  • Implementing IPv4- Part 2
  • Configuring IPv4 Address And Static Routes- Part 1
  • Configuring IPv4 Address And Static Routes- Part 2
  • Configuring IPv4 Address And Static Routes- Part 3
  • Using Dynamic Routing Protocols- Part 1
  • Using Dynamic Routing Protocols- Part 2
  • Configuring IPv4 Hosts- Part 1
  • Configuring IPv4 Hosts- Part 2

Module 6: IPv4 Design And Troubleshooting

  • Designing IP Subnets- Part 1
  • Designing IP Subnets- Part 2
  • Using VLAN- Part 1
  • Using VLAN- Part 2
  • Troubleshooting IPv4

Module 7: IPv4 Services

  • Access Control Lists- Part 1
  • Access Control Lists- Part 2
  • Access Control Lists- Part 3
  • Access Control Lists- Part 4
  • Network Address Translation- Part 1
  • Network Address Translation- Part 2

Module 8: Implementing IPv6

  • IPv6 Fundamentals- Part 1
  • IPv6 Fundamentals- Part 2
  • IPv6 Fundamentals- Part 3
  • IPv6 Fundamentals- Part 4
  • IPv6 Addressing And Subnetting- Part 1
  • IPv6 Addressing And Subnetting- Part 2
  • Implementing IPv6- Part 1
  • Implementing IPv6- Part 2
  • Implementing IPv6- Part 3
  • Implementing IPv6- Part 4
  • Course Conclusion

Module 1: Configuring Ethernet LANs

  • Introduction
  • Ethernet LAN Fundamentals- Part 1
  • Ethernet LAN Fundamentals- Part 2
  • Implementing Virtual LANs- Part 1
  • Implementing Virtual LANs- Part 2
  • Using VLAN Trunking- Part 1
  • Using VLAN Trunking- Part 2
  • Understanding Spanning Tree Protocol- Part 1
  • Understanding Spanning Tree Protocol- Part 2
  • Understanding Spanning Tree Protocol- Part 3
  • Spanning Tree Implementation- Part 1
  • Spanning Tree Implementation- Part 2
  • Spanning Tree Implementation- Part 3
  • Security Management- Part 1
  • Security Management- Part 2
  • Security Management- Part 3
  • Security Management- Part 4

Module 2: Configuring IPv4 Routing Protocols

  • Understanding OSPF- Part 1
  • Understanding OSPF- Part 2
  • Understanding OSPF- Part 3
  • Implementing OSPF- Part 1
  • Implementing OSPF- Part 2
  • Implementing OSPF- Part 3
  • Implementing OSPF- Part 4
  • Understanding EIGRP- Part 1
  • Understanding EIGRP- Part 2
  • Understanding EIGRP- Part 3
  • Implementing EIGRP- Part 1
  • Implementing EIGRP- Part 2
  • Troubleshooting IPv4- Part 1
  • Troubleshooting IPv4- Part 2
  • Troubleshooting IPv4- Part 3

Module 3: Wide Area Networks

  • Implementing Point-To-Point WANs- Part 1
  • Implementing Point-To-Point WANs- Part 2
  • Implementing Point-To-Point WANs- Part 3
  • Private WANs With Ethernet And MPLS- Part 1
  • Private WANs With Ethernet And MPLS- Part 2
  • Private WANs With Ethernet And MPLS- Part 3
  • Private WANs With Internet VPNs- Part 1
  • Private WANs With Internet VPNs- Part 2
  • Private WANs With Internet VPNs- Part 3

Module 4: IPv4 Services

  • Basic Access Control Lists- Part 1
  • Basic Access Control Lists- Part 2
  • Advanced Access Control Lists- Part 1
  • Advanced Access Control Lists- Part 2
  • Quality Of Service- Part 1
  • Quality Of Service- Part 2

Module 5: IPv4 Routing And Troubleshooting

  • IPv4 Routing In The LAN- Part 1
  • IPv4 Routing In The LAN- Part 2
  • Implementing HSRP- Part 1
  • Implementing HSRP- Part 2
  • Troubleshooting IPv4 Routing- Part 1
  • Troubleshooting IPv4 Routing- Part 2

Module 6: IPv6 Routing

  • IPv6 Implementation And Routing Basics- Part 1
  • IPv6 Implementation And Routing Basics- Part 2
  • IPv6 Implementation And Routing Basics- Part 3
  • IPv6 Implementation And Routing Basics- Part 4
  • Implementing OSPF For IPv6- Part 1
  • Implementing OSPF For IPv6- Part 2
  • Implementing EIGRP For IPv6- Part 1
  • Implementing EIGRP For IPv6- Part 2
  • IPv6 Access Control Lists- Part 1
  • IPv6 Access Control Lists- Part 2

Module 7: Cloud Based Networking

  • Overview Of Cloud Computing- Part 1
  • Overview Of Cloud Computing- Part 2
  • Conclusion

Module 1: Wireless Basics

  • Course And Instructor Introduction
  • Wireless Basics Part 1
  • Wireless Basics Part 2
  • Wireless Basics Part 3
  • Wireless Basics Part 4
  • Wireless Basics Part 5
  • Wireless Basics Part 6

Module 2: Wireless Standards

  • Wireless Standards Part 1
  • Wireless Standards Part 2
  • Wireless Standards Part 3
  • Wireless Standards Part 4
  • Wireless Standards Part 5

Module 3: Wireless Signals

  • Wireless Signals Part 1
  • Wireless Signals Part 2

Module 4: Antennas

  • Antennas Part 1
  • Antennas Part 2
  • Antennas Part 3

Module 5: Topologies

  • Topologies Part 1
  • Topologies Part 2

Module 6: Frame Types

  • Frame Types Part 1
  • Frame Types Part 2
  • Frame Types Part 3

Module 7: Planning Coverage

  • Planning Coverage Part 1
  • Planning Coverage Part 2
  • Planning Coverage Part 3

Module 8: Architectures

  • Architectures Part 1
  • Architectures Part 2
  • Architectures Part 3

Module 9: Stand Alone And Cloud Deployments

  • Stand Alone And Cloud Deployments Part 1
  • Stand Alone And Cloud Deployments Part 2

Module 10: Controller Based Deployment

  • Controller Based Deployment Part 1
  • Controller Based Deployment Part 2
  • Controller Based Deployment Part 3

Module 11: Controller Discovery

  • Controller Discovery Part 1
  • Controller Discovery Part 2
  • Controller Discovery Part 3

Module 12: Roaming

  • Roaming Part 1
  • Roaming Part 2

Module 13: Radio Resource Management

  • Radio Resource Management Part 1
  • Radio Resource Management Part 2
  • Radio Resource Management Part 3

Module 14: Wireless Security

  • Wireless Security Part 1
  • Wireless Security Part 2
  • Wireless Security Part 3

Module 15: WLAN Configuration

  • WLAN Configuration

Module 16: Guest Networks

  • Guest Networks

Module 17: Client Connectivity

  • Client Connectivity Part 1
  • Client Connectivity Part 2

Module 18: Managing Wireless

  • Managing Wireless Part 1
  • Managing Wireless Part 2

Module 19: Interference

  • Interference Part 1
  • Interference Part 2

Module 20: Troubleshooting

  • Troubleshooting Part 1
  • Troubleshooting Part 2
  • Course Conclusion

Module 1: Introducing Cisco Collaboration Architecture

  • Course Introduction
  • Introducing Cisco Collaboration Architecture Part 1
  • Introducing Cisco Collaboration Architecture Part 2
  • Small To Mid-Size Business Part 1
  • Small To Mid-Size Business Part 2
  • Small To Mid-Size Business Part 3
  • Cisco Unified Communications Manager Part 1
  • Cisco Unified Communications Manager Part 2
  • Cisco Unified Communications Manager Part 3
  • Cisco Unified Connection
  • Lab Introduction

Module 2: Telephony And Call Routing

  • Telephony 101 Part 1
  • Telephony 101 Part 2
  • Telephony 101 Part 3
  • Telephony 101 Part 4
  • Telephony 101 Part 5
  • Telephony 101 Part 6
  • Call Routing 101 Part 1
  • Call Routing 101 Part 2
  • VoIP Call Routing 101
  • Call Routing With DNS
  • Deployment Scenarios Part 1
  • Deployment Scenarios Part 2
  • Deployment Scenarios Part 3
  • Gateway Call Routing Basics Part 1
  • Gateway Call Routing Basics Part 2
  • Gateway Call Routing Basics Part 3
  • Gateway Call Routing Basics Part 4
  • Configuring The Gateway Lab Part 1
  • Configuring The Gateway Lab Part 2

Module 3: Preparing The Network And Phone Behavior

  • Preparing The Network For Voices Part 1
  • Preparing The Network For Voices Part 2
  • IP Phone Behavior
  • Configuring The LAN Lab
  • Standing Up The Platform Lab
  • Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 1
  • Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 2
  • Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 3
  • Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 4
  • Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 5
  • Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 6
  • Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 7
  • Using OVA Templates To Deploy Prime Collaboration Provisioning Lab Part 1
  • Using OVA Templates To Deploy Prime Collaboration Provisioning Lab Part 2

Module 4: CUCM Administration Interfaces

  • CUCM Administration Interfaces Part 1
  • CUCM Administration Interfaces Part 2
  • CUCM Stand Up
  • CUCM Stand Up Lab
  • End User Interfaces
  • End User Configuration Lab
  • AD Integration Lab
  • End Point Implementation Part 1
  • End Point Implementation Part 2
  • IMP Integration Lab
  • CUC Integration Lab Part 1
  • CUC Integration Lab Part 2
  • IP Communicator Lab
  • Profiles And Templates Lab
  • CUCME Phone Configuration
  • Configuring CUCME Lab Part 1
  • Configuring CUCME Lab Part 2
  • CUCM End-User Portal Lab
  • Configuring CUCM Phones From Scratch
  • Configuring Cisco SX20 Codec Part 1
  • Configuring Cisco SX20 Codec Part 2

Module 5: Call Configuration

  • Advanced Call Coverage Part 1
  • Advanced Call Coverage Part 2
  • Advanced Call Coverage Part 3
  • Call Coverage Lab Part 1
  • Call Coverage Lab Part 2
  • Call Coverage Lab Part 3
  • Call Coverage Lab Part 4
  • Call Coverage Lab Part 5
  • Calling Constrictions And COS Part 1
  • Calling Constrictions And COS Part 2
  • Implementing Class Of Control Lab Part 1
  • Implementing Class Of Control Lab Part 2
  • Connecting To The PSTN Part 1
  • Configuring Voice Gateway Features Lab Part 1
  • Configuring Voice Gateway Features Lab Part 2
  • Configuring Voice Gateway Features Lab Part 3
  • Connecting To The PSTN Part 2
  • PSTN Calling And Digit Manipulation Lab Part 1
  • PSTN Calling And Digit Manipulation Lab Part 2
  • PSTN Dial Plan Configuration Lab Part 1
  • PSTN Dial Plan Configuration Lab Part 2
  • Course Conclusion

Module 1: Pre-Course Chapter 1

  • Course Introduction
  • Civnd Intro Part 1
  • Civnd Intro Part 2
  • The Big Picture

Module 2: Pre-Course Chapter 2

  • All About Video Part 1
  • All About Video Part 2
  • All About Video Part 3
  • All About Video Part 4

Module 3: Cisco Video And Content Delivery

  • Cisco Video And Content Delivery Part 1
  • Cisco Video And Content Delivery Part 2
  • Cisco Video And Content Delivery Part 3

Module 4: Cisco Video Surveillance

  • Cisco Video Surveillance Part 1
  • Cisco Video Surveillance Part 2

Module 5: Cisco Collaboration

  • Cisco Collaboration Part 1
  • Cisco Collaboration Part 2
  • Cisco Collaboration Part 3

Module 6: Central Collaboration Endpoint Control

  • Central Collaboration Endpoint Control

Module 7: Unified IP Phones, Desk Endpoints And Cisco Jabber

  • Unified IP Phones Desk Endpoints And Cisco Jabber

Module 8: Configuring Unified IP Phones And Cisco Jabber

  • Configuring Unified IP Phones And Cisco Jabber Part 1
  • Configuring Unified IP Phones And Cisco Jabber Part 2

Module 9: Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber

  • Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber Part 1
  • Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber Part 2
  • Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber Part 3

Module 10: Cisco Telepresence Endpoints Installation And Characteristics

  • Cisco Telepresence Endpoints Installation And Characteristics Part 1
  • Cisco Telepresence Endpoints Installation And Characteristics Part 2
  • Cisco Telepresence Endpoints Installation And Characteristics Part 3
  • Cisco Telepresence Endpoints Installation And Characteristics Part 4

Module 11: Configuring Cisco Telepresence CTS And Cisco DX650 Endpoints

  • Configuring Cisco Telepresence CTs And Cisco D X650 Endpoints Part 1
  • Configuring Cisco Telepresence CTs And Cisco D X650 Endpoints Part 2

Module 12: Configuring Cisco Telepresence TC Endpoints

  • Configuring Cisco Telepresence TC Endpoints Part 1
  • Configuring Cisco Telepresence TC Endpoints Part 2
  • Configuring Cisco Telepresence TC Endpoints Part 3
  • Configuring Cisco Telepresence TC Endpoints Part 4
  • Configuring Cisco Telepresence TC Endpoints Part 5
  • Configuring Cisco Telepresence TC Endpoints Part 6

Module 13: Operating And Troubleshooting Cisco Telepresence Endpoints

  • Operating And Troubleshooting Cisco Telepresence Endpoints Part 1
  • Operating And Troubleshooting Cisco Telepresence Endpoints Part 2
  • Operating And Troubleshooting Cisco Telepresence Endpoints Part 3
  • Operating And Troubleshooting Cisco Telepresence Endpoints Part 4
  • Operating And Troubleshooting Cisco Telepresence Endpoints Part 5

Module 14: Cisco Multipoint Conferencing Solutions

  • Cisco Multipoint Conferencing Solutions Part 1
  • Cisco Multipoint Conferencing Solutions Part 2
  • Cisco Multipoint Conferencing Solutions Part 3

Module 15: Configuring And Monitoring Cisco Multipoint

  • Configuring And Monitoring Cisco Multipoint Part 1
  • Configuring And Monitoring Cisco Multipoint Part 2

Module 16: Cisco DMP Characteristics And Installation

  • Cisco DMP Characteristics And Installation Part 1
  • Cisco DMP Characteristics And Installation Part 2

Module 17: Configuring Cisco DMPs

  • Configuring Cisco DMP’s

Module 18: Managing Cisco Edge 340 DMPs

  • Managing Cisco Edge340 DMPs
  • Course Conclusion

Module 19: Labs

  • Basic Switch Port Configuration
  • Dashboard Options Part 1
  • Dashboard Options Part 2
  • Preparations For Endpoints Part 1
  • Preparations For Endpoints Part 2
  • Preparations For Endpoints Part 3
  • Preparations For Endpoints Part 4
  • Basic Troubleshooting
  • Setup TC Endpoint Part 1
  • Setup TC Endpoint Part 2
  • Setup TC Endpoint Part 3
  • Setup TC Endpoint Part 4

Module 1: Network Review

  • Course Introduction
  • Network Review Part 1
  • Network Review Part 2
  • Network Review Part 3
  • Network Review Part 4

Module 2: Terminology And Fundamentals

  • Terminology And Fundamentals Part 1
  • Terminology And Fundamentals Part 2
  • Terminology And Fundamentals Part 3
  • Terminology And Fundamentals Part 4
  • Terminology And Fundamentals Part 5
  • Terminology And Fundamentals Part 6
  • Terminology And Fundamentals Part 7

Module 3: PKI And Cryptography

  • Pki And Cryptography Part 1
  • Pki And Cryptography Part 2

Module 4: AAA

  • AAA Part 1
  • AAA Part 2
  • AAA Part 3

Module 5: Bring Your Own Device

  • Bring Your Own Device Part 1
  • Bring Your Own Device Part 2
  • Bring Your Own Device Part 3

Module 6: Secure Access

  • Secure Access Part 1
  • Secure Access Part 2
  • Secure Access Part 3
  • Secure Access Demo

Module 7: VPNs

  • VPN Concepts Part 1
  • VPN Concepts Part 2
  • Remote Access VPNs Part 1
  • Remote Access VPNs Part 2
  • Site To Site VPNs

Module 8: Secure Routing And Switching

  • Secure Routing And Switching Part 1
  • Secure Routing And Switching Part 2
  • Secure Routing And Switching Demo 1
  • Secure Routing And Switching Demo 2
  • Layer2 Attacks Part 1
  • Layer2 Attacks Part 2
  • Layer2 Attacks Part 3
  • Mitigation Part 1
  • Mitigation Part 2

Module 9: Firewalls

  • Firewall Technologies Part 1
  • Firewall Technologies Part 2
  • Implementing Nat Part 1
  • Implementing Nat Part 2
  • Zone Based Firewall
  • Firewall Features On The ASA Part 1
  • Firewall Features On The ASA Part 2
  • Firewall Features On The ASA Part 3

Module 10: Intrusion Protection System (IPS)

  • Intrusion Protection System Part 1
  • Intrusion Protection System Part 2

Module 11: Content And Endpoint Security

  • Content And Endpoint Security Part 1
  • Content And Endpoint Security Part 2
  • Course Conclusion

Module 1: Plan And Design

  • Introduction
  • Review Routing Fundamentals
  • Review Route Selection
  • Review Switching Versus Routing
  • Review IP Subnetting
  • Review How To Subnet
  • Review IP Address Classes

Module 2: EIGRP Enhanced Interior Gateway Routing Protocol

  • Plan And Design-Part1
  • Plan And Design-Part2
  • EIGRP Config
  • Configuring RIPng
  • Building EIGRP Topology Table
  • EIGRP Stub Routing
  • EIGRP Summarization
  • EIGRP Load Balancing
  • Discovering Main EIGRP Configuration
  • Implementing EIGRP Through Name Config
  • Configure EIGRP Authentication
  • Configure Authentication For EIGRP Routes

Module 3: IPv6

  • Introduction To IPv6-Part1
  • Introduction To IPv6-Part2
  • IPv6 Addressing
  • Basic IPv6 Configuration
  • EIGRP For IPv6
  • Configure And Optimize EIRGP For IPv6

Module 4: OSPF

  • lntroduction To OSPF-Part1
  • lntroduction To OSPF-Part2
  • lntroduction To OSPF-Part3
  • Configure OSPF
  • Building The Link State Database
  • OSPF Path Selection
  • OSPF Route Summarization
  • OSPF Stub Areas
  • Implement OSPF
  • Optimize OSPF
  • OSPF Authentication Configuration
  • Configure OSPFV3
  • Basic Redistribution

Module 5: Border Gateway Protocol BGP

  • Introduction To BGP
  • BGP Specifics
  • Basic BGP
  • BGP Path Selection
  • Configure BGP Authentication
  • Configure BGP

Module 6: Course Review

  • Configure Basic EIGRP
  • Basic OSPF Configuration
  • Summary Of-EIGRP-OSPF-IPv6-BGP
  • Conclusion
Module 1: Plan And Design

  • Course And Instructor Introduction
  • Planning For Complex Network-Part1
  • Planning For Complex Network-Part2
  • Intro To Cisco Enterprise Architecture And CAM-Part1
  • Intro To Cisco Enterprise Architecture And CAM-Part2
  • Review Networking Topology-Part1
  • Review Networking Topology-Part2
  • Review OSI Model
  • Review SLA
  • Network Discovery
  • NTP Explained-Part1
  • NTP Explained-Part2
  • Network Security-Part1
  • Network Security-Part2

Module 2: Switch Configuration

  • VLAN And Trunking-Part1
  • VLAN And Trunking-Part2
  • VTP Intro And Config
  • Ether Channel Configuration And Load Balancing
  • More Ether Channel Configuration-Part1
  • More Ether Channel Configuration-Part2
  • Port Security
  • Root Guard
  • Configuring MST

Module 3: IP Configuration

  • DHCP Intro And Config-Part1
  • DHCP Intro And Config-Part2
  • IPV6 Intro And Config-Part1
  • IPV6 Intro And Config-Part2
  • Configure DHCP
  • Configure DHCPV6
  • Configure IPSLA
  • NTP Configuration
  • Network Monitoring Using IPSLA-Part1
  • Network Monitoring Using IPSLA-Part2
  • Network Monitoring Using IPSLA-Part3

Module 4: STP And RTP

  • Config Routing Between VLANs With A Router
  • Improves STP Config-Part1
  • Improve STP Config-Part2
  • Improve STP Config-Part3
  • Improve STP Config-Part4
  • Implement RSTP
  • Intro And Config MST

Module 5: Routing

  • Config Routing Between VLANs With A Router
  • Routing On A Multi Layer Switch
  • Routing With An External Router
  • Further Routing On Multilayer Switch

Module 6: HSRP, VRRP, GLBP

  • Configure And Tune HSRP
  • Configure HSRP With Load Balancing
  • HSRP For IPv6
  • Configure VRRP
  • Configure VRRP With Load Balancing
  • Implement GLBP
  • Configure GLBP

Module 7: Course Review

  • Designing Complex Networks
  • Review Demo CAM
  • Review Demo VLANs And Trunking
  • Review Demo VTP Configure
  • Review Demo Ether Channel And Load Balancing
  • Review Demo RSTP
  • Review Demo Routing Between VLANs With A Router
  • Course Outro

Module 1: Introduction to Cisco Troubleshooting

  • Introduction
  • Troubleshooting And Maintenance
  • IOS Troubleshooting Commands
  • Remote Data Gathering
  • Introduction To Graphical Troubleshooting Tools And Review

Module 2: Troubleshooting Switches

  • Troubleshoot Catalyst Switches
  • Troubleshoot TCAM

Module 3: Troubleshooting VLANS and Trunking

  • Troubleshooting VLANs And Trunking-Part1
  • Troubleshooting VLANs And Trunking-Part2
  • Troubleshooting VLANs And Trunking-Part3
  • Trouble Ticket 1 VLANS

Module 4: Troubleshooting Spanning Tree Protocol, EtherChannel

  • Spanning Tree Protocol
  • STP Port Configuration
  • Ether Channel
  • Trouble Ticket 2-Trunking

Module 5: Troubleshooting Inter­VLAN Routing and Layer 3 EtherChannel

  • Troubleshooting Inter-VLAN Routing
  • Troubleshooting Layer 3 Ether Channel

Module 6: Troubleshooting Switch Security Features

  • Troubleshoot Switch Security-Part1
  • Troubleshoot Switch Security-Part2
  • Trouble Ticket 3-Switch Security-Part1
  • Trouble Ticket 3-Switch Security-Part2

Module 7: Troubleshooting First­Hop Redundancy Protocols

  • HSRP
  • VRRP
  • Questions
  • Trouble Ticket 4

Module 8: Troubleshooting IPv4 and IPv4 Addressing

  • IPv4 Addressing DHCPNAT-Part1
  • IPv4 Addressing DHCPNAT-Part2
  • Trouble Ticket 5
  • Trouble Ticket 6

Module 9: IPv6 Addressing and Addressing Technologies

  • IPv6 Addressing Options

Module 10: Troubleshooting IPv4 and IPv6 ACLs and Prefix Lists

  • IPv4 ACLs
  • Prefixlists IPv6 ACLs
  • Trouble Ticket Access Control List1
  • Trouble Ticket Access Control List2

Module 11: Troubleshooting GRE and Basic Routing Tunnels

  • IPv4 Routing-Part1
  • IPv4 Routing-Part2
  • IPv6 Routing
  • GRE Tunnels

Module 12: Troubleshooting RIPv2 and RIPng

  • RIPv2
  • RIPng

Module 13: Troubleshooting EIGRP

  • EIGRP
  • EIGRP For IPv6
  • Trouble Ticket 1
  • Trouble Ticket 2

Module 14: OSPF and OSPFv3

  • OSPF-Part1
  • OSPF-Part2
  • OSPFv3
  • Trouble Ticket 1
  • Trouble Ticket 2
  • Trouble Ticket 3

Module 15: Troubleshooting Route Maps and Policy Based Routing

  • Route Maps And Policy Based Routing

Module 16: Troubleshooting Redistribution

  • Verifying Redistribution Configuration
  • Troubleshooting Redistribution With Route Maps

Module 17: Troubleshooting BGP

  • BGP Overview
  • BGP Configuration-Part1
  • BGP Configuration-Part2
  • Trouble Ticket 1
  • Trouble Ticket 2

Module 18: Troubleshooting Management Protocols and Tools

  • Troubleshooting Management Protocols And Tools
  • SPAN And RSPAN

Module 19: Troubleshooting Management Access

  • Management Access Troubleshooting
  • Conclusion

Module 1: Introduction

  • Intro Part 1
  • Intro Part 2
  • Intro Part 3
  • Intro Part 4
  • Intro Part 5
  • Intro Part 6
  • Intro Part 7

Module 2: Telephony

  • Telephony Part 1
  • Telephony Part 2
  • Telephony Part 3
  • Telephony Part 4

Module 3: Basic Call Routing

  • Basic Call Routing Part 1
  • Basic Call Routing Part 2
  • Basic Call Routing Part 3

Module 4: VOIP Call Routing

  • VOIP Call Routing Part 1
  • VOIP Call Routing Part2
  • VOIP Call Routing Part 3
  • VOIP Call Routing Part 4
  • VOIP Call Routing Part 5

Module 5: CUCME Call Routing Basics

  • CUCME Call Routing Basics Part 1
  • CUCME Call Routing Basics Part 2
  • CUCME Call Routing Basics Part 3
  • CUCME Call Routing Basics Part 4
  • CUCME Call Routing Basics Part 5
  • CUCME Call Routing Basics Part 6
  • CUCME Call Routing Basics Part 7
  • CUCME Call Routing Basics Part 8
  • CUCME Call Routing Basics Part 9
  • CUCME Call Routing Basics Part 10
  • CUCME Call Routing Basics Part 11

Module 6: Preparing Network For Voice

  • Preparing Network For Voice Part 1
  • Preparing Network For Voice Part 2
  • Preparing Network For Voice Part 3
  • Preparing Network For Voice Part 4
  • Preparing Network For Voice Part 5
  • Preparing Network For Voice Part 6

Module 7: IP Phone Behavior

  • IP Phone Behavior

Module 8: CUCME Administration Basics

  • CUCME Administration Basics Part 1
  • CUCME Administration Basics Part 2
  • CUCME Administration Basics Part 3
  • CUCME Administration Basics Part 4

Module 9: CUCME StandUp

  • CUCME Stand Up Part 1
  • CUCME Stand Up Part 2
  • CUCME Stand Up Part 3
  • CUCME Stand Up Part 4
  • CUCME Stand Up Part 5

Module 10: CUCME StandUp Part 2

  • CUCME Stand Up2 Part 1
  • CUCME Stand Up2 Part 2

Module 11: CUCME StandUp CUCME

  • CUCME Stand Up CUCME Part 1
  • CUCME Stand Up CUCME Part 2
  • CUCME Stand Up CUCME Part 3

Module 12: End Users and End User Interfaces

  • End Users And End User Interfaces Part 1
  • End Users And End User Interfaces Part 2
  • End Users And End User Interfaces Part 3

Module 13: Endpoint Implementation

  • Endpoint Implementation Part 1
  • Endpoint Implementation Part 2
  • Endpoint Implementation Part 3
  • Endpoint Implementation Part 4

Module 14: Call Coverage

  • Call Coverage Part 1
  • Call Coverage Part 2
  • Call Coverage Part 3
  • Call Coverage Part 4
  • Call Coverage Part 5
  • Call Coverage Part 6
  • Call Coverage Part 7
  • Call Coverage Part 8
  • Call Coverage Part 9

Module 15: Calling Restrictions and Routing

  • Calling Restrictions And Routing Part 1
  • Calling Restrictions And Routing Part 2
  • Calling Restrictions And Routing Part 3
  • Calling Restrictions And Routing Part 4
  • Calling Restrictions And Routing Part 5
  • Calling Restrictions And Routing Part 6

Module 16: CUCME Advance Call Coverage

  • CUCME Advance Call Coverage Part 1
  • CUCME Advance Call Coverage Part 2

Module 17: Implementing Unity Connection

  • Implementing Unity Connection Part 1
  • Implementing Unity Connection Part 2
  • Implementing Unity Connection Part 3
  • Implementing Unity Connection Part 4
  • Implementing Unity Connection Part 5
  • Implementing Unity Connection Part 6
  • Implementing Unity Connection Part 7
  • Implementing Unity Connection Part 8
  • Outro

Module 1: Methodologies Used To Design A Network

  • Introduction
  • Developing Business Trends
  • P P D I O O- Part 1
  • P P D I O O- Part 2
  • 3 Layer Campus Design
  • Modular Network Design
  • Cisco Eight Step Design Methodology
  • Cisco I I N

Module 2: Network Structure And Modularity

  • Network Design Fundamentals
  • Design Methods And Methodologies- Part 1
  • Design Methods And Methodologies- Part 2
  • Enterprise Campus Design- Part 1
  • Enterprise Campus Design- Part 2

Module 3: Basic Enterprise Campus Networks

  • Campus Design Considerations- Part 1
  • Campus Design Considerations- Part 2
  • Cisco S O N A

Module 4: Enterprise Edge And Remote Network Modules

  • WAN Technologies And VPN- Part 1
  • WAN Technologies And VPN- Part 2
  • WAN Technologies- Part 1
  • WAN Technologies- Part 2
  • VPN Technologies- Part 1
  • VPN Technologies- Part 2
  • VPN Technologies- Part 3

Module 5: IP Addressing And Routing Protocols

  • Routing Protocol Operation And Design- Part 1
  • Routing Protocol Operation And Design- Part 2
  • Routing Protocol Operation And Design- Part 3
  • Routing Protocol Operation And Design- Part 4
  • EIGRP – Part 1
  • EIGRP – Part 2

Module 6: Enterprise Switching I

  • Enterprise Switching
  • Inter VLAN Routing
  • Multilayer Switch
  • Enterprise Switch Features And Design
  • VSS
  • Best Practices

Module 7: Enterprise Switching II

  • Switch Macros And Smart Ports
  • Private VLANs
  • Etherchannel

Module 8: Subnetting

  • IP v4
  • Subnetting- Part 1
  • Subnetting- Part 2
  • Subnetting- Part 3
  • Subnetting- Part 4
  • IP v6

Module 9: Designing Advanced Services

  • Designing Advanced Services
  • GLBP
  • Access Points
  • Radio Frequencies
  • Wireless Signals
  • Wireless LAN To VLAN Mapping
  • Conclusion

Chapter 1: Course Introduction and Methodology

Chapter 2: Virtualization Overview

Chapter 3: Planning and Installing ESXi

Chapter 4: Using tools to Administer a VMware Environment

Chapter 5: vCenter and Licensing

Chapter 6: Configuring Networking

Chapter 7: Configuring Storage

Chapter 8: VM Creation, Configuration, and Snapshots

Chapter 9: Security and Permissions

Chapter 10: Host and VM Monitoring

Chapter 11: Advanced ESXi and vCenter Server Management

Chapter 12: Patching and Upgrading ESXi

Chapter 13: Disaster Recovery and Backup

Module 1: VM And VMWARE

  • Introduction
  • VMWARE Foundations-Part 1
  • VMWARE Foundations-Part 2
  • VMWARE Company Overview
  • Server Virtualization
  • Thin Clients
  • Storage 101
  • Three Basic Forms Of Storage
  • Redundant Array

Module 2: Working With ESX And ESXI

  • VMWARE ESX And ESXI
  • Installing ESXI
  • Installing ESXI-Lab 1
  • Installing ESXI-Lab 2
  • Vsphere Client-Lab 1
  • Joining Active Directory Domain For Single Sign On-Part 1
  • Joining Active Directory Domain For Single Sign On-Part 2
  • Virtual Networking
  • Nic Notes
  • Virtual Network Basics-Lab
  • NFS
  • NFS-Lab

Module 3: Configuring Virtual Machines

  • Virtual Machines
  • Host Operating System
  • Working With VM Files
  • Virtual Machines-Lab 1
  • Virtual Machines-Lab 2
  • Working With New VM’s
  • Virtual Machines-Lab 3
  • Virtual Machines-Lab 4

Module 4: Vcenter Server

  • Say Hello To Vcenter
  • Vcenter Architecture
  • Vcenter Architecture-Lab 1
  • Vcenter Architecture-Lab 2
  • Managing Host With Vcenter-Lab
  • Working With Virtual Hardware-Part 1
  • Working With Virtual Hardware-Part 2
  • Adding Virtual Disk And Disk Expansion-Lab 1
  • Adding Virtual Disk And Disk Expansion-Lab 2
  • Configuring Vcenter SSO-Lab 1

Module 5: VM Storage Option

  • Shared And Local Storage
  • NAS
  • DC Designs
  • Configuring Shared Storage-Lab
  • Creating VMFS Datastores On Our SANS-Lab 1
  • Creating VMFS Datastores On Our SANS-Lab 2

Module 6: Managing A Virtual World

  • Alarms
  • Creating And Configuring Alarms-Lab 1
  • Creating And Configuring Alarms-Lab 2
  • Resource Pools
  • Creating Resource Pools-Lab 1
  • Creating Resource Pools-Lab 2
  • VMWARE Converter
  • Configuring VMWARE Converter-Lab 1
  • Configuring VMWARE Converter-Lab 2
  • Configuring VMWARE Converter-Lab 3

Module 7: Migrations, High Availability And VM Utilities

  • Migrating Virtual Machines
  • DRS And HA-Lab
  • Host Profiles
  • VM Utilities And Performance
  • Conclusion

Blockchain

Module 1: Certified Blockchain Developer Hyperledger Overview

  • 1.1 Course Introduction
  • 1.2 Module 1 Introduction
  • 1.3 Audience for the Certification
  • 1.4 What is a CBDH
  • 1.5 Exam Objectives
  • 1.6 Exam Overview

Module 2: Hyperledger Framework

  • 2.1 Module 2 Introduction
  • 2.2 Hyperledger Project Overview
  • 2.3 Hyperledger Frameworks
  • 2.4 Hyperledger Fabric
  • 2.5 Hyperledger Fabric Use Cases

Module 3: Hyperledger Fabric Blockchain

  • 3.1 Module 3 Introduction
  • 3.2 Hyperledger Fabric Design Overview
  • 3.3 Hyperledger Fabric WhiteboardÂ
  • 3.4 Hyperledger Fabric Consensus
  • 3.5 Hyperledger Fabric Transactions
  • 3.6 Transactions Whiteboard
  • 3.7 Hyperledger Fabric Ledger
  • 3.8 Ledger Whiteboard
  • 3.9 Hyperledger Fabric Versions
  • 3.10 Hyperledger Fabric Membership Services
  • 3.11 Node Types and Roles
  • 3.12 Nodes and Peers Whiteboard
  • 3.13 Channels
  • 3.14 Channels Whiteboard

Module 4: Access Controls and Secure Chaincode

  • 4.1 Module 4 Introduction
  • 4.2 Access Controls Lists (.acl)
  • 4.3 Certificates and Certificate Authority
  • 4.4 Organizations and Participants
  • 4.5 Endorsement Policies
  • 4.6 Rest APIs

Module 5: Plan and Prepare Apps for Deployment

  • 5.1 Module 5 Introduction
  • 5.2 Development Whiteboard
  • 5.3 Installation Considerations
  • 5.4 Composer
  • 5.5 Composer Demo

Module 6: Hyperledger Fabric Explorer

  • 6.1 Module 6 Introduction
  • 6.2 Hyperledger Fabric Explorer Basics
  • 6.3 Installation Requirements of Hyperledger Explorer

Module 7: Chaincode and Development

  • 7.1 Module 7 Introduction
  • 7.2 What is Chaincode
  • 7.3 Writing Chaincode Considerations
  • 7.4 Development Language
  • 7.5 Client App Considerations
  • 7.6 BNA Files
  • 7.7 Service Discovery

Module 8: Course Wrap Up

  • 8.1 Module 8 Introduction
  • 8.2 Course Review
  • 8.3 Top 10 Things to know for the exam
  • 8.4 Taking the Exam
  • 8.5 Course Closeout

Module 1: Certified Blockchain Developer Hyperledger Overview

  • 1.1 Course Introduction
  • 1.2 Module 1 Introduction
  • 1.3 Audience for the Certification
  • 1.4 What is a CBDH
  • 1.5 Exam Objectives
  • 1.6 Exam Overview

Module 2: Hyperledger Framework

  • 2.1 Module 2 Introduction
  • 2.2 Hyperledger Project Overview
  • 2.3 Hyperledger Frameworks
  • 2.4 Hyperledger Fabric
  • 2.5 Hyperledger Fabric Use Cases

Module 3: Hyperledger Fabric Blockchain

  • 3.1 Module 3 Introduction
  • 3.2 Hyperledger Fabric Design Overview
  • 3.3 Hyperledger Fabric WhiteboardÂ
  • 3.4 Hyperledger Fabric Consensus
  • 3.5 Hyperledger Fabric Transactions
  • 3.6 Transactions Whiteboard
  • 3.7 Hyperledger Fabric Ledger
  • 3.8 Ledger Whiteboard
  • 3.9 Hyperledger Fabric Versions
  • 3.10 Hyperledger Fabric Membership Services
  • 3.11 Node Types and Roles
  • 3.12 Nodes and Peers Whiteboard
  • 3.13 Channels
  • 3.14 Channels Whiteboard

Module 4: Access Controls and Secure Chaincode

  • 4.1 Module 4 Introduction
  • 4.2 Access Controls Lists (.acl)
  • 4.3 Certificates and Certificate Authority
  • 4.4 Organizations and Participants
  • 4.5 Endorsement Policies
  • 4.6 Rest APIs

Module 5: Plan and Prepare Apps for Deployment

  • 5.1 Module 5 Introduction
  • 5.2 Development Whiteboard
  • 5.3 Installation Considerations
  • 5.4 Composer
  • 5.5 Composer Demo

Module 6: Hyperledger Fabric Explorer

  • 6.1 Module 6 Introduction
  • 6.2 Hyperledger Fabric Explorer Basics
  • 6.3 Installation Requirements of Hyperledger Explorer

Module 7: Chaincode and Development

  • 7.1 Module 7 Introduction
  • 7.2 What is Chaincode
  • 7.3 Writing Chaincode Considerations
  • 7.4 Development Language
  • 7.5 Client App Considerations
  • 7.6 BNA Files
  • 7.7 Service Discovery

Module 8: Course Wrap Up

  • 8.1 Module 8 Introduction
  • 8.2 Course Review
  • 8.3 Top 10 Things to know for the exam
  • 8.4 Taking the Exam
  • 8.5 Course Closeout

Module 1: Course Overview

  •  1.1 Course Introduction
  •  1.2 Course Target Audience
  •  1.3 Course Pre-Requirements

Module 2: Pre-Sales Activities

  •  2.1 Module 2 Introduction
  •  2.2 Request for Proposals
  •  2.3 Request for Proposals Fintech
  •  2.4 Proof of Concepts
  •  2.5 Return on Investment
  •  2.6 Value Creation
  •  2.7 Cost Modeling
  •  2.8 Cost Considerations
  •  2.9 Enterprise Integration
  •  2.10 TPS
  •  2.11 Whiteboard Discussion

Module 3: Blockchain Fundamentals

  •  3.1 Module 3 Introduction
  •  3.2 What is a Blockchain
  •  3.3 Blockchain Components
  •  3.4 Blockchain Terminology
  •  3.5 Enterprise Blockchains
  •  3.6 Consensus and Mining
  •  3.7 Ledgers
  •  3.8 Permissioned vs Permissionless Blockchains
  •  3.9 Trust and Blockchain
  •  3.10 Advantages of Transparency
  •  3.11 Development Expertise
  •  3.12 Dapps
  •  3.13 BaaS
  •  3.14 AWS BaaS Whiteboard Discussion
  •  3.15 Understanding Blockchain Architecture

Module 4: Enterprise Blockchains

  •  4.1 Module 4 Introduction
  •  4.2 Hyperledger
  •  4.3 Ethereum
  •  4.4 Quorum
  •  4.5 R3 Corda
  •  4.6 Corda Demobench Demo
  •  4.7 Ripple
  •  4.8 IBM BaaS
  •  4.9 AWS BaaS Demo

Module 5: Use Cases

  •  5.1 Module 5 Introduction
  •  5.2 Ripple Use Cases
  •  5.3 Dubai Use Cases

Module 6: Course Closeout

  •  6.1 Module 6 Introduction
  •  6.2 Course Review
  •  6.3 Blockchain Roles

Module 1 – CompTIA Cloud+ CV0-003 Course Overview

  • 1.0 Course Trailer
  • 1.1 Course Overview
  • 1.2 What is the Cloud + Exam
  • 1.3 Cloud + Domain Obectives Overview
  • 1.4 CompTIA Certification Pathways
  • 1.5 DoD and ISO Requirements

Module 2 – General Cloud Knowledge

  • 2.1 Domain Overview
  • 2.2 Compare and Contrast Cloud Models
  • 2.3 Cloud Computing Defined
  • 2.4 Deployment Models
  • 2.5 Service Models
  • 2.6 Cloud Characteristics
  • 2.7 Cloud Roles
  • 2.8 Evaluate Cloud Providers and Services
  • 2.9 Regions and Zones
  • 2.10 Shared Responsibility Model
  • 2.11 Demonstration – AWS Shared Security Model
  • 2.12 Comparing Cloud to Virtualization
  • 2.13 Comparing Cloud to On Premises
  • 2.14 What is a Virtual Machine
  • 2.15 Demonstration – Deploy a Cloud VM (AWS EC2)
  • 2.16 What is an API
  • 2.17 Capacity Planning Factors
  • 2.18 Licensing, Factors, Requirements and Planning
  • 2.19 Capacity Planning
  • 2.20 Demonstration – AWS Trusted Advisor
  • 2.21 HA and Scaling
  • 2.22 High Availability and Disaster Recovery
  • 2.23 Virtual, System and Communication Protection
  • 2.24 Hypervisor Affinity
  • 2.25 Analyze the solution design
  • 2.26 Business Requirements
  • 2.27 Business Enablers
  • 2.28 Demonstration -AWS Well Architected Tool
  • 2.29 Testing Techniques
  • 2.30 Testing Success Factors
  • 2.31 Module Review Questions
  • 2.32 Module Summary Review

Module 3 – Cloud Security

  • 3.1 Domain Overview
  • 3.2 Configure Identity and Access Management
  • 3.3 Identification and Authorization Management (IAM)
  • 3.4 SDLC
  • 3.5 Directory Services
  • 3.6 Security and Access Controls
  • 3.7 Federation
  • 3.8 SSO and MFA
  • 3.9 Certificates and Key Management
  • 3.10 Secure a Network in a Cloud Environment
  • 3.11 Networking Devices and Segmentation
  • 3.12 Firewalls and Proxies
  • 3.13 NAT and PAT
  • 3.14 Secure Network Configurations (Tunnelling and Encryption)
  • 3.15 Demo Hardening and Configuration Changes
  • 3.16 OS Application Controls and Security Credentials
  • 3.17 Policies and Permissions
  • 3.18 Host and Network Protections (HIDSIPS)
  • 3.19 Virtualization Security
  • 3.20 Monitoring
  • 3.21 Data Security and Compliance Controls in Cloud Environments
  • 3.22 Structured, Unstructured and Semi Structured Data
  • 3.23 Data Classification and Labeling
  • 3.24 Data Loss Prevention
  • 3.25 Demonstration – Google Cloud DLP
  • 3.26 Chain of Custody and Non-Repudiation
  • 3.27 Discussion – CASB
  • 3.28 Module Summary Review
  • 3.29 Module Review Questions

Module 4 – Cloud Deployment

  • 4.1 Domain Overview
  • 4.2 Integrate Components into Cloud Solutions
  • 4.3 Subscription Services
  • 4.4 Demonstration – Provision VM
  • 4.5 Cloud Infrastructure Components
  • 4.6 Whiteboard – Design a Resilent AWS Cloud Architecture
  • 4.7 Containers
  • 4.8 Microservices
  • 4.9 Demonstration – Deploy Containers
  • 4.10 Scaling
  • 4.11 Provision Storage
  • 4.12 Cloud Storage Protocols
  • 4.13 Storage Features
  • 4.14 Storage Cost Considerations
  • 4.15 Storage Performance
  • 4.16 RAID and Tiering
  • 4.17 Demonstration – AWS S3
  • 4.18 Deploy Cloud Networking Solutions
  • 4.19 Connecting to The Cloud
  • 4.20 Network Protocols
  • 4.21 VPNS, VPC and Connectivity
  • 4.22 Whiteboard – AWS VPC Connectivity
  • 4.23 Demonstration – AWS VPC
  • 4.24 Software Defined Networking (SDN)
  • 4.25 Compute Sizing
  • 4.26 Virtualization Considerations
  • 4.27 Resource Rightsizing (CPU, Memory, etc)
  • 4.28 Module Summary Review
  • 4.29 Module Review Questions

Module 5 – Operations and Support

  • 5.1 Domain Overview
  • 5.2 Logging Monitoring and Alerting
  • 5.3 Logging, Storage and Analysis of Data Events
  • 5.4 Monitoring Cloud Resources
  • 5.5 Service Level Agreements
  • 5.6 Demonstration – SLAs in AWS
  • 5.7 Maintain Efficient Operations of a Cloud Environment
  • 5.8 Lifecycle Management
  • 5.9 Change and Asset Management
  • 5.10 SOP, Patching and Upgrades
  • 5.11 Orchestration and Automation
  • 5.12 Orchestration or Automation
  • 5.13 DevOps, IaC and CICD Pipelines
  • 5.14 Playbooks and Templates
  • 5.15 Backup and Restore Operations
  • 5.16 Backup Types, Objects, Targets
  • 5.17 Restore and Recovery
  • 5.18 Module Summary Review
  • 5.19 Module Review Questions

