Real Practice Labs
Try out your new skills as you learn! New lab releases are automatically added to your library. Personal login to your Ultimate Lab Library will be granted upon purchase.
AWS Cloud
- AWS Fundamentals (CLF-C01)
- AWS Security & Compliance Concepts (CLF-C01)
- AWS Security Services (CLF-C01)
- AWS Deployment Methods (CLF-C01)
- AWS Global Infrastructure (CLF-C01)
- AWS Computing Services (CLF-C01)
- AWS Storage Services (CLF-C01)
- AWS Networking Services (CLF-C01)
- AWS Database Services (CLF-C01)
- Introduction to AWS Cloud (CLF-C02)
- Identifying AWS Services (CLF-C02)
- AWS Monitoring and Logging Services (CLF-C02)
- AWS Identity and Access Management (CLF-C02)
- AWS Security Services (CLF-C02)
- AWS Deployment Models (CLF-C02)
- AWS Global Infrastructure (CLF-C02)
- AWS Computing Services (CLF-C02)
- AWS Database Services (CLF-C02)
- AWS Networking Services (CLF-C02)
- AWS Storage Services (CLF-C02)
- AWS Billing and Support Services (CLF-C02)
Microsoft Azure
- Cloud Essential Concepts (PLAB-AZ1)
- The Azure Platform (PLAB-AZ1)
- Azure Resource Groups (PLAB-AZ1)
- Azure Networking Concepts (PLAB-AZ1)
- Azure Virtual Machines (PLAB-AZ1)
- Management Tools (PLAB-AZ2)
- Monitoring Tools (PLAB-AZ2)
- The Azure Marketplace (PLAB-AZ2)
- Using Azure Key Vault (PLAB-AZ4)
- Admin Tools (PLAB-AZ4)
- Network Security (PLAB-AZ4)
Microsoft
- Configuring Desktop Settings (PLAB-BCM)
- Configuring Application and Tools (PLAB-BCM)
- Configuring Control Panel Options and Features (PLAB-BCM)
- Configuring File