Module 6 – Troubleshooting

  • 6.1 Domain Overview
  • 6.2 Troubleshooting Methodology Intro
  • 6.3 Troubleshooting Methodology
  • 6.4 Troubleshoot Security Issues
  • 6.5 Cloud Attacks
  • 6.6 Security Groups and NACLS
  • 6.7 Troubleshoot Deployment Issues
  • 6.8 Discussion Site Connectivity Issues
  • 6.9 Discussion – Capacity Issues
  • 6.10 Connectivity Issues
  • 6.11 Connectivity Troubleshooting Tools
  • 6.12 Demonstration – GCP AWS Azure Latency Test
  • 6.13 Module Summary Review
  • 6.14 Module Review Questions

Module 7 – Course Closeout

  • 7.1 Exam Preparation
  • 7.2 Course Closeout

Module 1 – Mobile Devices

  • Module 1 Workbook
  • 0.1 Intro to A+ Core1 Instructor
  • 1.0 CompTIA A+ Course Intro
  • 1.1 Mobile Devices Part 1
  • 1.1 Mobile Devices Part 2
  • 1.1 Mobile Devices Part 3
  • 1.2 Installing Components in Laptop
  • 1.3 Laptop Features Part 1
  • 1.3 Laptop Features Part 2
  • 1.4 Compare and Contrast Types of Mobile Devices
  • 1.5 Accessories and Ports of Other Mobile Devices Part 1
  • 1.5 Accessories and Ports of Other Mobile Devices Part 2
  • 1.6 Configure Basic Device Network Connectivity and Application Support Part 1
  • 1.6 Configure Basic Device Network Connectivity and Application Support Part 2
  • 1.7 Use Methods to Perform Mobile Device Synchronization
  • 1.8 Laptop Disassemble and Assemble

Module 2 – Networking

  • Module 2 Workbook
  • 2.1 Networking Part 1
  • 2.1 Networking Part 2
  • 2.2 Compare and Contrast Common Networking Hardware Devices Part 1
  • 2.2 Compare and Contrast Common Networking Hardware Devices Part 2
  • 2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 1
  • 2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 2
  • 2.3 Setting Up a Wireless Router
  • 2.4 Compare and Contrast Wireless Networking Protocols
  • 2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 1
  • 2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 2
  • 2.6 Explain Common Network Configuration Concepts Part 1
  • 2.6 Explain Common Network Configuration Concepts Part 2
  • 2.7 Compare and Contrast Internet Connection Types Network Types and Features
  • 2.8 Given a Scenario Using Appropriate Networking Tools

Module 3 – Hardware

  • Module 3 Workbook
  • 3.1 Hardware Part 1
  • 3.1 Hardware Part 2
  • 3.1 Hardware Part 3
  • 3.2 Identify Common Connector Types
  • 3.3 Scenario Install RAM Types
  • 3.4 Scenario Select Install and Configure Storage Devices
  • 3.4 Scenario Select Install and Configure Storage Devices Part 2
  • 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 1
  • 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 2
  • 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 3
  • 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 4
  • 3.5 Install Disassemble and Assemble a Desktop
  • 3.6 Purposes for Peripherals and Types
  • 3.7 Summarize Power Supplies
  • 3.8 Scenario Select and Configure Appropriate Components for Customers PCs
  • 3.9 Scenario Installand Configure Common Devices
  • 3.10 Scenario Configure SOHO Multifunction Devices Printers and Settings
  • 3.11 Scenario Install and Maintain Various Print Technologies Part 1
  • 3.11 Scenario Install and Maintain Various Print Technologies Part 2
  • 3.11 Scenario Install and Maintain Various Print Technologies Part 3

Module 4 – Virtualization and Cloud Computing

  • Module 4 Workbook
  • 4.1 Virtualization Part 1
  • 4.1 Virtualization Part 2
  • 4.2 Scenario Setup and Configure Client-side Virtualization

Module 5 – Hardware and Network Troubleshooting

  • Module 5 Workbook
  • 5.1 Hardware and Networking Troubleshooting
  • 5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 1
  • 5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 2
  • 5.3 Troubleshoot Hard Drives and RAID Arrays
  • 5.4 Troubleshoot Video and Display Issues
  • 5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 1
  • 5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 2
  • 5.6 Troubleshoot Printers
  • 5.7 Troubleshoot Common Wired and Wireless Network Problems

Module 1 – Operating Systems

  • 0.1 Intro to A+ Core2 Instructor
  • 1.0 Intro to A+ Core2
  • 1.1 Operating Systems Part1
  • 1.1 Operating Systems Part2
  • 1.2 Compare and Contrast features of Microsoft Windows Versions
  • 1.3 Summarize General OS Installation Considerations Upgrade Methods
  • 1.3 Summarize General OS Installation Considerations Upgrade Methods Part2
  • 1.3 Summarize General OS Installation Considerations Upgrade Methods Part3
  • 1.3 Summarize General OS Installation Considerations Upgrade Methods Demo
  • 1.4 Scenario use appropriate Microsoft Command Line Tools Part1
  • 1.4 Scenario use appropriate Microsoft Command Line Tools Part2
  • 1.4 Scenario use appropriate Microsoft Command Line Tools Demo
  • 1.5 Microsoft Operating System and Tools Part1
  • 1.5 Microsoft Operating System and Tools Part1 Demo
  • 1.5 Microsoft Operating System and Tools Part2
  • 1.5 Microsoft Operating System and Tools Part2 Demo
  • 1.5 Microsoft Operating System and Tools Part3
  • 1.5 Microsoft Operating System and Tools Part3 Demo
  • 1.5 Microsoft Operating System and Tools Part4
  • 1.5 Microsoft Operating System and Tools Part4 Demo
  • 1.6 Microsoft Windows Control Panel Utilities
  • 1.6 Microsoft Windows Control Panel Utilities Demo
  • 1.7 Summarize Application Installation and Configuration Concepts
  • 1.8 Configure Windows Networking on a Client Desktop
  • 1.8 Configure Windows Networking on a Client Desktop Demo
  • 1.9 Features and Tools of MAC OS and Linux Client Desktop

Module 2 – Security

  • 2.1 Security – Physical Security Measures
  • 2.2 Explain Logical Security Concepts
  • 2.2 Explain Logical Security Concepts Part2
  • 2.3 Compare, Contrast Wireless Security Protocols & Authentication Methods
  • 2.4 Detect, Remove, and Prevent Malware using Appropriate Tools
  • 2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part1
  • 2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part2
  • 2.6 Compare Contrast the different Microsoft Windows Security Settings
  • 2.6 Compare Contrast the different Microsoft Windows Security Settings- Demo
  • 2.7 Implement Security Best Practices to Secure a Workstation
  • 2.7 Implement Security Best Practices to Secure a Workstation Part2
  • 2.8 Implement Methods for Securing Mobile Devices
  • 2.9 Implement Appropriate Data Destruction & Disposal Methods
  • 2.10 Configure Security on SOHO Wireless and Wired Networks
  • 2.10 Configure Security on SOHO Wireless and Wired Networks Demo

Module 3 – Software Troubleshooting

  • 3.1 Software Troubleshooting Part1
  • 3.1 Software Troubleshooting Part2
  • 3.1 Software Troubleshooting Demo
  • 3.2 Troubleshoot and Resolve PC Security Issues
  • 3.2 Troubleshoot and Resolve PC Security Issues Part2
  • 3.2 Troubleshoot and Resolve PC Security Issues Demo
  • 3.3 Best Practice Procedures for Malware Removal
  • 3.4 Troubleshoot Mobile OS and Application
  • 3.5 Troubleshoot Mobile OS and Application Security Issue

Module 4 – Operational Procedures

  • 4.1 Operational Procedures
  • 4.2 Implement Basic Change Management Best Practices
  • 4.3 Implement Basic Disaster Prevention and Recovery Methods
  • 4.4 Explain Common Safety Procedures
  • 4.5 Explain Environmental Impacts and Appropriate Controls
  • 4.6 Explain Processes for Addressing Prohibited Content-Activity & Privacy Licensing Policy Concepts
  • 4.7 Using Proper Communication Techniques and Professionalism
  • 4.8 Identify the Basic of Scripting
  • 4.8 Identify the Basic of Scripting Demo
  • 4.9 Use Remote Access Technologies

Module 1 – Risk Management

  • Module 1 Notes
  • Intro CASP
  • CASP Introduction
  • Mod 1.1 Exploring Cloud Services Act
  • Mod 1.1 Acquisition Merger Demerger
  • Mod 1.1 Acquisition Merger Demerger Part2
  • Mod 1.2 Compare and Contrast
  • Mod 1.3 Given Scenario Execute Risk
  • Mod 1.3 Given Scenario Execute Risk Part2
  • Mod 1.3 Continuing Terminology IT Governance
  • Mod 1.4 Analyze Security Solution Metrics and Attributes
  • Mod 1.4 Analyze Risk
  • Mod 1.4 Trend Analysis Act

Module 2 – Enterprise Security Architecture

  • Module 2 Notes
  • Mod 2 Enterprise Security Architecture
  • Mod 2.1 Network Device Security Act
  • Mod 2.1 Application and Protocol
  • Mod 2.1 Advanced Network Security Act
  • Mod 2.1 Complex Network Security Solution
  • Mod 2.1 Implementing VLANs Switchport Sec Act
  • Mod 2.1 Implementing VLANs Switchport Sec Act Part2
  • Mod 2.1 Distributed Denial of Service
  • Mod 2.1 Exploring DoS Attacks Act
  • Mod 2.1 Security Zones
  • Mod 2.1 Network Access Control
  • Mod 2.1 Searching for Vulnerablie ICS-SCADA Act
  • Mod 2.2 Analyze a Scenario Integrate Security
  • Mod 2.2 Configuring Windows Firewall Act
  • Mod 2.2 Log Monitoring and Auditing
  • Mod 2.2 Group Policy Act
  • Mod 2.2 Patch Management
  • Mod 2.2 Management Interface
  • Mod 2.2 Measured Launch
  • Mod 2.3 Analyze a Scenario to Integrate Security Controls
  • Mod 2.3 Security Implications Privacy
  • Mod 2.3 Baseband
  • Mod 2.4 Given Software Vulnerabilty Scenarios
  • Mod 2.4 SQL Injection Act
  • Mod 2.4 Improper Error and Exception Handling
  • Mod 2.4 Buffer Overflows Act
  • Mod 2.4 Memory Leaks
  • Mod 2.4 Researching Vulnerabilities Exploits Act

Module 3 – Enterprise Security Operations

  • Module 3 Notes
  • Mod 3 Enterprise Security Operations
  • Mod 3 Runtime Debugging
  • Mod 3.1 Fingerprinting an OS Services Act
  • Mod 3.1 Code Review
  • Mod 3.1 Conducting OSINT Act
  • Mod 3.1 Types
  • Mod 3.1 Conducting a Vulnerability Assessment Act
  • Mod 3.2 Analyze a Scenario Output
  • Mod 3.2 Network Sniffing Act
  • Mod 3.2 Security Content Automation
  • Mod 3.2 Using a SCAP Scanner Act
  • Mod 3.2 Network Enumerator
  • Mod 3.2 Password Cracking Act
  • Mod 3.2 Host Vulnerability Scanner
  • Mod 3.2 Using Command Line Tools Act
  • Mod 3.2 OpenSSL
  • Mod 3.2 Scanning for Heartbleed Act
  • Mod 3.2 Local Exploitation Tools
  • Mod 3.2 Verifying File Integrity with SFC Act
  • Mod 3.2 Log Analysis Tools
  • Mod 3.3 Given Scenario Implement Incident
  • Mod 3.3 Facilitate Incident Detection Response
  • Mod 3.3 Using Incident Response Support Tools Act
  • Mod 3.3 Severity of Incident Detection Breach

Module 4 – Technical Integration of Enterprise Security

  • Module 4 Notes
  • Mod 4 Technical Integration of Enterprise
  • Mod 4 Technical Integration of Enterprise Part2
  • Mod 4.1 DataSecurity Considerations
  • Mod 4.1 Examing Network Diagrams Act
  • Mod 4.1 Security and Privacy Considerations of Storage integration
  • Mod 4.1 Exploring Directory Services and DNS Act
  • Mod 4.2 Given Scenario Integrate Cloud and Virtualization
  • Mod 4.2 Taking Another Look at Cloud Services Act
  • Mod 4.2 Security Advantages and Disadvanatges of Virtualization
  • Mod 4.2 Using Virtualization Act
  • Mod 4.2 Cloud Augmented Security
  • Mod 4.3 Given Scenario Integrate and Troubleshoot Advanced Authentication
  • Mod 4.4 Given Scenario Cryptographic
  • Mod 4.4 Cryptographic Part2
  • Mod 4.4 Mobile Device Encryption
  • Mod 4.4 Cryptography Act
  • Mod 4.5 Select the Appropriate Control
  • Mod 4.5 Phising Act
  • Mod 4.5 Telephony VoIP Integration

Module 5 – Research, Development and Collaboration

  • Module 5 Notes
  • Mod 5 Research Methods to Determine Industry Trends
  • Mod 5.1 Practicing Threat Intelligence Act
  • Mod 5.2 Scenario Implememt Security Activities Across
  • Mod 5.2 Static Testing
  • Mod 5.3 Explain the Importance of Interaction
  • CASP Conclusion

Domain 1 – Characteristics of Cloud Services from a Business Perspect

  • Overview
  • History
  • The Three Delivery Model Architecture
  • SaaS
  • Justification For Cloud
  • Confidentiality And Availability
  • Concepts From NIST
  • On Demand Self-Service
  • Broad Network Access
  • Resource Pooling
  • Measured Service
  • Service Models
  • Terms Of Service
  • Recommendations

Domain 2 – Cloud Computing and Business Value

  • Reasons For Cloud-Agility-Part1
  • Reasons For Cloud-Agility-Part2
  • New Business Opportunities

Domain 3 – Technical Perspectives/Cloud Types

  • Technical Perspectives Cloud Types
  • Sources
  • Security Risk
  • Technical Risk And Solutions

Domain 4 – Steps to Successful Adoption of Cloud

  • Steps To Adopting Cloud-Part1
  • Steps To Adopting Cloud-Part2
  • Steps To Adopting Cloud-Part3

Domain 5 – Impact and Changes of Cloud Computing on IT Service Management

  • Information Security Management System-Part1
  • Information Security Management System-Part2

Domain 6 – Risks and Consequences of Cloud Computing

  • Information Management And Security-Part1
  • Information Management And Security-Part2
  • The Data Security LifeCycle
  • Governance
  • Data Loss Prevention-Part1
  • Data Loss Prevention-Part2
  • Protecting Data
  • Risk Management-Part1
  • Risk Management-Part2
  • Risk Management-Part3
  • Risk Management-Part4
  • Risk Management-Part5
  • Recommendations-Part1
  • Recommendations-Part2
  • IT Governance
  • Audit
  • Recommendations For Audit-Part1
  • Recommendations For Audit-Part2

Module 1

  • Introduction
  • Models-Part 1
  • Models-Part 2
  • Service And Delivery Models
  • Terms And Characteristics
  • Objects Storage Concepts

Module 2

  • Virtualization
  • Install Configure Manage VM And Devices
  • Backups
  • Virtual Disks
  • Virtual Switches
  • Virtual Resource Migration
  • Benefits Of Virtualization In A Cloud Environment
  • Compare And Contrast Virtua lEnvironment

Module 3

  • Infrastructure
  • Different Access Protocols
  • Explain Storage Configuration
  • File Systems Types
  • Executing Storage Provisioning
  • Network Share Demo
  • Implement Appropriate Network Configurations
  • Importance Of Network Optimization
  • Troubleshoot Basic Network Configuration-Part 1
  • Troubleshoot Basic Network Configuration-Part 2
  • Troubleshoot Commands-Part 1
  • Troubleshoot Commands-Part 2
  • Troubleshoot Commands-Part 3
  • Explain Common Network Protocols
  • Common Hardware Resources

Module 4

  • Resource Management-Part 1
  • Resource Management-Part 2
  • Establishing Baselines And Thresholds
  • Appropriately Allocate Physical Host Resources-Part 1
  • Appropriately Allocate Physical Host Resources-Part 2
  • Appropriately Allocate Virtual Guest Resources-Part 1
  • Appropriately Allocate Virtual Guest Resources-Part 2
  • Use Appropriate Tools For Remote Access

Module 5

  • Security-Part 1
  • Security-Part 2
  • Storage Security Concepts And Methods
  • Different Encryption Technologies
  • Identify Access Control Methods

Module 6

  • Systems Management-Part 1
  • Systems Management-Part 2
  • Diagnose Remediate And Optimize-Part 1
  • Diagnose Remediate And Optimize-Part 2
  • Common Performance Concepts-Part 1
  • Common Performance Concepts-Part 2
  • Testing Techniques

Module 7

  • Business Continuity In Cloud-Part 1
  • Business Continuity In Cloud-Part 2
  • Solutions To Meet Availability Requirements
  • Conclusion

Module 1: Threat Management

  • Introduction
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 1
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 2
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 3
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 4
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 5
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 6
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 7
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 8
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 9
  • Given a scenario, analyze the results of a network reconnaissance Part 1
  • Given a scenario, analyze the results of a network reconnaissance Part 2
  • Given a scenario, analyze the results of a network reconnaissance Part 3
  • Given a scenario, analyze the results of a network reconnaissance Part 4
  • Given a scenario, analyze the results of a network reconnaissance Part 5
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 1
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 2
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 3
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 4
  • Explain the purpose of practices used to secure a corporate environment Part 1
  • Explain the purpose of practices used to secure a corporate environment Part 2
  • Explain the purpose of practices used to secure a corporate environment Part 3
  • Explain the purpose of practices used to secure a corporate environment Part 4

Module 2: Vulnerability Management

  • Given a scenario, implement an information security vulnerability management process Part 1
  • Given a scenario, implement an information security vulnerability management process Part 2
  • Given a scenario, implement an information security vulnerability management process Part 3
  • Given a scenario, implement an information security vulnerability management process Part 4
  • Given a scenario, implement an information security vulnerability management process Part 5
  • Given a scenario, implement an information security vulnerability management process Part 6
  • Given a scenario, implement an information security vulnerability management process Part 7
  • Given a scenario, analyze the output resulting from a vulnerability scan Part 1
  • Given a scenario, analyze the output resulting from a vulnerability scan Part 2
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 1
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 2
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 3

Module 3: Cyber Incident Response

  • Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 1
  • Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 2
  • Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 3
  • Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 1
  • Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 2
  • Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 3
  • Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 4
  • Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 5
  • Explain the importance of communications during the incident response process
  • Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 1
  • Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 2
  • Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 3
  • Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 4
  • Summarize the incident recovery and post-incident response process Part 1
  • Summarize the incident recovery and post-incident response process Part 2
  • Summarize the incident recovery and post-incident response process Part 3
  • Summarize the incident recovery and post-incident response process Part 4

Module 4: Security Architecture and Tool Sets

  • Explain the relationship between frameworks, common policies, controls, and procedures Part 1
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 2
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 3
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 4
  • Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 1
  • Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 2
  • Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 3
  • Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 4
  • Given a scenario, review security architecture and make recommendations to implement compensating controls Part 1
  • Given a scenario, review security architecture and make recommendations to implement compensating controls Part 2
  • Given a scenario, review security architecture and make recommendations to implement compensating controls Part 3
  • Given a scenario, use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 1
  • Given a scenario, use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 2
  • Overview
  • Conclusion

Module 1: Threat and Vulnerability Management

  • Instructor Intro
  • About the Exam
  • Test Taking Tips and Techniques
  • Explain the importance of threat data and intelligence
  • Given a scenario, utilize threat intelligence to support organizational security
  • Given a scenario, perform vulnerability management activities Pt 1
  • Given a scenario, perform vulnerability management activities Pt 2
  • Given a scenario, analyze the output from common vulnerability assessment tools
  • Explain the threats and vulnerabilities associated with specialized technology
  • Explain the threats and vulnerabilities associated with operating in the Cloud
  • Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 1
  • Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 2

Module 2: Software and Systems Security

  • Outline
  • Given a scenario, apply security solutions for infrastructure management Pt 1
  • Given a scenario, apply security solutions for infrastructure management Pt 2
  • Flashcards
  • Given a scenario, apply security solutions for infrastructure management Pt 3
  • Explain software assurance best practices
  • Scatter
  • Explain hardware assurance best practices
  • Learn
  • Speller
  • Workbook

Module 3: Security Operations and Monitoring

  • Given a scenario, analyze data as part of security monitoring activities Pt 1
  • Given a scenario, analyze data as part of security monitoring activities Pt 2
  • Given a scenario, analyze data as part of security monitoring activities Pt 3
  • Given a scenario, implement configuration changes to existing controls to improve security Pt 1
  • Given a scenario, implement configuration changes to existing controls to improve security Pt 2
  • Explain the importance of proactive threat hunting
  • Compare and contrast automation concepts and technologies

Module 4: Incident Response

  • Explain the importance of the incident response process
  • Given a scenario, apply the appropriate the incident response procedure
  • Given an incident, analyze potential indicators of compromise
  • Given a scenario, utilize basic digital forensic techniques

Module 5: Compliance and Assessment

  • Understand the importance of data privacy and protection
  • Given a scenario, apply security concepts in support of organizational risk mitigation Pt 1
  • Given a scenario, apply security concepts in support of organizational risk mitigation Pt 2
  • Explain the importance of frameworks, policies, procedures, and controls Pt 1
  • Explain the importance of frameworks, policies, procedures, and controls Pt 2

Module 6: Afterword

  • Recap
  • Review Questions
  • Before the Exam

Module 1 – IT Concepts and Terminology

  • 0.1 Instructor Intro
  • 1.1 Compare and Contrast Notational Systems
  • 1.1 Compare and Contrast Notational Systems Demo
  • 1.2 Compare and Contrast Fundamentals Data Types and Their Characteristics
  • 1.3 Illustrate the Basics of Computing and Processing
  • 1.4 Explain the Value of Data and Information
  • 1.5 Compare and Contrast Common Units of Measures
  • 1.5 Compare and Contrast Common Units of Measures Demo
  • 1.6 Explain the Troubleshooting Methodology

Module 2 – Infrastructure

  • 2.1 Classify Common Types of Input-Output Device Interfaces
  • 2.2 Given a scenario, set up & install Common Peripheral Devices to a PC
  • 2.2 Given a scenario, set up & install Common Peripheral Devices to a PC Demo
  • 2.3 Explain the Purpose of Common Internal Computing Components
  • 2.4 Compare & Contrast Common Internet Service Types-
  • 2.5 Compare & Contrast Storage Types
  • 2.6 Compare & Contrast Common Computing Devices & Their Purposes
  • 2.7 Explain Basic Networking Concepts
  • 2.7 Explain Basic Networking Concepts Demo
  • 2.7 Explain Basic Networking Concepts Part 2
  • 2.7 Explain Basic Networking Concepts Part 3
  • 2.7 Explain Basic Networking Concepts Part 4
  • 2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network
  • 2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network Demo

Module 3 – Applications and Software

  • 3.1 Explain the Purpose of Operating Systems
  • 3.1 Explain the Purpose of Operating Systems Demo
  • 3.2 Compare & Contrast Components of an Operating System
  • 3.2 Compare & Contrast Components of an Operating System Demo
  • 3.3 Explain the Purpose & Proper Use of Software
  • 3.4 Explain Methods of Application Architecture & Delivery Models
  • 3.5 Given a Scenario Configure & Use Web Browsers
  • 3.5 Given a Scenario Configure & Use Web Browsers FireFox
  • 3.5 Given a Scenario Configure & Use Web Browsers Demo Chrome
  • 3.5 Given a Scenario Configure & Use Web Browsers Demo Edge
  • 3.6 Compare & Contrast General Application Concepts & Uses

Module 4 – Software Development

  • 4.1 Compare & Contrast Programming Language Categories-
  • 4.2 Given a Scenario Use Programming Organizational Techniques & Interpret Logic-
  • 4.3 Explain the Purpose & Use of Programming Concepts-
  • 4.3 HTML Demo

Module 5 – Database Fundamentals

  • 5.1 Explain Database Concepts and the Purpose of Databases
  • 5.2 Compare and Contrast Various Database Structures
  • 5.3 Summarize Methods Used to Interface with Databases
  • 5.3 Summarize Methods Used to Interface with Databases Demo

Module 6 – Security

  • 6.1 Summarize Confidentiality, Integrity, and Availability Concerns
  • 6.2 Explain Methods to Secure Devices and Best Practices
  • 6.3 Summarize Behavioral Security Concepts
  • 6.4 Compare & Contrast Authentication, Authorization, Accounting, & Repudiation Concepts
  • 6.5 Explain Password Best Practices
  • 6.6 Explain Common Uses of Encryption
  • 6.7 Explain Business Continuity Concepts
  • 6.8 Takeaways-
  • 6.9 ITF Fundamentals Conclusion

Module 1: Intro & Performing Basic Linux Tasks

  • Instructor Introduction
  • Course Introduction
  • Identify The Linux Design Philosophy
  • Enter Shell Commands
  • Shell Commands Activity
  • Get Help with Linux

Module 2: Managing Users and Groups

  • Assume Superuser and Groups
  • Create, Modify, and Delete Users
  • Create, Modify, and Delete Groups
  • Query Users and Groups
  • Configure Account Profiles

Module 3: Managing Permissions and Ownership

  • Modify File and Directory Permissions
  • Modify File and Directory Ownership
  • Configure Special Permissions and Attributes
  • Troubleshoot Permissions Issues

Module 4: Managing Storage

  • Create Partitions
  • Manage Logical Volumes
  • Mount File Systems
  • Manage File Systems
  • Navigate the Linux Directory Structure
  • Troubleshoot Storage Issues

Module 5: Managing Files and Directories

  • Create and Edit Text Files
  • Search for Files
  • Perform Operations on Files and Directories
  • Process Text Files
  • Manipulate File Output

Module 6: Managing Kernel Modules

  • Explore the Linux Kernel
  • Install and Configure Kernel Modules
  • Monitor Kernel Modules

Module 7: Managing the Linux Boot Process

  • Configure Linux Boot Components
  • Configure GRUB

Module 8: Managing System Components

  • Configure Localization Options
  • Configure GUIs
  • Manage Services
  • Troubleshoot Process Issues
  • Troubleshoot CPU and Memory Issues

Module 9: Managing Devices

  • Identify the Types of Linux
  • Configure Devices
  • Monitor Devices
  • Troubleshoot Hardware Issues

Module 10: Managing Networking

  • Identify TCP/IP Fundamentals
  • Identify Linux Server Roles
  • Connect to a Network
  • Configure DHCP and DNS Client Services
  • Configure Cloud and Virtualization Technologies
  • Troubleshoot Networking Issues

Module 11: Managing Packages and Software

  • Identify Package Managers
  • Manage RPM Packages with YUM
  • Manage Debian Packages with APT
  • Configure Repositories
  • Acquire Software
  • Build Software from Source Code
  • Troubleshoot Software Dependency Issues

Module 12: Securing Linux SystemsModule 13: Working with Bash Scripts

  • Customize the Bash Shell Environment
  • Identify Scripting and Programming Fundamentals
  • Write and Execute a Simple Bash Script
  • Incorporate Control Statements in Bash Scripts

Module 14: Automating Tasks

  • Schedule Jobs
  • Implement Version Control Using Git
  • Identify Orchestration Concepts

Module 15: Installing Linux

  • Prepare for Linux Installation
  • Perform the Installation

Module 1: Instructions

  • Introduction
  • Introduction To Building Labs
  • Things You Need To Do
  • Install Demo Virtual Box
  • Navigation
  • Commands With LabDemo
  • Internal And External Commands
  • Overview Of Shell Commands Tricks
  • Exploring Shell Configuration
  • Stream Redirection
  • Overview Of Processing Text Using Filters
  • Overview File-Viewing Commands
  • Overview Using Grep
  • Sed Syntax And Summary
  • Overview Of Exam Essentials

Module 2: Managing Software

  • Managing Software
  • Managing Software
  • Overview Using RPM
  • RPM-Part 2
  • Overview Using Cpio
  • Overview Using Debian And Apt Cache
  • Using Apt-get
  • Debian Tools
  • Managing Shared Libraries
  • Overview Locating Library Files
  • Foreground and Background Processes
  • Managing Software Summary

Module 3: Configuring Hardware

  • Configuring Hardware
  • Configuring Devices
  • Configuring USB
  • Configuring Hard Disk
  • Designing Hard Disk Layout
  • Logical Volume Management
  • Overview Using Fdisk
  • Overview Common File System Types
  • Creating Filesystem
  • Overview Maintaining File System Health
  • Configuring Hardware Summary

Module 4: Managing Files

  • Managing Files
  • File Archiving Commands
  • Managing Files Ownership
  • Managing Disk Quotas
  • Directories And Content
  • Overview Tools For Locating Files
  • Overview Of Exam Essentials

Module 5: Booting Files

  • Booting Linux And Editing Files
  • Boot And Reboot
  • Understanding The Boot Process
  • Run Levels Process
  • Managing Run Level Services
  • Editing With Vi
  • Booting Summary

Module 6: X

  • X Windows Systems
  • X Configuration Options
  • X Configuration Options-Part 2
  • Untitled Media
  • Configuring X Featuring Fonts
  • Overview Managing GUI Logins
  • Using X For Remote Access
  • X Accessibility
  • Addition Assistive Technologies
  • Configuring Localization And Internationalization
  • Querying And Setting Your Locale
  • Configuring Printing-Part 1
  • Configuring Printing-Part 2
  • Using Web-Based CUPS Utilities

Module 7: Admin

  • Administering
  • Directly Modifying Account Configuration
  • Components Of Account
  • Adding Groups
  • Tuning User And System Environments
  • Reviewing Log File Contents
  • Maintaining System Time
  • Admin Summary

Module 8: Basic Networking

  • Basic Networking
  • Network Addressing-Part 1
  • Network Addressing-Part 2
  • DNS Data Flow Zone And Resolution
  • Network Ports
  • Connections
  • Testing Connectivity
  • Wireshark Demo
  • Basic Networking Summary

Module 9: Scripts

  • Scripts E-mail And Databases
  • Writing Scripts-Part 1
  • Writing Scripts-Part 2
  • Managing E-mail
  • Managing Data With SQL
  • Advantages Of Database
  • Scripts Summary

Module 10: Security

  • Security
  • Configuring Xinetd
  • Uninstalling Or Reconfiguring Servers
  • Tools For Managing Passwords
  • Configuring SSH
  • SSH Keys
  • Controlling SSH Access
  • Using GPG
  • Security Summary

Module 1: Over-The-Air Technologies

  • Introduction
  • Over-The-Air-Technologies
  • Wireless Technologies-Part 1
  • Wireless Technologies-Part 2
  • Radio Frequency
  • RF Power Fun
  • Antennas
  • Issues With RF
  • NON Wireless
  • Governing Bodies And Regulations

Module 2: Network Infrastructure

  • Network Foundations-Part 1
  • Network Foundations-Part 2
  • Network Foundations-Part 3
  • Network Foundations-Part 4
  • OSI Model Review
  • Wireless Terms And Terminology-Part 1
  • Wireless Terms And Terminology-Part 2
  • Wireless Media And Communication
  • Unified Wireless Architecture
  • SSIDs And VLANs

Module 3: Mobile Device Manager

  • Mobile Device Management-Part 1
  • Profiles And Polices-Part 1
  • Profiles And Polices-Part 2
  • Enterprise Mail And Messaging
  • Wireless Site Survey-Part 1
  • Wireless Site Survey-Part 2
  • Wireless Site Survey-Part 3
  • Wireless Site Survey-Part 4
  • Wireless Device Management-Part 1
  • Wireless Device Management-Part 2

Module 4: Security

  • Mobile Device Security
  • Network Security 101
  • Security Protocols-Part 1
  • Security Protocols-Part 2
  • Security Protocols-Part 3
  • EAP Overview
  • Encryption Overview-Part 1
  • Encryption Overview-Part 2
  • Common Security Troubleshooting
  • Wireless Risks-Part 1
  • Wireless Risks-Part 2
  • Other Risks

Module 5: Troubleshooting

  • Wireless Troubleshooting-Part 1
  • Wireless Troubleshooting-Part 2
  • Wireless Troubleshooting-Part 3
  • Conclusion

Module 1 – Networking Concepts

  • Module 1 Workbook
  • Intro Network Plus N10 007
  • Basic Networking
  • Activity Basic Networking
  • OSI Model
  • Exploring the OSI Model- Act
  • Protocol and Ports
  • Activity Examining Protocols and Ports
  • Connection-oriented vs. connectionless
  • Activity Comparing TCP and UDP
  • Internet Protocol (IP)
  • Activity Examining the Lower Layer Protocols
  • Layer 7 Remote Control Protocols
  • Layer 7 File Transfer Protocols
  • Layer 7 Messaging Protocols
  • Activity Examining Messaging Protocols
  • Layer 7 Web Traffic Protocols
  • Layer 7 Streaming Media Protocols
  • Layer 7 Infrastructure Management Protocols
  • Switching
  • Activity Creating Collision and Broadcast Domains
  • Interface Properties and Segmentation
  • Activity Creating a Basic Network Segment
  • Switching prt 2
  • Activity Switching
  • Switching Loop Management
  • Activity Managing Switching Loops
  • VLANs
  • Activity Creating VLANs
  • routing
  • Activity Examining ARP
  • IP Addressing Basics
  • Activity Configuring IP
  • Routers
  • Activity Setting Up a Router
  • Routing Basics
  • Activity Adding Static Routes
  • VLAN Routing
  • Activity Routing Between VLANs
  • NAT/PAT
  • Activity Configuring NAT/PAT
  • Routing Protocols
  • Activity Configuring a Routing Protocol
  • Firewalls
  • Activity Configuring Firewalls
  • Advanced Switching and Routing Concepts
  • Activity Exploring IPv6
  • Performance Concepts
  • IP Addressing
  • Subnetting
  • Activity Learning to Subnet
  • Address Assignments
  • Network Types and Topologies
  • Wireless Topologies
  • Network Types
  • Technologies that Facilitate the Internet Of Things (IoT)
  • Wireless Technologies
  • 802.11 Standards
  • Wi-Fi Frequencies
  • Wi-Fi Antenna Concepts
  • Bluetooth
  • Cellular
  • Activity Using an RF Spectrum Analyzer
  • cloud concepts
  • Activity Exploring Cloud Services
  • Network Services
  • Activity Setting up DNS
  • DHCP Service
  • Activity Setting Up DHCP
  • NTP

Module 2 – Infrastructure

  • Module 2 Workbook
  • Module 2 – Infrastructure
  • Activity Testing a Fiber Optic Cable
  • Plenum vs. PVC
  • Activity Crimping on an RJ-45 Connector
  • Transceivers
  • Activity Terminating Cable to a 110 Block
  • Copper Cable Standards
  • Activity Creating a Crossover Cable
  • Ethernet Deployment Standards
  • Network Device Placement and Installation
  • Repeater
  • Router
  • Modem
  • Activity Setting up a WAP
  • Firewall
  • Media Converter
  • Advanced Network Devices
  • Wireless Controller
  • Proxy Server
  • Activity Configuring Proxy Settings
  • VPN Concentrator
  • Virtual Networking Components
  • Network Storage Types
  • WAN Technologies
  • Transmission Mediums
  • Activity Configuring WAN Links
  • Termination

Module 3 – Network Operation

  • Module 3 Workbook
  • Network Operations Documentation
  • Standard Operation Procedures
  • Logical vs Physical Diagrams
  • Rack Diagrams
  • Change Management
  • Wiring and Ports Locations
  • IDF-MDF Documentation
  • Labeling
  • Using Documentation Act
  • Continuity and Disaster
  • MTTR Mean Time Repair
  • Recovery
  • Backing Up Your Data Act
  • Event Management
  • Metrics
  • Scanning Monitoring Patching
  • Testing the Network Act
  • HTTPS-Management
  • Out-of-Band Management
  • RDP
  • Remote Access Methods
  • Remote File Access
  • Making Remote Connections Act
  • SSH
  • VNC
  • Policies and Best Practices
  • Creating Policies and Procedures Act

Module 4 – Network Security

  • Module 4 Workbook
  • Physical Security Devices
  • Examining Security Devices Act
  • Authentication and Access
  • Access Controls Methods Act
  • Multifactor Authentication
  • Basic Wireless Network Security
  • Demonstrating the Need for Wireless Act
  • Common Network Attacks
  • Conducting a Phishing Campaign Act
  • Network Device Hardening
  • Supporting Secure Authentication Encryption Act
  • Updating Firmware
  • Explain Common Mitigation Techniques
  • Implementing a Honey Pot Act

Module 5 – Network Troubleshooting and Tools

  • Module 5 Workbook
  • Network Troubleshoot
  • Using the Appropriate Tools
  • Hardware Tools Analyzers
  • Troubleshooting With Hardware Tools Act
  • Software Tools
  • Troubleshooting with Software Tools Act
  • Software Tools Command Line
  • Troubleshooting with Command Line Tools Act
  • Troubleshoot Common Wired Connectivity
  • Troubleshooting Signal Problems
  • Physical Issues
  • Transceiver Issues
  • Troubleshooting Transceiver Problems
  • Traffic Flow Issues
  • Troubleshoot Common Wireless Connectivity
  • Latency and Jitter
  • Incorrect WAP Types
  • Troubleshooting WAP Issues
  • Troubleshooting Common Network
  • DHCP Issues
  • Firewall ACL Issues
  • Advanced Network Issues
  • Unresponsive Services
  • Case Study Troubleshooting
  • Outro N10 007
Module 1 – The Pen Test Engagement

  • Module 1 Notes
  • 1.0 PenTest Plus Introduction
  • 1.1 PenTest Plus Topics
  • 1.2 PenTest Engagement
  • 1.3 Threat Modeling
  • 1.4 Technical Constraints
  • 1.5 PenTest Engagement Review
  • 1.6 Examining PenTest Engagement Documents Act

Module 2 – Passive Reconnaissance

  • Module 2 Notes
  • 2.1 Passive Reconnaissance part1
  • 2.2 WHOIS Act
  • 2.3 Passive Reconnaissance part2
  • 2.4 Google Hacking Act
  • 2.5 Passive Reconnaissance part3
  • 2.6 DNS Querying Act
  • 2.7 Passive Reconnaissance part4
  • 2.8 Email Server Querying Act
  • 2.9 SSL-TLS Cerfificates
  • 2.10 Shodan Act
  • 2.11 The Havester
  • 2.12 TheHarvester Act
  • 2.13 Recon-ng
  • 2.14 Recon-g Act
  • 2.14 Recon-ng-Part-2-API-key Act
  • 2.15 Maltego
  • 2.16 Have I been Pwned
  • 2.17 Punked and Owned Pwned Act
  • 2.18 Fingerprinting Organization with Collected Archives
  • 2.19 FOCA Act
  • 2.20 Findings Analysis Weaponization
  • 2.21 Chp 2 Review

Module 3 – Active Reconnaissance

  • Module 3 Notes
  • 3.1 Active Reconnaissannce
  • 3.2 Discovery Scans Act
  • 3.3 Nmap
  • 3.4 Nmap Scans Types Act
  • 3.5 Nmap Options
  • 3.6 Nmap Options Act
  • 3.7 Stealth Scans
  • 3.8 Nmap Stealth Scans Act
  • 3.9 Full Scans
  • 3.10 Full Scans Act
  • 3.11 Packet Crafting
  • 3.12 Packet Crafting Act
  • 3.13 Network Mapping
  • 3.14 Metasploit
  • 3.15 Scanning with Metasploit Act
  • 3.16 Enumeration
  • 3.17 Banner Grabbing Act
  • 3.18 Windows Host Enumeration
  • 3.19 Winddows Host Enumeration Act
  • 3.20 Linux Host Enumeration
  • 3.21 Linux Host Enumeration Act
  • 3.22 Service Enumeration
  • 3.23 Service Enumeration Act
  • 3.24 Network Shares
  • 3.25 SMB Share Enumeration Act
  • 3.26 NFS Network Share Enumeration
  • 3.27 NFS Share Enumeration Act
  • 3.28 Null Sessions
  • 3.29 Null Sessions Act
  • 3.30 Website Enumeration
  • 3.31 Website Enumeration Act
  • 3.32 Vulnerability Scans
  • 3.33 Compliance Scans Act
  • 3.34 Credentialed Non-credentialed Scans
  • 3.35 Using Credentials in Scans Act
  • 3.36 Server Service Vulnerability Scan
  • 3.37 Vulnerability Scanning Act
  • 3.38 Web Server Database Vulnerability Scan
  • 3.39 SQL Vulnerability Scanning Act
  • 3.40 Vulnerability Scan Part 2 OpenVAS Act
  • 3.41 Web App Vulnerability Scan
  • 3.42 Web App Vulnerability Scanning Act
  • 3.43 Network Device Vulnerability Scan
  • 3.44 Network Device Vuln Scanning Act
  • 3.45 Nmap Scripts
  • 3.46 Using Nmap Scripts for Vuln Scanning Act
  • 3.47 Packet Crafting for Vulnerbility Scans
  • 3.48 Firewall Vulnerability Scans
  • 3.49 Wireless Access Point Vunerability
  • 3.50 Wireless AP Scans Act
  • 3.51 WAP Vulnerability Scans
  • 3.52 Container Security issues
  • 3.53 How to Update Metasploit Pro Expired Trial License

Module 4 – Physical Security

  • Module 4 Notes
  • 4.1 Physical Security
  • 4.2 Badge Cloning Act
  • 4.3 Physical Security Review

Module 5 – Social Engineering

  • Module 5 Notes
  • 5.1 Social Engineering
  • 5.2 Using Baited USB Stick Act
  • 5.3 Using Social Enginnering to Assist Attacks
  • 5.4 Phishing Act
  • 5.5 Social Engineering Review

Module 6 – Vulnerability Scan Analysis

  • Module 6 Notes
  • 6.1 Vulnerbility Scan Analysis
  • 6.2 Validating Vulnerability Scan Results Act
  • 6.3 Vulnerbility Scan Analysis Review

Module 7 – Password Cracking

  • Module 7 Notes
  • 7.1 Password Cracking
  • 7.2 Brute Force Attack Against Network Service Act
  • 7.3 Network Authentication Interception Attack
  • 7.4 Intercepting Network Authentication Act
  • 7.5 Pass the Hash Attacks
  • 7.6 Pass the Hash Act
  • 7.7 Password Cracking Review

Module 8 – Penetrating Wired Networks

  • Module 8 Notes
  • 8.1 Penetrating Wired Network
  • 8.2 Sniffing Act
  • 8.3 Eavesdropping
  • 8.4 Eavesdropping Act
  • 8.5 ARP Poisoning
  • 8.6 ARP Poisoning Act
  • 8.7 Man In The Middle
  • 8.8 MITM Act
  • 8.9 TCP Session HiJacking
  • 8.10 Server Message Blocks SMB Exploits
  • 8.11 SMB Attack Act
  • 8.12 Web Server Attacks
  • 8.13 FTP Attacks
  • 8.14 Telnet Server Attacks
  • 8.15 SSH Server Attacks
  • 8.16 Simple Network Mgmt Protocol SNMP
  • 8.17 Simple Mail Transfer Protocol SMTP
  • 8.18 Domain Name System DNS Cache Poisoning
  • 8.19 Denail of Service Attack DoS-DDoS
  • 8.20 DoS Attack Act
  • 8.21 VLAN Hopping Review

Module 9 – Penetrating Wireless Networks

  • Module 9 Notes
  • 9.1 Penetrating Wireless Networks
  • 9.2 Jamming Act
  • 9.3 Wireless Sniffing
  • 9.4 Replay Attacks
  • 9.5 WEP Cracking Act
  • 9.6 WPA-WPA2 Cracking
  • 9.7 WAP Cracking Act
  • 9.8 Evil Twin Attacks
  • 9.9 Evil Twin Attack Act
  • 9.10 WiFi Protected Setup
  • 9.11 Bluetooth Attacks
  • 9.12 Penetrating Wireless Networks

Module 10 – Windows Exploits

  • Module 10 Notes
  • 10.1 Windows Exploits
  • 10.2 Dumping Stored Passwords Act
  • 10.3 Dictionary Attacks
  • 10.4 Dictionary Attack Against Windows Act
  • 10.5 Rainbow Table Attacks
  • 10.6 Credential Brute Force Attacks
  • 10.7 Keylogging Attack Act
  • 10.8 Windows Kernel
  • 10.9 Kernel Attack Act
  • 10.10 Windows Components
  • 10.11 Memory Vulnerabilities
  • 10.12 Buffer Overflow Attack Act
  • 10.13 Privilegde Escalation in Windows
  • 10.14 Windows Accounts
  • 10.15 Net and WMIC Commands
  • 10.16 Sandboxes

Module 11 – Linux Exploits

  • Module 11 Notes
  • 11.1 Linux Exploits
  • 11.2 Exploiting Common Linux Features Act
  • 11.3 Password Cracking in Linux
  • 11.4 Cracking Linux Passwords Act
  • 11.5 Vulnerability Linux
  • 11.6 Priviledge Escalation Linux
  • 11.7 Linux Accounts
  • 11.8 Linux Exploits Review

Module 12 – Mobile Devices

  • Module 12 Notes
  • 12.1 Mobile Devices
  • 12.2 Hacking Android Act
  • 12.3 Apple Exploits
  • 12.4 Moblie Devices Review

Module 13 – Specialized Systems

  • Module 13 Notes
  • 13.1 Specialized Systems
  • 13.2 Specialized Systems Review

Module 14 – Scripts

  • Module 14 Notes
  • 14.1 Scripts
  • 14.2 Powershell
  • 14.3 Python
  • 14.4 Ruby
  • 14.5 Common Scripting Elements
  • 14.6 Scripts Review
  • 14.7 Better Ping Sweep
  • 14.8 Simple Port Scanner2
  • 14.9 Multitarget Port Scanner
  • 14.10 Port Scanner with Nmap
  • 14.11 Scripts Review

Module 15 – Application Testing

  • Module 15 Notes
  • 15.1 Application Testing
  • 15.2 Reverse Engineering

Module 16 – Web App Exploits

  • Module 16 Notes
  • 16.1 Webb App Exploits
  • 16.2 Injection Attacks
  • 16.3 HTML Injection
  • 16.4 SQL Hacking – SQLmap Act
  • 16.5 Cross-Site Attacks
  • 16.6 Cross-Site Request Forgery
  • 16.7 Other Web-based Attacks
  • 16.8 File Inclusion Attacks
  • 16.9 Web Shells
  • 16.10 Web Shells Review

Module 17 – Lateral Movement

  • Module 17 Notes
  • 17.1 Lateral Movement
  • 17.2 Lateral Movement with Remote Mgmt Services
  • 17.3 Process Migration Act
  • 17.4 Passing Control Act
  • 17.5 Pivoting
  • 17.6 Tools the Enable Pivoting
  • 17.7 Lateral Movement Review

Module 18 – Persistence

  • Module 18 Notes
  • 18.1 Persistence
  • 18.2 Breeding RATS Act
  • 18.3 Bind and Reverse Shells
  • 18.4 Bind Shells Act
  • 18.5 Reverse Shells
  • 18.6 Reverse Shells Act
  • 18.7 Netcat
  • 18.8 Netcat Act
  • 18.9 Scheduled Tasks
  • 18.10 Scheduled Tasks Act
  • 18.11 Services and Domains
  • 18.12 Persistence Review

Module 19 – Cover Your Tracks

  • Module 19 Notes
  • 19.1 Cover Your Tracks
  • 19.2 Cover Your Tracks – Timestomp Files Act
  • 19.3 Cover Your Tracks – Frame the Administrator Act
  • 19.4 Cover Your Tracks – Clear the Event Log Act
  • 19.5 Cover Your Tracks Review

Module 20 – The Report

  • Module 20 Notes
  • 20.1 The Report
  • 20.2 The Report Review

Module 21 – Post Engagement Cleanup

  • Module 21 Notes
  • 21.1 Post Engagement Cleanup_1
  • 21.3 Post Engagement Cleanup Review
  • 21.4 PenTest Plus Conclusion

Module 1: Information Security Roles Security Control and Framework Types

  • Introduction and Overview
  • Compare and Contrast Information Security Roles
  • Compare and Contrast Security Control and Framework Types
  • Module Summary

Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources

  • Explain Threat Actor Types and Attack Vectors
  • Explain Threat Intelligence Sources
  • Module Summary

Module 3: Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing

  • Assess Organizational Security with Network Reconnaissance Tools
  • Packet Capture and Replay Demo
  • Explain Security Concerns with General Vulnerability Types
  • Summarize Vulnerability Scanning Techniques
  • Explain Penetration Testing Concepts
  • Module Summary

Module 4: Social Engineering, Indicators of Malware Attacks

  • Compare and Contrast Social Engineering Techniques
  • Analyze Indicators of Malware-based Attacks
  • Fork Bomb Malware Demo
  • Module Summary

Module 5: Cryptography

  • Compare and Contrast Cryptographic Ciphers
  • Summarize Cryptographic Modes of Operation
  • Summarize Cryptographic Use Cases and Weaknesses
  • Summarize Other Cryptographic Technologies
  • Module Summary

Module 6: Certificates and PKI

  • Implement Certificates and Certificate Authorities
  • Implement PKI Management
  • Implementing a PKI Demo
  • Module Summary

Module 7: Authentication

  • Summarize Authentication Design Concepts
  • Implement Knowledge-based Authentication
  • Password Cracker Demo
  • Implement Authentication Technologies
  • Summarize Biometrics Authentication Concepts
  • Module Summary

Module 8: Identity and Accounts, Authorization, Personnel Polices

  • Implement Identity and Account Types
  • Implement Account Policies
  • Account Types and Polices Demo
  • Implement Authorization Solutions
  • Explain the Importance of Personnel Policies
  • Module Summary

Module 9: Network Design and Hardware (Part 1)

  • Implement Secure Network Designs
  • Implement Secure Switching and Routing
  • Various Types of Network Attacks Demo
  • Implement Secure Wireless Infrastructure
  • Implement Load Balancers
  • Module Summary

Module 10: Network Hardware (Part 2)

  • Implement Firewalls and Proxy Servers
  • Implement Network Security Monitoring
  • Summarize the Use of SIEM
  • Module Summary

Module 11: Network Protocols

  • Implement Secure Network Operations Protocols
  • Implement Secure Application Protocols
  • Implement Secure Remote Access Protocols
  • Module Summary

Module 12: Endpoint Security

  • Implement Secure Firmware
  • Implement Endpoint Security
  • Endpoint Protection Demo
  • Explain Embedded System Security Implications
  • Module Summary

Module 13: Mobile Devices

  • Implement Mobile Device Management
  • Implement Secure Mobile Device Connections
  • Module Summary

Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation

  • Analyze Indicators of Application Attack
  • Analyze Indicators of Web Application Attacks
  • Summarize Secure Coding Practices
  • Implement Secure Script Environments
  • Summarize Deployment and Automation Concepts
  • Module Summary

Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualization

  • Summarize Secure Cloud and Virtualization Services
  • Apply Cloud Security Solutions
  • Summarize Infrastructure as Code Concepts
  • Module Summary

Module 16: Privacy and Data Protection

  • Explain Privacy and Data Sensitivity Concepts
  • Explain Privacy and Data Protection Controls
  • Module Summary

Module 17: Incident Response

  • Summarize Incident Response Procedures
  • Utilize Appropriate Data Sources for Incident Response
  • Apply Mitigation Controls
  • Module Summary

Module 18: Forensics

  • Explain Key Aspects of Digital Forensics Documentation
  • Explain Key Aspects of Digital Forensics Evidence Acquisition
  • Module Summary

Module 19: Risk Management and Business Impact Analysis

  • Explain Risk Management Processes and Concepts
  • Explain Business Impact Analysis Concepts
  • Module Summary

Module 20: Redundancy and Backup Strategies

  • Implement Redundancy Strategies
  • Implement Backup Strategies
  • Implement Cybersecurity Resiliency Strategies
  • Module Summary

Module 21: Physical Security

  • Explain the Importance of Physical Site Controls
  • Explain the Importance of Physical Host Security Controls
  • Module Summary

Module 22: Afterword

  • Conclusion and General Exam Tips

Module 1: Threats, Attacks and Vulnerabilities

  • Module 1 Workbook
  • Introduction
  • Types Of Malware-Part 1
  • Types Of Malware-Part 2
  • Types Of Attacks-Part 1
  • Types Of Attacks-Part 2
  • Types Of Attacks-Part 3
  • Types Of Attacks-Part 4
  • Types Of Attacks-Part 5
  • Threat Actors-Part 1
  • Threat Actors-Part 2
  • Penetration Testing And Vulnerability Scanning-Part 1
  • Penetration Testing And Vulnerability Scanning-Part 2
  • Impact Of Vulnerabilities-Part 1
  • Impact Of Vulnerabilities-Part 2

Module 2: Technologies and Tools

  • Module 2 Workbook
  • Networking Hardware And Software-Part 1
  • Networking Hardware And Software-Part 2
  • Networking Hardware And Software-Part 3
  • Networking Hardware And Software-Part 4
  • Networking Hardware And Software-Part 5
  • Networking Hardware And Software-Part 6
  • Security Assessment-Part 1
  • Security Assessment-Part 2
  • Troubleshooting Issues-Part 1
  • Troubleshooting Issues-Part 2
  • Securing Mobile Devices-Part 1
  • Securing Mobile Devices-Part 2
  • Securing Mobile Devices-Part 3
  • Securing Mobile Devices-Part 4
  • Secure Protocols-Part 1
  • Secure Protocols-Part 2

Module 3: Architecture and Design

  • Module 3 Workbook
  • Secure Network Architecture-Part 1
  • Secure Network Architecture-Part 2
  • Secure System Designs-Part 1
  • Secure System Designs-Part 2
  • Secure Staging Deployment Concepts
  • Embedded Systems-Part 1
  • Embedded Systems-Part 2
  • Application Development And Deployment-Part 1
  • Application Development And Deployment-Part 2
  • Application Development And Deployment-Part 3
  • Physical Security Controls-Part 1
  • Physical Security Controls-Part 2
  • Physical Security Controls-Part 3
  • Cloud Virtualization-Part 1
  • Cloud Virtualization-Part 2

Module 4: Identity and Access Management

  • Module 4 Workbook
  • Identity And Access Management-Part1
  • Identity And Access Management-Part2
  • Identity And Access Services-Part1
  • Identity And Access Services-Part2
  • Management Controls-Part1
  • Management Controls-Part2
  • Account Management Practices-Part1
  • Account Management Practices-Part2
  • Account Management Practices-Part3

Module 5: Risk Management

  • Module 5 Workbook
  • Organizational Security-Part1
  • Organizational Security-Part2
  • Business Impact Analysis Concepts-Part1
  • Business Impact Analysis Concepts-Part2
  • Risk Management-Part1
  • Risk Management-Part2
  • Incident Response Procedures-Part1
  • Incident Response Procedures-Part2
  • Forensics-Part1
  • Forensics-Part2
  • Disaster Recovery-Part1
  • Disaster Recovery-Part2
  • Types Of Control-Part1
  • Types Of Control-Part2
  • Data Security And Privacy Practices-Part1
  • Data Security And Privacy Practices-Part2

Module 6: Cryptography and PKI

  • Module 6 Workbook
  • Cryptographic Basics-Part1
  • Cryptographic Basics-Part2
  • Cryptographic Basics-Part3
  • Cryptographic Algorithms-Part1
  • Cryptographic Algorithms-Part2
  • Wireless Security-Part1
  • Wireless Security-Part2
  • Implementing PKI-Part1
  • Implementing PKI-Part2
  • Implementing PKI-Part3
  • Conclusion
Module 1: Course Overview

  • 1.1 Course Overview
  • 1.2 Course PreReqs

Module 2: Kubernetes and Container Fundamentals

  • 2.1 Core Concepts
  • 2.2 What is the CKAD Exam
  • 2.3 Why Get Certified
  • 2.4 CKAD Exam Domains
  • 2.5 APIs
  • 2.6 Demo – Explore APIS
  • 2.7 Pods
  • 2.8 Whiteboard – Pod Creation Workflow
  • 2.9 Create a Pod
  • 2.10 Lifecycle Status
  • 2.11 Inspecting Pods
  • 2.12 Demo – Create a Pod and Inspect

Module 3: Configuration

  • 3.1 Configuration
  • 3.2 Understand Configmaps
  • 3.3 Understand Security Contexts
  • 3.4 Demo – Create a Security Context
  • 3.5 Create and Consume Secrets
  • 3.6 Understand Service Accounts
  • 3.7 Demo – Create a Pod to Use a Secret
  • 3.8 Demo – Define a Service Account

Module 4: Multi Container Pods

  • 4.1 Multi Container Pods
  • 4.2 Multi Container Pods Design and Patterns
  • 4.3 Ambassador Containers
  • 4.4 Connecting to Pods
  • 4.5 Side Cars
  • 4.6 Demo – Create an Init Container

Module 5: Observability

  • 5.1 Observability
  • 5.2 Container Health
  • 5.3 Probes
  • 5.4 Logging
  • 5.5 Monitor Resources and Apps
  • 5.6 Monitoring Pods
  • 5.7 Demo – Monitoring and Logging

Module 6: Pod Design

  • 6.1 Pod Design
  • 6.2 Deployments
  • 6.3 Rolling Updates
  • 6.4 Pod Changes
  • 6.5 Jobs and Crons
  • 6.6 Labels and Annotations
  • 6.7 Demo – Define and Query Labels
  • 6.8 Scalability Options

Module 7: Services and Networking

  • 7.1 Services and Networking
  • 7.2 Understanding Networking, Routing and Services
  • 7.3 Network Policies
  • 7.4 Namespaces
  • 7.5 Demo – Networking

Module 8: State Persistence

  • 8.1 State Persistence
  • 8.2 Storage Options
  • 8.3 Volume Storage
  • 8.4 Configure Pod Volumes
  • 8.5 Configure Persistent Volumes
  • 8.6 Whiteboard – Persistent Volumes

Module 9: CKA Practice Exams

  • 9.1 CKAD Practice Preparation
  • 9.2 Exam Prep Need to Know
  • 9.3 Question 1 – Create a Pod and Inspect
  • 9.4 Question 2 – Define a Pods Readiness
  • 9.5 Question 3 – Create a Pod with a Secret
  • 9.6 Question 4 – View Pods logs in Real Time
  • 9.7 Question 5 – Define and query labels
  • 9.8 Additional Questions

Module 10: Course Closeout

    • 10.1 Course Closeout
    • 10.2 Course Summary Review
    • 10.3 Kubernetes Certifications
    • 10.4 Additional Resources
    • 10.5 Exam Review
    • 10.6 Course Closeout
Module 1: Course Overview

  • 1.1 Course Overview
  • 1.2 Course PreReqs

Module 2: Kubernetes and Container Fundamentals

  • 2.1 Core Concepts
  • 2.2 What is the CKA Exam
  • 2.3 Why Get Certified
  • 2.4 CKA Exam Domains
  • 2.5 What is Kubernetes
  • 2.6 What is a Container
  • 2.7 What is Docker
  • 2.8 Kubernetes Terminology
  • 2.9 Kubernetes Components
  • 2.10 Kubernetes Documentation
  • 2.11 Whiteboard – Kubernetes Overview

Module 3: Kubernetes Installation

  • 3.1 Kubernetes Installation
  • 3.2 Installation Options
  • 3.3 MiniKube
  • 3.4 Demo – Install Minikube
  • 3.5 Demo – Clusters
  • 3.6 Kubectl Basics
  • 3.7 Demo – Install Kubectl

Module 4: Working with Kubernetes Clusters and Nodes

  • 4.1 Working with Kubernetes Clusters and Nodes
  • 4.2 Understanding the Architecture
  • 4.3 Understanding the nodes
  • 4.4 Core Objects
  • 4.5 API
  • 4.6 Create a Cluster
  • 4.7 Demo – Create a Cluster
  • 4.8 Demo – YAML
  • 4.9 Demo – Nodes
  • 4.10 Demo – Kubectl Client Config

Module 5: API Access and Commands

  • 5.1 API Access and Commands
  • 5.2 About the API
  • 5.3 Accessing the APIs
  • 5.4 Demo – Exploring APIS
  • 5.5 Kubectl
  • 5.6 Using YAML for API Objects
  • 5.7 Using Curl
  • 5.8 Labels and Annotations

Module 6: Running Pods and Deployments

  • 6.1 Running Pods and Deployments
  • 6.2 Pods and Deployments
  • 6.3 What is a Namespace
  • 6.4 Scalability Options
  • 6.5 Rolling Updates
  • 6.6 Apply Changes to a Pod
  • 6.7 Stateful Sets
  • 6.8 Demo – Manage Deployments

Module 7: Configuring Storage

  • 7.1 Configuring Storage
  • 7.2 Storage options with Kubernetes
  • 7.3 Configure Pod Volumes
  • 7.4 Configure Persistent Volumes
  • 7.5 Storage Classes
  • 7.6 Whiteboard – Persistent Volumes
  • 7.7 Demo – Configure Storage

Module 8: Kubernetes Networking

  • 8.1 Kubernetes Networking
  • 8.2 Understanding Networking
  • 8.3 Services
  • 8.4 Network Plugins
  • 8.5 DNS
  • 8.6 Network Policies
  • 8.7 Namespaces
  • 8.8 Demo – Networking
  • 8.9 Manage High Availability

Module 9: Managing Security

  • 9.1 Managing Security
  • 9.2 Kubernetes Security
  • 9.3 Container and Pod Security
  • 9.4 Certificates
  • 9.5 API Security
  • 9.6 Configmaps and Secrets
  • 9.7 Secure Images
  • 9.8 Security Context
  • 9.9 RBAC

Module 10: Managing Kubernetes In the Enterprise

  • 10.1 Managing Kubernetes In the Enterprise
  • 10.2 Cluster Management and Maintenance
  • 10.3 Demo – Scale Deployment
  • 10.4 Demo – Restart Cluster
  • 10.5 Demo – Add or Remove Nodes
  • 10.6 Demo – Create a Pod in the Background
  • 10.7 Kubelet Restarts and Drains
  • 10.8 UI Dashboard
  • 10.9 Demo – Describe Resources
  • 10.10 Kube-scheduler
  • 10.11 Demo – Set-Up Alias

Module 11: Kubernetes Monitoring and Troubleshooting

  • 11.1 Kubernetes Monitoring and Troubleshooting
  • 11.2 Monitoring Resources
  • 11.3 Monitoring Pods
  • 11.4 Demo – Monitoring Pods
  • 11.5 Logging
  • 11.6 Demo – Logging
  • 11.7 Troubleshooting
  • 11.8 Affinity and Taints

Module 12: CKA Practice Exams

  • 12.1 CKA Practice Exams
  • 12.2 Exam Preparation Must Know
  • 12.3 Question 1 – Create a Cluster, Deploy Pods and a Deployment
  • 12.4 Question 2 – Create a Pod and Verify
  • 12.5 Question 3 – Create a Pod with a Secret
  • 12.6 Question 4 – Get Logs on a Pod and Send to File
  • 12.7 Question 5 – Liveness Probe
  • 12.8 Question 6 – Use Labels
  • 12.9 Additional Questions

Module 13: Course Closeout

    • 13.1 Course Closeout
    • 13.2 Course Review
    • 13.3 Kubernetes Certifications
    • 13.4 Additional Resources
    • 13.5 Exam Readiness
    • 13.6 Course Closeout
Module 1: Course Overview

  • Course Overview
  • Course PreReqs

Module 2: Basics of Kubernetes

  • Basics of Kubernetes
  • What is Kubernetes
  • Business Value of Kubernetes
  • What is a Container
  • What is Docker
  • Kubernetes History
  • Kuberntes Terminology
  • Kubernetes Components
  • Whiteboard – Kubernetes Overview

Module 3: Kubernetes Design and Architecture

  • Kubernetes Design and Architecture
  • Kubernetes Design Fundamentals
  • Whiteboard – Kubernetes Architecture
  • Deployment – Nodes, Pods, and Clusters
  • Etcd
  • Kubectl
  • Demo – Install Kubectl
  • Demo – Kubernetes Commands
  • Demo – Kubernetes Commands

Module 4: Deployments

  • Deployments
  • Options for Deployment
  • Deploying a Containerized Application
  • What is Minikube
  • Demo – Deploy MiniKube
  • Demo – Deploy Cluster Deployment
  • Demo – Deploy Services
  • Demo – Manage Application

Module 5: Course Closeout

    • Course Closeout
    • Course Review
    • Kubernetes Certifications
    • Additional Resources
    • Kubernetes Job Outlook
    • Course Closeout
Module 1: Course Overview

  • Course Overview
  • Course Pre Reqs

Module 2: The Basics

  • The Basics
  • What is DevOps
  • DevOps Building Blocks
  • DevOps Best Practices
  • Why Containers
  • What is a Pipeline
  • Continuous Integration and Continous Delivery
  • Continuous Deployment
  • Pipelines – Whiteboard

Module 3: Development

  • Development Basics
  • CICD Strategy
  • Source Control Management
  • Demo – Build Management

Module 4: Infrastructure

  • Release and Deployments
  • Release Management
  • Demo – Release Management
  • Reliability Engineering
  • DevOps Tools
  • Infrastructure as Code
  • Automation
  • Demo – (IaaC) CloudFormation
  • Demo – Jenkins
  • Demo – GitHub

Module 5: Key Performance Indicators (KPIs)

  • Key Performance Indicators (KPI)
  • KPI Metrics
  • KPI Tools
  • Monitoring Applications
  • Demo – AWS CloudWatch

Module 6: Course Closeout

  • Course Closeout
  • 6.1 Module 6 Introduction
  • 6.2 Course Review
  • Summary Review
  • 6.3 Blockchain Roles
  • Additional Resources
  • DevOps Job Outlook
  • Course Closeout

Module 1: Introduction to AWS Basics

  • 1.1 Instructor Intro
  • 1.2 AWS Basic Intro
  • 1.3 What Is AWS
  • 1.4 Advantages of cloud computing
  • 1.5 Types of cloud computing

Module 2: AWS Web Services and Cloud Platform Services

  • 2.1 Console
  • 2.2 CLI
  • 2.3 Compute/EC2
  • 2.4 Database-RDS
  • 2.5 Networking and content delivery
  • 2.6 Analytics
  • 2.7 SQS-SNS
  • 2.8 Workmail
  • 2.9 SES
  • 2.10 Systems manager
  • 2.11 CloudTrail
  • 2.12 Route53
  • 2.13 Elastic Load Balancing (ELB)
  • 2.14 Certificate manager
  • 2.15 Directory service
  • 2.16 Amazon Simple Storage Service (S3)
  • 2.17 Identity and Access Management (IAM)

Module 3: AWS Basic Summary

  • 3.1 AWS Basic Summary

Module 4: Introduction to AWS Deep Dive

  • 4.1 AWS Deep Dive Intro

Module 5: AWS Management of Services and Features Deep Dive

  • 5.1 VPC and Endpoint services pt 1
  • 5.1 VPC and Endpoint services pt 2
  • 5.2 DNS (Route 53)
  • 5.3 Elastic Load Balancing (ELB) & Certificate manager pt 1
  • 5.3 Elastic Load Balancing (ELB) & Certificate manager pt 2
  • 5.4 Compute-EC2 Stand alone and SA with AR pt 1
  • 5.4 Compute-EC2 Stand alone and SA with AR pt 2
  • 5.5 ASG and Suspended ASG processes pt 1
  • 5.5 ASG and Suspended ASG processes pt 2
  • 5.6 Code deploy pt 1
  • 5.6 Code deploy pt 2
  • 5.7 Backups-Recovery of EC2 pt 1
  • 5.7 Backups-Recovery of EC2 pt 2
  • 5.7 Backups-Recovery of EC2 pt 3
  • 5.8 RDS pt 1
  • 5.8 RDS pt 2
  • 5.8 RDS pt 3
  • 5.9 Directory service
  • 5.10 Identity and Access Management (IAM) pt 1
  • 5.10 Identity and Access Management (IAM) pt 2
  • 5.11 Amazon Simple Storage Service (S3)
  • 5.12 SES
  • 5.13 Cloudwatch
  • 5.14 Cloudtrail

Module 6: AWS Deep Dive Summary

  • 6.1 AWS Deep Dive Summary

Module 1: Introduction to Cloud Computing

  • Welcome
  • Why Cloud Computing
  • What is Cloud Computing
  • Cloud Computing Deployment Models
  • Cloud Computing Types
  • AWS Cloud Overview
  • AWS Management Console Walk-Through
  • AWS Shared Responsibility
  • Summary

Module 2: Identity and Access Management IAM

  • IAM Overview
  • IAM Users & Groups Hands-On
  • IAM Policies Hands-On
  • MFA Overview
  • MFA Hands-On
  • AWS CLI
  • AWS CLI Installation Hands-On
  • AWS CLI Hands-On
  • IAM Roles
  • IAM Roles Hands-On
  • IAM Security Tools
  • IAM Security Tools Hands-On
  • IAM Best Practices
  • Shared Responsibility Model for IAM
  • IAM Summary

Module 3: Elastic Cloud Computing EC2

  • Budget Setup
  • EC2 Overview
  • EC2 Instance Hands-On
  • Security Groups
  • Security Groups Hands-On
  • SSH Overview
  • SSH Using Putty-Windows
  • SSH Using CMD-Windows
  • EC2 Instance Connect
  • EC2 Instance Roles
  • EC2 Launch Types
  • Shared Responsibility Model for EC2
  • EC2 Summary

Module 4: EC2 Storage

  • Intro to EC2 Instance Storage
  • EBS Volume Overview
  • EBS Volume Hands-On
  • EBS Snapshots
  • EBS Snapshots Hands-On
  • AMI Overview
  • AMI Hands-On
  • EC2 Instance Store
  • EC2 Instance Store Hands-On
  • Elastic File System – EFS
  • Shared responsibility Model for EC2 Storage
  • Section Cleanup
  • EC2 Instance Storage Summary

Module 5: Elastic Load Balancer and Auto Scaling Group ELB and ESG

  • Introduction to Scalability & High-Availability
  • High Availability, Scalability and Elasticity
  • ELB Overview
  • ELB Hands-On
  • ASG Overview
  • ASG Hands-On
  • Section Cleanup
  • Summary

Module 6: Amazon S3

  • S3 Introduction
  • S3 Overview
  • S3 Hands-On
  • S3 Security
  • S3 Bucket Policies Hands-On
  • S3 Websites
  • S3 Website Hands-On
  • S3 Versioning
  • S3 Versioning Hands-On
  • S3 Access Logs
  • S3 Access Logs Hands-On
  • S3 Replication
  • S3 Replication Hands-On
  • S3 Storage Classes
  • Snowball, Snowball Edge and SnowMobile
  • S3 Summary

Module 7: Database and Analytics

  • Database Introduction
  • RDS & Aurora Overview
  • RDS Database Hands-On
  • ElastiCache Overview
  • DynamoDB Overview
  • DynamoDB Hands-On
  • RedShift Overview
  • Amazon EMR Overview
  • Athena Overview
  • AWS Glue
  • DMS Overview
  • Database & Analytics Summary

Module 8: Other Services

  • Other Compute Introduction
  • ECS-Fargate-ECR Overview
  • What is Serverless
  • AWS Lambda
  • AWS Lambda Hands-On
  • AWS Batch
  • AWS LightSail
  • AWS LightSail Hands-On
  • Other Compute Summary

Module 9: Scaling Your Infrastructure

  • CloudFormation Overview
  • Cloud Formation Hands-On
  • Elastic Beanstalk Overview
  • Elastic Beanstalk Hands-On
  • AWS CodeDeploy
  • AWS SSM
  • AWS OpsWorks
  • Infrastructure at Scale Summary

Module 10: Global Applications

  • Why Global Application
  • Route 53
  • Route 53 Hands-On
  • CloudFront
  • CloudFront Hands-On
  • S3 Transfer Acceleration
  • AWS Global Aceelerator
  • Global Application Summary

Module 11: Cloud Integration

  • Cloud Integration Introduction
  • SQS Service
  • SQS Service Hands-On
  • SNS Service
  • SNS Service Hands-On
  • Cloud Integration Summary

Module 12: Cloud Monitoring

  • CloudWatch Metrics and Alarms
  • CloudWatch Metrics and Alarms Hands-On
  • CloudWatch Logs
  • CloudWatch Events and EventBridge
  • CloudWatch Events and EventBridge Hands-On
  • CloudTrail
  • X-Ray
  • Service Health Dashboard
  • Personal Health Dashboard
  • Monitoring Summary

Module 13: Virtual Private Network

  • Settings the Expectations
  • VPC and subnets, Internet Gateway and NAT Gateways
  • VPC and subnets, Internet Gateway and NAT Gateways-Hands-On
  • NACL and Security Groups
  • NACL and Security Groups Hands-On
  • VPC Flow Logs
  • VPC Peering
  • VPC Flow Logs and VPC Peering Hands-On
  • VPC Endpoints
  • VPC Endpoints Hands-On
  • Site-to-Site VPNs and Direct Connect
  • Transit Gateway
  • VPC Summary

Module 14: Security and Compliance

  • Introduction to Security and Compliance
  • DDoS Mitigration
  • Penetration Testing
  • KMS and CloudHSM
  • Secrets Manager
  • AWS Artifact
  • GuardDuty
  • Inspector
  • AWS Config
  • AWS Macie
  • Security and Compliance Summary

Module 15: Machine Learning

  • Amazon Rekognition
  • Amazon Transcribe
  • Amazon Polly
  • Amazon Translate
  • Amazon Lex and Connect
  • Amazon Comprehend
  • Amazon SageMaker
  • Machine Learning Summary

Module 16: Advanced Identity

  • Amazon Cognito
  • Directory Services
  • Single Sign-On (SSO)
  • Advanced Identity Summary

Module 17: Are You Well Architected?

  • Are You Well Architected
  • Operational Excellence
  • Security
  • Reliability
  • Performance Efficiency
  • Cost Optimization
  • Trusted Advisor

Module 18: Congratulations & Exam Preparation

  • Exam Tips & Congratulations

Module 1: Introduction

  • Instructor Introduction
  • Course Introduction
  • Exam Overview

Module 2: Information Security Governance

  • Module Overview
  • InfoSec Strategic Context Part 1
  • InfoSec Strategic Context Part 2
  • GRC Strategy and Assurance
  • Roles and Responsibilities
  • GMA Tasks Knowledge and Metrics
  • IS Strategy Overview
  • Strategy Implemenation
  • Strategy Development Support
  • Architecture and Controls
  • Considerations and Action Plan
  • InfoSec Prog Objectives and Wrap-Up

Module 3: Information Security Risk Management

  • Module Overview
  • Risk Identification Task and Knowledge
  • Risk Management Strategy
  • Additional Considerations
  • Risk Analysis and Treatment Tasks & Knowledge
  • Leveraging Frameworks
  • Assessment Tools and Analysis
  • Risk Scenario Development
  • Additional Risk Factors
  • Asset Classification and Risk Management
  • Risk Monitoring and Communication
  • Information Risk Management Summary

Module 4: InfoSec Prog Development and Management

  • Module Overview
  • Alignment and Resource Management – Task and Knowledge
  • Key Relationships
  • Standards Awareness and Training – Tasks and Knowledge
  • Awareness and Training
  • Building Security into Process and Practices – Tasks and Knowledge
  • Additional Technology Infrastructure Concerns
  • Security monitoring and reporting Overview Tasks and Knowledge
  • Metrics and Monitoring
  • Summary

Module 5: Information Security Incident Management

  • Module Overview
  • Planning and Integration Overview Task and Knowledge
  • Incident Response Concepts and Process
  • Forensics and Recovery
  • Readiness and Assessment – Overview Tasks and Knowledge
  • Identification and Response Overview Tasks and Knowledge
  • Incident Processes

Module 6: Exam Prep

  • Case Study – Security On a Shoestring Budget
  • Case Study – APT In Action
  • Summary
  • Exam Prep

Domain 1: Information Security Governance

  • CISM Introduction
  • Information Security
  • Business Goals, Objectives, and Functions
  • Business Goals and Information Security
  • Information Security Threats
  • Information Security Management
  • Identity Management
  • Data Protection
  • Network Security
  • Personnel Security
  • Facility Security
  • Security Compliance and Standards
  • Information Security Strategy
  • Inputs and Outputs of the Informtion Security Strategy
  • Processes in an Information Security Strategy
  • People in an Information Security Strategy
  • Technologies in an Indormation Security Strategy
  • Logical and Physical Information Security Strategy Architectures
  • Information Security and Business Functions
  • Information Security Policies and Enterprise Objectives
  • International Standards for the Security Management
  • ISO/IEC 27000 Standards
  • International Info Government Standards
  • Information Security Government Standards in the United States
  • Methods of Coordinating Information Security Activites
  • How to Develop an Information Security Strategy
  • Information Security Governance
  • Role of the Security in Governance
  • Scope of Information Security Governance
  • Charter of Information Security Governance
  • Information Security Governance and Enterprise Governance
  • How to Align Information Security Strategy with Corporate Governance
  • Regulatory Requirements and Information Security
  • Business Impact of Regulatory Requirements
  • Liability Management
  • Liability Management Strategies
  • How to Identify Legal and Regulatory Requirements
  • Business Case Development
  • Budgetary Reporting Methods
  • Budgetary Planning Strategy
  • How to Justify Investment in Info Security
  • Organizational Drivers
  • Impact of Drivers on Info Security
  • Third Party Relationships
  • How to Identify Drivers Affecting the Organization
  • Purpose of Obtaining Commitment to Info Security
  • Methods for Obtaining Commitment
  • ISSG
  • ISSG Roles and Responsibilities
  • ISSG Operation
  • How to Obtain Senior Management’s Commitment to Info Security
  • Info Security Management Roles and Responsibilities
  • How to Define Roles and Responsibilities for Info Security
  • The Need for Reporting and Communicating
  • Methods for Reporting in an Organization
  • Methods of Communication in an Organization
  • How to Establish Reporting and Communicating Channels

Domain 2: Risk Management

  • Risk
  • Risk Assessment
  • Info Threat Types
  • Info Vulnerabilities
  • Common Points of Exposure
  • Info Security Controls
  • Types of Info Security Controls
  • Common Info Security Countermeasures
  • Overview of the Risk Assessment Process
  • Factors Used in Risk Assessment and Analysis
  • Risk Assessment Methodologies
  • Quantitative Risk Assessment – Part 1
  • Quantitative Risk Assessment – Part 2
  • Qualitative Risk Assessment
  • Hybrid Risk Assessment
  • Best Practices for Info Security Management
  • Gap Analysis
  • How to Implement an Info Risk Assessment Process
  • Info Classification Schemas
  • Components of Info Classification Schemas
  • Info Ownership Schemas
  • Components of Info Ownership Schemas
  • Info Resource Valuation
  • Valuation Methodologies
  • How to Determine Info Asset Classification and Ownership
  • Baseline Modeling
  • Control Requirements
  • Baseline Modeling and Risk Based Assessment of Control Requirements
  • How to Conduct Ongoing Threat and Vulnerability Evaluations
  • BIA’s
  • BIA Methods
  • Factors for Determining Info Resource Sensitivity and Critically
  • Impact of Adverse Events
  • How to Conduct Periodic BIA’s
  • Methods for Measuring Effectiveness of Controls and Countermeasures
  • Risk Mitigation
  • Risk Mitigation Strategies
  • Effect of Implementing Risk Mitigation Strategies
  • Acceptable Levels of Risk
  • Cost Benefit Analysis
  • How to Identify and Evaluate Risk Mitigation Strategies
  • Life Cycle Processes
  • Life Cycle-Based Risk Management
  • Risk Management Life Cycle
  • Business Life Cycle Processes Affected by Risk Management
  • Life Cycled-Based Risk Management Principles and Practices
  • How to Integrate Risk Management Into Business Life Cycle Processes
  • Significant Changes
  • Risk Management Process
  • Risk Reporting Methods
  • Components of Risk Reports
  • How to Report Changes in Info Risk

Domain 3: Information Security Program

  • Info Security Strategies
  • Common Info Security Strategies
  • Info Security Implementation Plans
  • Conversation of Strategies Into Implementation Plans
  • Info Security Programs
  • Info Security Program Maintenance
  • Methods for Maintaining an Info Security Program
  • Succession Planning
  • Allocation of Jobs
  • Program Documentation
  • How to Develop Plans to Implement an Info Security Strategy
  • Security Technologies and Controls
  • Cryptographic Techniques
  • Symmetric Cryptography
  • Public Key Cryptography
  • Hashes
  • Access Control
  • Access Control Categories
  • Physical Access Controls
  • Technical Access Controls
  • Administrative Access Controls
  • Monitoring Tools
  • IDS’s
  • Anti-Virus Systems
  • Policy-Compliance Systems
  • Common Activities Required in Info Security Programs
  • Prerequisites for Implementing the Program
  • Implementation Plan Management
  • Types of Security Controls
  • Info Security Controls Development
  • How to Specify info Security Program Activities
  • Business Assurance Function
  • Common Business Assurance Functions
  • Methods for Aligning info Security Programs with Business Assurance Functions
  • How to Coordinate Info Security Programs with Business Assurance Functions
  • SLA’s
  • Internal Resources
  • External Resources
  • Services Provided by External Resources – Part 1
  • Services Provided by External Resources – Part 2
  • Skills Commonly Required for Info Security Program Implementation
  • Dentification of Resources and Skills Required for a Particular Implementation
  • Resource Acquisition Methods
  • Skills Acquisition Methods
  • Info Security Architectures
  • The SABSA Model for Security Architecture
  • Deployment Considerations
  • Deployment of Info Security Architectures
  • How to Develop Info Security Architecture
  • Info Security Policies
  • Components of Info Security Policies
  • Info Security Policies and the Info Security Strategy
  • Info Security Policies and Enterprise Business Objectives
  • Info Security Policy Development Factors
  • Methods for Communicating Info Security Policies
  • Info Security Policy Maintenance
  • How to Develop Info Security Policies
  • Info Security Awareness Program, Training Programs, and Education Programs
  • Security Awareness, Training, and Education Gap Analysis
  • Methods for Closing the Security Awareness, Training, and Education Gaps
  • Security-Based Cultures and Behaviors
  • Methods for Establishing and Maintaining a Security-Based Culture in the Enterprise
  • How to Develop Info Security Awareness, Training, and Education Programs
  • Supporting Documentation for Info Security Policies
  • Standards, Procedures, Guidelines, and Baselines
  • Codes of Conduct
  • NDA’s
  • Methods for Developing Supporting Documentation
  • Methods for Implementing Supporting Documentation and for Communicating Supporting Documentation
  • Methods for Maintaining Supporting Documentation
  • C and A
  • C and A Programs
  • How to Develop Supporting Documentation for Info Security Policies

Domain 4: Information Security Program Implementation

  • Enterprise Business Objectives
  • Integrating Enterprise Business Objectives & Info Security Policies
  • Organizational Processes
  • Change Control
  • Merges & Acquisitions
  • Organizational Processes & Info Security Policies
  • Methods for Integrating Info Security Policies & Organizational Processes
  • Life Cycle Methodologies
  • Types of Life Cycle Methodologies
  • How to Integrate Info Security Requirements Into Organizational Processes
  • Types of Contracts Affected by Info Security Programs
  • Joint Ventures
  • Outsourced Provides & Info Security
  • Business Partners & Info Security
  • Customers & Info Security
  • Third Party & Info Security
  • Risk Management
  • Risk Management Methods & Techniques for Third Parties
  • SLA’s & Info Security
  • Contracts & Info Security
  • Due Diligence & Info Security
  • Suppliers & Info Security
  • Subcontractors & Info Security
  • How to Integrate Info Security Controls Into Contracts
  • Info Security Metrics
  • Types of Metrics Commonly Used for Info Security
  • Metric Design, Development & Implementation
  • Goals of Evaluating Info Security Controls
  • Methods of Evaluating Info Security Controls
  • Vulnerability Testing
  • Types of Vulnerability Testing
  • Effects of Vulnerability Assessment & Testing
  • Vulnerability Correction
  • Commercial Assessment Tools
  • Goals of Tracking Info Security Awareness, Training, & Education Programs
  • Methods for Tracking Info Security Awareness, Training, & Education Programs
  • Evaluation of Training Effectiveness & Relevance
  • How to Create Info Security Program Evaluation Metrics

Domain 5: Information Security Program Management

  • Management Metrics
  • Types of Management Metrics
  • Data Collection
  • Periodic Reviews
  • Monitoring Approaches
  • KPI’s
  • Types of Measurements
  • Other Measurements
  • Info Security Reviews
  • The Role of Assurance Providers
  • Comparing Internal and External Assurance Providers
  • Line Management Technique
  • BudgetingStaff Management
  • Facilities
  • How to Manage Info Security Program Resources
  • Security Policies
  • Security Policy Components
  • Implementation of Info Security Policies
  • Administrative Processes and Procedures
  • Access Control Types
  • ACM
  • Access Security Policy Principles
  • Identity Management and Compliance
  • Authentication Factors
  • Remote Access
  • User Registration
  • Procurement
  • How to Enforce Policy and Standards Compliance
  • Types of Third Party Relationships
  • Methods for Managing Info Security Regarding Third Parties
  • Security Service Providers
  • Third Party Contract Provisions
  • Methods to Define Security Requirements in SLA’s, Security Provisions and SLA’s, and Methods to Monitor Security
  • How to Enforce Contractual Info Security Controls
  • SDLC
  • Code Development
  • Common Techniques for Security Enforcement
  • How to Enforce Info Security During Systems Development
  • Maintenance
  • Methods of Monitoring Security Activities
  • Impact of Change and Configuration Management Activities
  • How to Maintain Info Security Within an Organization
  • Due Diligence Activities
  • Types of Due Diligence Activities
  • Reviews of Info Access
  • Standards of Managing and Controlling Info Access
  • How to Provide Info Security Advice and Guidance
  • Info Security Awareness
  • Types of Info Security Stakeholders
  • Methods of Stakeholder Education
  • Security Stakeholder Education Process
  • How to Provide Info Security Awareness and Training
  • Methods of Testing the Effectiveness of Info Security Control
  • The Penetration Testing Process
  • Types of Penetration Testing
  • Password Cracking
  • Social Engineering Attacks
  • Social Engineering Types
  • External Vulnerability Reporting Sources
  • Regulatory Reporting Requirements
  • Internal Reporting Requirements
  • How to Analyze the Effectiveness of Info Security Controls
  • Noncompliance Issues
  • Security Baselines
  • Events Affecting the Security Baseline
  • Info Security Problem Management Process
  • How to Resolve Noncompliance Issues

Domain 6: Incident Management and Response

  • Incident Response Capability
  • Components of Incident Response
  • BCP
  • BIA Phase
  • Coop
  • DRP
  • Alternate Sites
  • Develop a BCP
  • Develop a DRP
  • MTD
  • RPO
  • RTO
  • Data Backup Strategies
  • Data Backup Types
  • Data Restoration Strategies
  • Info Incident Management Practices
  • IRP
  • Trigger Events and Types of Trigger Events
  • Methods of Containing Damage
  • How to Develop an IRP
  • Escalation Process
  • Notification Process
  • IRT
  • Crisis Communication
  • How to Establish an Escalation Process
  • Internal Reporting Requirements
  • External Reporting Requirements
  • Communication Process
  • play_circle_outline
  • IRP and DRP
  • IRP and BCP
  • Methods of Identifying Business Resources Essential to Recovery
  • How to Integrate an IRP
  • Role of Primary IRT Members and Role of Additional IRT Members
  • Response Team Tools and Equipment
  • How to Develop IRT’s
  • BCP testing
  • Disaster Recovery Testing
  • Schedule Disaster Recovery Testing
  • Refine IRP
  • How to Test an IRP
  • Damage Assessment
  • Business Impacts Cause by Security Incidents
  • How to Manage Responses to Info Security Incidents
  • Computer and Digital Forensics
  • Forensic Requirements for Responding to Info Security Incidents
  • Evidence Life Cycle
  • Evidence Collection
  • Evidence Types
  • Five Common Rules of Evidence
  • Chain of Custody
  • How to Investigate an Info Security Incident
  • PIR Methods
  • Security Incident Review Process
  • Investigate Cause of a Security Incident
  • Identify Corrective Actions
  • Reassess Security Risks After a Security Incident
  • How to Conduct a Post-Incident Review
  • Outro – Pre Test/Test Strategy
  • Post Test

Cloud Concepts, Architecture and Design

  • Course Intro
  • Cloud Concepts, Architecture and Design – Part 1
  • Cloud Concepts, Architecture and Design – Part 2
  • Cloud Concepts, Architecture and Design – Part 3
  • Cloud Concepts, Architecture and Design – Part 4
  • Cloud Concepts, Architecture and Design – Part 5
  • Cloud Concepts, Architecture and Design – Part 6
  • Cloud Concepts, Architecture and Design – Part 7
  • Cloud Concepts, Architecture and Design – Part 8
  • Cloud Concepts, Architecture and Design – Part 9

Legal, Risk and Compliance

  • Legal, Risk and Compliance Part 1
  • Legal, Risk and Compliance Part 2
  • Legal, Risk and Compliance Part 3
  • Legal, Risk and Compliance Part 4
  • Legal, Risk and Compliance Part 5
  • Legal, Risk and Compliance Part 6
  • Legal, Risk and Compliance Part 7

Cloud Data Security

  • Cloud Data Security – Part 1
  • Cloud Data Security – Part 2
  • Cloud Data Security – Part 3
  • Cloud Data Security – Part 4
  • Cloud Data Security – Part 5
  • Cloud Data Security – Part 6
  • Cloud Data Security – Part 7

Cloud Platform and Infrastructure Security

  • Cloud Platform and Infrastructure Security – Part 1
  • Cloud Platform and Infrastructure Security – Part 2
  • Cloud Platform and Infrastructure Security – Part 3
  • Cloud Platform and Infrastructure Security – Part 4
  • Cloud Platform and Infrastructure Security – Part 5
  • Cloud Platform and Infrastructure Security – Part 6
  • Cloud Platform and Infrastructure Security – Part 7
  • Cloud Platform and Infrastructure Security – Part 8

Cloud Application Security

  • Cloud Application Security – Part 1
  • Cloud Application Security – Part 2
  • Cloud Application Security – Part 3
  • Cloud Application Security – Part 4
  • Cloud Application Security – Part 5
  • Cloud Application Security – Part 6
  • Cloud Application Security – Part 7
  • Cloud Application Security – Part 8
  • Cloud Application Security – Part 9

Cloud Security Operations

  • Cloud Security Operations – Part 1
  • Cloud Security Operations – Part 2
  • Cloud Security Operations – Part 3
  • Cloud Security Operations – Part 4
  • Cloud Security Operations – Part 5
  • Cloud Security Operations – Part 6
  • Cloud Security Operations – Part 7
  • Cloud Security Operations – Part 8
  • Cloud Security Operations – Part 9
  • Cloud Security Operations – Part 10
  • Cloud Security Operations – Part 11
  • Course Outro

Module 1 – Introduction to Ethical Hacking

  • Introduction
  • Introduction to Hacking
  • Information Security Threats and Attack Vectors
  • Hacking Concepts
  • Ethical Hacking Concepts and Scope
  • Information Security Controls Part 1
  • Information Security Controls Part 2
  • Information Security Laws and Standards

Module 2 – Footprinting and Reconnaissance

  • Footprinting and Reconnaissance
  • Footprinting Methodology
  • Google Hacking
  • FootPrinting Through Social Networking
  • Website Foot Printing
  • Email Foot Printing
  • Competitive Intelligence Gathering
  • WhoIs Foot Printing
  • DNS Logical and Geographical Foot Printing
  • Network Footprinting
  • Foot Printing
  • Foot Printing Tools
  • Foot Printing Penetration Testing
  • Conduct Recon with Ping Act
  • Query DNS with NSLookUp Act
  • Discover Website Subdomain with Sublist3r Act
  • Obtain OSINT Information About a Person wit Pipl Act
  • Gather Contact and Host Information with theHarvester Act
  • Automate OSINT Research with Recon-ng Act
  • Get Started with Metasploit Act
  • Conduct Open Source Intelligence with OSR Framework Act
  • Obtain Whois Information with Smart Whois Act
  • Extract Links, URLs, and Emails from Websites with Web Data Extractor Act
  • Create an Offline Copy of a Website with HTTrack Act
  • Trace an Email with eMail Tracker Pro Act

Module 3 – Network Scanning

  • Network Scanning
  • Discovery Scans
  • Port Scans
  • Nmap
  • Nmap Stealth Scans
  • Nmap Options
  • H-ping and Other Scanners
  • SSDP Scanning
  • Scanning Beyond IDS and Firewall
  • Banner Grabbing
  • Scanning Pen Testing
  • Checking for Live Systems with Angry IP Scanner Act
  • Network Scanning with MegaPing Act
  • Advanced Scanning with nmap Act
  • Packet Crafting with Hping3 Act
  • Packet Crafting with Colasoft Packet Builder Act

Module 4 – Enumeration

  • Enumeration
  • Enumeration Technicques Tools
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP and DNS Enumeration
  • Enumeration Countermeasures
  • Enumeration Penetration Testing
  • Enumerate NetBIOS Information with SuperScan Act
  • Enumerate NetBIOS Information with NetBIOS Enumerator Act
  • Enumerate NetBIOS and LDAP Information with Hyena Act
  • Enumerate SNMP WMI and Other Information Using SoftPerfect Network Scanner Act

Module 5 – Vulnerability Analysis

  • Vulnerability Analysis
  • Vulnerability Assessment Solutions
  • Vulnerability Scoring Systems
  • Vulnerability Assessment Tools and Reports
  • Perform a Vulnerability Scan and Analysis with Nessus Act

Module 6 – Malware Threats

  • Malware Threats
  • Trojan Concepts
  • Trojan Types
  • Trojan Tools
  • Virus and Worm Concepts
  • Virus Types
  • Malware Analysis
  • Malware Reverse Engineering
  • Malware Detection
  • Malware Countermeasures
  • Malware Penetration Testing
  • Infect a Victim with a Remote Access Trojan Act

Module 7 – Sniffing

  • Sniffing Concepts
  • DHCP Attacks
  • MAC Attacks
  • ARP Poisoning
  • DNS Poisoning
  • Sniffing Tools
  • Sniffing Countermeasures
  • Sniff a Clear Text HTTP Session with Wireshark Act
  • Intercept and Crack a Network Login Act

Module 8 – Social Engineering

  • Social Engineering
  • Human Based Social Engineering
  • Computer Based Social Engineering
  • Additional Types of Social Enginnering
  • Social Engineering Countermeasures
  • Social Engineering Penetration Testing
  • Fool a User with a Baited USB Stick Act
  • Harvest Credentials with Spear Phishing Act

Module 9 – Denial of Service

  • Denial of Service
  • Common Dos-DDoS Attack Types
  • Additional DoS Attack Types
  • BotNets
  • DoS Countermeasures
  • Additional DoS Countermeasures
  • DoS Penetration Testing
  • Perform a DoS Attack With the Low Orbit ION Cannon Act
  • Step Up the DoS Attack With the High Orbit ION Cannon Act
  • Perform a Slowloris DoS Attack Act

Module 10 – Session Hijacking

  • Session Hijacking
  • Browser Session Hijacking
  • Way to Compromise a Session Token
  • Client Side Attacks
  • Hijacking at the Network Level
  • Session Hijacking Tools
  • Session Hijacking Countermeasures
  • Session Hijacking Testing
  • Perform a MITM Attack with Ettercap Act

Module 11 – Hacking Webservers

  • Hacking Web Servers
  • Webserver Attacks
  • Methodology of Webserver Attacks
  • Webserver Attack and Defense Tools
  • Webserver General Defense
  • Webserver Specific Attack Countermeasures
  • Webserver Patch Management
  • Webserver Pen Testing
  • Footprint a Web Server with IDServe Act
  • Conduct a Simple Web Server Vulnerability Scan with Uniscan Act
  • Conduct a Comprehensive Web Server Vulnerability Scan with Uniscan Act
  • Brute Force a Web Server with Medusa Act

Module 12 – Hacking Web Applications

  • Hacking Web Applications
  • Web App Vulnerabilities and Exploits
  • Web Application Threats
  • Injection Attacks
  • Hidden Fields and Clickjacking
  • Cross Site Attacks
  • Additional Web App Attacks
  • Web Hacking Methodology
  • Web App Hacking Countermeasures
  • Web App Security Tools
  • Web Application Penetration Testing
  • Conduct a Simple Command Injection Attack Act
  • Inject a Malicious Link with Cross Site Scripting Act
  • Conduct a Cross Site Request Forgery Attack

Module 13 – SQL Injection

  • SQL Injection
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • SQL Injection Countermeasures
  • SQL Injection Penetration Testing
  • SQL Injection Act

Module 14 – Hacking Wireless Networks

  • Hacking Wireless Networks
  • Wireless Discovery and Mapping
  • WiFi Sniffers
  • WiFi Attacks
  • WiFi Cracking
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Wireless Hacking Countermeasures
  • Wireless Security Tools
  • Wireless Penetration Testing
  • Crack a WEP Key with Aircrack-ng Act
  • Crack a WPA Key with Aircrack-ng Act

Module 15 – System Hacking

  • System Hacking Methodology
  • Windows System Vulnerabilities and Exploits
  • Linux System Vulnerablities and Exploits
  • Password Cracking Methods
  • Network Service Password Cracking
  • Windows Password Cracking
  • Linux Password Cracking
  • Password Cracking Tools
  • Other Methods of Obtaining Passwords
  • Keylogging
  • Spyware
  • RootKits
  • Hiding Files
  • Steganography
  • Privilege Escalation
  • Creating and Maintaining Remote Access
  • Hiding Evidence
  • System Hacking Penetration Testing
  • Spoof Name Resolution and Capture Credentials with Responder Act
  • Dump and Crack Password Hashes with pwdump7 and Ophcrack Act
  • Crack Passwords with L0pht7 Act
  • Exploit Client Side Vulnerabilities Act
  • Track User Activity with Spyware Act
  • View and Clear Audit Policies with Auditpol Act
  • Hide Data Using Whitespace Steganography Act
  • Hide Data Using Least Significant Bit Steganography Act
  • Cover Your Tracks Act

Module 16 – Hacking Mobile Platforms

  • Hacking Mobile Platforms
  • Hacking Android OS
  • Rooting Android
  • Securing Android
  • Hacking iOS
  • Jailbreaking iOS
  • Securing iOS
  • Hacking Windows Phone OS
  • Hacking Blackberry
  • Mobile Device Management
  • Mobile Security Guidelines and Tools
  • Mobile Penetration Testing
  • Prepare Your Wireless Email Environment Act
  • Pwn a Mobile Device with Metasploit Act
  • Use a Mobile Device in a DDoS Campaign Act
  • Return Your VMs to Original Configuration Act
  • Uninstall Main Activity Malware from Android Act

Module 17 – Evading IDS, Firewalls, and Honeypots

  • Evading IDS Firewalls and Honeypots
  • Firewalls
  • Honeypots
  • IDS Firewalls and Honeypots Tools
  • Evasion
  • Evasion Countermeasures
  • IDS Firewall Honeypot Penetration Testing
  • Fly Below IDS Radar Act
  • Test and Analyze a Honey Pot Act
  • Bypass Windows Firewall Act

Module 18 – Cryptography

  • Cryptography
  • Encryption Algorithms
  • Cryptography Tools
  • Public key Infrastructure
  • Email Encryption
  • Disk Encryption
  • Cryptography Attacks
  • Crytography Penetration Testing
  • Examine Hashing Algorithms Act
  • Protect Data with Symmetric Encryption Act
  • Protect Data with Asymmetric Encryption Act

Module 19 – Cloud Computing

  • Cloud Computing
  • Virtualization
  • Cloud Computing Threats
  • Countermeasures to Cloud Computing Threats
  • Cloud Computing Attacks
  • Cloud Security
  • Cloud Security Best Practices
  • Cloud Penetration Testing

Module 20 – IoT Hacking

  • IoT Hacking
  • IoT Vulnerabilities and Attacks
  • IoT Hacking Methodology and Tools
  • IoT Hacking Countermeasures
  • IoT Penetration Testing
  • Search the Internet for Vulnerable IoT Devices Act
  • Conclusion

Module 1 – CEH v11 Foundations Course Introduction

  • 1.1 About this course: CEH Foundations
  • 1.2 About the Instructor

Module 2 – CEH v11 Introduction To Networking

  • 2.1 Networking Overview
  • 2.2 Network Scope
  • 2.3 Network Addressing
  • 2.4 Activity – Examining Network Addressing

Module 3 – CEH v11 Lan Components

  • 3.1 Protocols, Ports, Sockets
  • 3.2 Network Topologies
  • 3.3 LAN Devices
  • 3.4 LAN Devices Part 2
  • 3.5 VLANs
  • 3.6 Activity – Examining Ports and Sockets
  • 3.7 Activity – Examining Switches and VLANs

Module 4 – CEH v11 Routing and Network Access

  • 4.1 Routers
  • 4.2 Layer 3 Switches
  • 4.3 Modems and Remote Access
  • 4.4 Firewalls and Proxies
  • 4.5 Activity – Examining Routing
  • 4.6 Activity – Examining VLAN Routing
  • 4.7 Activity – Examining Firewall Rules

Module 5 – CEH v11 Intrusion Detection and Network Layers

  • 5.1 IDS and IPS
  • 5.2 OSI Model
  • 5.3 TCP-IP
  • 5.4 Activity – Examining Network Layers

Module 6 – CEH v11 Networking Protocols and Addressing

  • 6.1 Layer 4 Protocols
  • 6.2 Layer 3 Protocols
  • 6.3 Layer 2 Protocols
  • 6.4 IP Addressing
  • 6.5 Subnetting
  • 6.6 DHCP
  • 6.7 Activity – Examining TCP
  • 6.8 Activity – Examining UDP
  • 6.9 Activity – Examining IP
  • 6.10 Activity – Examining ICMP
  • 6.11 Activity – Examining ARP

Module 7 – CEH v11 Network Services

  • 7.1 DNS
  • 7.2 DNS Records
  • 7.3 NTP
  • 7.4 Authentication
  • 7.5 Biometrics
  • 7.6 Activity – Examining DNS
  • 7.7 Activity – Examining DNS Records

Module 8 – CEH v11 Access Control

  • 8.1 Local Authentication
  • 8.2 Directory Service Authentication
  • 8.3 Extending Authentication
  • 8.4 Authorization
  • 8.5 Activity – Testing Access Control

Module 9 – CEH v11 Intro to Linux

  • 9.1 Linux Overview
  • 9.2 Linux File System
  • 9.3 Linux Core Commands
  • 9.4 Linux Search and Read Commands
  • 9.5 Activity – Exploring Linux
  • 9.6 Activity – Using Linux Core Commands
  • 9.7 Activity – Using Linux Search Commands
  • 9.8 Activity – Using Linux Read Commands

Module 10 – CEH v11 Configuring Linux

  • 10.1 Linux File Permissions
  • 10.2 Linux Special Permissions
  • 10.3 Linux Configuration
  • 10.4 Linux Packages
  • 10.5 Linux User Management

Module 11 – CEH v11 Practicing Linux Configuration

  • 11.1 Activity – Setting Linux Permissions
  • 11.2 Activity – Setting Linux Special Permissions
  • 11.3 Activity – Managing Packages in Kali Linux
  • 11.4 Activity – Managing Users and Groups in Linux

Module 12 – CEH v11 Managing Linux

  • 12.1 Linux Job Scheduling
  • 12.2 Linux File, Directory, and Download Commands
  • 12.3 Linux System Commands
  • 12.4 Linux Network Management
  • 12.5 Linux Firewall

Module 13 – CEH v11 Practicing Linux Management

  • 13.1 Activity – Scheduling Tasks in Linux
  • 13.2 Activity – Using Linux File, Directory, and Download Commands
  • 13.3 Activity – Using Linux Edit and Archive Commands
  • 13.4 Activity – Compiling Malicious Code
  • 13.5 Activity – Using Linux Process and System Commands
  • 13.6 Activity – Using Linux Disk, Hardware, and Network Commands

Module 14 – CEH v11 Intro to Windows

  • 14.1 Windows Overview
  • 14.2 Windows Registry
  • 14.3 Windows Security

Module 15 – CEH v11 Windows Commands

  • 15.1 Windows Commands
  • 15.2 Windows Admin Commands
  • 15.3 Windows Network Commands
  • 15.4 Windows Run Line Commands
  • 15.5 Windows PowerShell

Module 16 – CEH v11 Practicing Windows Commands

  • 16.1 Activity – Using Windows Built-in Commands
  • 16.2 Activity – Using Windows Task Commands
  • 16.3 Activity – Using Windows Admin Commands
  • 16.4 Activity – Using Windows Network Commands
  • 16.5 Activity – Using Windows PowerShell
  • 16.6 Networking and OS Penetration Testing
  • 16.7 Review

Module 17 – CEH v11 Intro to Hacking

  • 17.1 Information Security Overview
  • 17.2 Hacking Concepts
  • 17.3 Ethical Hacking Concepts
  • 17.4 Penetration Testing
  • 17.5 Penetration Testing Part 2
  • 17.6 Activity – Performing a Static Code Review

Module 18 – CEH v11 Information Security

  • 18.1 Cyber Kill Chain Concepts
  • 18.2 Activity – Performing Weaponization
  • 18.3 Information Security
  • 18.4 Security Policies
  • 18.5 Security Controls
  • 18.6 Access Control

Module 19 – CEH v11 Protecting Data

  • 19.1 Data Protection
  • 19.2 Backup Sites
  • 19.3 Vulnerability Management
  • 19.4 SIEM
  • 19.5 Risks

Module 20 – CEH v11 Managing Risk

  • 20.1 Risk Management
  • 20.2 Incident Handling
  • 20.3 Information Security Laws and Standards
  • 20.4 Activity – Assessing Risk
  • 20.5 Ethical Hacking Penetration Testing
  • 20.6 Review
  • 20.7 Conclusion

Module 21 – CEH v11 Ethical Hacker Course Intro

  • 21.1 About this course – Ethical Hacker
  • 21.2 About the Instructor

Module 22 – CEH v11 Intro to Footprinting

  • 22.1 Footprinting Concepts
  • 22.2 Footprinting Methodology
  • 22.3 OSINT Tools
  • 22.4 Advanced Google Search
  • 22.5 Whois Footprinting
  • 22.6 Activity – Performing a Whois Lookup

Module 23 – CEH v11 Footprinting Network Services

  • 23.1 DNS Footprinting
  • 23.2 Website Footprinting
  • 23.3 Email Footprinting
  • 23.4 Network Footprinting
  • 23.5 Footprinting through Social Networking Sites

Module 24 – CEH v11 Defend Against Footprinting

  • 24.1 Competitive Intelligence Gathering
  • 24.2 Footprinting Countermeasures
  • 24.3 Footprinting Penetration Testing
  • 24.4 Review

Module 25 – CEH v11 Intro to Scanning

  • 25.1 Scanning Concepts
  • 25.2 ICMP Discovery Scans
  • 25.3 Other Discovery Scans

Module 26 – CEH v11 Port Scanning

  • 26.1 Ports
  • 26.2 TCP Flags and Handshakes
  • 26.3 TCP Scan Types
  • 26.4 Other Scanning Techniques

Module 27 – CEH v11 Vulnerability Scanning

  • 27.1 Banner Grabbing
  • 27.2 Vulnerability Scanning
  • 27.3 SSDP Scanning

Module 28 – CEH v11 NMAP

  • 28.1 Nmap
  • 28.2 Common Nmap Scans
  • 28.3 Nmap Options
  • 28.4 Nmap Stealth Scans
  • 28.5 Hping and Other Scanners

Module 29 – CEH v11 Firewalls and Intrusion Detection

  • 29.1 Firewall Types
  • 29.2 Firewall Features
  • 29.3 Firewall Features Part 2
  • 29.4 Firewall Configurations
  • 29.5 Intrusion Detection and Prevention

Module 30 – CEH v11 Evading Detection

  • 30.1 Firewall and IDS Evasion
  • 30.2 Firewall and IDS Evasion Part 2
  • 30.3 Firewalking
  • 30.4 Probing a Firewall
  • 30.5 Probing a Firewall Part 2

Module 31 – CEH v11 Proxies and VPNs

  • 31.1 Proxies
  • 31.2 VPNs
  • 31.3 Tor
  • 31.4 Scanning Countermeasures
  • 31.5 Scanning Penetration Testing
  • 31.6 Review

Module 32 – CEH v11 Accessing Vulnerability

  • 32.1 Vulnerability Assessment Overview
  • 32.2 Vulnerability Scoring Systems
  • 32.3 Vulnerability Assessment Tools

Module 33 – CEH v11 Vulnerability Research

  • 33.1 Scanner Output and Reports
  • 33.2 Vulnerability Research
  • 33.3 Review

Module 34 – CEH v11 Intro to Enumeration

  • 34.1 Enumeration Concepts
  • 34.2 Enumeration Techniques and Tools
  • 34.3 Service and Application Enumeration
  • 34.4 SMB and NetBIOS Enumeration

Module 35 – CEH v11 Service Enumeration

  • 35.1 SNMP Enumeration
  • 35.2 LDAP Enumeration
  • 35.3 DNS Enumeration
  • 35.4 SMTP Enumeration
  • 35.5 NTP Enumeration

Module 36 – CEH v11 Advanced Enumeration

  • 36.1 Remote Connection Enumeration
  • 36.2 File Transfer Enumeration
  • 36.3 VoIP Enumeration
  • 36.4 IPSEC Enumeration
  • 36.5 IPv6 Enumeration
  • 36.6 BGP Enumeration

Module 37 – CEH v11 Command Line Enumeration

  • 37.1 Windows Command Line Enumeration
  • 37.2 Linux Command Line Enumeration
  • 37.3 Linux Command Line Enumeration Part 2

Module 38 – CEH v11 Defending Against Enumeration

  • 38.1 Enumeration Countermeasures
  • 38.2 Enumeration Countermeasures Part 2
  • 38.3 Enumeration Penetration Testing
  • 38.4 Review

Module 39 – CEH v11 Intro to System Hacking

  • 39.1 System Hacking Concepts
  • 39.2 System Hacking Tools and Frameworks
  • 39.3 Searchsploit
  • 39.4 Compiling and Running Exploits

Module 40 – CEH v11 System Hacking with Metasploit

  • 40.1 Metasploit
  • 40.2 Metasploit Search
  • 40.3 Metasploit Exploits and Payloads
  • 40.4 Metasploit Meterpreter
  • 40.5 Metasploit Connectivity
  • 40.6 Metasploit Impersonation and Migration

Module 41 – CEH v11 Further Attacking a Compromised System

  • 41.1 Netcat
  • 41.2 Pivoting
  • 41.3 Netcat Relays
  • 41.4 Metasploit Post Exploitation Modules
  • 41.5 Common Operating System Exploits

Module 42 – CEH v11 Hacking an Operating System

  • 42.1 Hacking Windows
  • 42.2 Hacking Linux
  • 42.3 Network Service Exploits
  • 42.4 Password Attacks

Module 43 – CEH v11 Password Cracking Overview

  • 43.1 Dictionary Attack
  • 43.2 Brute Force Attack
  • 43.3 Password Spraying
  • 43.4 Rainbow Tables

Module 44 – CEH v11 Performing Password Attacks

  • 44.1 Network Service Password Attacks
  • 44.2 Password Cracking Tools
  • 44.3 Online Password Cracking Sites
  • 44.4 Windows Password Cracking
  • 44.5 Linux Password Cracking
  • 44.6 Other Methods for Obtaining Passwords

Module 45 – CEH v11 Using Exploits

  • 45.1 Keylogging
  • 45.2 Spyware
  • 45.3 Rootkits
  • 45.4 Buffer Overflows
  • 45.5 Privilege Escalation
  • 45.6 Hiding Files

Module 46 – CEH v11 Hiding Information

  • 46.1 Alternate Data Streams
  • 46.2 Steganography
  • 46.3 Creating and Maintaining Remote Access
  • 46.4 Hiding Evidence

Module 47 – CEH v11 Covering Tracks

  • 47.1 Covering Tracks in Windows
  • 47.2 Covering Tracks in Linux
  • 47.3 System Hacking Counter-Measures
  • 47.4 System Hacking Penetration Testing
  • 47.5 Review

Module 48 – CEH v11 Malware Overview

  • 48.1 Intro to Malware
  • 48.2 Virus Overview
  • 48.3 Virus Types
  • 48.4 Self-Hiding Viruses
  • 48.5 Worms
  • 48.6 Trojans
  • 48.7 Trojan Types
  • 48.8 RATS

Module 49 – CEH v11 Hacking With Malware

  • 49.1 Ransomware
  • 49.2 Botnets
  • 49.3 Covert Channel Trojans
  • 49.4 Banking Trojans
  • 49.5 Rootkits

Module 50 – CEH v11 Creating Malware

  • 50.1 Other Malware
  • 50.2 Malware Makers
  • 50.3 Dropper and Stage Creation
  • 50.4 Exploit Kits

Module 51 – CEH v11 Detecting Malware

  • 51.1 Malware Detection
  • 51.2 Malware Detection Part 2
  • 51.3 Malware Analysis

Module 52 – CEH v11 Defending Against Malware

  • 52.1 Malware Reverse Engineering
  • 52.2 Malware Countermeasures
  • 52.3 Malware Penetration Testing
  • 52.4 Review

Module 53 – CEH v11 Sniffing

  • 53.1 Sniffing Concepts
  • 53.2 Types of Sniffing
  • 53.3 Sniffing Protocols
  • 53.4 Sniffing Tools

Module 54 – CEH v11 Spoofing and MITM

  • 54.1 ARP
  • 54.2 ARP Spoofing
  • 54.3 MITM
  • 54.4 MAC Attacks
  • 54.5 MAC Spoofing
  • 54.6 DHCP Attacks

Module 55 – CEH v11 Defending Against Poisoning and Sniffing

  • 55.1 Name Resolution Poisoning
  • 55.2 VLAN Hopping
  • 55.3 Sniffing Counter Measures
  • 55.4 Sniffing Penetration Testing
  • 55.5 Review

Module 56 – CEH v11 Social Engineering

  • 56.1 Social Engineering Concepts
  • 56.2 Social Engineering Techniques
  • 56.3 Social Engineering Examples
  • 56.4 Social Engineering Tools

Module 57 – CEH v11 Defending Against Social Engineering

  • 57.1 Social Media
  • 57.2 Identity Theft
  • 57.3 Insider Threats
  • 57.4 Social Engineering Countermeasures
  • 57.5 Social Engineering Penetration Testing
  • 57.6 Review

Module 58 – CEH v11 Denial-of-Service

  • 58.1 DoS-DDoS Concepts
  • 58.2 Volumetric Attacks
  • 58.3 Fragmentation Attacks
  • 58.4 State Exhaustion Attacks
  • 58.5 Application Layer Attacks

Module 59 – CEH v11 Advanced DoS Attacks

  • 59.1 Protocol Attacks
  • 59.2 Other Attacks
  • 59.3 Botnets

Module 60 – CEH v11 Defending Against Denial-of-Service

  • 60.1 DoS-DDoS Attack Tools
  • 60.2 DoS-DDoS Countermeasures
  • 60.3 Dos Penetration Testing
  • 60.4 Review

Module 61 – CEH v11 Advanced Ethical Hacker Course Intro

  • 61.1 About This Course: Advanced Ethical Hacker
  • 61.2 About the Instructor

Module 62 – CEH v11 Session Hjacking

  • 62.1 Session Hijacking Concepts
  • 62.2 Token-based Authentication
  • 62.3 Compromising a Session Token
  • 62.4 XSS
  • 62.5 CSRF
  • 62.6 Other Attacks

Module 63 – CEH v11 Defending Against Hijacking

  • 63.1 Network Level Hijacking
  • 63.2 Session Hijacking Tools
  • 63.3 Session Hijacking Countermeasures
  • 63.4 Session Penetration Hijacking
  • 63.5 Review

Module 64 – CEH v11 Implementing Intrusion Detection

  • 64.1 IDS-IPS
  • 64.2 Snort
  • 64.3 Snort Rules
  • 64.4 Syslog

Module 65 – CEH v11 Testing Intrusion Detection

  • 65.1 WIPS
  • 65.2 IDS Considerations
  • 65.3 IDS Tools
  • 65.4 IDS Evasion
  • 65.5 IDS-Firewall Evasion Tools
  • 65.6 IDS Scenerios

Module 66 – CEH v11 Implementing Firewalls

  • 66.1 Firewalls
  • 66.2 Packet Filtering Rules
  • 66.3 Firewall Deployments
  • 66.4 Traffic Flow through Firewalls
  • 66.5 Split DNS

Module 67 – CEH v11 Testing Firewallls

  • 67.1 Firewall Tools
  • 67.2 Firewall Evasion
  • 67.3 Firewall Scenarios

Module 68 – CEH v11 Implementing Honeypots

  • 68.1 Honeypots
  • 68.2 Honeypot Detection
  • 68.3 IDS-Firewall Evasion Countermeasures
  • 68.4 IDS-Firewall Honeypot Penetration Testing
  • 68.5 Review

Module 69 – CEH v11 Attacker Webserver

  • 69.1 Webserver Security Overview
  • 69.2 Common Webservers
  • 69.3 Webserver Attacks
  • 69.4 Misconfiguration Attack Examples

Module 70 – CEH v11 Webserver Defense

  • 70.1 Webserver Attack Tools
  • 70.2 Attack Countermeasures
  • 70.3 Webserver Penetration Testing
  • 70.4 Review

Module 71 – CEH v11 Intro To Web Apps

  • 71.1 Web Application Concepts
  • 71.2 Attacking Web Apps

Module 72 – CEH v11 OWASP Top 5 Web App Vulnerabilities

  • 72.1 A01 – Broken Access Control
  • 72.2 A02 – Cryptographic Failures
  • 72.3 A03 – Injection
  • 72.4 A04 – Insecure Design
  • 72.5 A05 – Security Misconfiguration

Module 73 – CEH v11 OWASP Additional Web App Vulnerabilities

  • 73.1 A06 – Vulnerable and Outdated Components
  • 73.2 A07 – Identification and Authentication Failures
  • 73.3 A08 – Software and Data Integrity Failures
  • 73.4 A09 – Security Logging and Monitoring
  • 73.5 A10 – Server Side Request Forgery

Module 74 – CEH v11 Common Web App Attacks

  • 74.1 XSS Attacks
  • 74.2 CSRF
  • 74.3 Parameter Tampering
  • 74.4 Clickjacking
  • 74.5 SQL Injection

Module 75 – CEH v11 Unauthorized Access Through Web Apps

  • 75.1 Insecure Deserialization Attacks
  • 75.2 IDOR
  • 75.3 Directory Traversal
  • 75.4 Session Management Attacks
  • 75.5 Response Splitting

Module 76 – CEH v11 Web App Overflow Attacks

  • 76.1 Denial of Service
  • 76.2 Overflow Attacks
  • 76.3 XXE Attacks
  • 76.4 Soap Attacks
  • 76.5 Ajax Attacks

Module 77 – CEH v11 Defending Web Apps

  • 77.1 Web App Hacking Tools
  • 77.2 Web Hacking Countermeasures
  • 77.3 Web Application Penetration Testing
  • 77.4 Review

Module 78 – CEH v11 Intro To SQL Injection

  • 78.1 SQL Overview
  • 78.2 SQL Injection Concepts
  • 78.3 Basic SQL Injection

Module 79 – CEH v11 Performing SQL Injection

  • 79.1 Finding Vulnerable Websites
  • 79.2 Error-based SQL Injection
  • 79.3 Union SQL Injection
  • 79.4 Blind SQL Injection
  • 79.5 SQL Injection Scenarios
  • 79.6 Evading Detection

Module 80 – CEH v11 Defending Against SQL Injection

  • 80.1 SQL Injection Tools
  • 80.2 SQL Injection Countermeasures
  • 80.3 Safe Coding Examples
  • 80.4 SQL Wildcards
  • 80.5 SQL Injection Penetration Testing
  • 80.6 Review

Module 81 – CEH v11 Wireless Networking Overview

  • 81.1 Wireless Concepts
  • 81.2 Wireless Signal Encoding
  • 81.3 Wi-Fi Standards
  • 81.4 Wi-Fi Antennas
  • 81.5 Wireless Authentication

Module 82 – CEH v11 Wi-Fi Security

  • 82.1 Wi-Fi Security Standards
  • 82.2 Wireless Network Troubleshooting Tools
  • 82.3 Wi-Fi Discovery Tools
  • 82.4 Sniffing Wi-Fi

Module 83 – CEH v11 Hacking Wi-Fi

  • 83.1 Wi-Fi Attack Types
  • 83.2 Wi-Fi Rogue Access Point Attacks
  • 83.3 Wi-Fi Denial of Service Attacks
  • 83.4 Wi-Fi Password Cracking Attacks
  • 83.5 WEP Cracking

Module 84 – CEH v11 Advanced Wireless Attacks

  • 84.1 WPA-WPA2 Cracking
  • 84.2 WPA3 Attacks
  • 84.3 WPS Cracking
  • 84.4 Wi-Fi Attack Tools for Mobile Devices
  • 84.5 Bluetooth Hacking
  • 84.6 Other Wireless Hacking

Module 85 – CEH v11 Defending Wireless Networks

  • 85.1 Wireless Hacking Countermeasures
  • 85.2 Wireless Security Tools
  • 85.3 Wireless Penetration Testing
  • 85.4 Review

Module 86 – CEH v11 Mobile Platform Overview

  • 86.1 Mobile Platform Overview
  • 86.2 Mobile Device Vulnerabilities
  • 86.3 Mobile Device Attacks

Module 87 – CEH v11 Hacking Android

  • 87.1 Android
  • 87.2 Android Vulnerabilities
  • 87.3 Rooting Android
  • 87.4 Android Exploits
  • 87.5 Android Hacking Tools
  • 87.6 Reverse Engineering an Android App
  • 87.7 Securing Android

Module 88 – CEH v11 Hacking iOS

  • 88.1 iOS
  • 88.2 iOS Vulnerabilities
  • 88.3 Jailbreaking iOS
  • 88.4 iOS Exploits
  • 88.5 iOS Hacking Tools
  • 88.6 Securing iOS

Module 89 – CEH v11 Mobile Platform Defense

  • 89.1 Mobile Device Management
  • 89.2 BYOD
  • 89.3 Mobile Security Guidelines and Tools
  • 89.4 Mobile Device Penetration Testing
  • 89.5 Review

Module 90 – CEH v11 IoT Hacking

  • 90.1 loT Concepts
  • 90.2 loT Infrastructure
  • 90.3 Fog Computing
  • 90.4 loT Vulnerabilities
  • 90.5 loT Threats

Module 91 – CEH v11 IoT Defense

  • 91.1 IoT Hacking Methodologies and Tools
  • 91.2 IoT Hacking Methodolgies and Tools Part 2
  • 91.3 Hacking Countermeasures
  • 91.4 IoT Penetration Testing
  • 91.5 OT Concepts
  • 91.6 Industrial IoT

Module 92 – CEH v11 Operational Technology Overview

  • 92.1 IT-OT Convergence
  • 92.2 ICS
  • 92.3 SCADA
  • 92.4 DCS
  • 92.5 RTU
  • 92.6 PLC
  • 92.7 Addition OT Components

Module 93 – CEH v11 Hacking OT

  • 93.1 OT Variables
  • 93.2 Well-known OT attacks
  • 93.3 OT Attack Methodology and Basic Tools
  • 93.4 OT Reconnaissance
  • 93.5 OT Penetration and Control

Module 94 – CEH v11 Defending OT

  • 94.1 OT Attack Tools
  • 94.2 OT Hacking Countermeasures
  • 94.3 OT Penetration Testing
  • 94.4 Review

Module 95 – CEH v11 Attacking The Cloud

  • 95.1 Cloud Computing Concepts
  • 95.2 Virtualization
  • 95.3 Cloud Types
  • 95.4 Cloud Benefits and Considerations
  • 95.5 Cloud Risks and Vulnerablilities

Module 96 – CEH v11 Cloud Defense

  • 96.1 Cloud Threats and Countermeasures
  • 96.2 Cloud Security Tools
  • 96.3 Cloud Security Best Practices
  • 96.4 Cloud Penetration Testing
  • 96.5 Review

Module 97 – CEH v11 Cryptography Overview

  • 97.1 Cryptography Concepts
  • 97.2 Symetric Encryption
  • 97.3 Asymmetric Encryption
  • 97.4 Public Key Exchange
  • 97.5 PKI

Module 98 – CEH v11 Protecting Data With Crytography

  • 98.1 Digital Certificates
  • 98.2 Digital Signatures
  • 98.3 Hashing
  • 98.4 Email Encryption
  • 98.5 Network Communication Encryption

Module 99 – CEH v11 Protecting Data at Home and in Transit

  • 99.1 Disk Encryption
  • 99.2 VPN Encryption
  • 99.3 Cryptography Tools

Module 100 – CEH v11 Pentesting Cryptography

  • 100.1 Cryptography Attacks
  • 100.2 Cryptography Penetration Testing
  • 100.3 Review
  • 100.4 Conclusion

Module 1 – Introduction To Ethical Hacking

  • 1.0 Introduction to CEH v12
  • 1.1 Elements of Security
  • 1.2 Cyber Kill Chain
  • 1.3 MITRE ATT&CK Framework
  • 1.3.1 Activity – Researching the MITRE ATTACK Framework
  • 1.4 Hacking
  • 1.5 Ethical Hacking
  • 1.6 Information Assurance
  • 1.7 Risk Management
  • 1.8 Incident Management
  • 1.9 Information Security Laws and Standards
  • 1.10 Introduction to Ethical Hacking Review

Module 2: Footprinting and Reconnaissance

  • 2.1 Footprinting Concepts
  • 2.2 OSINT Tools
  • 2.2.1 Activity – Conduct OSINT with OSR Framework
  • 2.2.2 Activity – OSINT with theHarvester
  • 2.2.3 Activity – Add API Keys to theHarvester
  • 2.2.4 Activity – Extract Document Metadata with FOCA
  • 2.2.5 Activity – Extract Document Metadata with FOCA
  • 2.3 Advanced Google Search
  • 2.3.1 Activity – Google Hacking
  • 2.4 Whois Footprinting
  • 2.4.1 Activity – Conducting Whois Research
  • 2.5 DNS Footprinting
  • 2.5.1 Activity – Query DNS with NSLOOKUP
  • 2.6 Website Footprinting
  • 2.6.1 Activity – Fingerprint a Webserver with ID Serve
  • 2.6.2 Activity – Extract Data from Websites
  • 2.6.3 Activity – Mirror a Website with HTTrack
  • 2.7 Email Footprinting
  • 2.7.1 Activity – Trace a Suspicious Email
  • 2.8 Network Footprinting
  • 2.9 Social Network Footprinting
  • 2.10 Footprinting and Reconnaissance Countermeasures
  • 2.11 Footprinting and Reconnaissance Review

Module 3: Scanning Networks

  • 3.1 Scanning Concepts
  • 3.2 Discovery Scans
  • 3.2.1 Activity – ICMP ECHO and ARP Pings
  • 3.2.2 Activity – Host Discovery with Angry IP Scanner
  • 3.3 Port Scans
  • 3.3.1 Activity – Port Scan with Angry IP Scanner
  • 3.4 Other Scan Types
  • 3.5 Scanning Tools
  • 3.5.1 Activity – Hping3 Packet Crafting
  • 3.5.2 Activity – Fingerprinting with Zenmap
  • 3.6 NMAP
  • 3.6.1 Activity – Nmap Basic Scans
  • 3.6.2 Activity – Host Discovery with Nmap
  • 3.6.3 – Activity – Nmap Version Detection
  • 3.6.4 Activity – Nmap Idle (Zombie) Scan
  • 3.6.5 Activity – Nmap FTP Bounce Scan
  • 3.6.6 – Activity – NMAP Scripts
  • 3.7 Firewall and IDS Evasion
  • 3.7.1 Activity – Nmap Advanced Scans
  • 3.8 Proxies
  • 3.9 Scanning Countermeasures
  • 3.10 Scanning Networks Review

Module 4: Enumeration

  • 4.1 Enumeration Overview
  • 4.2 SMB_NetBIOS_Enumeration
  • 4.2.1 Activity – Enumerate NetBIOS Information with Hyena
  • 4.3 File Transfer Enumeration
  • 4.4 WMI Enumeration
  • 4.4.1 – Activity – Enumerating WMI with Hyena
  • 4.5 SNMP Enumeration
  • 4.5.1 Activity – Enumerate WMI, SNMP and Other Information Using SoftPerfect
  • 4.6 LDAP Enumeration
  • 4.7 DNS Enumeration
  • 4.8 SMTP Enumeration
  • 4.8.1 Activity – Enumerate Email Users with SMTP
  • 4.9 Remote Connection Enumeration
  • 4.10 Website Enumeration
  • 4.10.1 Activity – Enumerate a Website with DirBuster
  • 4.11 Other Enumeration Types
  • 4.12 Enumeration Countermeasures and Review

Module 5: Vulnerability Analysis

  • 5.1 Vulnerability Scanning
  • 5.1.1 Vulnerability Scanning with OpenVAS
  • 5.2 Vulnerability Assessment
  • 5.3 Vulnerability Analysis Review

Module 6: System Hacking

  • 6.1 System Hacking Concepts
  • 6.2 Common OS Exploits
  • 6.3 Buffer Overflows
  • 6.3.1 Activity – Performing a Buffer Overflow
  • 6.4 System Hacking Tools and Frameworks
  • 6.4.1 Activity – Hack a Linux Target from Start to Finish
  • 6.5 Metasploit
  • 6.5.1 Activity – Get Started with Metasploit
  • 6.6 Meterpreter
  • 6.7 Keylogging and Spyware
  • 6.7.1 Activity – Keylogging with Meterpreter
  • 6.8 Netcat
  • 6.8.1 Activity – Using Netcat
  • 6.9 Hacking Windows
  • 6.9.1 Activity – Hacking Windows with Eternal Blue
  • 6.10 Hacking Linux
  • 6.11 Password Attacks
  • 6.11.1 Activity – Pass the Hash
  • 6.11.2 Activity – Password Spraying
  • 6.12 Password Cracking Tools
  • 6.13 Windows Password Cracking
  • 6.13.1 Activity – Cracking Windows Passwords
  • 6.13.2 Activity – Cracking Password Hashes with Hashcat
  • 6.14 Linux Password Cracking
  • 6.15 Other Methods for Obtaining Passwords
  • 6.16 Network Service Attacks
  • 6.16.1 Activity – Brute Forcing a Network Service with Medusa
  • 6.17 Post Exploitation
  • 6.18 Pivoting
  • 6.18.1 Activity – Pivoting Setup
  • 6.19 Maintaining Access
  • 6.19.1 Activity – Persistence
  • 6.20 Hiding Data
  • 6.20.1 Activity – Hiding Data Using Least Significant Bit Steganography
  • 6.21 Covering Tracks
  • 6.21.1 Activity – Clearing Tracks in Windows
  • 6.21.2 Activity – View and Clear Audit Policies with Auditpol
  • 6.22 System Hacking Countermeasures
  • 6.23 System Hacking Review

Module 7: Malware Threats

  • 7.1 Malware Overview
  • 7.2 Viruses
  • 7.3 Trojans
  • 7.3.1 Activity – Deploying a RAT
  • 7.4 Rootkits
  • 7.5 Other Malware
  • 7.6 Advanced Persistent Threat
  • 7.7 Malware Makers
  • 7.7.1 Activity – Creating a Malware Dropper and Handler
  • 7.8 Malware Detection
  • 7.9 Malware Analysis
  • 7.9.1 Activity – Performing a Static Code Review
  • 7.9.2 Activity – Analyzing the SolarWinds Orion Hack
  • 7.10 Malware Countermeasures
  • 7.11 Malware Threats Review

Module 8: Sniffing

  • 8.1 Network Sniffing
  • 8.2 Sniffing Tools
  • 8.2.1 Activity- Sniffing HTTP with Wireshark
  • 8.2.2 Activity – Capturing Files from SMB
  • 8.3 ARP and MAC Attacks
  • 8.3.1 Activity – Performing an MITM Attack with Ettercap
  • 8.4 Name Resolution Attacks
  • 8.4.1 Activity – Spoofing Responses with Responder
  • 8.5 Other Layer 2 Attacks
  • 8.6 Sniffing Countermeasures
  • 8.7 Sniffing Review

Module 9: Social Engineering

  • 9.1 Social Engineering Concepts
  • 9.2 Social Engineering Techniques
  • 9.2.1 Activity – Deploying a Baited USB Stick
  • 9.2.2 Activity – Using an O.MG Lightning Cable
  • 9.3 Social Engineering Tools
  • 9.3.1 Activity – Phishing for Credentials
  • 9.4 Social Media, Identity Theft, Insider Threats
  • 9.5 Social Engineering Countermeasures
  • 9.6 Social Engineering Review

Module 10: Denial-of-Service

  • 10.1 DoS-DDoS Concepts
  • 10.2 Volumetric Attacks
  • 10.3 Fragmentation Attacks
  • 10.4 State Exhaustion Attacks
  • 10.5 Application Layer Attacks
  • 10.5.1 Activity – Performing a LOIC Attack
  • 10.5.2 Activity – Performing a HOIC Attack
  • 10.5.3 Activity – Conducting a Slowloris Attack
  • 10.6 Other Attacks
  • 10.7 DoS Tools
  • 10.8 DoS Countermeasures
  • 10.9 DoS Review

Module 11: Session Hijacking

  • 11.1 Session Hijacking
  • 11.2 Compromising a Session Token
  • 11.3 XSS
  • 11.4 CSRF
  • 11.5 Other Web Hijacking Attacks
  • 11.6 Network-Level Session Hijacking
  • 11.6.1 Activity – Hijack a Telnet Session
  • 11.7 Session Hijacking Tools
  • 11.8 Session Hijacking Countermeasures
  • 11.9 Session Hijacking Review

Module 12: Evading IDS, Firewalls, and Honeypots

  • 12.1 Types of IDS
  • 12.2 Snort
  • 12.3 System Logs
  • 12.4 IDS Considerations
  • 12.5 IDS Evasion
  • 12.5.1 Activity – Fly Below IDS Radar
  • 12.6 Firewalls
  • 12.7 Packet Filtering Rules
  • 12.8 Firewall Deployments
  • 12.9 Split DNS
  • 12.10 Firewall Product Types
  • 12.11 Firewall Evasion
  • 12.11.1 Activity – Use Social Engineering to Bypass a Windows Firewall
  • 12.11.2 Activity – Busting the DOM for WAF Evasion
  • 12.12 Honeypots
  • 12.13 Honeypot Detection and Evasion
  • 12.13.1 Activity – Test and Analyze a Honey Pot
  • 12.14 Evading IDS, Firewalls, and Honeypots Review

Module 13: Hacking Web Servers

  • 13.1 Web Server Operations
  • 13.2 Hacking Web Servers
  • 13.3 Common Web Server Attacks
  • 13.3.1 Activity – Defacing a Website
  • 13.4 Web Server Attack Tools
  • 13.5 Hacking Web Servers Countermeasures
  • 13.6 Hacking Web Servers Review

Module 14: Hacking Web Applications

  • 14.1 Web Application Concepts
  • 14.2 Attacking Web Apps
  • 14.3 A01 Broken Access Control
  • 14.4 A02 Cryptographic Failures
  • 14.5 A03 Injection
  • 14.5.1 Activity – Command Injection
  • 14.6 A04 Insecure Design
  • 14.7 A05 Security Misconfiguration
  • 14.8 A06 Vulnerable and Outdated Components
  • 14.9 A07 Identification and Authentication Failures
  • 14.10 A08 Software and Data integrity Failures
  • 14.11 A09 Security Logging and Monitoring Failures
  • 14.12 A10 Server-Side Request Forgery
  • 14.13 XSS Attacks
  • 14.13.1 Activity – XSS Walkthrough
  • 14.13.2 Activity – Inject a Malicious iFrame with XXS
  • 14.14 CSRF
  • 14.15 Parameter Tampering
  • 14.15.1 Activity – Parameter Tampering with Burp
  • 14.16 Clickjacking
  • 14.17 SQL Injection
  • 14.18 Insecure Deserialization Attacks
  • 14.19 IDOR
  • 14.19.1 Activity – Hacking with IDOR
  • 14.20 Directory Traversal
  • 14.21 Session Management Attacks
  • 14.22 Response Splitting
  • 14.23 Overflow Attacks
  • 14.24 XXE Attacks
  • 14.25 Web App DoS
  • 14.26 Soap Attacks
  • 14.27 AJAX Attacks
  • 14.28 Web API Hacking
  • 14.29 Webhooks and Web Shells
  • 14.30 Web App Hacking Tools
  • 14.31 Hacking Web Applications Countermeasures
  • 14.32 Hacking Web Applications Review

Module 15: SQL Injection

  • 15.1 SQL Injection Overview
  • 15.2 Basic SQL Injection
  • 15.3 Finding Vulnerable Websites
  • 15.4 Error-based SQL Injection
  • 15.5 Union SQL Injection
  • 15.5.1 Activity – Testing SQLi on a Live Website – Part 1
  • 15.5.2 Activity – Testing SQLi on a Live Website – Part 2
  • 15.6 Blind SQL Injection
  • 15.7 SQL Injection Tools
  • 15.7.1 Activity – SQL Injection Using SQLmap
  • 15.8 Evading Detection
  • 15.9 Analyzing SQL Injection
  • 15.10 SQL Injection Countermeasures
  • 15.11 SQL Injection Review

Module 16: Hacking Wireless Networks

  • 16.1 Wireless Concepts
  • 16.2 Wireless Security Standards
  • 16.3 WI-FI Discovery Tools
  • 16.4 Common Wi-Fi Attacks
  • 16.5 Wi-Fi Password Cracking
  • 16.6 WEP Cracking
  • 16.6.1 Activity – Cracking WEP
  • 16.7 WPA,WPA2,WPA3 Cracking
  • 16.7.1 Activity – WPA KRACK Attack
  • 16.8 WPS Cracking
  • 16.9 Bluetooth Hacking
  • 16.10 Other Wireless Hacking
  • 16.10.1 Activity – Cloning an RFID badge
  • 16.10.2 Activity – Hacking with a Flipper Zero
  • 16.11 Wireless Security Tools
  • 16.12 Wireless Hacking Countermeasures
  • 16.13 Hacking Wireless Networks Review

Module 17: Hacking Mobile Platforms

  • 17.1 Mobile Device Overview
  • 17.2 Mobile Device Attacks
  • 17.3 Android Vulnerabilities
  • 17.4 Rooting Android
  • 17.5 Android Exploits
  • 17.5.1 Activity – Hacking Android
  • 17.5.2 Activity – Using a Mobile Device in a DDoS Campaign
  • 17.6 Android-based Hacking Tools
  • 17.7 Reverse Engineering an Android App
  • 17.8 Securing Android
  • 17.9 iOS Overview
  • 17.10 Jailbreaking iOS
  • 17.11 iOS Exploits
  • 17.12 iOS-based Hacking Tools
  • 17.13 Reverse Engineering an iOS App
  • 17.14 Securing iOS
  • 17.15 Mobile Device Management
  • 17.16 Hacking Mobile Platforms Countermeasures
  • 17.17 Hacking Mobile Platforms Review

Module 18: IoT AND OT Hacking

  • 18.1 IoT Overview
  • 18.2 IoT Infrastructure
  • 18.3 IoT Vulnerabilities and Threats
  • 18.3.1 Activity – Searching for Vulnerable IoT Devices
  • 18.4 IoT Hacking Methodology and Tools
  • 18.5 IoT Hacking Countermeasures
  • 18.6 OT Concepts
  • 18.7 IT-OT Convergence
  • 18.8 OT Components
  • 18.9 OT Vulnerabilities
  • 18.10 OT Attack Methodology and Tools
  • 18.11 OT Hacking Countermeasures
  • 18.12 IoT and OT Hacking Review

Module 19: Cloud Computing

  • 19.1 Cloud Computing Concepts
  • 19.2 Cloud Types
  • 19.3 Cloud Benefits and Considerations
  • 19.4 Cloud Risks and Vulnerabilities
  • 19.5 Cloud Threats and Countermeasures
  • 19.5.1 Activity – Hacking S3 Buckets
  • 19.6 Cloud Security Tools And Best Practices
  • 19.7 Cloud Computing Review

Module 20: Cryptography

  • 20.1 Cryptography Concepts
  • 20.2 Symmetric Encryption
  • 20.2.1 Activity – Symmetric Encryption
  • 20.3 Asymmetric Encryption
  • 20.3.1 Activity – Asymmetric Encryption
  • 20.4 Public Key Exchange20.5 PKI
  • 20.5.1 Activity – Generating and Using an Asymmetric Key Pair
  • 20.6 Digital Signatures
  • 20.7 Hashing
  • 20.7.1 Activity – Calculating Hashes
  • 20.8 Common Cryptography Use Cases
  • 20.9 Cryptography Tools
  • 20.10 Cryptography Attacks
  • 20.11 Cryptography Review
  • 20.12 Course Conclusion
Lesson 1

  • Introduction
  • Audit Process
  • Auditing Standards
  • Auditing Guidelines
  • Cobit Model
  • Audit Management
  • Internal Control Classifications
  • Planning
  • Program
  • Evidence
  • Audit Control Evaluation
  • CSA Control Self-Assessment

Lesson 2

  • IT Governance
  • Governance & Security Policies
  • Outsourcing & Governance
  • Outsourcing & Globalization
  • Organizational Compliance
  • IT Strategy
  • IT Performance

Lesson 3

  • System & Infrastructure
  • Requirements
  • Project Management Tools – Part 1
  • Project Management Tools – Part 2
  • Applications
  • Agile Development
  • Monitoring & Controlling
  • Acquisition Process
  • Testing Process
  • Information Systems Maintenance Practices
  • Data Conversion Tools

Lesson 4

  • Media Disposal Process
  • Post Implementation Review
  • Periodic Review
  • System Maintenance

Lesson 5

  • IT Service Delivery and Support
  • How to Evalutate Service Level Management Practices
  • Operations Management
  • Databases
  • Structured Query Language (SQL)
  • Monitoring Performance
  • Source Code and Perfomance Monitoring
  • Patch Management
  • Incident Management
  • Hardware Component Types
  • Network Component Types

Lesson 6

  • IS Auditor Technical Overview
  • Security Design
  • Monitoring Systems
  • Types of Attacks
  • Cryptography
  • Encryption
  • Asymmetric Encryption
  • Digital Certificate
  • Different Kinds of Attacks
  • Access Controls
  • Identification and Authenication
  • Physical Access Exposure
  • Environmental Security
  • Network Security Devices and Network Components
  • Network Address Translation
  • Virtual Private Networks (VPNs)
  • Voice System Risks
  • Intrusion Detection
  • Firewalls
  • Firewall Implementation
  • Network Access Protection
  • HoneyPot
  • Risks to Portable and Wireless Devices
  • Bluetooth
  • OSI Networking
  • Managing Data

Lesson 7

  • Business Continuity and Disaster Recovery
  • Fault Tolerance
  • Business Continuity and Disaster Recovery Regulations

Module 1: Security and Risk Management

  • Introduction
  • CIA Triad Security Governance – Part 1
  • CIA Triad Security Governance – Part 2
  • Compliance Legal And Regulatory Issues – Part 1
  • Compliance Legal And Regulatory Issues – Part 2
  • Understanding Professional Ethics – Part 1
  • Understanding Professional Ethics – Part 2
  • Risk Management – Part 1
  • Risk Management – Part 2
  • Threat Modeling Acquisition Strategy And Practice Security Awareness And Training – Part 1
  • Threat Modeling Acquisition Strategy And Practice Security Awareness And Training – Part 2

Module 2: Asset Security

  • Asset Security – Part 1
  • Asset Security – Part 2

Module 3: Security Engineering

  • Engineering And Management Of Security – Part 1
  • Engineering And Management Of Security – Part 2
  • Engineering And Management Of Security – Part 3
  • Engineering And Management Of Security – Part 4
  • Engineering And Management Of Security – Part 5
  • Engineering And Management Of Security – Part 6

Module 4: Communication and Network Security

  • Apply Secure Design Principles To Networks – Part 1
  • Apply Secure Design Principles To Networks – Part 2
  • Apply Secure Design Principles To Networks – Part 3
  • Apply Secure Design Principles To Networks – Part 4
  • Apply Secure Design Principles To Networks – Part 5
  • Apply Secure Design Principles To Networks – Part 6
  • Securing Network Components – Part 1
  • Securing Network Components – Part 2
  • Design And Establish Secure Communication Channels – Part 1
  • Design And Establish Secure Communication Channels – Part 2
  • Design And Establish Secure Communication Channels – Part 3

Module 5: Identity and Access Management

  • Controlling Access And Managing Identity – Part 1
  • Controlling Access And Managing Identity – Part 2
  • Controlling Access And Managing Identity – Part 3
  • Controlling Access And Managing Identity – Part 4

Module 6: Security Assessment Testing

  • Designing Performing And Analyzing Security Testing

Module 7: Security Operations

  • Foundational Concepts And Investigations – Part 1
  • Foundational Concepts And Investigations – Part 2
  • Incident Management And Preventative Measures – Part 1
  • Incident Management And Preventative Measures – Part 2
  • Disaster Recovery Process – Part 1
  • Disaster Recovery Process – Part 2

Module 8: Software Development Security

  • Understanding Applying And Enforcing Software Security – Part 1
  • Understanding Applying And Enforcing Software Security – Part 2
  • Conclusion
Module 1: Security and Risk Management

  • Module 1 Notes
  • Intro
  • Security and Risk Management pt.1
  • Security and Risk Management pt.2
  • Security and Risk Management pt.3
  • Security and Risk Management Summary
  • Security and Risk Management Test Prep pt.1
  • Security and Risk Management Test Prep pt.2
  • Security and Risk Management Test Prep pt.3
  • Security and Risk Management Test Prep pt.4

Module 2: Asset Security

  • Module 2 Notes
  • Asset Secutity pt.1
  • Asset Security pt.2
  • Asset Security Summary
  • Asset Security Test Prep

Module 3: Security Architecture and Engineering

  • Module 3 Notes
  • Security Architecture and Engineering pt.1
  • Security Architecture and Engineering pt.2
  • Security Architecture and Engineering pt.3
  • Security Architecture and Engineering Summary
  • Security Architecture and Engineering Test Prep pt.1
  • Security Architecture and Engineering Test Prep pt.2
  • Security Architecture and Engineering Test Prep pt.3

Module 4: Communication and Network Security

  • Module 4 Notes
  • Communication and Network Security pt.1
  • Communication and Network Security pt.2
  • Communication and Network Security Summary
  • Communication and Network Security Test Prep

Module 5: Identity and Access Management (IAM)

  • Module 5 Notes
  • Identity and Access Management (IAM)
  • Identity and Access Management (IAM) Summary
  • Identity and Access Management (IAM) Test Prep pt.1
  • Identity and Access Management (IAM) Test Prep pt.2
  • Identity and Access Management (IAM) Test Prep pt.3
  • Identity and Access Management (IAM) Test Prep pt.4

Module 6: Security Assessment and Testing

  • Module 6 Notes
  • Security Assessment and Testing
  • Security Assessment and Testing Summary
  • Security Assessment and Testing Test Prep

Module 7: Security Operations

  • Module 7 Notes
  • Security Operations pt.1
  • Security Operations pt.2
  • Security Operations pt.3
  • Security Operations pt.4
  • Security Operations Summary
  • Security Operations Test Prep

Module 8: Software Development Security

  • Module 8 Notes
  • Software Development Security pt.1
  • Software Development Security pt.2
  • Software Development Security pt.3
  • Software Development Security pt.4
  • Software Development Security pt.5
  • Software Development Security Summary
  • Software Development Security Test Prep
  • Outro

Module 1: Computer Forensics Introduction

  • Intro To Course-Part1
  • Intro To Course-Part2
  • Intro To Course-Part3
  • Intro To Course-Part4
  • Intro To Course-Part5
  • Intro To Forensics-Part1
  • Intro To Forensics-Part2
  • Intro To Forensics-Part3
  • Intro To Forensics-Part4
  • Intro To Forensics-Part5
  • Intro To Forensics-Part6
  • Intro To Forensics-Part7
  • Intro To Forensics-Part8

Module 2: Forensics Investigation Process

  • Forensics Investigation Process-Part1
  • Forensics Investigation Process-Part2
  • Forensics Investigation Process-Part3
  • Forensics Investigation Process-Part4
  • Forensics Investigation Process-Part5
  • Forensics Investigation Process-Part6
  • Forensics Investigation Process-Part7
  • Forensics Investigation Process-Part8
  • Forensics Investigation Process-Part9
  • Forensics Investigation Process-Part10

Module 3: Searching and Seizing

  • Searching And Seizing-Part1
  • Searching And Seizing-Part2
  • Searching And Seizing-Part3
  • Searching And Seizing-Part4
  • Searching And Seizing-Part5

Module 4: Digital Evidence

  • Digital Evidence-Part1
  • Digital Evidence-Part2
  • Digital Evidence-Part3
  • Digital Evidence-Part4
  • Digital Evidence-Part5
  • Digital Evidence-Part6
  • Digital Evidence-Part7

Module 5: First Responder Procedures

  • First Responder Procedures-Part1
  • First Responder Procedures-Part2
  • First Responder Procedures-Part3
  • First Responder Procedures-Part4
  • First Responder Procedures-Part5
  • First Responder Procedures-Part6
  • First Responder Procedures-Part7
  • First Responder Procedures-Part8

Module 6: Forensics Lab

  • Forensic Lab-Part1
  • Forensic Lab-Part2
  • Forensic Lab-Part3
  • Forensic Lab-Part4
  • Forensic Lab-Part5

Module 7: Hard Disks and File Systems

  • Hard Disks And File Systems-Part1
  • Hard Disks And File Systems-Part2
  • Hard Disks And File Systems-Part3
  • Hard Disks And File Systems-Part4
  • Hard Disks And File Systems-Part5
  • Hard Disks And File Systems-Part6
  • Hard Disks And File Systems-Part7
  • Hard Disks And File Systems-Part8
  • Hard Disks And File Systems-Part9
  • Hard Disks And File Systems-Part10

Module 8: Windows Forensics

  • Windows Forensics-Part1
  • Windows Forensics-Part2
  • Windows Forensics-Part3
  • Windows Forensics-Part4
  • Windows Forensics-Part5
  • Windows Forensics-Part6
  • Windows Forensics-Part7
  • Windows Forensics-Part8
  • Windows Forensics-Part9
  • Windows Forensics-Part10

Module 9: Data Acquisition and Duplication

  • Data Acquisition And Duplication-Part1
  • Data Acquisition And Duplication-Part2
  • Data Acquisition And Duplication-Part3
  • Data Acquisition And Duplication-Part4
  • Data Acquisition And Duplication-Part5
  • Data Acquisition And Duplication-Part6
  • Data Acquisition And Duplication-Part7

Module 10: Recovering Deleted Files and Partitions

  • Recovering Deleted Files And Partitions-Part1
  • Recovering Deleted Files And Partitions-Part2

Module 11: Using Access Data FTK

  • Using Access Data FTK And Special Steps-Part1
  • Using Access Data FTK And Special Steps-Part2
  • Using Access Data FTK And Special Steps-Part3
  • Using Access Data FTK And Special Steps-Part4
  • Using Access Data FTK And Special Steps-Part5
  • Using Access Data FTK And Special Steps-Part6
  • Using Access Data FTK And Special Steps-Part7
  • Using Access Data FTK And Special Steps-Part8

Module 12: Using EnCase

  • EnCase-Part1
  • EnCase-Part2
  • EnCase-Part3

Module 13: Steganography

  • Stenography-Part1
  • Stenography-Part2
  • Stenography-Part3
  • Stenography-Part4

Module 14: Password Crackers

  • Passwords-Part1
  • Passwords-Part2
  • Passwords-Part3
  • Passwords-Part4

Module 15: Log Correlation

  • Log Correlation-Part1
  • Log Correlation-Part2
  • Log Correlation-Part3
  • Log Correlation-Part4
  • Log Correlation-Part5
  • Log Correlation-Part6

Module 16: Network Forensics

  • Network Forensics-Part1
  • Network Forensics-Part2
  • Network Forensics-Part3
  • Network Forensics-Part4

Module 17: Wireless Attacks

  • Wireless Attacks-Part1
  • Wireless Attacks-Part2
  • Wireless Attacks-Part3

Module 18: Web Attacks

  • Web Attacks-Part1
  • Web Attacks-Part2
  • Web Attacks-Part3
  • Web Attacks-Part4
  • Web Attacks-Part5
  • Web Attacks-Part6
  • Web Attacks-Part7
  • Web Attacks-Part8

Module 19: Email Crimes

  • Email Crimes-Part1
  • Email Crimes-Part2
  • Email Crimes-Part3
  • Email Crimes-Part4

Module 20: Mobile Investigation

  • Mobile Investigation-Part1
  • Mobile Investigation-Part2
  • Mobile Investigation-Part3
  • Mobile Investigation-Part4
  • Mobile Investigation-Part5

Module 21: Investigative Reports

  • Investigation Reports-Part1
  • Investigation Reports-Part2
  • Investigation Reports-Part3
  • Investigation Reports-Part4

Module 22: Expert Witness

  • Expert Witness-Part1
  • Expert Witness-Part2
  • Expert Witness-Part3

Module 1: Cyber Security Awareness and Prevention

  • Course Introduction
  • Where We Are Today
  • Areas Of Protection
  • The Connection – Part 1
  • The Connection – Part 2
  • Network Protection
  • Browsing Blunders – Part 1
  • Browsing Blunders – Part 2
  • Settings – Part 1
  • Settings – Part 2
  • Settings – Part 3
  • Settings – Part 4
  • Cookies
  • Browsing Tips And Tricks
  • Email Can’t Hurt You Right – Part 1
  • Email Can’t Hurt You Right – Part 2
  • Viruses – Part 1
  • Viruses – Part 2
  • Viruses – Part 3

Module 2: Managing Mobile Device Security

  • Managing Mobile Device Security-Part1
  • Managing Mobile Device Security-Part2
  • Secure Access
  • Secure Access iPhone Demo
  • Secure Access Android Demo
  • Protect The Digital
  • Protect The Digital Android Demo
  • Protect The Digital iPhone Demo
  • Manage App Access
  • Manage App Access iPhone Demo
  • Manage App Access Android Demo
  • Stay Up To Date
  • Stay Up To Date Android Demo
  • Stay Up To Date iPhone Demo
  • Use Other Tools To Help
  • Prepare For The Worst
  • Prepare For The Worst-Android Demo
  • Prepare For The Worst-iPhone Demo
  • Best Practices
  • Course Conclusion
Module 1: Data Breaches And ID Theft

  • Course Introduction
  • Treat And Cost

Module 2: Device Security Basics

  • It’s All About YOU Part1
  • It’s All About YOU Part2

Module 3: Avoiding Inadvertent Disclosure

  • No More Oops Part1
  • No More Oops Part2

Module 4: Physical And Technical Safeguards

  • The DO Of Security Part1
  • The DO Of Security Part2
  • Course Conclusion

Module 1: What Is Agile

  • Course And Instructor Introduction
  • What Is Agile – Part1
  • What Is Agile Part2 – Agile Manifesto Principles 1-6
  • What Is Agile Part3 – Agile Manifesto Principles 7-12
  • What Is Agile Part4 – Agile Manifesto Values
  • What Is Agile Part5 – Why Agile?
  • What Is Agile – Part6 – Misconceptions about Agile
  • What Is Agile Part7 – Agile Lifecycle
  • What Is Agile Part8 – Key Definitions
  • What Is Agile – Part9

Module 2: Projects And Projects Management In An Agile World

  • Projects And Project Management In An Agile World Part 1 – Historical Information
  • Projects And Project Management In An Agile World Part 2 – Organizational Projects
  • Projects And Project Management In An Agile World Part 3 – Traditional Projects
  • Projects And Project Management In An Agile World Part 4 – Roles
  • Projects And Project Management In An Agile World Part 5 – Roles 2

Module 3: Agile and Scrum

  • Agile And Scrum Part1 – In Depth
  • Agile And Scrum Part2 – Major Activities
  • Agile And Scrum Part3 – 3 Questions
  • Agile And Scrum Part4 – Sprints

Module 4: Common Scrum Terminology

  • Common Scrum Terminology-Part1
  • Common Scrum Terminology-Part2

Module 5: Other Iterative Methods

  • Other Iterative Methods

Module 6: Communication Skills In Agile World

  • Communication Skills In Agile World Part1 – Model
  • Communication Skills In Agile World Part2 – Verbal vs. Nonverbal
  • Communication Skills In Agile World Part3 – Learned Patterns
  • Communication Skills In Agile World Part4 – Key Skills
  • Communication Skills In Agile World Part5 – Key Skills
  • Communication Skills In Agile World Part6 – Conflict Resolution
  • Communication Skills In Agile World Part7 – Tuckman’s 5 Stages

Module 7: Using Agile Outside Software Development

  • Using Agile Outside Software Development-Part1
  • Using Agile Outside Software Development-Part2

Module 8: Case Studies Of Transitioning to Agile

  • Case Studies Of Transitioning To Agile-Part1
  • Case Studies Of Transitioning To Agile Part2 – Procurement
  • Case Studies Of Transitioning To Agile Part3 – In an Agile World
  • Case Studies Of Transitioning To Agile Part4 – Measurements

Module 9: Critique Of Agile

  • Critique Of Agile-Part1
  • Critique Of Agile-Part2

Module 10: Review Of Agile

  • Review Of Agile-Part1
  • Review Of Agile-Part2
  • Review Of Agile-Part3
  • Course Conclusion

Module 1 : Agile Principles and Mindset

  • Agile Introduction Scrum
  • Agile Core Principles Scrum
  • Lean Product Development Scrum
  • Agile Leadership Tasks Scrum
  • Agile Communications Scrum

Module 2 : Value Driven Delivery

  • Value Driven Delivery Scrum
  • Value Driven Delivery Scrum Part2

Module 3 : Stakeholder Engagement

  • Stakeholder Engagement Scrum
  • Facilitation Tools Scrum

Module 4 : Team Performance

  • Team Performance Scrum
  • Digital Tools for Distibuted Teams Scrum

Module 5 : Adaptive Planning

  • Adaptive Planning Scrum
  • Adaptive Planning Scrum Part2

Module 6 : Problem Detection and Resolution

  • Problem Detection and Resolution Scrum

Module 7 : Continuous Improvement

  • Continuous Improvement Scrum

Module 1 : Agile Principles and Mindset

  • Agile Introduction XP
  • Agile Core Principles XP
  • Lean Product Development XP
  • Agile Leadership Tasks XP
  • Agile Communications XP

Module 2 : Value Driven Delivery

  • Value Driven Delivery XP
  • Value Driven Delivery XP Part2

Module 3 : Stakeholder Engagement

  • Stakeholder Engagement XP
  • Facilitation Tools XP

Module 4 : Team Performance

  • Team Performance XP
  • Digital Tools for Distibuted Teams XP

Module 5 : Adaptive Planning

  • Adaptive Planning XP
  • Adaptive Planning Part2 XP

Module 6 : Problem Detection and Resolution

  • Problem Detection and Resolution XP

Module 7 : Continuous Improvement

  • Continuous Improvement XP

Module 1 – ChatGPT Fundamentals

  • 1.1 Course Welcome
  • 1.2 Instructor Introduction
  • 1.3 Download Course Resources
  • 1.4 ChatGPT Fundamentals
  • 1.5 What is ChatGPT
  • 1.6 Use Cases for ChatGPT
  • 1.7 Role of ChatGPT
  • 1.8 Future of ChatGPT
  • 1.9 ChatGPT Statistics, Facts & Trends
  • 1.10 Limitations
  • 1.11 What is a Chatbot
  • 1.12 Understanding AI-ML
  • 1.13 Demonstration – Tools to Use with ChatGPT
  • 1.14 Business Benefits
  • 1.15 Whiteboard – How it all works
  • 1.16 Demonstration – How to Get Started with ChatGPT
  • 1.17 Demonstration – Example Prompts
  • 1.18 Discussion – ChatGPT Performance Issues
  • 1.19 Module Summary

Module 2 – ChatGPT Prompt Demonstrations

  • 2.1 ChatGPT Prompt Demonstrations
  • 2.2 What is a Prompt
  • 2.3 Best Practices For Writing Prompts
  • 2.4 Prompt Demonstration – Asking Questions
  • 2.5 Prompt Demonstration – Top Ten Lists
  • 2.6 Prompt Demonstration – Long Form Docs
  • 2.7 Prompt Demonstration – Complex Form and Code
  • 2.8 Prompt Demonstration – Feedback
  • 2.9 Prompt Demonstration – Content Modification
  • 2.10 Prompt Demonstration – Instruction Generation
  • 2.11 Prompt Demonstration – Information Extraction
  • 2.12 Prompt Demonstration – Writing Computer Code
  • 2.13 Prompt Demonstration – Solving Math Problems
  • 2.14 Prompt Demonstration – Create YT Video Outline
  • 2.15 Prompt Demonstration – Write a Blog Article
  • 2.16 Prompt Demonstration – SEO Keywords
  • 2.17 Comparing Google Bard vs ChatGPT
  • 2.18 Module Summary
  • 2.19 Course Closeout
Module 1: Getting Started

1.1 Instructor Introduction

1.2 Course Introduction

Module 2: Getting to Know Adobe Audition

  • 2.1 Setting Up Your Workspace and Using Shortcuts

Module 3: The Interface

  • 3.1 Setting Up and Adjusting Your Workspace
  • 3.2 Navigating the Media Browser
  • 3.3 Create a Short Cut to Media and Basic Dive into the Editor Panel

Module 4: Waveform Editing

  • 4.1 Opening Audio and Video Files
  • 4.2 Making a Basic Adjustment in the HUD
  • 4.3 Skipping and Deleting Unwanted Portions of Audio
  • 4.4 Quickly Insert Silence into an Audio Track
  • 4.5 Using the Zero Crossing Tool to Remove Pops in Audio
  • 4.6 Cut, Copy and Paste Phrases and Use Multiple Clipboards
  • 4.7 Merge Sections of Audio with Mix Paste
  • 4.8 Create a Loop
  • 4.9 Add an Audio Fade

Module 5: Effects

  • 5.1 Working With Effects
  • 5.2 Gain Staging
  • 5.3 Applying the Effect
  • 5.4 Amplitude and Compression
  • 5.5 Delay and Echo Effects
  • 5.6 Filter and EQ Effects
  • 5.7 Modulation Effects
  • 5.8 Reverb Effects
  • 5.9 Special Effects
  • 5.10 Stereo Imagery Effects
  • 5.11 Time and Pitch Effects
  • 5.12 Audio Plugin Manager and Effects Menu vs Effects Rack
  • 5.13 Invert, Reverse, Silence and Generate Effects
  • 5.14 Match Loudness and Additional Effects
  • 5.15 Create Effect Presets and Favorites

Module 6: Audio Restoration

  • 6.1 Hiss Reduction
  • 6.2 Crackle, Pop and Click Reduction
  • 6.3 Broadband Noise Reduction
  • 6.4 Hum Reduction
  • 6.5 Removing Artifacts Manually
  • 6.6 Automated Sound Removal

Module 7: Mastering

  • 7.1 Parametric Equalizer and Equalization
  • 7.2 Multi Band Compressor and Dynamic Processing
  • 7.3 Reverb and Ambience
  • 7.4 Stereo Imaging
  • 7.5 Diagnostic Tools and Metering

Module 8: Sound Design

  • 8.1 Generate Noise and Tones
  • 8.2 Generate Speech Based on Text
  • 8.3 Use a Sound File to Create Various Sound Effects Pt 1
  • 8.4 Use a Sound File to Create Various Sound Effects Pt 2
  • 8.5 Extracting Frequency Bands with the Frequency Band Splitter

Module 9: Creating and Recording Files

  • 9.1 Create a Project and Record Into the Waveform Editor
  • 9.2 Recording Into the MultiTrack Editor
  • 9.3 Check Remaining Free Space for Recording on Hard Drive
  • 9.4 Dragging Files Into Audition Directly From a Computer
  • 9.5 Import Tracks from a CD

Module 10: Multitrack Sessions

  • 10.1 Create a Multitrack session and Template
  • 10.2 Multitrack and Waveform Editor Integration
  • 10.3 Change Track Colors and Tracks Panel
  • 10.4 Track Controls and Creating Busses
  • 10.5 Channel Mapping in the Multitrack Editor
  • 10.6 Multitrack Editor Effects Rack

Module 11: Multitrack Session Editing

  • 11.1 Create a Session, Add Clips and Adjust Timing
  • 11.2 Mix Down Session Into a New Audio Track
  • 11.3 Adjusting the Timing of a Clip to Match a Specific Range of Time
  • 11.4 Clip Editing Techniques and Effects

Module 12: Additional Features and Summary

  • 12.1 Advanced Features to Consider and Conclusion

Module 1: Introduction to After Effects

  • 1.1 Introduction
  • 1.2 What is After Effects?
  • 1.3 Creating a New Project in After Effects
  • 1.4 Creating and Animating Primitive Shapes Demo – Part1
  • 1.5 Creating and Animating Primitive Shapes Demo -Part2
  • 1.6 Simply Bouncing Ball Demo -Part1
  • 1.7 Simply Bouncy Ball Demo – Part2
  • 1.8 Complex Bouncy Ball Demo – Part1
  • 1.9 Complex Bouncing Ball Demo – Part2
  • 1.10 Exporting from After Effects
  • 1.11 Curves Editor Demo
  • 1.12 Importing Footage – Part1
  • 1.13 Importing Footage – Part2
  • 1.14 Parenting – Part1
  • 1.15 Parenting – Part2

Module 2: Intermediate Effects and Techniques in After Effects

  • 2.1 3D Layers and Cameras Demo – Part1
  • 2.2 3D Layers and Cameras Demo – Part2
  • 2.3 Animating Text Demo – Part1
  • 2.4 Animating Text Demo – Part2
  • 2.5 Animating Text Demo – Part3
  • 2.6 Animating Text Demo – Part4
  • 2.7 Importing and Syncing Audio
  • 2.8 Particles Demo – Part1
  • 2.9 Particles Demo – Part2
  • 2.10 Lights Demo
  • 2.11 Common Effects in After Effects

Module 3: More Advanced Effects and Techniques in After Effects

  • 3.1 Puppet Building Demo – Part1
  • 3.2 Puppet Building Demo – Part2
  • 3.3 Puppet Building Demo – Part3

Module 1: Getting Started

  • 1.1 Course Introduction
  • 1.2 Keyboard Shortcuts
  • 1.3 Keyboard Tips
  • 1.4 Things to Do Before Starting

Module 2: Getting to Know the Workflow

  • 2.1 General Interface and Starting a Project
  • 2.2 Basic Title Animation Using Keyframes
  • 2.3 Keyframe Interpolation and Keyframe Assistan
  • 2.4 Renaming a Composition
  • 2.5 Soloing a Layer for Individual Edits
  • 2.6 Interface Continued: Tool bar, Timeline panel, Preferences, Workspaces
  • 2.7 Render and Export

Module 3: Creating a Basic Animation Using Effects and Presets

  • 3.1 Importing Files from Bridge and Creating a New Composition
  • 3.2 Horizontal Type Tool and Guides
  • 3.3 Controls, Effects and Presets for Titles and Logos

Module 4: Animating Text

  • 4.1 Create and Stylize a Text Layer With the Characters and Paragraph Panels
  • 4.2 Preview and Apply Text Animation Presets and Use Keyframes
  • 4.3 Animate Layers Using Parenting
  • 4.4 Editing and Animating Imported Photoshop Text
  • 4.5 Install Fonts Using Adobe Fonts

Module 5: Working With Shape Layers

  • 5.1 Create and Customize a Shape with Shape Tool
  • 5.2 Self Animating Shape with a Wiggle Path (green marker)
  • 5.3 Create and Customize a Shape with Pen Tool
  • 5.4 Snap Layers
  • 5.5 Animating Shape Layers with Path Operations
  • 5.6 Creating Nulls from Paths

Module 6: Animating a Multimedia Presentation

  • 6.1 Animate Multiple Layers Using Parenting
  • 6.2 Precomposing Layers
  • 6.3 Keyframing a Motion Path
  • 6.4 Animating a Character to Create Movement
  • 6.5 Animating Precomposed Layers with Effects

Module 7: Animating Photoshop Layers

  • 7.1 Animating Change in Light
  • 7.2 Animating Birds Flying with a Track Mat
  • 7.3 Animating Shadows and Using Corner Pin
  • 7.4 Adding a Lens Flare Effect
  • 7.5 Render Composition and Retime
  • 7.6 Use the Graph Editor to Remap Time

Module 8: Working With Masks

  • 8.1 Setup a Basic Mask
  • 8.2 Refine and Apply Mask
  • 8.3 Creating a Reflection with a Mask and Blending Modes
  • 8.4 Create a Vignette

Module 9: Distorting Objects with the Puppet Tools

  • 9.1 Puppet Position Pen Tool
  • 9.2 Starch Pins
  • 9.3 Manually Animate with Puppet Tool
  • 9.4 Automate Animation Using Puppet Sketch Tool

Module 10: Using the Roto Brush Tool

  • 10.1 Extract Foreground Object from Background and Create a Mat
  • 10.2 Touch Up a Mat with the Refine Edge Tool
  • 10.3 Edit or Replace the Separated Background

Module 11: Performing Color Correction

  • 11.1 Set up Composition and Use Levels to Start Balancing the Color
  • 11.2 Basic Color Grading with Lumetri Color Effects
  • 11.3 Use Basic Masking, Tracking and Keying to Replace the Background
  • 11.4 Use an Adjustment Layer to Create a Global Color Effect
  • 11.5 Gaussian Blur Effect

Module 12: Creating Motion Graphics Templates

  • 12.1 Add New Font with Adobe Fonts and Create a Title with Basic Effects
  • 12.2 Using Adjustment Layers to Apply a Specific Effect
  • 12.3 Use Essential Graphics Panel to Build Custom Controls and Share as a Template
  • 12.4 Create Checkboxes to Toggle Visibility of a Background Image
  • 12.5 Protect Portions of a Project from Time Stretching and Export Template
Module 1

  • Instructor Intro
  • Course Intro
  • Course pt.1
  • Course pt.2
  • Course pt.3
  • Course pt.4
Module 1

  • Instructor Intro
  • Course Intro
  • Getting Images Ready for the Web
  • Setting Up Your Workspace
  • Creating a New Site

Module 2

  • Using Spark Post pt.1
  • Using Spark Post pt.2
  • Linking Your Web Pages
  • Adding Colors and Style
  • Creating a Page Visually in Photoshop
  • Importing Into Dreamweaver
  • Export Site to Web

Module 1 – Introduction to Adobe Illustrator 2022

  • 1.1 Instructor Bio
  • 1.2 Course Introduction

Module 2 – Getting Started with Adobe Illustrator 2022

  • 2.1 What are Vectors
  • 2.2 Creating a New Document
  • 2.3 Navigating the Interface

Module 3 – Drawing

  • 3.1 Drawing and Manipulating Primitive Shapes
  • 3.2 Drawing Custom Shapes
  • 3.3 Importing Images
  • 3.4 Understanding Layers and Sublayers
  • 3.5 Additional Drawing and Manipulation Tools

Module 4 – Colors and Gradients

  • 4.1 Color Theory
  • 4.2 In-depth dive into Color Palette4.3 Creating Color Swatches
  • 4.3.2 Gradient Mesh

Module 5 – Intermediate Illustration

  • 5.1 Appearance Palette
  • 5.2 Pathfinder Palette
  • 5.3.1 Recreating an Existing Logo
  • 5.3.2 Creating an icon from a Sketch
  • 5.3.3 Creating a vector illustration from a sketch
  • 5.3.4 Blending Modes

Module 6 – Typography

  • 6.1 Introduction to Typography
  • 6.2 Type Tools in Illustrator
  • 6.3 Envelope Warp and Mesh
  • 6.4 Breaking Text into Outlines
  • 6.5 Caligramme Demo

Module 7 – Live Trace, Paintbrush and Blob Brush

  • 7.1 Live Trace
  • 7.2 Paint Brush

Module 8 – Advanced Illustration

  • 8.1 Illustrating a face from a photo
  • 8.2 Illustrating the body
  • 8.3 Hair and emulating texture
  • 8.4 Adding a background
  • 8.5 Shadows and highlights

Module 9 – Exporting

  • 9.1 Differences Between File Formats
  • Conclusion

Module 1: Tools and Effects in Illustrator

  • 1.1 Course Introduction
  • 1.2 Introduction to Adobe Illustrator
  • 1.3 Basic Tools in Illustrator
  • 1.4 Working with Shapes
  • 1.5 Fills and Strokes
  • 1.6 Pencil Tool
  • 1.7 Pen Tool
  • 1.8 Brush Tool
  • 1.9 Compound Path
  • 1.10 Gradients
  • 1.11 Layers and Grooves
  • 1.12 Transparency and Graphic Style
  • 1.13 Transforming, Moving and Rotating Objects
  • 1.14 Type Tool
  • 1.15 Blending Shapes and Colors
  • 1.16 Basic Effects in Illustrator
  • 1.17 Image Trace Tool

Module 2: Creating Projects in Illustrator

  • 2.1 Creating a Caricature Part 1
  • 2.2 Creating a Caricature Part 2
  • 2.3 Creating a Caricature Part 3
  • 2.4 Creating a Caricature Part 4
  • 2.5 Recreating a Wonka Bar Logo Part 1
  • 2.6 Recreating a Wonka Bar Logo Part 2
  • 2.7 Creating a Logo
  • 2.8 Recreating a Pablo Picasso Painting Part 1
  • 2.9 Recreating a Pablo Picasso Painting Part 2
  • 2.10 Recreating a Pablo Picasso Painting Part 3
  • 2.11 Recreating a Pablo Picasso Painting Part 4
  • 2.12 Recreating a Pablo Picasso Painting Part 5
  • 2.13 Recreating a Pablo Picasso Painting Part 6
  • 2.14 Exporting
  • 2.15 Conclusion

Module 1

  • Instructor Intro
  • Course Intro
  • Navigating the Interface
  • Activating and Deactivating Fonts
  • Font Packs
  • Type Kit Web Fonts
  • Course Conclusion

Module 1

  • 1.1 Introduction
  • 1.2 What is Flash Animate
  • 1.3 Creating A New Document in Flash and Exploring the Interface
  • 1.4 Drawing in Flash Part 1
  • 1.5 Drawing in Flash Part 2
  • 1.6 Frame by Frame Animating in Flash Part 1
  • 1.7 Frame by Frame Animating in Flash Part 2
  • 1.8 Saving, Rendering, and Exporting
  • 1.9 Animating with Symbols Part 1
  • 1.10 Animating with Symbols Part 2
  • 1.11 Animating with Symbols Part 3
  • 1.12 Different Types of Tweening Part 1
  • 1.13 Different Types of Tweening Part 2
  • 1.14 Nesting Symbols
  • 1.15 Importing Graphics Part 1
  • 1.16 Importing Graphics Part 2
  • 1.17 Masking Part 1
  • 1.18 Masking Part 2
  • 1.19 Camera and Parallax Scrolling Part 1
  • 1.20 Camera and Parallax Scrolling Part 2
  • 1.21 Camera and Parallax Scrolling Part 3
  • 1.22 Rotoscoping Part 1
  • 1.23 Rotoscoping Part 2
  • 1.24 Rotoscoping Part 3
  • 1.25 Rotoscoping Part 4
  • 1.26 Rotoscoping Part 5
  • 1.27 Rotoscoping Part 6
  • 1.28 Rotoscoping Part 7
  • 1.29 Creating a Puppet Part 1
  • 1.30 Creating a Puppet Part 2
  • 1.31 Creating a Puppet Part 3
  • 1.32 Creating a Puppet Part 4
  • 1.33 Creating a Puppet Part 5
  • 1.34 Creating a Puppet Part 6
  • 1.35 Animating a Puppet Part 1
  • 1.36 Animating a Puppet Part 2
  • 1.37 Animating a Puppet Part 3
  • 1.38 Animating a Puppet Part 4
  • 1.39 Cycles
  • 1.40 Interchangeable Parts
  • 1.41 Interactivity
  • 1.42 Text Part 1
  • 1.43 Text Part 2
  • 1.44 Animating with Code
  • 1.45 Dialog Part 1
  • 1.46 Dialog Part 2
  • 1.47 Dialog Part 3
  • 1.48 Dialog Part 4
  • 1.49 Controlling the Timeline Part 1
  • 1.50 Controlling the Timeline Part 1
  • 1.51 Putting Together an Interactive eCard Part 1
  • 1.52 Putting Together an Interactive eCard Part 2
  • 1.53 Putting Together an Interactive eCard Part 3
  • 1.54 Putting Together an Interactive eCard Part 4
  • 1.55 Putting Together an Interactive eCard Part 5
  • 1.56 Bone Tool
  • 1.57 Conclusion
Module 1

  • 1.1 Introduction
  • 1.2 What is InDesign
  • 1.3 Creating a New Document
  • 1.4 Importing Images – Part1
  • 1.5 Importing Images – Part2
  • 1.6 Vector vs. Pixels
  • 1.7 Exploring the InDesign Work Area
  • 1.8 Master Pages

Module 2

  • 2.1 Typography – Part1
  • 2.2 Typography – Part2
  • 2.3 Creating Tables
  • 2.4 Packaging
  • 2.5 Principle of Design
  • 2.6 Knowing Your Output
  • 2.7 Advanced Techniques in InDesign
  • 2.8 Using InDesign for Ineractivity
  • 2.9 Scripts
  • 2.10 Exporting
  • 2.11 Conclusion
Module 1

  • 1.1 Instructor Bio
  • 1.2 Course Intro

Module 2

  • 2.1 Creating a New Document
  • 2.2 Importing Images and Understanding Links
  • 2.3 Basic Tools and Navigating the Interface
  • 2.4 Properties Panel
  • 2.5 Creating Your Own Graphics within InDesign-
  • 2.6 Working with Layers

Module 3

  • 3.1 Color Theory
  • 3.2 Adding and Altering Fills, Strokes, Colors and Gradients

Module 4

  • 4.1 Pages Panel
  • 4.2 Master Pages

Module 5

  • 5.1 Typography Terms and Definitions
  • 5.2 Creating Text + Character and Paragraph Formatting
  • 5.3 Character and Paragraph Styles
  • 5.4 Wrapping Text Around an Image
  • 5.5 Working with Tables

Module 6

  • 6.1 Saving, Preflight and Packaging Your Document
  • 6.2 Exporting a PDF

Module 7

  • 7.1 Principles of Design

Module 8

  • 8.1 Letterheads
  • 8.2 Business Card
  • 8.3 Brochure
  • 8.4 Multi-Page Binded Document
  • 8.5 Print Booklet

Module 9

  • 9.1 Creating a Template in InDesign
  • 9.2 Using Step and Repeat
  • 9.3 Grouping Objects
  • 9.4 Island Spread & Page Tool-
  • 9.5 Scripts
  • 9.6 Object Styles
  • 9.7 Content Collector & Content Placer
  • 9.8 Gap Tool
  • 9.9 Pathfinder Pallet

Module 10

  • 10.1 Considerations When Working with Interactive Documents
  • 10.2 Web Docs, Hyperlinks, Buttons and Rollovers
  • 10.3 Creating Your Own Path
  • 10.4 Exporting

Module 11

  • 11.1 Outro
Module 1: What is Animation and the Basics

  • 1.1 Introduction
  • 1.2 What is Animation – Part1
  • 1.3 What is Animation – Part2
  • 1.4 Bouncy Ball Demo – Part1
  • 1.5 Bouncy Ball Demo – Part2
  • 1.6 Bouncy Ball Demo – Part3
  • 1.7 Pendulum Demo – Part1
  • 1.8 Pendulum Demo – Part2
  • 1.9 Platform Pendulum Demo – Part1
  • 1.10 Platform Pendulum Demo – Part2
  • 1.11 Principles of Animation – Part1
  • 1.12 Principles of Animation – Part2
  • 1.13 Bouncy Ball in Perspective Demo – Part1
  • 1.14 Bouncy Ball in Perspective Demo – Part2
  • 1.15 Flag Wave Demo – Part1

Module 2: Intermediate Animation Techniques

  • 2.1 Weight Demo – Part1
  • 2.2 Weight Demo – Part2
  • 2.3 Weight Demo- Part3
  • 2.4 Breaking a Character Down Into Basic Shapes – Part1
  • 2.5 Breaking a Character Down Into Basic Shapes – Part2
  • 2.6 Breaking a Character Down Into Basic Shapes – Part3
  • 2.7 Boil Demo – Part1
  • 2.8 Boil Demo – Part2
  • 2.9 A Take Demo – Part1
  • 2.10 A Take Demo – Part2
  • 2.11 Staggering Demo – Part1
  • 2.12 Staggering Demo – Part2
  • 2.13 Staggering Demo – Part3
  • 2.15 Head Turn Demo – Part1
  • 2.16 Head Turn Demo – Part2
  • 2.17 Head Turn Demo – Part3
  • 2.18 Head Turn Demo – Part4
  • 2.19 Walk Cycles Demo – Part1
  • 2.20 Walk Cycles Demo – Part2
  • 2.21 Walk Cycles Demo – Part3
  • 2.22 Run Cycles Demo
  • 2.23 Dialogue Demo – Part1
  • 2.24 Dialogue Demo – Part2
  • 2.25 Dialogue Demo – Part3
  • 2.26 Dialogue Demo – Part4
  • 2.27 Conclusion

Module 1: Welcome

  • Welcome
  • Welcome 2

Module 2: Why use Lightroom

  • Why use Lightroom

Module 3: Lightroom library and organization

  • Lightroom library and organization
  • Lightroom library and organization 2
  • Lightroom library and organization 3
  • Lightroom library and organization 4

Module 4: Edit your photo – global adjustments

  • Edit your photo – global adjustments
  • Edit your photo – global adjustments 2
  • Edit your photo – global adjustments 3
  • Edit your photo – global adjustments 4
  • Edit your photo – global adjustments 5
  • Edit your photo – global adjustments 6
  • Edit your photo – global adjustments 7
  • Edit your photo – global adjustments 8
  • Edit your photo – global adjustments 9
  • Edit your photo – global adjustments 10
  • Edit your photo – global adjustments 11

Module 5: Edit your photo – local adjustments

  • Edit your photo – local adjustments
  • Edit your photo – local adjustments 2
  • Edit your photo – local adjustments 3
  • Edit your photo – local adjustments 4
  • Edit your photo – local adjustments 5
  • Edit your photo – local adjustments 6

Module 6: Saving and exporting

  • Saving and exporting

Module 7: Lightroom CC overview

  • Lightroom CC overview

Module 8: Outro

  • Outro
Module 1: Tools and Effects in Photoshop

  • 1.1 Introduction
  • 1.2 Exploring the Tools and Work Area – Part1
  • 1.3 Exploring the Tools and Work Area – Part2
  • 1.4 Exploring the Tools and Work Area – Part3
  • 1.5 Exploring the Tools and Work Area – Part4
  • 1.6 Layers in Photoshop – Part1
  • 1.7 Layers in Photoshop – Part2
  • 1.8 Layers in Photoshop – Part3
  • 1.9 Crop and Transform
  • 1.10 Working with Text – Part1
  • 1.11 Working with Text – Part2
  • 1.12 Filters in Photoshop
  • 1.13 Layer Styles
  • 1.14 Adjustment Layers – Part1
  • 1.15 Adjustment Layers – Part2

Module 2: Creating Projects in Photoshop

  • 2.1 Photo Retouching Methods – Part1
  • 2.2 Photo Retouching Methods – Part2
  • 2.3 Creating a Poster Design – Part1
  • 2.4 Creating a Poster Design – Part2
  • 2.5 Creating a Poster Design – Part3
  • 2.6 Creating a Poster Design – Part4
  • 2.7 Coloring Digital Art – Part1
  • 2.8 Coloring Digital Art – Part2
  • 2.9 Coloring Digital Art – Part2
  • 2.10 Colorizing a Black and White Photo – Part1
  • 2.11 Colorizing a Black and White Photo – Part2
  • 2.12 Creating a Website Design – Part1
  • 2.13 Creating a Website Design – Part2
  • 2.14 Creating a Website Design – Part3
  • 2.15 Exporting in Photoshop
  • 2.16 Conclusion

Module 1

  • Instructor Intro
  • Course Intro
  • Course pt.1
  • Course pt.2
  • Course pt.3
  • Course pt.4

Module 1: Introduction to Premiere and Getting Started on an Editing Project

  • 1.1 Course Introduction
  • 1.2 Introduction to Premiere Pro CC
  • 1.3 Creating a New Project
  • 1.4 Workspace Layout
  • 1.5 Importing Media
  • 1.6 Organizing Media
  • 1.7 Monitoring Footage
  • 1.8 Navigating the Source Monitor
  • 1.9 Creating a Sequence
  • 1.10 Editing Video Part 1
  • 1.11 Editing Video Part 2
  • 1.12 Editing with Multi Source Sequence Part 1
  • 1.13 Editing with Multi Source Sequence Part 2
  • 1.14 Editing with Multi Source Sequence Part 3
  • 1.15 Adding Titles

Module 2: More Editing Techniques and Completing a Project

  • 2.1 Editing Using Program Monitor
  • 2.2 Advanced Editing Techniques
  • 2.3 Inserting Graphics
  • 2.4 Adding Music
  • 2.5 Adjusting Audio
  • 2.6 Using The Tools In Tool Panel
  • 2.7 Trimming Using The Program Monitor
  • 2.8 Track Monitoring And Algorithm
  • 2.9 Transitions
  • 2.10 Basic Effects
  • 2.11 Manipulate Clip Speed
  • 2.12 Color Correction
  • 2.14 Exporting A Project
  • 2.15 Conclusion

Module 1

  • Instructor Intro
  • Course Intro
  • How Does Rush Differ
  • Starting a New Project
  • Video Resolution and Creating Content
  • Finding and Importing Content
  • Timeline Controls
  • Importing Audio

Module 2

  • General Editing
  • Advanced Editing
  • Color Grading
  • Adding Titles
  • Principles of Typography in Video
  • Fixing Audio
  • Video and Audio Transitions
  • Exporting Finished Projects
Module 1

  • Instructor Intro
  • Course Intro
  • Web Based vs Mobile Device
  • How to Access Spark
  • Branding in Spark

Module 2

  • Using Spark Post
  • Uploading Content from Post for Exporting
  • Using Spark Video
  • Exporting Finished Videos
  • Using Spark Page
  • Putting Spark Pages on the Web

Module 1

  • Instructor Info
  • Course Info
  • Interface and Features
  • Images
  • Videos and Licensing
  • Templaes and Premium
  • Contributing Content
  • Best Practices when Contributing

Module 1 – Welcome to Adobe XD 2022

  • 1.1 Welcome to Adobe XD 2022
  • 1.2 What is Adobe XD 2022

Module 2 – Adobe XD 2022 Overview

  • 2.1 Adobe XD 2022 Overview

Module 3 – Designing in a Project with Adobe XD 2022

  • 3.1 Adobe XD 2022 Project Overview
  • 3.2 Designing Your First Screen in Adobe XD 2022

Module 4 – Assets, Reusable Styles, and Responsive Resize in Adobe XD 2022

  • 4.1 Assets and Reusable Styles in Adobe XD 2022
  • 4.2 Responsive Resize in Adobe XD 2022

Module 5 – Images and Visual Effects in Adobe XD 2022

  • 5.1 Imports, Images, and Masks in Adobe XD 2022
  • 5.2 Special Visual Effects in Adobe XD 2022

Module 6 – Making Interactive Buttons in Adobe XD 2022

  • 6.1 Plugins in Adobe XD 2022
  • 6.2 Stacks in Adobe XD 2022
  • 6.3 Components in Adobe XD 2022
  • 6.4 Repeat Grid in Adobe XD 2022

Module 7 – Grouped Imports and Scroll Groups in Adobe XD 2022

  • 7.1 Grouped imports in Adobe XD 2022
  • 7.2 Scroll Groups in Adobe XD 2022

Module 8 – Prototyping and Animations in Adobe XD 2022

  • 8.1 Prototyping with Adobe XD 2022
  • 8.2 Animations in Adobe XD 2022

Module 9 – Exporting and Sharing with Adobe XD 2022

  • 9.1 Exports in Adobe XD 2022
  • 9.2 Adobe XD 2022 Conclusion
Module 1: Intro

  • Intro

Module 2: Camera Anatomy

  • Camera Anatomy
  • Camera Anatomy 2

Module 3: Scene Camera Modes

  • Scene Camera Modules

Module 4: Achieve Exposure

  • Achieve Exposure
  • Achieve Exposure 2

Module 5: Filetypes

  • Filetypes

Module 6: Sensor

  • Sensor

Module 7: Resolution

  • Resolution

Module 8: White Balance

  • White Balance
  • White Balance 2

Module 9: Color Theory

  • Color Theory

Module 10: Depth of Field

  • Depth of Field

Module 11: Focusing

  • Focusing

Module 12: Lighting

  • Lighting
  • Lighting 2

Module 13: Metering

  • Metering

Module 14: Composition

  • Composition
Module 1: Introduction

  • 1.1 Instructor Intro
  • 1.2 Course Intro

Module 2: Getting Started

  • 2.1 What are Vectors
  • 2.2 Creating a New Document
  • 2.3 Navigating the Interface

Module 3: Drawing

  • 3.1 Drawing and Manipulating Primitive Shapes
  • 3.2 Drawing Custom Shapes Part 1
  • 3.2 Drawing Custom Shapes Part 2
  • 3.2 Drawing Custom Shapes Part 3
  • 3.3 Importing Images
  • 3.4 Understanding Layers and Sublayers
  • 3.5 Additional Drawing and Manipulation Tools

Module 4: Colors and Gradients

  • 4.1 Color Theory
  • 4.2 In-depth dive into Color Palette-
  • 4.3 Creating Color Swatches
  • 4.4 Creating and Manipulating Gradients Part 1
  • 4.5 Creating and Manipulating Gradients part 2
  • 4.6 Creating and Manipulating Gradients Part 3

Module 5: Intermediate Illustration

  • 5.1 Appearance Palette
  • 5.2 Pathfinder Palette
  • 5.3 Drawing with Intent part 1
  • 5.3 Drawing with Intent Part 2
  • 5.4 Blending Modes & FX Part 1
  • 5.5 Blending Modes & FX Part 2

Module 6: Typography

  • 6.1. Introduction to Typography
  • 6.2. Type Tools in Illustrator
  • 6.3 Envelope Warp and Mesh
  • 6.4 Breaking Text into Outlines

Module 7: Live Trace, Paint Brush and Blob Brush

  • 7.1 Live Trace
  • 7.2 Paint and Blob Brush

Module 8: Exporting

  • 8.1 Difference Between File Formats and Exporting
  • 8.2 Course Conclusion

Module 1: Getting Started

  • 1.1 Instructor Intro
  • 1.1 Course Intro
  • 1.2 Open Images
  • 1.3 Get Familiar with Work Space
  • 1.4 Zoom and Pan
  • 1.5 Undo and Save Pt 1
  • 1.5 Undo and Save Pt 2
  • 1.6 Resize and Resolution
  • 1.7 Crop and Straighten
  • 1.8 Expand the Canvas
  • 1.9 Basic Image Corrections

Module 2: Layers and More

  • 2.1 Layer Basics
  • 2.2 Resizing Layers
  • 2.3 Adding Text and Images
  • 2.4 Layer Styles
  • 2.5 Photo Merge and Panoramic Images
  • 2.6 Camera Raw
  • 2.7 Camera Raw Continued and Adjustment Layers
  • 2.8 Selection Basics

Module 3: Editing, Techniques and More

  • 3.1 Raw File XMP
  • 3.2 Masks
  • 3.3 Puppet Warp and Alpha Channel
  • 3.4 Typography
  • 3.5 Vector Drawing Techniques
  • 3.6 Advanced Compositing
Module 1: Getting Started

  • 1.0 Course Intro
  • 1.1 Touring Adobe PP
  • 1.1 Touring Adobe PP pt.2
  • 1.2 Setting Up a Project
  • 1.3 Importing Media
  • 1.4 Organizing Media
  • 1.5 Mastering the Essentials of Video Editing
  • 1.6 Working with Clips and Markers
  • 1.7 Adding Transitions
  • 1.8 Multicamera Editing
  • 1.9 Advanced Editing Techniques

Module 2: Motion, Sound, and More

  • 2.1 Putting Clips in Motion
  • 2.2 Editing and Mixing Audio
  • 2.3 Sweetening Sound
  • 2.4 Adding Video Effects
  • 2.5 Basic Color Correction
  • 2.6 Compositing Techniques
  • 2.7 Creating Graphics
  • 2.8 Exporting Frames, Clips and Sequences

Module 1: Architecture

  • Cloud Security Overview-Part1
  • Cloud Security Overview-Part2
  • Cloud Diagrams
  • Cloud Services

Module 2: Governance and Enterprise Risk

  • Risk Management
  • Corporate Governance
  • Enterprise Risk Management
  • Risk Management Balance Process Supply Chain Security
  • ERM Incidents Recommendations-Part1
  • ERM Incidents Recommendations-Part2
  • ERM Incidents Recommendations-Part3

Module 3: Legal Issues- Contracts and Electronic

  • Cloud Legal Issues-Part1
  • Cloud Legal Issues-Part2
  • Cloud Legal Issues-Part3

Module 4: Compliance and Audit Management

  • Audits
  • Compliance And Audit
  • Audit Recommendations
  • Audit Requirements

Module 5: Information Management and Data Security

  • Information And Security
  • Storage
  • Information Governance Classification
  • Data Security
  • Protecting Data Moving
  • Client Database Encryption
  • PaaS Encryption

Module 6: Interoperability and Portability

  • Interoperability And Portability
  • Interoperability Recommendations
  • Portability Recommendations
  • Recommendations SAAS

Module 7: Traditional Security, Business Continuity, and Disaster Recovery

  • Business Continuity And Disaster Recovery
  • Assessing CSP Security
  • Equipment Maintenance
  • Recommendations

Module 8: Data Center Operations

  • Data Center Operations

Module 9: Incident Response

  • Incident Response
  • Testing
  • IaaS
  • C.E.R.- Containment, Eradication, And Recovery

Module 10: Application Security

  • Application Security
  • Security Testing
  • Audit Compliance
  • Security Assurance Recommendations

Module 11: Encryption and Key Management

  • Encryption And Key Management
  • Content Aware Encryption
  • Storage Of Keys

Module 12: Identity, Entitlement, and Access Management

  • Building Access Control
  • Intro To Identity
  • Entitlement Process
  • Trust With Identity
  • Recommendations For Identity Management

Module 13: Virtualization

  • Virtualization
  • Hypervisor And Virtual Machine
  • Inter-Virtual Machine Attacks
  • Virtual Machine Encryption
  • Virtual Machine Recommendations And Requirements

Module 14: Security as a Service

  • Security As A Service
  • Security Offerings
  • Intrusion Detection Prevention
  • Business Continuity And Disaster Recovery
  • European CCSK
  • Top Security Benefits
  • European Legal Based Issues
Module 1: The principles of CC

  • EXIN Overview-Part 1
  • EXIN Overview-Part 2
  • EXIN Overview 2-Part 1
  • EXIN Overview 2-Part 2
  • The Basics
  • History Of Cloud
  • Delivery Model Architectures
  • Software As A Service
  • Justification For Cloud Computing
  • Confidentiality And Availability
  • Concepts From NIST
  • Important Characteristics
  • Broad Network Access
  • Resource Pooling
  • Measured Service
  • Service Models
  • Terms Of Service
  • Recommendations
  • Virtualization
  • Virtualization Concepts
  • Inter-Virtual Machine Attacks
  • Virtual Machine Encryption
  • Recommendations
  • Service Models
  • Business Process
  • Outsourcing
  • Software As A Service-Part 1
  • Software As A Service-Part 2
  • Risks And Recommendations
  • Platform As A Service
  • PaaS Considerations
  • PaaS Issues
  • Infrastructure As A Service
  • Scope Of Control
  • IaaS Benefits
  • IaaS Issues And Concerns
  • IaaS Recommendations
  • Services Oriented Architecture
  • Web Services
  • Infrastructure On Demand
  • Why Cloud
  • Collaborative Working
  • New Business Opportunities

Module 2: Implementing and Managing CC

  • Implementing And Managing Cloud Computing

Module 3: Using the Cloud

  • Relevent Technologies In Cloud
  • Storage Devices-Part 1
  • Storage Devices-Part 2
  • Application Programming Interfaces
  • Traditional Software Model
  • Impact Of Cloud On Users
  • Providing Cloud Services
  • Developing Added Services-Part 1
  • Developing Added Services-Part 2
  • Using Cloud Services

Module 4: Security and Compliance

  • Threats And Controls
  • Malicious Insiders
  • Insiders Remediation

Module 5: Evaluation of CC

  • Why Cloud
  • Resource Scaling
  • Quality
  • Thin Clients
  • Buying Cloud Services
  • Pay As You Go Vs Ownership
  • Establishing Requirements
  • Contract Terms
Module 1 – Google Analytics 4 – Course Overview

  • 1.0 About Google Analytics 4
  • 1.1 Course Intro Welcome
  • 1.2 Instructor Intro

Module 2 – Fundamentals of Google Analytics

  • 2.1 What is a Digital Product
  • 2.2 Google Market Platform
  • 2.3 Google Analytics Overview
  • 2.4 Google Analytics 4 Overview
  • 2.5 Whiteboad Discussion-How Does GA Work
  • 2.6 Comparing GA3 to GA4
  • 2.7 Whiteboard Compare Data Models
  • 2.8 Demo- GA Console Walkthru
  • 2.9 Admin Panel
  • 2.10 Demo Admin Panel
  • 2.11 Tag Manager
  • 2.12 Demo Tag Manager
  • 2.13 Segment Review
  • 2.14 Segment Review Questions

Module 3 – Advanced Topics with Google Analytics

  • 3.1 Upgrading and Running Parallel
  • 3.2 Whiteboard Discussion – Parallel
  • 3.3 Demo Console Parallel
  • 3.4 Hands on Demo – Install GA4 on a Live Site
  • 3.5 Understand Reporting Options, Lifecycle Collections
  • 3.6 Hands on Demo – Exploring reports
  • 3.7 Hands on Demo – Set up GA4 Custom Eventsmp4
  • 3.8 Hands on Demo – Conversions, Audiences, DebugView
  • 3.9 Hands on Demo – Advertising
  • 3.10 Hands on Demo – Explorations:Insights
  • 3.11 Hands on Demo – Lifecycle and Users
  • 3.12 Google Big Query Connections
  • 3.13 Demo – BigQuery Data Integrations
  • 3.14 Google Ads
  • 3.15 Demo – Google Ads
  • 3.16 Google Signals
  • 3.17 Demo – Google Signals
  • 3.18 Certification Options
  • 3.19 Segment Summary
  • 3.20 Review Questions
  • 3.21 Resources
  • 3.22 Course Closeout

Module 1: Introduction to Google Analytics

  • Intro Definitions-Part 1
  • Intro Definitions-Part 2
  • How Google Analytics Works

Module 2: Fundamentals of Google Analytics

  • Build Analytics Infrastructure
  • Setting Up Conversion Data
  • Setting Up E-Commerce And Goal Tracking
  • Cross Domain Tracking
  • Input New Users
  • Examine Data Points

Module 3: Basics of Google Anayltics

  • Basic Features
  • Dashboard
  • Shortcuts
  • Adding A Dashboard
  • Sharing Reports
  • Alerts
  • Realtime Analytics
  • Standard Reports
  • Views

Module 4: Reports in Google Analytics

  • Acquisitions Intro
  • All Traffic Acquisitions
  • Acquisitions Overview
  • Acquisitions Channels
  • All Referrals
  • Campaign
  • Keywords
  • Social
  • Webmaster Tools

Module 5: Behavioral Reports

  • Behavioral Reports Intro
  • Dimensions
  • Content Drilldown
  • Landing Pages
  • Exit Pages
  • Event Flow Report
  • Working With Events
  • Site Search Report-Part 1
  • Site Search Report-Part 2
  • Site Search Report-Part 3
  • Site Search Report-Part 4
  • Behavior Flow Report
  • Site Speed
  • Using Site Speed Search
  • Page Timings
  • Speed Suggestions
  • User Timing Adsense
  • Experiments
  • Inpage Analytics

Module 6: Audience

  • Audience Reports
  • Location Report
  • Language
  • Behavior
  • Frequency Recency
  • Engagement Report
  • Technology Reports
  • Mobile Reporting
  • Demographic Report
  • Interests
  • Visitor Flow Chart

Module 7: Conversions

  • Intro To Module 7
  • Funnel Visualization
  • Goal Flow Report
  • Reverse Goal Path
  • Goal URLs
  • E-commerce Reports
  • Product Performance Reports
  • Transactions Report
  • Time To Purchase Report
  • Multi-Channels Funnels Report
  • Assisted Conversion Report
  • Top Conversion Paths Report
  • Time Log And Path Length Report
  • Attribution Report And Model Comparison Tool
  • Conclusion
Module 1: Course Overview

  • 1.1 Course Overview
  • Course Overview
  • 1.2 Course PreReqs
  • Course PreReqs

Module 2: DevOps Basics

  • DevOps Fundamentals
  • What is DevOps
  • What are Pipelines
  • Continuous Integration and Delivery
  • Continuous Deployment
  • Whiteboard Build Services
  • Demo – DevOps Services on GCP

Module 3: App Engine PaaS

  • App Engine
  • App Engine Basics
  • App Engine Demo
  • App Engine Security Scanner Demo
  • App Engine or Kubenetes Engine

Module 4: Kubenetes Engine Overview

  • Kubenetes Engine
  • Kubernetes Basics
  • What is Kubenetes Engine
  • Demo – Kubenetes Engine Clusters Demo
  • Kubenetes Engine Application Demo
  • Kubenetes Engine Whiteboard

Module 5: DevOps Developer Tools

  • DevOps Services & Tools
  • Demo – Cloud SDK
  • Demo – Cloud Shell
  • Demo – Cloud Build
  • Demo – Container Registry
  • Demo – Cloud Source Repositories
  • Demo – Private Catalog
  • Demo – Artifact Registry

Module 6: Microservices

  • Microservices
  • Demo – Cloud Watch
  • Cloud Functions-Cloud Run
  • Demo – Cloud Functions
  • Demo – Cloud Run

Module 7: Management of your DevOps Services

  • Management and Monitoring
  • Cloud Operations
  • Demo – Cloud Operations
  • Service Accounts
  • Cloud Endpoints and Apigee
  • Demo – Workflows and Cloud Tasks
  • Demo – Recommendation Engine
  • Infrastructure as Code (IaaC)
  • Deployment Manager
  • Demo – Deployment Manager
  • Demo – Cloud Marketplace

Module 8: Resources and Closeout

  • Resources and Closeout
  • Course Summary
  • DevOps Roles and Salary Demand
  • Additional Resources
  • Google Cloud Platform Certification
  • Course Closeout

Module 1: Foundations (Beginner)

  • Introduction
  • History Of Computer Programming
  • Categories Of Programming Languages
  • Condensed History Of Java
  • Software Life Cycle

Module 2: Terms and Tools (Beginner)

  • Programming General Terms
  • Downloading And Installing Java
  • Programmer Editors And Integrated Development Environments Part 1
  • Programmer Editors And Integrated Development Environments Part 2
  • Installing Eclipse

Module 3: Identifiers, Variables, and Data Types (Beginner)

  • Understanding Identifiers
  • Unicode And Java Syntax
  • Variables Constants And Literals
  • Field Member And Variable Components
  • Primitive Data Types Part 1
  • Primitive Data Types Part 2
  • Primitive Data Types Part 3
  • Operators Part 1
  • Operators Part 2
  • Escape Characters
  • Type Conversions And Type Casting
  • Java Reserved Words
  • Commenting
  • Abstract Data Types

Module 4: Object-Orientated Programming (Intermediate)

  • Object Oriented Programming
  • What Is An Object?
  • Eclipse Lab

Module 5: Predefined Classes (Intermediate)

  • String Class Part 1
  • String Class Part 2
  • String Class Part 3
  • Date Class
  • Simple Date Format Class
  • Scanner Class Part 1
  • Scanner Class Part 2
  • Decimal Format Class Part 1
  • Decimal Format Class Part 2
  • JFrame Class
  • Container Class Part 1
  • Container Class Part 2

Module 6: Methods Part 1 (Intermediate)

  • Methods
  • Naming Methods
  • Implementation Method Hiding
  • Method Variables And Literals
  • Invoking A Method

Module 7: Methods Part 2 (Advanced)

  • Methods And Multiple Arguments
  • Methods Lab
  • Method Overloading

Module 8: Constructors (Advanced)

  • Creating Objects
  • Constructor Declarations
  • Overloading And Default Constructors

Module 9: Control of Flow (Advanced)

  • While Loop
  • While Statement
  • For Loop

Module 10: Arrays and Exceptions (Advanced)

  • Array Structures
  • Constants And Array Sizes Part 1
  • Constants And Array Sizes Part 2
  • Exceptions And The Try Catch Block
  • Conclusion
Module 1: Introduction To Javascript

  • Introduction
  • Java Script From The Dawn Of The Web Part 1
  • Java Script From The Dawn Of The Web Part 2
  • Getting The Right Tools
  • Creating Your First JavaScript Program Part 1
  • Creating Your First JavaScript Program Part 2

Module 2: Core Concepts And Syntax

  • The Structure And Content Part 1
  • The Structure And Content Part 2
  • Naming And Casing Best Practices
  • Understanding Variables Part 1
  • Understanding Variables Part 2
  • Understanding Variables Part 3
  • Working With Operators Part 1
  • Working With Operators Part 2
  • Working With Loops Part 1
  • Working With Loops Part 2
  • Creating Functions Part 1
  • Creating Functions Part 2
  • Understanding Types And Objects Part 1
  • Understanding Types And Objects Part 2
  • Understanding Types And Objects Part 3
  • Understanding Types And Objects Part 4
  • Understanding Types And Objects Part 5

Module 3: Getting A Handle On The DOM

  • Introduction To The HTML Document Object Model
  • Accessing DOM Elements
  • Changing DOM Elements
  • Creating DOM Elements
  • Responding To Events Part 1
  • Responding To Events Part 2

Module 4: Working With Libraries

  • Introduction To Libraries
  • Installing And Using jQuery Part 1
  • Installing And Using jQuery Part 2
  • Modifying Web Pages Using jQuery Part 1
  • Modifying Web Pages Using jQuery Part 2
  • Conclusion

Module 1: The ITIL Qualification Scheme

  • Intro
  • About Scheme
  • Levels Of Qualifications
  • Qualification Bodies
  • The I T I L Foundation Certification Stubble

Module 2: Introduction to Service Management

  • Service And Service Management- Part 1
  • Service And Service Management- Part2
  • Service Management Processes- Part 1
  • Service Management Processes- Part 2
  • Service Management Best Practices And Summary

Module 3: ITIL and the Service Lifecycle

  • Service Management Practices
  • Why ITIL
  • The Service Lifecycle

Module 4: Service Strategy

  • Service Strategy Purpose And Objectives
  • Service Strategy Scope
  • Business Value Stubble
  • Key Principles- Part1
  • Key Principles- Part2
  • Service Stragey Processes

Module 5: Service Design

  • Service Design Purpose And Objectives
  • Scope Of Service Design
  • Business Value Service Design
  • Service Design Key Principles
  • Service Design Processes- Part 1
  • Service Design Processes- Part 2
  • Service Design Processes- Part 3
  • Service Design Processes- Part 4

Module 6: Service Transition

  • Service Transition Purpose And Objectives
  • Service Transition Scope And Business Value
  • Service Transition Key Principles
  • Service Transition Processes- Part 1
  • Service Transition Processes- Part 2
  • Service Transition Processes- Part 3
  • Service Transition Processes- Part 4

Module 7: Service Operation

  • Intro To Service Operation
  • Service Operation Basic Concepts
  • Service Operation Processes-Part 1
  • Service Operation Processes-Part 2
  • Service Operation Access Management
  • Service Operation Functions

Module 8: Continual Service Improvement

  • Continual Service Improvement Purpose Objectives And Scope
  • Continual Service Improvement Key Principles
  • Continual Service Improvement Processes

Module 9: Service Management Technology

  • SMT
  • SMT Service Automation
  • SMT Service Analytics

Module 10: How it all Fits Together

  • How It All Fits Together
  • Outro

Module 11: Bonus Material

  • Lifecycle Stages Flow-Part 1
  • Lifecycle Stages Flow-Part 2
  • Lifecycle Stages Breakdown-Part 1
  • Lifecycle Stages Breakdown-Part 2
  • Lifecycle Stages Breakdown-Part 3
  • Function Reviews-Part 1
  • Function Reviews-Part 2
  • Service Support Function
  • Service Delivery Function-Part 1
  • Service Delivery Function-Part 2
  • Test Taking Tips
  • Practice Questions

Module 1: Service Operation Introduction

  • Introduction
  • Syllabus Exam Overview And Testing Tips
  • Service Operation Introduction Part 1
  • Service Operation Introduction Part 2
  • Service Operation Introduction Part 3
  • Service Operation Introduction Part 4
  • Service Operation Introduction Part 5

Module 2: Service Management As a Practice

  • Service Management As A Practice Part 1
  • Service Management As A Practice Part 2
  • Service Management As A Practice Part 3

Module 3: Service Operation Principles

  • Service Operation Principles Part 1
  • Service Operation Principles Part 2
  • Service Operation Principles Part 3
  • Service Operation Principles Part 4

Module 4: Service Operation Process

  • Service Operation Process Part 1
  • Service Operation Process Part 2
  • Service Operation Process Part 3
  • Incident Management Part 1
  • Incident Management Part 2
  • Problem Management
  • Request Fulfillment
  • Access Management

Module 5: Common Service Operation Activities

  • Common Service Operation Activities Part 1
  • Common Service Operation Activities Part 2
  • Common Service Operation Activities Part 3
  • Common Service Operation Activities Part 4

Module 6: Organizing For Service Operation

  • Organizing For Service Operation Part 1
  • Organizing For Service Operation Part 2
  • Organizing For Service Operation Part 3
  • Roles Part 1
  • Roles Part 2

Module 7: Technology Considerations

  • Technology Considerations

Module 8: Service Operation

  • Implementation Of Service Operation
  • Challenges Risks And Critical Success Factors
  • Conclusion

Module 1: Introduction To Oracle 12c SQL Fundamentals

  • Introduction
  • Intro To Oracle 12c-SQL Fundamentals
  • Structure Of SQL
  • Basic Select Statements
  • Basic Select Statements Demo

Module 2: Retrieving Data

  • Modifying Reported Output
  • The Where Clause
  • The Order By Clause
  • Left And Right Outer Joins
  • The Where Clause Demo
  • Multi-Table Selection Demo

Module 3: SQL Functions

  • Single Row Functions
  • Aggregate Functions
  • Single Row Functions Demo
  • Muiltrow Functions Demo
  • Group By
  • Grouping Demo
  • Conversion Functions
  • Conversion Functions Demo
  • Datetime Functions
  • Datetime Functions Demo

Module 4: Subqueries

  • Single-Row Subqueries
  • Single-Row Subqueries Demo
  • Multi-Row Subqueries
  • Multi-Row Subqueries Demo
  • Other Subquery Types
  • Other Subquery Types Demo

Module 5: Data Manipulation Language

  • Adding Data
  • Changing Data
  • Deleting Data
  • DML Demo

Module 6: Data Control Language

  • Security
  • Object Privileges
  • DCL Demo

Module 7: Data Definition Language

  • Creating Objects In The Database
  • Creating Objects In The Database Demo
  • Sequences
  • Sequenced Demo
  • Indexes
  • Views

Module 8: Combining Queries

  • Combining Queries

Module 9: Oracle 12C SQL Fundamentals Review

  • Oracle 12c SQL Fundamentals Review – Part 1
  • Oracle 12c SQL Fundamentals Review – Part 2
  • Oracle 12c SQL Fundamentals Review – Part 3
  • Conclusion

Module 1: Database Concepts And Tools

  • Instructor And Course Introduction
  • Database Concepts And Tools – Part 1
  • Database Concepts And Tools – Part 2

Module 2: Memory Structure

  • Memory Structure – Part 1
  • Memory Structure – Part 2

Module 3: Tables

  • Tables – Part 1
  • Tables – Part 2

Module 4: Indexes

  • Indexes – Part 1
  • Indexes – Part 2

Module 5: Constraints And Triggers

  • Constraints And Triggers – Part 1
  • Constraints And Triggers – Part 2

Module 6: Users

  • Users
  • Profiles
  • Privileges
  • Roles

Module 7: Internal Structures

  • Storage Structures – Part 1
  • Storage Structures – Part 2
  • Internal Memory Structures – Part 1
  • Internal Memory Structures – Part 2
  • Background Processes – Part 1
  • Background Processes – Part 2

Module 8: Starting Up and Shutting Down Database

  • Starting And Stopping DataBase – Part 1
  • Starting And Stopping DataBase – Part 2

Module 9: Critical Storage Files

  • Critical Storage Files – Part 1
  • Critical Storage Files – Part 2

Module 10: Data Manipulation Language

  • DML Atomicity – Part 1
  • DML Atomicity – Part 2
  • DML Insert
  • DML Update – Part 1
  • DML Update – Part 2
  • DML Delete And Review Of DML Statements – Part 1
  • DML Delete And Review Of DML Statements – Part 2

Module 11: Data Concurrency

  • Data Concurrency – Part 1
  • Data Concurrency – Part 2

Module 12: BackUp And Recovery

  • Back Up – Part 1
  • Back Up – Part 2
  • Back Up – Part 3
  • RMAN Catalog
  • RMAN BackUps – Part 1
  • RMAN BackUps – Part 2
  • Disaster Preparedness
  • Recovery
  • Flashback Recovery

Module 13: Installation

  • Installation – Part 1
  • Installation – Part 2

Module 14: Course Review

  • Course Review – Part 1
  • Course Review – Part 2
  • Course Review – Part 3
  • Course Review – Part 4
  • Course Review – Part 5
  • Course Outro

Module 1: Database Admininstration

  • Intro to Oracle
  • Database Administration
  • Installing Oracle – Part 1
  • Installing Oracle – Part 2
  • Post Setup Overview – Part 1
  • Post Setup Overview – Part 2
  • SQLplus – Part 1
  • SQLplus – Part 2
  • SQLplus Demo – Part 1
  • SQLplus Demo – Part 2
  • SQLplus Demo – Part 3
  • Startup and Shutdown – Part 1
  • Startup and Shutdown – Part 2

Module 2: Oracle Architecture

  • Oracle Architecture
  • Schema Objects
  • Data Access
  • Architecture

Module 3: Database Schema

  • Database Schema
  • Create Table & Tablespace – Part 1
  • Create Table & Tablespace – Part 2
  • Create View
  • Create Index
  • Create Sequence

Module 4: Recovery Manager

  • Recovery Manager
  • What is RMAN
  • RMAN Demo
  • Restore – Part 1
  • Restore – Part 2

Module 5: Introduction to SQL

  • SQL – Part 1
  • SQL – Part 2
  • Parts of SQL Statement
  • Select Statement

Module 6: Filtering and Sorting Data

  • Build ERD – Part 1
  • Build ERD – Part 2
  • Build ERD – Part 3

Module 7: Functions

  • Functions
  • More Functions
  • Group Functions
  • Custom Functions

Module 8: SET Operators and Subqueries

  • SET Operations
  • Subqueries

Module 9: Regular Expressions and SQL Loader

  • Regular Expressions
  • SQL Loader

Module 1: What Is Microsoft 365

  • Introduction To 365
  • A Little Background On MS Office
  • Office 365 Versions And Features-Part1
  • Office 365 Versions And Features-Part2
  • Online Sign Up

Module 2: Word Online

  • Word Online Overview
  • Starting A Document In Word Online
  • Word Saved To One Drive
  • Navigating Word
  • Tools And Features
  • Fonts Attributes-Part1
  • Fonts Attributes-Part2
  • Lines And Paragraphs-Part1
  • Lines And Paragraphs-Part2
  • Bullets Numbering And Styles-Part1
  • Bullets Numbering And Styles-Part2
  • Inserts Pictures And Tools-Part1
  • Inserts Pictures And Tools-Part2
  • Tables And Formatting-Part1
  • Tables And Formatting-Part2
  • Sharing And Templates-Part1
  • Sharing And Templates-Part2

Module 3: Excel Online

  • Excel Online Overview
  • Getting Started With Excel
  • Data Entry And Navigation
  • Data Entry-Part1
  • Data Entry-Part2
  • Data Entry And Formatting-Part1
  • Data Entry And Formatting-Part2
  • Intro To Formulas
  • Formulas-Part1
  • Formulas-Part2
  • Formulas-Part3
  • Intermediate Formula And Table Format-Part1
  • Surveys
  • More Formula And Charts-Part1
  • More Formula And Charts-Part2
  • Charts
  • Sheets And Templates

Module 4: Powerpoint Online

  • What Is Powerpoint
  • Screen Layout
  • Entering And Formatting Text
  • Layouts And Designs Part 1
  • Layouts And Designs Part 2
  • Inserting Objects
  • Objects And Transitions
  • Animations
  • Smart Art
  • Notes Printing And Templates

Module 5: Outlook Online

  • Intro To Outlook Online
  • Intro To Email Accounts Screen Layout
  • Configuring Outlook Online
  • Sending Emails Outlook Online
  • Organization Outlook Online
  • Mail Rules In Outlook Online
  • Additional Mail Options In Outlook Online
  • Spam And Junk Outlook Online

Module 6: One Note Online

  • What Is OneNote
  • OneNote Screen Overview
  • OneNote Desktop
  • Drawing Tools With OneNote
  • Send To OneNote
  • Media With OneNote
Module 1: Beginner

  • 1.01 Instructor Intro
  • 1.02 Course Intro
  • 1.1 Explaining the Ribbon
  • 1.2 Creating a Document
  • 1.3 Saving Files
  • 1.4 Page Views
  • 1.5 Formatting Text
  • 1.6 Ruler, Margins and Tab Stops
  • 1.7 Moving and Duplicating Text
  • 1.8 Line Spacing and Paragraph Formatting
  • 1.9 Basic Editing
  • 1.10 Insert a Basic Table and Graphics
  • 1.11 Working with Styles

Module 2: Intermediate

  • 2.1 Intermediate Intro
  • 2.2 Collaboration & Co-Authorship
  • 2.3 Tracking and Viewing Changes
  • 2.4 Commenting
  • 2.5 Templates & Layouts
  • 2.6 Layout Functions on the Ribbon
  • 2.7 Customize, Format and Convert Tables and Use as a Page Layout
  • 2.8 Insert and Edit a Cover Page
  • 2.9 Insert and Customize Headers and Footers
  • 2.10 Insert and Customize Endnotes and Footnotes
  • 2.11 Creating Sections in a Long Document
  • 2.12 Using Sections to Format a Document
  • 2.13 Deleting a Section
  • 2.14 Reviewing, Inserting and Updating TOC
  • 2.15 Creating a Data Source and Linking a Mailing List
  • 2.16 Print Settings for Mail Merge

Module 3: Advanced

  • 3.1 Adding the Developer Tab
  • 3.2 Functionality Among Microsoft Office Products
  • 3.3 Using Formulas in Word
  • 3.4 Citing Sources in Word
  • 3.5 Reviewing and Merging Versions of the Same Document
  • 3.6 Creating a Master Document
  • 3.7 Creating Sub Documents and Editing Master and Sub Docs
  • 3.8 Controlling Editable Content
  • 3.9 Form Creation Using the Developer Tab
  • 3.10 Macros

Module 1: Beginner

  • 1.0 Intro
  • 1.1 The Ribbon
  • 1.2 Saving Files
  • 1.3 Entering and Formatting Data
  • 1.4 Printing from Excel & Using Page Layout View
  • 1.5 Formulas Explained
  • 1.6 Working with Formulas and Absolute References
  • 1.7 Specifying and Using Named Range
  • 1.8 Correct a Formula Error
  • 1.9 What is a Function
  • 1.10 Insert Function & Formula Builder
  • 1.11 How to Use a Function- AUTOSUM, COUNT, AVERAGE
  • 1.12 Create and Customize Charts

Module 2: Intermediate

  • 2.0 Recap
  • 2.1 Navigating and editing in two or more worksheets
  • 2.2 View options – Split screen, view multiple windows
  • 2.3 Moving or copying worksheets to another workbook
  • 2.4 Create a link between two worksheets and workbooks
  • 2.5 Creating summary worksheets
  • 2.6 Freezing Cells
  • 2.7 Add a hyperlink to another document
  • 2.8 Filters
  • 2.9 Grouping and ungrouping data
  • 2.10 Creating and customizing all different kinds of charts
  • 2.11 Adding graphics and using page layout to create visually appealing pages
  • 2.12 Using Sparkline formatting
  • 2.13 Converting tabular data to an Excel table
  • 2.14 Using Structured References
  • 2.15 Applying Data Validation to cells
  • 2.16 Comments – Add, review, edit
  • 2.17 Locating errors

Module 3: Advanced

  • 3.1 Recap
  • 3.2 Conditional (IF) functions
  • 3.3 Nested condition formulas
  • 3.4 Date and Time functions
  • 3.5 Logical functions
  • 3.6 Informational functions
  • 3.7 VLOOKUP & HLOOKUP
  • 3.8 Custom drop down lists
  • 3.9 Create outline of data
  • 3.10 Convert text to columns
  • 3.11 Protecting the integrity of the data
  • 3.12 What is it, how we use it and how to create a new rule
  • 3.13 Clear conditional formatting & Themes
  • 3.14 What is a Pivot Table and why do we want one
  • 3.15 Create and modify data in a Pivot Table
  • 3.16 Formatting and deleting a Pivot Table
  • 3.17 Create and modify Pivot Charts
  • 3.18 Customize Pivot Charts
  • 3.19 Pivot Charts and Data Analysis
  • 3.20 What is it and what do we use it for
  • 3.21 Scenarios
  • 3.22 Goal Seek
  • 3.23 Running preinstalled Macros
  • 3.24 Recording and assigning a new Macro
  • 3.25 Save a Workbook to be Macro enabled
  • 3.26 Create a simple Macro with Visual Basics for Applications (VBA)
  • 3.27 Outro
Word 2016 Basic

  • Introduction To Word Interface Part1
  • Introduction To Word Interface Part2
  • Introduction To Word Interface Part3
  • View
  • Typing Part1
  • Typing Part2
  • Typing Part3
  • Typing Part4
  • Resume Part1
  • Resume Part2
  • Bullet List

Word 2016 Intermediate

  • Menus And Keyboard Shortcuts Part1
  • Menus And Keyboard Shortcuts Part2
  • Tabs
  • Tables Part1
  • Tables Part2
  • Tables Part3
  • Styles Part1
  • Styles Part2
  • Styles Part3
  • Page Formatting Part1
  • Page Formatting Part2
  • Page Formatting Part3

Word 2016 Advanced

  • Creating An Outline
  • Inserting Images Part1
  • Inserting Images Part2
  • Tracking Changes
  • Mail Merge Part1
  • Mail Merge Part2
  • Large Documents Part1
  • Large Documents Part2
  • Other Word Functions Part1
  • Other Word Functions Part2
  • Document Comparison
Excel 2016 Basic

  • Tabs And Ribbons Part1
  • Tabs And Ribbons Part2
  • Cells Part1
  • Cells Part2
  • Cells Part3
  • Cells Part4
  • Calculations Part1
  • Calculations Part2
  • Calculations Part3
  • Printing Part1
  • Printing Part2

Excel 2016 Intermediate

  • Menus And Keyboard Shortcuts Part1
  • Menus And Keyboard Shortcuts Part2
  • Menus And Keyboard Shortcuts Part3
  • Tabs Part1
  • Tabs Part2
  • Formulas And Calculations Part1
  • Formulas And Calculations Part2
  • Formulas And Calculations Part3
  • Formulas And Calculations Part4
  • Importing Data Part1
  • Importing Data Part2
  • Invoices

Excel 2016 Advanced

  • Advanced Invoice Part1
  • Advanced Invoice Part2
  • Advanced Invoice Part3
  • Advanced Invoice Part4
  • Number Crunching
  • Creating A Pivot Table From Scratch
  • Smaller Excel Components Part1
  • Smaller Excel Components Part2
  • Smaller Excel Components Part3

Basic Microsoft PowerPoint 2016

  • What Is PowerPoint Part 1
  • What Is PowerPoint Part 2
  • New Presentation
  • Viewing Presentation
  • Inserting Transitions
  • More Visual Designs Part 1
  • More Visual Designs Part 2
  • More Visual Designs Part 3
  • More Visual Designs Part 4
  • Notes

Intermediate Microsoft PowerPoint 2016

  • Visual Designs With Logos And Animation Part1
  • Visual Designs With Logos And Animation Part2
  • Visual Designs With Logos And Animation Part3
  • Visual Designs With Logos And Animation Part4
  • Visual Designs With Logos And Animation Part5
  • Exit Animation Part1
  • Exit Animation Part2
  • Exit Animation Part3
  • Navigation Buttons
  • Layout Options Part1
  • Layout Options Part2

Advanced Microsoft PowerPoint 2016

  • Master Pages Part1
  • Master Pages Part2
  • Software Simulation Part1
  • Software Simulation Part2
  • Setting Pictures To Music
  • Advanced Animation Techniques
  • Triggers
  • Motion Path Animation
  • Video In PowerPoint
  • PowerPoint Review Part1
  • PowerPoint Review Part2
  • Additional Options

Outlook 2016 Basic

  • Introduction Part 1
  • Introduction Part 2
  • Options For Displaying Email Messages
  • Create And Send An Email
  • Receive An Email
  • Calendar Part 1
  • Calendar Part 2
  • Contacts Part 1
  • Contacts Part 2
  • Tasks

Outlook 2016 Intermediate

  • Folder Structure Part
  • Folder Structure Part 2
  • Multiple Email Accounts Part 1
  • Multiple Email Accounts Part 2
  • Create A New Email Part 1
  • Create A New Email Part 2
  • Signatures
  • Calendars Part 1
  • Calendars Part 2
  • Contacts
  • Outlook Settings Part 1
  • Outlook Settings Part 2

Outlook 2016 Advanced

  • One Note Introduction Part 1
  • One Note Introduction Part 2
  • One Note And PowerPoint
  • One Note And Word
  • One Note And Outlook
  • Sharing Information
  • OneNote And Mobile Devices
  • Additional Elements Part 1
  • Additional Elements Part 2

Access 2016 Basic

  • Introduction Part1
  • Introduction Part2
  • Elements Part1
  • Elements Part2
  • Reviewing Data
  • Queries Part1
  • Queries Part2
  • Tracking Time Part1
  • Tracking Time Part2
  • Tracking Time Part3
  • Design Work With Forms

Access 2016 Intermediate

  • Relationships Part1
  • Relationships Part2
  • Changing Information
  • Loading Tables
  • Relating Invoices Part1
  • Relating Invoices Part2
  • Relating Invoices Part3
  • Relating Invoices Part4
  • Time Entry Form

Access 2016 Advanced

  • Queries Part1
  • Queries Part2
  • Queries Part3
  • Queries Part4
  • Reports Based On Queries
  • Adding Additional Information
  • Update Query Part1
  • Update Query Part2
  • Creating A Report From Scratch Part1
  • Creating A Report From Scratch Part2
  • Creating A Report From Scratch Part3

Word 2013 Basic

  • Intro To Word
  • Screen Layout
  • Page Setup And Text Entry
  • Auto-correct Text Formatting
  • More Font Formatting
  • Fonts-Part 3
  • Font Attributes Using Right Click
  • Paragraph Attributes
  • Customizing Bullets And Numbers
  • Reveal Codes Putting It All Together And Saving
  • Viewing Rulers
  • Formatting Images
  • Inserting Images
  • Tabs
  • Window Views And Putting It All Together-Part 1
  • Window Views And Putting It All Together-Part 2

Word 2013 Intermediate

  • Intro To Word 2013 Intermediate
  • Review Introduction To Styles
  • Headers And Footers
  • Section Breaks Section Footers
  • More Objects Word Intermediate
  • Tables In Word Intermediate
  • Inserting Text Boxes Word Intermediate
  • Additional Page Attributes Word Intermediate
  • Intro To Customizing Attributes
  • Continuing Auto-correct Options
  • View Options In Navigation Pane
  • Mail Merge-Part 1
  • Mail Merge-Part 2
  • Mail Merge-Part 3
  • Table Of Contents
  • Columns
  • Working With Outlines

Word 2013 Advanced

  • Word Advanced Introduction
  • End Notes Foot Notes
  • Captions
  • Citations
  • Table Of Authorities
  • Reference Page Index Table
  • Track Changes
  • Compare
  • Advance Mail Merge-Part 1
  • Advance Mail Merge-Part 2
  • Advance Smart Art
  • Templates
  • Custom Configuration

Excel 2013 Basic

  • Intro To Excel Overview Of Screen
  • Ribbon Elements
  • Entering Data And Editing Font Attributes
  • Number Formats
  • Formatting Cells
  • Printing
  • Formulas – Part 1
  • Formulas – Part 2
  • Rearranging Data
  • More Formulas – Part 1
  • More Formulas – Part 2 Review And Sort
  • More Formulas – Part 3 Concatenate
  • Chart – Part 1
  • Chart – Part 2
  • Chart – Part 3
  • Summary

Excel 2013 Intermediate

  • Introduction
  • Review
  • Formulas Across Worksheets – Part 1
  • Formulas Across Worksheets – Part 2
  • Conditional Formatting
  • Data Validation
  • Names Ranges
  • CSV Files
  • Text To Column
  • Grouping Data
  • More Charts Beyond Building Blocks
  • Working With Windows – Part 1
  • Working With Windows – Part 2
  • Headers Footers And Protecting Data

Excel 2013 Advanced

  • Pivot Tables – Part 1
  • Pivot Tables – Part 2
  • Sparklines
  • Trancing Formulas
  • What If Scenario
  • External Data Sources
  • Customizing Menus And Options – Part 1
  • Customizing Menus And Options – Part 2
  • Macros

Powerpoint 2013 Basic

  • What Is PowerPoint
  • Screen Elements
  • Starting A New Presentation
  • Layouts
  • Objects-Part1
  • Objects-Part2
  • Objects-Part3
  • Slide Design
  • Slide Transitions
  • Animations-Part1
  • Animations-Part2
  • View And Slideshow

Powerpoint 2013 Intermediate

  • Understanding Slide Masters
  • Slide Masters
  • Animations-Part1
  • Animations-Part2
  • Hotspots And Actions
  • Views
  • Printing Options

Powerpoint 2013 Advanced

  • Introduction To Advanced And Inserting Charts
  • Setting Up Slide Shows-Part1
  • Setting Up Slide Shows-Part2
  • Advanced Animations
  • Templates Vs Shows
  • Reviewing Information And Compare
  • Copy And Paste Across Presentations
  • Customizing Powerpoint
  • Adding Media Video
  • Adding Media Audio-Part1
  • Adding Media Audio-Part2
Outlook 2013 Basic

  • Outlook 2013 Basic
  • Introduction To Outlook
  • Understanding Email Setting Outlook
  • Configuring Interface-Part1
  • Configuring Interface-Part2
  • Email Window-Part1
  • Email Window-Part2
  • Managing The Inbox
  • Using The Calendar-Part1
  • Using The Calendar-Part2
  • Contacts-Part1
  • Contacts-Part2
  • Task List

Outlook 2013 Intermediate

  • Adding An Account From Scratch
  • Multiple Email Accounts In One Window
  • Searching For Mail
  • Managing The Folders Views In Inbox
  • Using Priority And Receipts
  • Calendars
  • Contacts-Part1
  • Contacts-Part2

Outlook 2013 Advanced

  • Mail Part 1 Auto-Replies
  • Mail Part 2 Signatures
  • Views and Options Part 1
  • Views and Options Part 2
  • Calendar Part 1
  • Calendar Part 2
  • Calendar Options
  • Contacts
  • Contacts Options
  • Advanced Options Part 1
  • Advanced Options Part 2

Access 2013 Introduction

  • Access 2013 Introduction
  • What Are Databases
  • The Interface Window
  • Setting Up The Database-Part1
  • Setting Up The Database-Part2
  • Creating Forms
  • Understanding Table Relationships
  • Introduction To Queries
  • Introduction To Reports

Access 2013 Intermediate

  • Introduction to Table Tools Part 1
  • Table Tools-Part2
  • Table Tools-Part3
  • Forms And Design Intermediate-Part1
  • Forms And Design Intermediate-Part2
  • Forms Data Entry-Part1
  • Forms Data Entry-Part2
  • Queries
  • Reports From Queries-Part1
  • Reports From Queries-Part2
  • Reports From Queries-Part3
  • Specialized Form

Access 2013 Advanced

  • Advance Introduction And Sub-forms
  • Sub-forms
  • Additional Types Of Queries
  • Form And Macros-Part1
  • Form And Macros-Part2
  • Advance Forms
  • Reports Advance-Part1
  • Reports Advance-Part2
  • Updating Reports
  • Customization And Conclusion
Word 2010 Basic

  • Intro to the Word Interface
  • Working with Templates
  • Creating a New Blank Document
  • Formatting a Document
  • More Formatting Options
  • Adding Shapes, Clipart, & Pictures
  • Page Layout
  • Conclusion

Word 2010 Intermediate

  • Introduction
  • Tracking Changes in a Document
  • Customizing the Interface
  • Working with Styles
  • Tables in Word
  • Endnotes, Footnotes, & Captions
  • Cover Pages, Headers, & Footers
  • Working with Sections
  • Headers & Footers
  • Cover Sheet & Table of Contents
  • Cover Letters & Mail Merge
  • Conclusion

Word 2010 Advanced

  • Introduction to the Word Interface
  • Customizing the Ribbon
  • Embedding Non-Word Documents
  • Working with Formulas
  • Citations
  • Comparing Documents
  • Forms & Content Controls
  • Master Documents & Subdocuments
  • Conclusion

Excel 2010 Basic

  • Intro to Excel Basic
  • Interface and Functions
  • Cells
  • Entering Data Into Cells
  • Basic Formatting in Excel
  • Creating a Worksheet
  • The Intelligence Of Excel
  • Customizing Rows and Columns
  • Creating Formulas
  • Summary Pages and Moving Workbook to Workbook
  • The Function Builder
  • Conditional Formatting
  • Sorting and Filtering Data
  • Printing with Excel
  • Conclusion

Excel 2010 Intermediate

  • Intro to Excel Intermediate
  • Charts
  • Headers Footers and Layout Options
  • What If
  • Basic Tables in Excel
  • Pivot Tables
  • Manipulating Data Within the Pivot Tables
  • Pivot Table Charts
  • Data Validation
  • Conclusion

Excel 2010 Advanced

  • Intro to Excel Advanced
  • Customizing the Ribbon and Cells
  • Creating and Managing Ranges
  • More Formulas
  • Data Analysis
  • Data From an Outside Source
  • Spark Lines
  • Macros
  • Conclusion
Powerpoint 2010 Basic

  • Intro To PowerPoint Basic
  • The PowerPoint Interface
  • Creating A New Presentation With Templates
  • Slide Layout
  • Visually Appealing Presentations
  • Preview Mode And Page Setup
  • Transitions
  • Creating Custom Slides
  • Animating Text
  • Animating Objects
  • Animation Timing
  • Conclusion

Powerpoint 2010 Intermediate

  • Introduction To PowerPoint Intermediate
  • Sections And Organizing Slides
  • Adding Autoshapes
  • Inserting And Editing Pictures
  • Inserting And Editing Video
  • Inserting And Editing Tables
  • SmartArt
  • Animating Smart Art And Inserting Audio
  • Headers And Footers In PowerPoint
  • Setup Slideshow And Rehearsal Timing
  • Conclusion

Powerpoint 2010 Advanced

  • Intro To PowerPoint Advanced
  • Master Slides
  • Styles
  • More Functions With Video In PowerPoint
  • Transitions And Action Buttons
  • Customizing The Show
  • Printing In PowerPoint
  • Conclusion

Outlook 2010 Basic

  • Intro To Outlook Basic
  • Interface
  • Customizing Interface
  • E-mail 101
  • Organizing Inbound E-mails
  • Calendar Function
  • Task Lists
  • Contact List
  • Multiple Accounts
  • Conclusion

Outlook 2010 Intermediate

  • Intro To Outlook Intermediate
  • Message Functions
  • Calendar
  • More In-Depth Contact Functions
  • Email Message Options
  • Mail Rules
  • Customizing Options
  • Conclusion

Outlook 2010 Advanced

  • Intro To Outlook Advanced
  • Send And Receive
  • Account Settings
  • Calendars
  • Quick Actions Within Messages
  • Quick Steps
  • Conclusion

Access 2010 Basic

  • Introduction
  • Databases And The Access Interface
  • Spreadsheets And Tables
  • Entering Data In A Table
  • Relationships Between Tables
  • Editing A Form
  • Queries
  • Across The Tables
  • Creating Forms
  • Conclusion

Access 2010 Intermediate

  • Introduction
  • Primary Key
  • Multiple Table Query
  • Creating Forms
  • Validation Within Forms
  • Adding Related Fields
  • Forms Created With Design View
  • Find Functionality
  • Creating Report
  • Conclusion

Access 2010 Advanced

  • Introduction
  • Customizing Access With Back Stage Options
  • Mailing Labels
  • Macros-Part1
  • Macros-Part2
  • Queries-Part1
  • Queries-Part2
  • Joining In Sequel
  • Navigation
  • Adding Chart With Specific Data
  • Action Query
  • Security
  • Conclusion
Module 1: Introduction to CSS3

  • Introduction
  • The Advantages Of Style Sheets
  • Discovering Cascading Style Sheets
  • CSS Structure And Syntax Part1
  • CSS Structure And Syntax Part2
  • CSS Structure And Syntax Part3
  • Using Different Kinds Of Style Sheets

Module 2: Understanding The CSS Box Model

  • What Is The Box Model
  • Height And Width
  • Margin And Padding
  • Working With Borders

Module 3: Working With Page Layouts

  • Positioning Elements
  • Floating Elements
  • Controlling Display And Visibility

Module 4: Using Colors And Backgrounds

  • Working With Colors
  • Working With Backgrounds

Module 5: Web Typography

  • Understanding Fonts
  • Working With Text Properties
  • Text And Shadow Effects Part1
  • Text And Shadow Effects Part2

Module 6: Links, Lists, And Tables

  • Working With Lists
  • Using Navigation Bars
  • Working With Tables Part1
  • Working With Tables Part2

Module 7: Dynamic CSS3 Properties

  • Using Transforms Part1
  • Using Transforms Part2
  • Using Transitions
  • Using Animations
  • CSS Project Part1
  • CSS Project Part2
  • Course Conclusion

Module 1: What Is HTML?

  • Introduction
  • What Is HTML
  • HTML Resources
  • Choosing A Code Editor
  • The Relationship Of HTML, CSS And JavaScript

Module 2: The Structure And Components

  • The HTML Document
  • DOCTYPE Declaration
  • The Head
  • The Body
  • The Footer

Module 3: Formatting The Page

  • Using Headings
  • Creating Paragraphs
  • Emphasizing Text
  • Controlling Line Breaks And Whitespace
  • Creating Lists
  • Working With Tables

Module 4: Structuring Content

  • Why Structure Matters
  • Controlling Document Outlines
  • Structure Elements Part 1
  • Structure Elements Part 2

Module 5: Adding Links, Images And Other Media

  • Working With Links Part 1
  • Working With Links Part 2
  • Working With Images Part 1
  • Working With Images Part 2

Module 6: Styling Web Pages

  • HTML And CSS
  • Creating Inline Styles
  • Controlling Typography
  • Adding Color
  • Externalizing Styles

Module 7: Creating Your Own Website

  • Creating A Website Part 1
  • Creating A WebsitIntroduction to Pythone Part 2
  • Conclusion

Module 1: Introduction to CSS3

  • Introduction
  • The Advantages Of Style Sheets
  • Discovering Cascading Style Sheets
  • CSS Structure And Syntax Part1
  • CSS Structure And Syntax Part2
  • CSS Structure And Syntax Part3
  • Using Different Kinds Of Style Sheets

Module 2: Understanding The CSS Box Model

  • What Is The Box Model
  • Height And Width
  • Margin And Padding
  • Working With Borders

Module 3: Working With Page Layouts

  • Positioning Elements
  • Floating Elements
  • Controlling Display And Visibility

Module 4: Using Colors And Backgrounds

  • Working With Colors
  • Working With Backgrounds

Module 5: Web Typography

  • Understanding Fonts
  • Working With Text Properties
  • Text And Shadow Effects Part1
  • Text And Shadow Effects Part2

Module 6: Links, Lists, And Tables

  • Working With Lists
  • Using Navigation Bars
  • Working With Tables Part1
  • Working With Tables Part2

Module 7: Dynamic CSS3 Properties

  • Using Transforms Part1
  • Using Transforms Part2
  • Using Transitions
  • Using Animations
  • CSS Project Part1
  • CSS Project Part2
  • Course Conclusion
Module 1: What Is HTML?

  • Introduction
  • What Is HTML
  • HTML Resources
  • Choosing A Code Editor
  • The Relationship Of HTML, CSS And JavaScript

Module 2: The Structure And Components

  • The HTML Document
  • DOCTYPE Declaration
  • The Head
  • The Body
  • The Footer

Module 3: Formatting The Page

  • Using Headings
  • Creating Paragraphs
  • Emphasizing Text
  • Controlling Line Breaks And Whitespace
  • Creating Lists
  • Working With Tables

Module 4: Structuring Content

  • Why Structure Matters
  • Controlling Document Outlines
  • Structure Elements Part 1
  • Structure Elements Part 2

Module 5: Adding Links, Images And Other Media

  • Working With Links Part 1
  • Working With Links Part 2
  • Working With Images Part 1
  • Working With Images Part 2

Module 6: Styling Web Pages

  • HTML And CSS
  • Creating Inline Styles
  • Controlling Typography
  • Adding Color
  • Externalizing Styles

Module 7: Creating Your Own Website

  • Creating A Website Part 1
  • Creating A Website Part 2
  • Conclusion

Module 1: Getting Started with Python

  • Intro to Course and Instructor
  • Getting Started with Python

Module 2: Working with Primitive Data Types

  • Working with Primitive Data Types
  • Working with Primitive Data Types Part 2
  • Working with Primitive Data Types Part 3
  • Working with Primitive Data Types Part4
  • Working with Primitive Data Types Part4 Answers

Module 3: Working with Multiple Assignments Statements

  • Working with Multiple Assignments Statements

Module 4: Convert Types in Python

  • Convert Types in Python

Module 5: Creating Lists

  • Creating Lists

Module 6: Modifying Lists

  • Modifying Lists

Module 7: Sorting and Reversing Lists

  • Sorting and Reversing Lists

Module 8: Slicing Lists

  • Slicing Lists

Module 9: Working With Operators

  • Working With Operators
  • Working With Operators Part2
  • Working With Operators Part3

Module 10: Determining Operator Precedence

  • Determining Operator Precedence

Module 11: Working with IF Statements

  • Working with IF Statements

Module 12: Working With For Loops

  • Working With For Loops

Module 13: Working With While Loops

  • Working With While Loops

Module 14: Nesting for Loops

  • Nesting for Loops

Module 15: Reading Files

  • Reading Files Part1
  • Reading Files Part2

Module 16: More on Files

  • More on Files

Module 17: Merging Emails

  • Merging Emails

Module 18: Reading Console Inputs and Formatting Outputs

  • Reading Console Inputs and Formatting Outputs

Module 19: Reading Command Line Argument

  • Reading Command Line Argument

Module 20: Defining Functions

  • Defining Functions

Module 21: Using Default Argument

  • Using Default Argument

Module 22: Using Keyword and Positional Arguments

  • Using Keyword and Positional Arguments

Module 23: Handling Exceptions

  • Handling Exceptions

Module 24: Using Math and Random Modules

  • Using Math and Random Modules

Module 25: Displaying Daytime Working Directory and File Metadata

  • Displaying Daytime Working Directory and File Metadata

Module 1

  • Introduction and Developing in HTML5 with Javascript and CSS3
  • Intro to HTML 5
  • Examples of Browsers Using Codes
  • Using HTML5 Codes and Utilizing Virtual Studio – Part 1
  • Using HTML5 Codes and Utilizing Virtual Studio – Part 2
  • Using HTML5 Codes and Utilizing Virtual Studio – Part 3
  • Using HTML5 Codes and Utilizing Virtual Studio – Part 4

Module 2

  • HTML5 Code Walk through – Part 1
  • HTML5 Code Walk through – Part 2
  • HTML5 Code Walk through – Part 3
  • CSS3 Selectors and Style Properties – Part 1
  • CSS3 Selectors and Style Properties – Part 2
  • CSS3 Selectors and Style Properties – Part 3
  • CSS3 Selectors and Style Properties – Part 4
  • CSS3 Selectors and Style Properties – Part 5
  • CSS3 Selectors and Style Properties – Part 6

Module 3

  • Developer Tool Support
  • Browse-Specific Feature Detection
  • HTML Form Examples – Part 1
  • HTML Form Examples – Part 2
  • HTML Form Examples – Part 3
  • HTML Form Examples – Part 4

Module 4

  • HTML Form Enhancements – Part 1
  • HTML Form Enhancements – Part 2
  • HTML Form Enhancements – Part 3
  • HTML Form Enhancements – Part 4
  • HTML Form Enhancements – Part 5
  • HTML Form Enhancements – Part 6

Module 5

  • Building Websites – Part 1
  • Building Websites – Part 2
  • Building Websites – Part 3
  • Building Websites – Part 4

Module 6

  • More HTML5
  • More HTML5 – Information Tags
  • More HTML5 – Codes
  • More HTML5 – Java Script
  • Course Outro

Microsoft 70-480: Programming In HTML5 With JavaScript And CSS3

  • Creating document structure
  • Writing code that interacts with UI controls
  • Applying styles to HTML elements
  • Implementing HTML5 APIs
  • Establishing the scope of objects and variables
  • Creating and implementing objects and methods
  • Implementing program flow
  • Raising and handling an event
  • Implementing exception handling
  • Implementing a callback
  • Creating a web worker process
  • Validating user input with HTML5 elements
  • Validating user input with JavaScript
  • Consuming data
  • Serializing, de-serializing, and transmitting data
  • Stylizing HTML text and box properties
  • Creating a flexible content layout
  • Creating an animated and adaptive UI
  • Finding elements by using CSS selectors and JQuery
  • Structuring a CSS file using CSS selectors

Module 1: Introduction to Web Development

  • Course And Instructor Introduction
  • Net Using Visual Studio
  • Net Tools In Visual Studio
  • Net Data Validation-Part1
  • Net Data Validation-Part2
  • Net Web User Control
  • Net Creating Web Service
  • Net Web Service Explained
  • Classes Defined

Module 2: C ­ Sharp

  • Intro To C Sharp
  • Functions In C Sharp
  • If Statements In C Sharp
  • Static Variables In C Sharp
  • Loops In C Sharp
  • Debugging In C Sharp
  • Introduction To Windows Forms In C Sharp
  • More Windows Forms In C Sharp
  • Windows Forms Controls In C Sharp
  • Object Oriented Programming In C Sharp
  • Constructors And Destructors In C Sharp
  • Members Of A Class In C Sharp
  • Class Inheritance In C Sharp
  • Abstract Classes In C Sharp
  • Enumerations In C Sharp
  • Exception Handling In C Sharp
  • Creating XML Documents In C Sharp
  • Putting It All Together In A File In C Sharp

Module 3: HTML and CSS Comprehensive Review

  • Intro To HTML
  • HTML Markup
  • Lists In HTML
  • Links In HTML
  • Tables In HTML
  • Forms In HTML
  • Intro To CSS
  • CSS Color Properties

Module 4: Intro to SQL Server

  • Databases Defined
  • Tables Defined
  • Basic Query Optimization
  • Defining And Using Store Procedures
  • Creating Stored Procedure
  • Executing Store Procedure From C Sharp
  • Executing Store Procedure From ASP.Net
  • Changing ASP.Net Interface To Retrieve Data-Part1
  • Changing ASP.Net Interface To Retrieve Data-Part2

Module 5: Java Script A Comprehensive Introduction

  • Intro To JavaScript
  • Using JavaScript For Data Validation
  • Using JavaScript To Manipulate Documents
  • Variables In JavaScript
  • If Statements In JavaScript
  • Logical Operators In JavaScript
  • If Else Statements In JavaScript
  • Switch Statements In JavaScript
  • For Loops In JavaScript
  • For And While Loops In JavaScript

Module 6: Object Based Java Script

  • Working With String Object
  • More On String Object
  • The Math Object
  • Creating Your Own Objects
  • String Manipulation In JavaScript
  • Programming The Browser In JavaScript
  • Browser Versions In JavaScript
  • Working With Forms In JavaScript

Module 7: Model View and Controller

  • MVC Mindset
  • MVC Defined
  • Create An MVC Project
  • MVC Project Initial Walkthrough
  • MVC Building Routes
  • MVC Approach
  • Controllers
  • Controllers From Scratch
  • MVC Routing
  • MVC Routing Constraints
  • Routing Constraint Attributes
  • MVC Attribute Routing

Module 8: A Comprehensive Introduction to jQuery

  • What Is jQuery
  • jQuery Effects
  • Get And Set Elements In jQuery
  • Add And Remove Elements In jQuery
  • CSS In jQuery
  • Ancestors And Descendants

Module 9: Course Review

  • MVC Best Practices
  • Testing The Application
  • Writing For Production
  • Review Web Development
  • Review C Sharp
  • Review HTML And CSS
  • Review SQL Server
  • Review JavaScript
  • Review Software Development Lifecycle
  • Review Design Patterns
  • Review jQuery
  • Conclusion

Module 1

  • Exploring ASP Dot NET MVC 4 – Part 1
  • Exploring ASP Dot NET MVC 4 – Part 2
  • Exploring ASP Dot NET MVC 4 – Part 3
  • Exploring ASP Dot NET MVC 4 – Part 4

Module 2

  • Designing Web Applications – Part 1
  • Designing Web Applications – Part 2
  • Designing Web Applications – Part 3
  • Designing Web Applications – Part 4
  • Designing Web Applications – Part 5

Module 3

  • Developing ASP Dot NET MVC 4 Models – Part 1
  • Developing ASP Dot NET MVC 4 Models – Part 2
  • Developing ASP Dot NET MVC 4 Models – Part 3

Module 4

  • Developing ASP Dot NET MVC 4 Controllers – Part 1
  • Developing ASP Dot NET MVC 4 Controllers – Part 2
  • Developing ASP Dot NET MVC 4 Controllers – Part 3
  • Developing ASP Dot NET MVC 4 Controllers – Part 4

Module 5

  • Applying Styles to ASP Dot NET MVC 4 Web Applications – Part 1
  • Applying Styles to ASP Dot NET MVC 4 Web Applications – Part 2
  • Applying Styles to ASP Dot NET MVC 4 Web Applications – Part 3
  • Applying Styles to ASP Dot NET MVC 4 Web Applications – Part 4
  • Applying Styles to ASP Dot NET MVC 4 Web Applications – Part 5

Module 6

  • Testing and Debugging ASP Dot NET MVC 4 Web Applications – Part 1
  • Testing and Debugging ASP Dot NET MVC 4 Web Applications – Part 2
  • Testing and Debugging ASP Dot NET MVC 4 Web Applications – Part 3
  • Testing and Debugging ASP Dot NET MVC 4 Web Applications – Part 4
  • Testing and Debugging ASP Dot NET MVC 4 Web Applications – Part 5

Module 7

  • Structuring ASP Dot NET MVC 4 Web Applications – Part 1
  • Structuring ASP Dot NET MVC 4 Web Applications – Part 2
  • Structuring ASP Dot NET MVC 4 Web Applications – Part 3

Module 8

  • Troubleshooting ASP Dot NET MVC 4 Web Applications

Module 1: Preparing for and Taking the Exam

  • Preparing to Take the Exam and Instructor Introduction
  • Getting Certified to take the Examination
  • Examination Characteristics
  • Test Taking Tips and Techniques
  • Question Formats
  • Post Certification Requirements

Module 2: Process Domain

  • Process Domain and Framework defined
  • Predictive, Iterative, Incremental and Adaptive Project Life Cycles
  • Framework Definitions
  • Project Manager Skills
  • Framework Key Points to Remember
  • Framework Example Questions Review
  • Project Integration Management Knowledge Area Defined
  • Knowledge Area Process Mapping and Definitions
  • Develop Project Charter and Develop Project Management Plan
  • Direct and Manage Project Work, Manage Project Knowledge, and Monitor and Control Project Work
  • Perform Integrated Change Control
  • Close Project or Phase
  • Integration Key Points to Remember
  • Integration Example Questions Review
  • Project Scope Management Knowledge Area Defined
  • Plan Scope Management and Collect Requirements
  • Nominal Group Technique (Delphi-Opinion Technique)
  • Define Scope and Create WBS
  • Breakdown Structures used in WBS Dictionary
  • Validate Scope and Control Scope
  • Defining Requirements in Agile
  • Prioritizing requirements in Agile, Definition of Done and Rolling Wave Planning
  • Scope Key Points to Remember
  • Scope Example Questions Review
  • Project Schedule Management Knowledge Area Defined
  • Plan Schedule Management, Define Activities, and Sequence Activities
  • Dependencies, Predecessors, Leads, and Lags
  • Estimate Activity Durations
  • Develop Schedule
  • Critical Path Method
  • Schedule Compression
  • Resource Leveling, Schedule Format, and Control Schedule
  • Agile Estimating
  • Agile Schedule Planning and Reporting
  • Schedule Key Points to Remember and Example Question review
  • Project Cost Management Knowledge Area Defined
  • Plan Cost Management and Estimate Cost
  • Types of Cost, Expected Present Value, Sunk Costs, and Depreciation
  • Life Cycle Costing, Status Reporting, and Determine Budget
  • Control Costs, and Earned Value Management
  • Earned Schedule, and Agile Cost Control
  • Cost Key Points to Remember
  • Cost Example Questions Review
  • Project Quality Management Knowledge Area Defined
  • Plan Quality Management
  • Manage Quality
  • Control Quality
  • Continuous Improvement in Agile-Adaptive Life Cycles – Kaizen and Process Analysis
  • Continuous Improvement in Agile-Adaptive Life Cycles – Retrospectives
  • Quality Key Points to Remember
  • Quality Example Questions Review
  • Project Risk Management Knowledge Area Defined
  • Risk Management Plan and Identify Risks
  • Risk Register and Issues Vs Risk
  • Perform Qualitative and Quantitative Risk Analysis
  • Plan Risk Responses
  • Implement Risk Responses and Monitor Risks
  • Agile Risk Tools and Risk Key Points to Remember
  • Risk Example Questions Review
  • Project Procurement Management Knowledge Area Defined
  • Plan Procurement Management and Conduct Procurements
  • Contracts
  • Share and Point of Total Assumption
  • Procurement Documents
  • Non-Competitive Awards and Control Procurements
  • Agile Contracts
  • Procurement Key Points to Remember and Example Questions Review

Module 3: People Domain

  • People Domain and Project Communications Management Knowledge Area Defined
  • Plan Communications Management
  • Manage and Monitor Communications
  • Agile Communications
  • Communications Key Points to Remember
  • Communications Example Question Review
  • Project Stakeholder Management Knowledge Area Defined
  • Stakeholder Position Descriptions
  • Identify Stakeholders
  • Plan Stakeholder Engagement and Manage Stakeholder Engagement
  • Monitor Stakeholder Engagement and Agile Stakeholder Engagement Techniques
  • Stakeholder Management Key Points to Remember
  • Stakeholder Management Example Question Review
  • Resource Management Knowledge Area Defined
  • Plan Resource Management and Estimate Activity Resources
  • Acquire Resources and Develop Team
  • Manage Team
  • Control Resources and Agile Teaming Concepts
  • Other Agile Teaming Concepts
  • Agile Team Roles and Troubleshooting Agile team issues
  • Resources Key Points to Remember
  • Resources Example Question Review

Module 4: Business Environment Domain

  • Business Environment Domain Defined
  • Project Selection Tools
  • PMO, Organizational Structure, and Reports
  • Agile in the Business Environment
  • Business Environment Key Points to Remember and Example Question Review
  • Course Closing

Module 1 : Getting Certified to take the Examination

  • Intro

Module 2 : Techniques for Preparing for and Taking the Examination

  • Getting Certified to take the Exam
  • Techniques for Preparing for the Exam

Module 3 : Project Management Framework

  • PMBOK Framework prt1
  • PMBOK Framework prt2
  • PMBOK Framework prt3

Module 4 : Project Integration Management

  • Project Integration Mgmt
  • Project Integration Mgmt prt2
  • Integration Questions

Module 5 : Project Scope Management

  • Project Scope Mgmt
  • Project Scope Mgmt prt2
  • Scope Questions

Module 6 : Project Schedule Management

  • Project Schedule Mgmt
  • Project Schedule Mgmt prt2
  • Project Schedule Mgmt prt3
  • Schedule Knowledge Questions

Module 7 : Project Cost Management

  • Project Cost Mgmt
  • Earned Value Mgmt
  • Trend Analysis
  • Cost Questions

Module 8 : Project Quality Management

  • Project Quality Mgmt
  • Quality Zero Defects
  • Control Quality
  • Quality Questions

Module 9 : Project Resource Management

  • Project Resource Mgmt
  • Estimate Activity Resources
  • Manage Team
  • Resource Histogram
  • Resource Questions

Module 10 : Project Communications Management

  • Project Communication Mgmt
  • Communication Methods
  • Communications
  • Communication Questions

Module 11 : Project Risk Management

  • Project Risk Mgmt
  • Identify Risk
  • Quantitive Risk Analysis
  • Plan Risk Responses
  • Risk Questions

Module 12 : Project Procurement Management

  • Project Procurement
  • Make or Buy
  • Share
  • Procurement Documents
  • Negotiations
  • Procurement Questions

Module 13 : Project Stakeholder Management

  • Project Stakeholder Mgmt
  • Plan Stakeholder Engagement
  • Project Stakeholder Questions
  • CAPM Conclusion

Module 1: Introduction

  • Introduction
  • Overview – Part 1
  • Overview – Part 2
  • Overview – Part 3
  • Overview – Part 4
  • Overview – Part 5

Module 2: Risk Management Concepts

  • Risk Definition And Project Risk Management – Part 1
  • Risk Definition And Project Risk Management – Part 2
  • Critical Success Factors For Project Risk Management
  • Overall And Individual Risks-Roles And Responsibilities

Module 3: Risk Management Environment

  • Organizational Risk Attitudes
  • Organizational Structures
  • Stakeholder Identification And Analysis
  • Stakeholder Risk Tolerances And Risk Attitudes

Module 4: Project Definition

  • Defining The Project And Project Management Plan
  • Scope Management – Part 1
  • Scope Management – Part 2
  • Scope Management – Part 3
  • Schedule Management – Part 1
  • Schedule Management – Part 2
  • Schedule Management – Part 3
  • Cost Management – Part 1
  • Cost Management – Part 2
  • Quality Management

Module 5: Risk Management Planning

  • Risk Management Planning
  • Critical Success Factors

Module 6: Risk Identification

  • Risk Identification
  • Project Scope Risk
  • Project Schedule Risk
  • Resource Risk
  • Tools And Techniques – Part 1
  • Tools And Techniques – Part 2
  • Tools And Techniques – Part 3
  • Tools And Techniques – Part 4

Module 7: Qualitative Risk Analysis

  • Qualitative Risk Analysis
  • Tools And Techniques – Part 1
  • Tools And Techniques – Part 2

Module 8: Quantitative Risk Analysis

  • Quantitative Risk Analysis
  • Tools And Techniques – Part 1
  • Tools And Techniques – Part 2
  • Tools And Techniques – Part 3

Module 9: Risk Response Planning

  • Risk Response Planning
  • Risk Responses
  • Negative And Positive Risk Responses
  • Tools And Techniques – Part 1
  • Tools And Techniques – Part 2
  • Results

Module 10: Risk Monitoring And Controlling

  • Risk Monitoring And Controlling
  • Tools And Techniques
  • Conclusion

Module 1: Risk Management Fundamentals

  • Instructor Intro
  • Course Intro
  • Risk Management Fundamentals Pt 1
  • Risk Management Fundamentals Pt 2

Module 2: Test Requirements

  • Test Requirements

Module 3: Test Domains

  • Test Domains Pt 1
  • Test Domains Pt 2

Module 4: Risk Strategy and Planning

  • Risk Strategy and Planning Pt 1
  • Risk Strategy and Planning Pt 2

Module 5: Stakeholder Engagement

  • Stakeholder Engagement Pt 1
  • Stakeholder Engagement Pt 2
  • Stakeholder Engagement Pt 3
  • Stakeholder Engagement Pt 4

Module 6: Risk Process Facilitation

  • Risk Monitoring and Reporting Pt 1
  • Risk Monitoring and Reporting Pt 2
  • Risk Monitoring and Reporting Pt 3

Module 7: Risk Monitoring and Reporting

  • Risk Monitoring and Reporting Pt 1
  • Risk Monitoring and Reporting Pt 2
  • Risk Monitoring and Reporting Pt 3

Module 8: Specialized Risk Analyses

  • Specialized Risk Analyses Pt 1
  • Specialized Risk Analyses Pt 2
  • Specialized Risk Analyses Pt 3

Module 9: RMP Recap

  • RMP Recap

Module 10: RMP Review Questions

  • RMP Review Questions Pt 1
  • RMP Review Questions Pt 2
  • RMP Review Questions Pt 3
  • RMP Review Questions Pt 4
  • RMP Review Questions Pt 5

Module 1 : Getting Certified to take the Examination

  • 1.1 Intro
  • 1.2 Getting Certified to take the Exam
  • 1.3 Techniques for Preparing for the Exam

Module 2 : Project Management Framework

  • 2.1 PMBOK Framework prt1
  • 2.2 PMBOK Framework prt2
  • 2.3 PMBOK Framework prt3

Module 3 : Project Integration Management

  • 3.1 Project Integration Mgmt
  • 3.2 Project Integration Mgmt prt2
  • 3.3 Integration Questions

Module 4 : Project Scope Management

  • 4.1 Project Scope Mgmt
  • 4.2 Project Scope Mgmt prt2
  • 4.3 Scope Questions

Module 5 : Project Schedule Management

  • 5.1 Project Schedule Mgmt
  • 5.2 Project Schedule Mgmt prt2
  • 5.3 Project Schedule Mgmt prt3
  • 5.4 Schedule Knowledge Questions

Module 6 : Project Cost Management

  • 6.1 Project Cost Mgmt
  • 6.2 Earned Value Mgmt
  • 6.3 Trend Analysis
  • 6.4 Cost Questions

Module 7 : Project Quality Management

  • 7.1 Project Quality Mgmt
  • 7.2 Quality Zero Defects
  • 7.3 Control Quality
  • 7.4 Quality Questions

Module 8 : Project Resource Management

  • 8.1 Project Resource Mgmt
  • 8.2 Estimate Activity Resources
  • 8.3 Manage Team
  • 8.4 Resource Histogram
  • 8.5 Resource Questions

Module 9 : Project Communications Management

  • 9.1 Project Communication Mgmt
  • 9.2 Communication Methods
  • 9.3 Communications
  • 9.4 Communication Questions

Module 10 : Project Risk Management

  • 10.1 Project Risk Mgmt
  • 10.2 Identify Risk
  • 10.3 Quantitive Risk Analysis
  • 10.4 Plan Risk Responses
  • 10.5 Risk Questions

Module 11 : Project Procurement Management

  • 11.1 Project Procurement
  • 11.2 Make or Buy
  • 11.3 Share
  • 11.4 Procurement Documents
  • 11.5 Negotiations
  • 11.6 Procurement Questions

Module 12 : Project Stakeholder Management

  • 12.1 Project Stakeholder Mgmt
  • 12.2 Plan Stakeholder Engagement
  • 12.3 Project Stakeholder Questions

Module 13 : Review

  • 13.1 Review for Exam Prep
  • 13.2 Project Mgmt vs Program Mgmt vs Portfolio Mgmt
  • 13.3 Knowledge Areas review
  • 13.4 Project Scope Management Review
  • 13.5 Project Schedule Management Review
  • 13.6 Project Cost Management Review
  • 13.7 Project Quality Management Review
  • 13.8 Project Resource Management Review
  • 13.9 Project Communications Mgmt Review
  • 13.10 Project Risk Management Review
  • 13.11 Project Procurement Management
  • 13.12 Project Stakeholder Management

Module 1: Organization­ – Wide Planning and Deployment

  • Introduction
  • Wide Planning And Deployment-Part 1
  • Wide Planning And Deployment-Part 2
  • Wide Planning And Deployment-Part 3

Module 2: Leadership

  • Leadership-Part 1
  • Leadership-Part 2

Module 3: Organizational Process Measures and Management

  • Organizational Process Measures And Management-Part 1
  • Organizational Process Measures And Management-Part 2

Module 4: Team Management

  • Team Management-Part 1
  • Team Management-Part 2
  • Team Management-Part 3
  • Team Management-Part 4

Module 5: Define Phase­ – Overview of the Define Phase and the Voice of the Customer

  • Overview Of The Define Phase And The Voice Of The Customer-Part 1
  • Overview Of The Define Phase And The Voice Of The Customer-Part 2
  • Overview Of The Define Phase And The Voice Of The Customer-Part 3

Module 6: Define Phase – Business Case and Project Charter

  • Business Case And Project Charter-Part 1
  • Business Case And Project Charter-Part 2

Module 7: Define Phase­ – Analytical Tools

  • Analytical Tools

Module 8: Measure Phase­ – Process Analysis and Documentation

  • Process Analysis And Documentation-Part 1
  • Process Analysis And Documentation-Part 2
  • Process Analysis And Documentation-Part 3

Module 9: Measure Phase­ – Data Collection

  • Data Collection

Module 10: Measure Phase – ­Measurement Systems

  • Measurement Systems-Part 1
  • Measurement Systems-Part 2

Module 11: Measure Phase­ – Basic Statistics

  • Basic Statistics-Part 1
  • Basic Statistics-Part 2

Module 12: Measure Phase­ – Probability

  • Probability

Module 13: Measure Phase­ – Process Capability

  • Process Capability

Module 14: Analyze Phase – Measuring and Modeling Relationships

  • Measuring And Modeling Relationships

Module 15: Analyze Phase­ – Hypothesis Testing

  • Hypothesis Testing

Module 16: Analyze Phase­ – FEMA and Additional Analysis Methods

  • FMEA And Additional Analysis Methods-Part 1
  • FMEA And Additional Analysis Methods-Part 2
  • FMEA And Additional Analysis Methods-Part 3
  • FMEA And Additional Analysis Methods-Part 4

Module 17: Improve Phase­ – Design of Experiments (DOE)

  • Design Of Experiments-Part 1
  • Design Of Experiments-Part 2

Module 18: Improve Phase­ – Lean Method

  • Lean Method-Part 1
  • Lean Method-Part 2
  • Lean Method-Part 3

Module 19: Improve Phase -­ Implementation

  • Implementation

Module 20: Control Phase­ – Statistical Process Control (SPC)

  • Statistical Process Control

Module 21: Control Phase­ – Other Controls

  • Other Controls

Module 22: Control Phase­ – Maintain Controls and Sustain Improvements

  • Maintain Controls And Sustain Improvements

Module 23: DFSS

  • DFSS

Module 24: Exam Review­ – Prep and Key Concepts

  • Prep And Key Concepts-Part 1
  • Prep And Key Concepts-Part 2
  • Prep And Key Concepts-Part 3
  • Prep And Key Concepts-Part 4
  • Prep And Key Concepts-Part 5
  • Conclusion

Module 1: Six Sigma And The Organization

  • Introduction
  • Six Sigma And The Organization Goals-Part 1
  • Six Sigma And The Organization Goals-Part 2
  • Lean Principles In The Organization
  • Design For Six Sigma

Module 2: Define Phase ­Project Identification

  • Define Phase-Project Identification-Part 1
  • Define Phase-Project Identification-Part 2
  • Define Phase-Project Identification-Part 3

Module 3: Define Phase­Voice Of The Customer

  • Define Phase-Voice Of The Customer-Part 1
  • Define Phase-Voice Of The Customer-Part 2

Module 4: Define Phase­ Project Management Basics on Six Sigma Green Belt

  • Define Phase-Project Management Basics-Part 1
  • Define Phase-Project Management Basics-Part 2

Module 5: Define Phase­Management And Planning Tools

  • Define Phase-Management And Planning Tools-Part 1
  • Define Phase-Management And Planning Tools-Part 2

Module 6: Define Phase­Business Results For Projects

  • Define Phase-Business Results For Projects-Part 1
  • Define Phase-Business Results For Projects-Part 2

Module 7: Define Phase­Team Dynamics And Define Phase Summary Review Questions

  • Define Phase-Team Dynamics And Review Questions
  • Define Phase-Summary And Review Questions

Module 8: Measure Phase­Process Analysis And Documentation

  • Measure Phase-Process Analysis And Documentation

Module 9: Measure Phase­Probability And Statistics

  • Measure Phase-Probability And Statistics

Module 10: Measure Phase­Statistical Distributions

  • Measure Phase-Statistical Distributions

Module 11: Measure Phase­Collecting And Summarizing Data

  • Measure Phase-Collecting And Summarizing Data-Part 1
  • Measure Phase-Collecting And Summarizing Data-Part 2

Module 12: Measure Phase­Measurements System Analysis (MSA)

  • Measure Phase-Measurements System Analysis(MSA)

Module 13: Measure Phase­Process And Performance Capability And Measure Phase Summary And Review

  • Measure Phase-Process And Performance Capability And Measure Phase Summary And Review

Module 14: Analyze Phase­Exploratory Data Analysis And Hypothesis Testing

  • Analyze Phase-Exploratory Data Analysis And Hypothesis Testing-Part1
  • Analyze Phase-Exploratory Data Analysis And Hypothesis Testing-Part2
  • Analyze Phase-Exploratory Data Analysis And Hypothesis Testing-Part3

Module 15: Analyze Phase ­ Process Drivers

  • Analyze Phase-Process Drivers-Part 1
  • Analyze Phase-Process Drivers-Part 2
  • Analyze Phase-Process Drivers-Part 3
  • Analyze Phase-Process Drivers-Part 4
  • Analyze Phase-Process Drivers-Part 5

Module 16: Improve Phase­Design Of Experiment (DOE)

  • Improve Phase-Design Of Experiment(DOE)-Part 1
  • Improve Phase-Design Of Experiment(DOE)-Part 2

Module 17: Improve Phase­Root Cause Analysis

  • Improve Phase-Root Cause Analysis-Part 1
  • Improve Phase-Root Cause Analysis-Part 2
  • Improve Phase-Root Cause Analysis-Demo

Module 18: Improve Phase­Lean Tools

  • Improve Phase-Lean Tools-Part 1
  • Improve Phase-Lean Tools-Part 2
  • Improve Phase-Lean Tools-Part 3
  • Improve Phase-Lean Tools-Part 4

Module 19: Control Phase­ Statistical Process Control

  • Control Phase-Statistical Process Control

Module 20: Control Phase­Lean Tools For Process Control

  • Control Phase-Lean Tools For Process Control-Part 1
  • Control Phase-Lean Tools For Process Control-Part 2
  • Control Phase-Lean Tools For Process Control-Part 3

Module 21: Review Exam­Prep And Key Concepts

  • Exam Review And Key Concepts-Part 1
  • Exam Review And Key Concepts-Part 2
  • Exam Review And Key Concepts-Part 3
  • Exam Review And Key Concepts-Part 4
  • Exam Review And Key Concepts-Part 5
  • Exam Review And Key Concepts-Part 6
  • Exam Review And Key Concepts-Part 7
  • Exam Review-Flash Cards
  • Conclusion

Module 1: Virtual Box

  • Virtual Box-Part 1
  • Virtual Box-Part 2
  • Virtual Box-Part 3
  • Virtual Box-Part 4
  • Virtual Box-Part 5
  • Virtual Box-Part 6

Module 2: Basic Commands

  • Basic Commands-Part 1
  • Basic Commands-Part 2
  • Basic Commands-Part 3
  • Basic Commands-Part 4
  • Basic Commands-Part 5
  • Basic Commands-Part 6
  • Basic Commands-Part 7
  • Basic Commands-Part 8
  • Basic Commands-Part 9
  • Basic Commands-Part 10

Module 3: Special Characters

  • Special Characters-Part 1
  • Special Characters-Part 2
  • Special Characters-Part 3

Module 4: File Editing

  • File Editing-Part 1
  • File Editing-Part 2
  • File Editing-Part 3
  • File Editing-Part 4
  • File Editing-Part 5
  • File Editing-Part 6
  • File Editing-Part 7

Module 5: File System Structure

  • File System Structure-Part 1
  • File System Structure-Part 2
  • File System Structure-Part 3
  • File System Structure-Part 4

Module 6: Finding Files

  • Finding Files-Part 1
  • Finding Files-Part 2
  • Finding Files-Part 3

Module 7: Shell Special Characters

  • Shell Special Characters-Part 1
  • Shell Special Characters-Part 2
  • Shell Special Characters-Part 3

Module 8: Regular Expressions

  • Regular Expressions-Part 1
  • Regular Expressions-Part 2
  • Regular Expressions-Part 3
  • Regular Expressions-Part 4
  • Regular Expressions-Part 5
  • Regular Expressions-Part 6

Module 9: Process Management

  • Process Management-Part 1
  • Process Management-Part 2
  • Process Management-Part 3
  • Process Management-Part 4
  • Process Management-Part 5
  • Process Management-Part 6
  • Process Management-Part 7
  • Process Management-Part 8

Module 10: Job Scheduling

  • Job Scheduling-Part 1
  • Job Scheduling-Part 2
  • Job Scheduling-Part 3
  • Job Scheduling-Part 4
  • Job Scheduling-Part 5
  • Job Scheduling-Part 6

Module 11: Customizing Your Account

  • Customizing Your Account-Part 1
  • Customizing Your Account-Part 2
  • Customizing Your Account-Part 3
  • Customizing Your Account-Part 4
  • Customizing Your Account-Part 5
  • Customizing Your Account-Part 6

Module 12: Unix Printing

  • Unix Printing-Part 1
  • Unix Printing-Part 2
  • Unix Printing-Part 3
  • Unix Printing-Part 4

Module 13: Networking

  • Networking-Part 1
  • Networking-Part 2
  • Networking-Part 3
  • Networking-Part 4
  • Networking-Part 5
  • Networking-Part 6
  • Networking-Part 7
  • Networking-Part 8
  • Networking-Part 9
  • Networking-Part 10

Module 14: X Windows

  • X Windows-Part 1
  • X Windows-Part 2
  • X Windows-Part 3
  • X Windows-Part 4
  • X Windows-Part 5

Module 15: Back Up And Compression

  • Back Up And Compression-Part 1
  • Back Up And Compression-Part 2
  • Back Up And Compression-Part 3
  • Back Up And Compression-Part 4

Module 16: Text Utility

  • Text Utility-Part 1
  • Text Utility-Part 2
  • Text Utility-Part 3
  • Text Utility-Part 4
  • Text Utility-Part 5

Module 17: Shell Scripting

  • Shell Scripting-Part 1
  • Shell Scripting-Part 2
  • Shell Scripting-Part 3
  • Shell Scripting-Part 4
  • Shell Scripting-Part 5
  • Shell Scripting-Part 6
  • Shell Scripting-Part 7
  • Shell Scripting-Part 8
  • Shell Scripting-Part 9
  • Shell Scripting-Part 10
  • Shell Scripting-Part 11

Module 18: System Administration Basics

  • System Administration Basics-Part 1
  • System Administration Basics-Part 2
  • System Administration Basics-Part 3
  • System Administration Basics-Part 4
  • System Administration Basics-Part 5

Module 1: Development Methods

  • Introduction To Scrum Master
  • Development Methods

Module 2: Agile Manifesto Principles

  • Agile Manifesto Principles

Module 3: Scrum

  • Scrum
  • Scrum Summary

Module 4: Why Scrum

  • Why Scrum?

Module 5: Scrum-Roles Overview

  • Scrum – Roles Overview

Module 6: Product Owner

  • Product Owner

Module 7: Scrum Master

  • Scrum Master

Module 8: Scrum Team

  • Scrum Team

Module 9: Scrum Process

  • Scrum Process

Module 10: Scrum Project Phase

  • Scrum Project Phase

Module 11: Plan and Estimate

  • Plan And Estimate

Module 12: Implement

  • Implement

Module 13: Review and Retrospect

  • Review And Retrospect

Module 14: Release

  • Release

Module 15: Project Vision

  • Project Vision

Module 16: Scrum Master and Stake Holder(s)

  • Scrum Master And Stake Holders

Module 17: Form Scrum Team

  • Form Scrum Team

Module 18: Develop Epics

  • Develop Epics

Module 19: User Stories

  • User Stories

Module 20: Justifications and Sample Change(s)

  • Justifications And Sample Changes

Module 21: Creating a Prioritized Backlog

  • Creating A Prioritized Backlog

Module 22: Conduct Release Planning

  • Conduct Release Planning

Module 23: Sprints

  • Sprints

Module 24: Scrum Framework

  • Scrum Framework – Part 1 Roles
  • Scrum Framework – Part 2 Ceremonies
  • Scrum Framework – Part 3 Artifacts

Module 25: Scrum of Scrums

  • Scrum Of Scrums

Module 26: Scrum Demo

  • Scrum Demo

Module 27: Review

  • Review
  • Outro

Module 1: Development Methods

  • Introduction To Certified Scrum Master
  • Development Methods

Module 2: Agile Manifesto Principles

  • Agile Manifesto Principles

Module 3: Scrum

  • Scrum
  • Scrum Summary

Module 4: Why Scrum

  • Why Scrum?

Module 5: Scrum-Roles Overview

  • Scrum – Roles Overview

Module 6: Product Owner

  • Product Owner

Module 7: Scrum Master

  • Scrum Master

Module 8: Scrum Team

  • Scrum Team

Module 9: Scrum Process

  • Scrum Process

Module 10: Scrum Project Phase

  • Scrum Project Phase

Module 11: Plan and Estimate

  • Plan And Estimate

Module 12: Implement

  • Implement

Module 13: Review and Retrospect

  • Review And Retrospect

Module 14: Release

  • Release

Module 15: Project Vision

  • Project Vision
  • Module 16: Scrum Master and Stake Holder(s)
  • Scrum Master And Stake Holders

Module 17: Form Scrum Team

  • Form Scrum Team

Module 18: Develop Epics

  • Develop Epics

Module 19: User Stories

  • User Stories

Module 20: Justifications and Sample Change(s)

  • Justifications And Sample Changes

Module 21: Creating a Prioritized Backlog

  • Creating A Prioritized Backlog

Module 22: Conduct Release Planning

  • Conduct Release Planning

Module 23: Sprints

  • Sprints

Module 24: Scrum Framework

  • Scrum Framework – Part 1 Roles
  • Scrum Framework – Part 2 Ceremonies
  • Scrum Framework – Part 3 Artifacts

Module 25: Scrum of Scrums

  • Scrum Of Scrums

Module 26: Scrum Demo

  • Scrum Demo

Module 27: Review

  • Review
  • Outro

Module 1: Introduction To Application Virtualization

  • Course Introduction
  • Introduction To Virtualization
  • Introduction To Desktop Virtualization
  • Introduction To Application Virtualization
  • The XenApp Blue Print
  • Building The Lab Environment

Module 2: XenApp Server Setup

  • Configure XenApp Server After Initial Install
  • Configuration Updates And Virtual Delivery Agent Install
  • Build Master Image For Machine Catalog
  • Complete Master Image Build
  • Setup Delivery Group
  • Test XenApp Application Delivery

Module 3: Plan For High Availability

  • High Availability Explained-Part1
  • High Availability Explained-Part2
  • Windows Failover Cluster-Part1
  • Windows Failover Cluster-Part2
  • Complete Failover Cluster Configuration
  • Complete Basic Cluster Configuration-Part1
  • Complete Basic Cluster Configuration-Part2

Module 4: Scripting Primer

  • Windows Batch Files-Part1
  • Windows Batch Files-Part2
  • Windows Batch Files-Part3
  • Power Shell Scripts-Part1
  • Power Shell Scripts-Part2
  • Error Handling In PowerShell Scripts
  • Scripts Explained

Module 5: Using VMware vSphere

  • Introduction To VMware
  • Configuring Windows 7 And Installing VMware Tools
  • Power CLI Scripting In VMware

Module 6: Virtualization Using Microsoft Hyper-V

  • Introduction To Hyper-V
  • Introduction To Hyper-V Continued
  • Windows Server Core Install And Configure-Part1
  • Windows Server Core Install And Configure-Part2
  • Install And Configure DHCP Server
  • Hyper-V Virtual Networking

Module 7: Course Review

  • Active Directory Fundamentals
  • Permissions In Active Directory
  • Logon Scripts In Windows
  • Review Virtualization
  • Review Application Virtualization
  • Review High Availability
  • Review Scripting
  • Review XenApp Blue Print
  • Course Conclusion

Module 1: Introduction To Virtualization

  • Introduction
  • Intro To Virtualization-Part1
  • Virtualization Demo-Part1
  • Virtualization Demo-Part2
  • Intro To Virtualization-Part2

Module 2: Introduction To Desktop Virtualization

  • Into To Desktop Virtualization

Module 3: XenDesktop 7.6 Requirements and Implementations

  • Intro To Xen Desktop Concepts And Components
  • Xen Desktop Implementations-Part1
  • Xen Desktop Implementations-Part2

Module 4: Plan and Design XenDesktop Infrastructure

  • Intro To Plan And Design-Part1
  • Intro To Plan And Design-Part2
  • Active Directory Permissions Demo
  • Customize The Desktop Demo
  • Customize Environment Demo
  • Folder Redirection Demo
  • Custom Scripts Demo
  • Dynamic VM Demo
  • Network Design Considerations
  • VM From Scratch Demo
  • Access And Optimize
  • Cloud Considerations Demo
  • Design Monitoring

Module 5: Data And Network Redundancy

  • Intro To Network Redundancy
  • Intro To Data Redundancy
  • VM Availability Demo-Part1
  • VM Availability Demo-Part2
  • VM Availability Demo-Part3
  • Citrix Linux VM And Citrix Xendesktop Site Configuration Demo

Module 6: Automating Using Powershell

  • Intro To Powershell-Part1
  • Intro To Powershell-Part2
  • Powershell Scripting Demo
  • Creating Functions In Powershell

Module 7: Virtualizing Using Hyper-V

  • Introduction To Hyper-V Installtion
  • Introduction To Hyper-V VM Build
  • Automating Admin In Hyper-V

Module 8: Build Test And Deploy VM To Xen Desktop

  • Customize Client OS Demo
  • Customize User Profiles Demo
  • Installing XenDesktop Client Components For Pooled Desktops Demo
  • Installing XenDesktop Client Components For Remote Desktops Demo
  • Deploy XenDesktop Client After VDA Install Demo
  • Test Client Deployment Demo

Module 9: Internet Information Services

  • Intro And Install Of Information Services-Part1
  • Intro And Install Of Information Services-Part2
  • Creating Websites And Managing Application Pools
  • Backup And Restore WebServer

Module 10: Course Review

  • Active Directory Domain
  • Windows Permissions And Configurations
  • Configure Citrix XenDesktop Studio
  • Failover Cluster Demo
  • Citrix Authentication And Troubleshooting
  • XenDesktop Technical Overview
  • SQL Server Database Overview Demo
  • SQL Server DBA Tasks
  • Conclusion

Module 1: Intro To XenServer And Virtualization

  • Intro To Virtual Computing
  • Hypervisors-Part1
  • Hypervisors-Part2
  • Installing Your First VM
  • Creating An Active Directory Domain In The VM
  • Adding VM And Host To Domain
  • Virtual Networks Explained

Module 2: Comprehensive Introduction To Linux

  • Intro And Demo Of Linux
  • Configuring Linux VM
  • Network Configuration
  • Linux Scripting And File Permissions
  • Advanced Linux Permissions
  • Linux DHCP And Disks Explained
  • Install And Configure DHCP

Module 3: Hosts, Storage, And Networking

  • Storage Access And Configuration
  • iCSI Configuration And Access
  • Storage Repository
  • Subnets Explained
  • Subnets Example
  • More Subnetting
  • Building A Linux Based VM Router

Module 4: Comprehensive Introduction To Powershell

  • Why Powershell
  • Using Powershell
  • Pipelines And WMI
  • More WMI And Scripting Using Powershell
  • Advanced Powershell Scripting

Module 5: XenServer Components And Features

  • Critical Components
  • VM Templates
  • Virtual Networking
  • Automation Explained
  • Automation Using XenServer CLI Demo
  • Automation Using Powershell Demo
  • Powershell Script Completion And Execution
  • Protecting Your Virtual Environment Explained
  • Protecting Your Virtual Environment Demo
  • XenCenter Comprehensive Walk Through

Module 6: Problem Resolution

  • Troubleshooting Explained
  • VM Migration

Module 7: Review

  • XenServer Exam Objectives
  • PXE Server Explained
  • PXE Server Demo
  • XenServer Product Review
  • AD Using Command Line And PowerShell
  • Conclusion
  • Social Media Introduction
  • Creating A Google Account
  • Setting Up Your Twitter Account
  • Getting Your Twitter House In Order
  • Why Facebook For Your Business
  • Using Facebook As A Business
  • Setting Up Your Business Page
  • Setting Your Cover Photo
  • Tying It All Together
  • Tip-Adding Admins In Facebook
  • Adjusting Your Settings- Part 1
  • Adjusting Your Settings- Part 2
  • Adjusting Your Settings- Part 3
  • Updating Your Page Info- Part 1
  • Updating Your Page Info- Part 2
  • Tips For Getting 25 Likes
  • Using Facebook As Your Business Page
  • What Kind Of Person Would Your Business Be
  • How To Post To Facebook
  • What To Post
  • Sharing Posts
  • Sharing Links
  • Pinning And Highlighting With Posts
  • Tips For Generating Traffic
  • Getting Notifications And Staying In Clients News Feed
  • Comment Moderation
  • The Activity Log- Where Do Hidden Posts Go
  • Scheduling Posts
  • Intro To Facebook Advertising
  • Setup Advertising Account
  • Types Of Advertising On Facebook
  • Ad Testing
  • Choosing Our Audience-Location
  • Choosing Our Audience-Age And Gender
  • Choosing Our Audience-Precise Interests
  • Choosing Our Audience-Broad Categories
  • Choosing Our Audience-Connections
  • Choosing Our Audience-Advanced Targeting Options
  • Choosing Our Audience-Campaign And Budget
  • Other Types Of Ads-Part 1
  • Other Types Of Ads-Part 2
  • Ad Campaign Manager-Part 1
  • Ad Campaign Manager-Part 2
  • Outside URLs
  • Building Ad Text
  • News Feed Format And Creating Your Audience
  • Campaign Pricing And Schedule
  • Ad Campaign Tracker
  • Facebook Insights-Overview Intro
  • Analyzing Page Posts
  • Engaged Users
  • Talking About This
  • Virality
  • Likes
  • Reach
  • Reach And Frequency
  • Page Visits
  • Talking About This
  • Conclusion
  • Introduction To LinkedIn
  • Overview Of The Interface And Settings
  • Open Link Settings
  • LinkedIn Groups
  • Adding And Removing Applications
  • Basic Account Settings
  • Updating Your Public Profile
  • LinkedIn Connections Groups And Pages
  • LinkedIn Channels And Today
  • Advertising on LinkedIn
  • Determine Your Goals
  • Create Your Persona Or Voice
  • Decide On Your Platforms
  • Establishing A Social Media Manager
  • Coordinate With Customer Service
  • Create A Predetermined Crisis Management Plan
  • Stick To The Script
  • Building Relationships With The Media
  • Find Your Evangelist
  • Stay Informed Part 1
  • Stay Informed Part 2
  • Bitly
  • Woobox Part 1
  • Woobox Part 2
  • HootSuite Part 1
  • HootSuite Part 2
  • Storify
  • Social Media Rules And Tips
  • Social Media Conclusion
  • Tweetdeck-Boolean Search
  • Introduction To Google Plus
  • Overview Of The Interface
  • Setting Up A Google Plus Page
  • Linking Your Other Social Networks
  • Linking Your Website To Your Google Plus Page
  • Review Of Your Google Plus Dashboard
  • Notification Settings For Google Plus
  • Photo Settings In Google Plus
  • Google Plus And YouTube
  • YouTube Advanced Settings
  • Interface For Uploaded Videos
  • Sharing Videos Across Your Social Network
  • Updating Your About Section
  • Quick Recap Of Everything Covered So Far
  • Overview Of Pinterest
  • How Does Pinterest Relate To Your Business
  • Industry Specific Sites
  • The Uses of Pinterest
  • Conclusion Of Pinterest
  • Introduction to Reddit
  • The Rules of Reddit
  • Module 1.0 Introduction
    • Social Media Introduction
    • Creating A Google Account
    • Setting Up Your Twitter Account
    • Getting Your Twitter House In Order
    • Why Facebook For Your Business
    • Using Facebook As A Business
    • Setting Up Your Business Page
    • Setting Your Cover Photo
    • Tying It All Together
    • Tip-Adding Admins In Facebook

    Module 2.0 Adjusting Your Facebook Settings

    • Adjusting Your Settings-Part1
    • Adjusting Your Settings-Part2
    • Adjusting Your Settings-Part3
    • Updating Your Page Info-Part1
    • Updating Your Page Info-Part2
    • Tips For Getting 25 Likes
    • Using Facebook As Your Business Page

    Module 3.0 Posting on Facebook

    • What Kind Of Person Would Your Business Be
    • How To Post To Facebook
    • What To Post
    • Sharing Posts
    • Sharing Links
    • Pinning And Highlighting With Posts
    • Tips For GeneratingTraffic
    • Getting Notifications And Staying In Clients News Feed
    • Comment Moderation
    • The Activity Log-Where Do Hidden Posts Go
    • Scheduling Posts

    Module 7.0 Twitter

    • Limiting the Number Of Actions
    • Setting Your Twitter Preferences
    • Finish Setting Up Your Profile
    • Twitter Widgets
    • Who To Follow
    • Connect
    • Bringing Followers From Facebook
    • Intro To Hashtags
    • Examples Of Hashtags
    • Monitoring Whats Going On
    • Using Twitter For Social Listening
    • Social Media Tips
    • Hashtags Across Social Media

    Module 8.0 Pinterest

    • Overview Of Pinterest
    • How Does Pinterest Relate To Your Business
    • Industry Specific Sites
    • The Uses of Pinterest
    • Conclusion Of Pinterest

    Module 9.0 Reddit

    • Introduction To Reddit
    • The Rules Of Reddit

    Module 11.0 LinkedIn

    • Introduction To LinkedIn
    • Overview Of The Interface And Settings
    • Open Link Settings
    • LinkedIn Groups
    • Adding And Removing Applications
    • Basic Account Settings
    • Updating Your Public Profile
    • LinkedIn Connections Groups And Pages
    • LinkedIn Channels And Today
    • Advertising On LinkedIn

    Module 12.0 Google+ and Youtube

    • Introduction To Google Plus
    • Overview Of The Interface
    • Setting Up A Google Plus Page
    • Linking Your Other Social Networks
    • Linking Your Website To Your Google Plus Page
    • Review Of Your Google Plus Dashboard
    • Notification Settings For Google Plus
    • Photo Settings In Google Plus
    • Google Plus And YouTube
    • YouTube Advanced Settings
    • Interface For Uploaded Video
    • Sharing Videos Across Your Social Network
    • Updating Your About Section
    • Quick Recap Of Everything Covered So Far

    Module 14.0 Additional Tools

    • Bitly
    • Woobox-Part1
    • Woobox-Part2
    • Hoot Suite-Part1
    • Hoot Suite-Part2
    • Storify
    • Social Media Rules And Tips
    • Tweet deck-Boolean Search
    • Social Media Conclusion

    Module 4.0 Facebook Advertising

    • Intro To Facebook Advertising
    • Setup Advertising Account
    • Types Of Advertising On Facebook
    • Ad Testing
    • Choosing Our Audience-Location
    • Choosing Our Audience-Age And Gender
    • Choosing Our Audience-Precise Interests
    • Choosing Our Audience-Broad Categories
    • Choosing Our Audience-Connections
    • Choosing Our Audience-Advanced Targeting Options
    • Choosing Our Audience-Campaign And Budget
    • Other Types Of Ads-Part1
    • Other Types Of Ads-Part2
    • Ad Campaign Manager-Part1
    • Ad Campaign Manager-Part2
    • Outside URLs
    • Building Ad Text
    • News Feed Format And Creating Your Audience
    • Campaign Pricing And Schedule
    • Ad Campaign Tracker

    Module 5.0 Facebook Insights

    • Facebook Insights-Overview Intro
    • Analyzing Page Posts
    • Engaged Users
    • Talking About This
    • Virality
    • Likes
    • Reach
    • Reach And Frequency
    • Page Visits
    • Talking About This
    • Conclusion

    Module 6.0 Facebook Analytics

    • 0 New Facebook Analytics Overview
    • 1 Page Likes
    • 2 Post Reach
    • 3 Page Visits
    • 4 Posts
    • 5 People
    • New Facebook Analytics Overview
    • Page Likes
    • Post Reach
    • Page Visits
    • Posts
    • People

    Module 10.0 Tumblr

    • Tumblr Introduction
    • Setting Up A Tumblr
    • Dashboard
    • Posting To Tumblr
    • Testing Your Post
    • URL Post
    • Chat Post
    • Audio On Tumblr
    • Video On Tumblr
    • Tumblr Conclusion

    Module 13.0 Best Practices

    • Determine Your Goals
    • Create Your Persona Or Voice
    • Decide On Your Platforms
    • Establishing A Social Media Manager
    • Coordinate With Customer Service
    • Create A Predetermined Crisis Management Plan
    • Stick To The Script
    • Building Relationships With The Media
    • Find Your Evangelist
    • Stay Informed-Part1
    • Stay Informed-Part2
  • Module 1 Online Lead Generation
    • Intro to Social Media Digital Marketing
    • Online Lead Generation prt1
    • Online Lead Generation prt2
    • Lead Examples
    • Live Streaming Video for Leads
    • Lead Generation
    • Using Your Customers
    • Be Ready

    Module 2 Facebook, LinkedIn, and YouTube 101

    • Create a Facebook Business Page
    • Facebook Setup
    • Marketing in Facebook Groups
    • Messenger Bots
    • More on Messenger
    • Facebook Video using InShot
    • Repurposing
    • Setting Up LinkedIn Pro le
    • Benefits of YouTube

    Module 3 List Building & Email Marketing

    • Email List prt1
    • Email List prt2
    • MailChimp prt1
    • MailChimp prt2
    • Email Content Ideas
    • Email summary

    Module 4 Creating Social Media Content and Marketing Materials with Canva and other Apps

    • Canva Image Creation
    • Making a video with your phone
    • InShot video
    • Purpose Video Marketing
    • Transcribing Video
    • Word Swag
    • Ripl
    • Instagram prt1
    • Instagram prt2
    • Instagram prt3

    Module 5 Sales Funnels

    • Click Funnel prt1
    • Click Funnel prt2
    • Funnel Building prt1
    • Funnel Building prt2

    Module 6 Apps & Tools Review

    • Social Media apps
    • Podcasting
    • Customer Value Letter
    • Tips and Tricks
    • Fiverr
    • Outro
  • Module 1: Social Media Marketing
    • Course Intro
    • How to Utilize Social Media
    • Client Briefs
    • Target Markets
    • Personas Pt 1
    • Personas Pt 2
    • Personas Pt 3
    • Competitive Analysis Pt 1
    • Competitive Analysis Pt 2
    • Competitive Analysis Pt 3

    Module 2: Social Media Marketing

    • What is the Right Content for You
    • Images Pt 1
    • Images Pt 2
    • Images Pt 3
    • Images Pt 4
    • Images Pt 5
    • Video Pt 1
    • Video Pt 2
    • Video Pt 3
    • Video Pt 4
    • Live Videos and Engagement Pt 1
    • Live Videos and Engagement Pt 2

    Module 3: Social Media Marketing

    • What are Analytics and How to Use Them
    • Free Analytic Tools Available
    • Paid Services to Consider Pt 1
    • Paid Services to Consider Pt 2
    • Finding the Right Hashtags
    • What is Automation
    • How to Best Use Automation
    • Course Outro
    • Tumblr Introduction
    • Setting Up A Tumblr
    • Dashboard
    • Posting To Tumblr
    • Testing Your Post
    • URL Post
    • Chat Post
    • Audio On Tumblr
    • Video On Tumblr
    • Tumblr Conclusion
    • Limiting the Number Of Actions
    • Setting Your Twitter Preferences
    • Finish Setting Up Your Profile
    • Twitter Widgets
    • Who To Follow
    • Connect
    • Bringing Followers From Facebook
    • Intro To Hashtags
    • Examples Of Hashtags
    • Monitoring What’s Going On
    • Using Twitter For Social Listening
    • Hashtags Across Social Media
  • Introduction
  • Business Entities
  • Beginning Your Business
  • Financial Basics Part 1
  • Financial Basics Part 2
  • Employees Payroll
  • Getting Your Business Out There
  • SEO
  • Other Topics
  • Closing
  • Module 1: Setup and Maintenance
    • Course Introduction
    • Knowing Which Account is Right for You
    • Getting Started
    • User Setup
    • Access Rights
    • User Setup Completion
    • Adding Employees to Payroll
    • Inviting Your Accountant
    • Dashboard and 3 Ways to Navigate QBO
    • Commonly Used Forms
    • Module 1 Summary

    Module 2: List Management

    • Defining Lists
    • Importing Lists
    • Employees vs 1099
    • Adding and Removing Entries
    • Updating Entries
    • Editing and Managing List Elements Demo
    • Merging Items (entries)
    • Form Requirements
    • Summary

    Module 3: Sales (Money-In)

    • Product and Service Setup
    • Customer Setup Demo
    • Invoicing Workflows
    • Recording Sales
    • Customer Statements
    • Tracking Audit History Demo
    • Sales Reciept Workflow
    • Undeposited Funds Account
    • Accounts Receivable Impact
    • Impact of Connecting Your Bank Account to QBO
    • Billable Expense Invoicing
    • Recording a Customer Credit
    • Delayed Charges
    • Estimates
    • Summary

    Module 4: Purchased (Money-Out)

    • Product and Service Setup on Purchase Forms
    • Vendor Setup
    • Purchase Order Transactions
    • Entering and Paying Bills
    • Recording Checks
    • Recording Credit and Debit Card Transactions
    • Recording EFTs, Online Payments, and Wire Transfers
    • Recording Vendor Credits
    • Voiding vs Deleting Checks
    • Vendor Page and Report Insights
    • Summary

    Module 5: Accounting

    • Basic financial statements (Balance sheet, income statement, and statement of cash flows)
    • Financial Statements Expanded
    • Cash and Accrual Accounting Differences
    • Difference Between Cash and Accrual Reporting
    • Setting a Closing Date
    • Balancing Your Books aka Reconciling Demo
    • Journal Entries
    • Audit Log Insights
    • Project Profitability Demo
    • Summary

    Module 6: Reports

    • Customized Reports
    • Commonly Used Reports Demo
    • Setup Automatic Report Emails
    • Collapse and Expand Report Function
    • Exporting and Importing Reports
    • Summary

    Module 7: Customizations and Time Savers

    • Tracking Income and Expenses for Multiple Locations
    • Organizing your Chart of Accounts
    • Custom Fields on Invoices
    • Recurring Transactions
    • Customizing a Sales Form
    • Keyboard Shortcuts
    • QBO Mobile App Preview
    • Connecting Third Party Apps to QBO
    • Summary

    Module 8: Extra

    • Common Mistakes QBO Users Make
    • Final Note on Bookkeeping Best Practices
    • Why QBO is Awesome
    • Course Outro
    • Defining Terms and Sample Quiz Questions
  • Module 1: Creating and Setting Up Your Point of Sale Company File
    • Intro To Point Of Sale
    • Creating And Setting Up Point Of Sale

    Module 2: Installing your System

    • Determining Your Point Of Sale Additions

    Module 3: Navigating and Customizing the Home Page

    • Navigating And Customizing The Homepage

    Module 4: Company Preferences

    • Company Preferences

    Module 5: Financial- Setting up QuickBooks Connection

    • Setting Up Quickbooks Connection

    Module 6: Setting up Sales Tax

    • Setting Up Sales Tax

    Module 7: Workstation Preferences

    • Workstation Preferences

    Module 8: Additional Features

    • Additional Features

    Module 9: Employees and Security

    • Employees And Security

    Module 10: Customers

    • Customers

    Module 11: Rewards Program

    • Reward Programs

    Module 12: Vendors

    • Vendors

    Module 13: Setting Up Your Inventory

    • Setting Up Inventory

    Module 14: Item Styles, Assemblies, and Group

    • Adding Styles Assemblies And Groups

    Module 15: Working with Inventory

    • Working With Inventory

    Module 16: Sales

    • Sales

    Module 17: Working with Price Levels and Discounts

    • Working With Price Level And Discounts

    Module 18: Collecting Sales Tax

    • Collecting Sales Tax

    Module 19: Adding Shipping Information (Pro/MS)

    • Adding Shipping Info

    Module 20: Tracking Sales Commissions

    • Tracking Sales And Commission

    Module 21: Taking Payment and Giving Change

    • Taking Payments And Giving Change

    Module 22: Recording Tips

    • Recording Tip

    Module 23: Handling Tricky Sales Returns

    • Handling Tricky Sales And Returns

    Module 24: Working with Sales Orders, Work Orders, and Layaways

    • Working With Sales And Work Orders

    Module 25: Purchasing Merchandise

    • Purchasing Merchandise

    Module 26: Receiving from a PO

    • Receiving Purchase Orders

    Module 27: Managing Inventory

    • Managing Inventory

    Module 28: Reporting

    • Reporting Point Of Sales

    Module 29: QuickBooks Financial

    • Quickbooks Financial

    Module 30: Multi-Store

    • Multi-Store

    Module 31: Protect your data

    • Protecting Your Data

    Module 32: Adding Third Party Applications

    • Adding 3rd Party Apps
    • Summary of Point of Sale
  • Module 1: Intro and Setup
    • Intro To Quickbooks
    • Setup Quickbooks

    Module 2: Tools

    • Tools-Part 1
    • Tools-Part 2
    • Tools-Part 3

    Module 3: Preferences

    • Preferences
    • Email Preferences

    Module 4: Security & Users

    • Security And Users

    Module 5: Estimates

    • Estimates

    Module 6: Sales Orders

    • Sales And Orders

    Module 7: Receiving Money

    • Account Receivable
    • Batch Invoicing
    • Customer Deposits

    Module 8: Bounced Checks

    • Bounced Checks

    Module 9: Specific Tracking

    • Vehicle Mileage
    • Class Tracking Transactions

    Module 10: Receiving and Depositing

    • Receiving Payments
    • Making Deposits

    Module 11: Credit Cards and Bank Accounts

    • Credit Cards
    • Bank Accounts

    Module 12: Payroll

    • Payroll Preferences
    • Employee Setup
    • Processing Payroll
    • Payroll Tax Forms
    • Job Costing With Payroll
    • Payroll Setup Advance
    • Workers Compensation

    Module 13: Transactions

    • Special Transactions
    • Memorized Transactions

    Module 14: Accounts and Reports

    • Other Account Types
    • Quickbooks Reporting
    • Advance Reporting
    • Budgets And Forecast

    Module 15: Integrating with Word

    • Writing Letters In Microsoft Word

    Module 16: Data Types

    • Converting Importing And Exporting
    • Quickooks Backup Data Integrity
    • Multi-Currencies

    Module 17: Conclusion

    • Advance Features
    • Update Or Upgrade
    • Summary Of Quickbooks
  • Module 1: Sage 50 2013
    • Course Overview-Part1
    • Course Overview-Part2
    • Course Overview-Part3
    • Course Overview-Part4
    • New Features-Part1
    • New Features-Part2
    • New Features-Part3
    • Quick Tab Menu Overview
    • Business Status-Part1
    • Business Status-Part2
    • Customer And Sales
    • Vendors And Purchases
    • Inventory And Services
    • Employees And Services
    • Banking
    • System-Part 1
    • System-Part2
    • Quick Tab Menu Review
    • Sage 50 Menu Overview-Part1
    • Sage 50 Menu Overview-Part 2
    • Sage 50 Menu Overview-Part3
    • Sage 50 Menu Overview-Part 4
    • Sage 50 Menu Overview-Part5
    • Sage 50 Menu Overview-Part6
    • Sage 50 Menu Overview-Part7

    Module 2: Sage 50 Basics

    • Sage 50 Available Products
    • Accounts Payable Features
    • Vendors And Purchases-Part 1
    • Vendors And Purchases-Part 2
    • Vendors And Purchases-Part 3
    • Vendors And Purchases-Part 4
    • Vendors And Purchases-Part 5
    • Vendors And Purchases-Part 6
    • Accounts Payable Review
    • Accounts Receivable Review
    • Customer And Sales Menu
    • Customers
    • Jobs
    • Sales Taxes
    • Quotes And Proposals
    • Sales Orders
    • Invoices
    • Finance Charges Basics
    • Receive Money
    • Bank Accounts
    • Printing Statements
    • Credits And Returns
    • Accounts Receivable Report
    • Basics Review

    Module 3: Inventory

    • Inventory And Services Overview
    • Inventory Items-Part 1
    • Inventory Items-Part 2
    • Company Services
    • Assemblies and Prices
    • Purchase Orders
    • Receiving Inventory Shipping And Tracking
    • Inventory Count And Adjustments
    • Inventory Reports
    • Inventory Review

    Module 4: Employee

    • Employees And Payroll Overview
    • Employees And Users-Part 1
    • Employees And Users-Part 2
    • 1099’s
    • Payroll Setup
    • Time And Expense Tickets
    • Direct Deposit And Printing Payroll Checks
    • Forms And Void Checks
    • Employees Module Review

    Module 5: Banking

    • Banking Features Overview
    • Write Checks
    • Account Register
    • Analysis Tools-Part 1
    • Analysis Tools-Part 2
    • Chart Of Accounts
    • Receive Money And Bank Deposits-Part 1
    • Receive Money And Bank Deposits-Part 2
    • Enter Bills Pay Bills And Electronic Bill Pay
    • Reconcile Accounts
    • General Journal Entries
    • Void Checks And Reports
    • Banking Module Review

    Module 6: Maintenance

    • Automatic Backup
    • BackUp Data-Part 1
    • BackUp Data-Part 2
    • Automatic Backup
    • Restore Data
    • Data Maintenance
    • System Checks
    • Company Maintenance
    • Data Integrity
    • Maintenance Review

    Module 7: File Handling

    • Attaching Documents
    • Attaching And Managing Documents
    • File Handling Review

    Module 8: Manager

    • Analysis Managers
    • Cash Flow Manager-Part 1
    • Cash Flow Manager-Part 2
    • Cash Flow Manager-Part 3
    • Collection Manager
    • Payment Manager
    • Financial Manager
    • Manager Review

    Module 9: Jobs

    • MaintainingJobs
    • CreatingJobs-Part 1
    • Creating Jobs-Part 2
    • Managing Jobs
    • Jobs Review

    Module 10: Budgets

    • Maintain Budgets
    • Creating And Managing Budgets-Part 1
    • Creating And Managing Budgets-Part 2
    • Budgets Module Review

    Module 11: Charts of Accounts

    • Maintain Chart Of Accounts
    • Creating Accounts
    • Accounts List-Part 1
    • Accounts List-Part 2
    • Chart Of Accounts Review

    Module 12: Accounts Management

    • Maintain Customers And Prospects
    • Adding Customers And Prospects
    • Accounts Aging
    • Payment Methods
    • Managing A Customer Account
    • Accounts Management Review

    Module 13: Customer Setup

    • Customer Setup Guide
    • Customer Setup-Part 1
    • Customer Setup-Part 2
    • Customer Setup-Part 3
    • Customer Beginning Balance
    • Customer Account Defaults
    • Sales Tax
    • Statement And Invoice Defaults
    • Customer Setup Review

    Module 14: Jobs Setup

    • Jobs Setup Guide
    • Jobs Setup
    • Jobs Change Order
    • Job Ledger
    • Job Profitability Report-Part 1
    • Job Profitability Report-Part 2
    • Job Defaults
    • Jobs Beginning Balances
    • Jobs Setup Review

    Module 15: Vendor Setup

    • Vendors Setup Guide
    • Vendor Setup-Part 1
    • Vendor Setup-Part 2
    • Vendor Setup-Part 3
    • Vendor Setup-Part 4
    • Vendor Beginning Balances
    • Vendor Default
    • Vendor Setup Review

    Module 16: Inventory Setup

    • Inventory And Services Items Setup
    • Adding And Managing Inventory And Service Items-Part 1
    • Adding And Managing Inventory And Service Items-Part 2
    • Adding And Managing Inventory And Service Items-Part 3
    • Adding And Managing Inventory And Service Items-Part 4
    • Quantities On Hand
    • Inventory And Service Items Default Setup
    • Inventory Setup Review

    Module 17: Employee Setup

    • Employees Setup Guide
    • Employee Payroll Settings
    • Payroll Options Settings
    • Company Information Setting
    • Benefits Settings-Part 1
    • Benefits Settings-Part 2
    • Payroll Taxes And Place Order Settings
    • Employee Setup
    • Salary History Setup
    • Employees Default Setup
    • Employee Setup Review

    Module 18: Security Setup

    • Security Setup Guide
    • Setup Security
    • Set Up Users
    • User Security Setup
    • User List Rights And Permissions
    • Setup Guide Next Steps
    • Security Review

    Module 19: ACTI Link

    • Sage 50 ACT
    • Sage ACT Link
    • ACT Accounting Link Setup
    • Creating And Editing Contact Links-Part 1
    • Creating And Editing Contact Links-Part 2
    • Creating And Editing Contact Links-Part 3
    • Contact Link Updates Options
    • ACT! Link Review

    Module 20: Task Overview

    • Tasks Menu
    • Quotes Sales Orders And Proposals-Part 1
    • Quotes Sales Orders And Proposals-Part 2
    • Quotes Sales Orders And Proposals-Part 3
    • Sales Invoicing And Time Expenses
    • Shipments
    • Receipts
    • Finance Charges
    • Select For Deposit
    • Credit Memos
    • Select For Purchase Orders-Part 1
    • Select For Purchase Orders-Part 2
    • Bills And Payments-Part 1
    • Bills And Payments-Part 2
    • Account Register
    • Time And Expense
    • Select For Payroll Entry
    • General Journal Entry
    • Asemblies
    • Account Reconciliation And Void Checks
    • Write Letters And Action Items
    • System Tasks
    • Tasks Overview Review

    Module 21: Forms, Reports, and Recap

    • Reports And Forms
    • Form Types And Sample Forms-Part 1
    • Form Types And Sample Forms-Part 2
    • Form Types And Sample Forms-Part 3
    • Reports-Part 1
    • Reports-Part 2
    • Reports-Part 3
    • Reports-Part 4
    • Reports-Part 5
    • Services
    • Program Review
  • Module 1: Intro to SalesForce Automation
    • Course And Instructor Introduction
    • What Is Salesforce Automation
    • Sales Force Automation System Overview
    • Why Salesforce

    Module 2: Working With The SalesForce System

    • Creating Accounts And Contacts
    • Creating Leads And Opportunities
    • Sales Process-Part 1
    • Sales Process-Part 2
    • Sales Process-Part 3
    • Sales Process-Part 4
    • Leads Through Social Channels

    Module 3: SalesForce Solution

    • Core Problems
    • Managing Accounts
    • Badges And Campaigns
    • Custom Apps

    Module 4: SalesForce Admin

    • Introduction To RDBMS
    • Introduction To The Cloud
    • Introduction To Virtual Machines-Part1
    • Introduction To Virtual Machines-Part2
    • Salesforce Development
    • Introduction To Building In The Cloud
    • Salesforce Set Up

    Module 5: Migrating To SalesForce

    • Tasks To Complete Before Migration-Part 1
    • Tasks To Complete Before Migration-Part 2
    • Frequently Asked Questions-Part 1
    • Frequently Asked Questions-Part 2
    • Frequently Asked Questions-Part 3
    • Frequently Asked Questions-Part 4
    • Frequently Asked Questions-Part 5
    • Frequently Asked Questions-Part 6
    • Frequently Asked Questions-Part 7
    • Frequently Asked Questions-Part 8
    • Frequently Asked Questions-Part 9

    Module 6: Course Conclusion

    • The Salesforce Solution
    • Conclusion
  • Module 1: The Phone
    • Introduction
    • Buttons

    Module 2: The Screen

    • Gestures

    Module 3: The Keyboard

    • Keypad

    Module 4: Contacts

    • Contacts
    • Groups

    Module 5: Phone Calls

    • Phone
    • Call Customization

    Module 6: Messaging

    • Messages-Part 1
    • Messages – Part 2
    • Messages – Part 3
    • Messages – Part 4
    • Customizing Messages

    Module 7: Internet

    • Internet – Part 1
    • Internet – Part 2
    • Internet Settings

    Module 8: Email

    • Email-Part1
    • Email-Part 2
    • Setup Email

    Module 9: Music

    • Music

    Module 10: Android Specifics

    • Google Voice
    • Customization
    • Lock Screen
    • Stylus

    Module 11: Photos & Video

    • Camera-Part1
    • Camera-Part2
    • Taking Photos-Part1
    • Taking Photos-Part2
    • Editing Photos
    • Capturing Video

    Module 12: Conclusion

    • Wrap Up
  • Module 1: iPhone Basics
    • Iphone Intro
    • Iphone The Basics

    Module 2: The Screen

    • 2.1 The Screen Pt. 1
    • 2.2 The Screen Pt. 2
    • 2.3 The Screen Pt. 3
    • 2.4 The Screen Pt. 4

    Module 3: The Keyboard

    • Basic Keyboard
    • Advanced Keyboard

    Module 4: Basic Calls and Settings

    • Making A Call
    • Settings-Part 1
    • Settings-Part 2

    Module 5: Contacts

    • Contacts-Part 2
    • Contacts-Part 2

    Module 6: Phone Calls

    • Phone Calls-Part 1
    • Phone Calls-Part 2
    • Phone Calls-Part 3
    • Advanced Phone Calls

    Module 7: Messaging

    • Texting-Part 1
    • Texting-Part 2
    • Advanced Texting-Part 1
    • Advanced Texting-Part 2
    • Message Settings

    Module 8: Web

    • Web-Part 1
    • Web-Part 2
    • Web-Part 3

    Module 9: Email

    • Email-Part 1
    • Email-Part 2
    • Multiple Email Accounts
    • Email Settings

    Module 10: Siri

    • SIRI

    Module 11: Music

    • Music-Part 1
    • Music-Part 2

    Module 12: Photos and Video

    • Camera Functions
    • Photography Settings
    • Edit Photos
    • Share Photos
    • Video Functions

    Module 13: Maps

    • Apple Maps

    Module 14: Conclusion

    • Application Management
    • Misc-Part 1
    • Misc-Part 2
    • Conclusion
  • Aerobic Bootcamp
  • Baking Cupcakes
  • Chess
  • Cooking
  • Cooking with Children
  • DIY Home Improvement Basics
  • Harassment in the Workplace
  • HIPAA, Fraud, and Abuse
  • Holiday Baking
  • How to Become a Personal Trainer
  • How to Handle Stress in the Workplace
  • ICD 10 & 11 Medical Coding and Billing
  • Jewelry
  • Juicing and Blending
  • Managing Different Personality Types
  • Marketing Tools and Tips for Success
  • Massage Therapy
  • Mastering Bartending in a Week or Less
  • Mastering Beer Brewing
  • Mastering Makeup Application Techniques at Home
  • Medical Coding and Billing ICD 10
  • Medical Coding and Billing ICD-9
  • OSHA Training
  • Photography Basics
  • Special Effects (fx) Makeup Level 1
  • Special Effects (fx) Makeup Level 2
  • Starting Your Own YouTube Channel 101
  • The Key to Nutrition and Wellness
  • Ultimate Resume Building
  • Wedding Makeup and Hair
  • Weight Loss
  • Wine Making
  • Wine Pairing and Tasting
  • Yoga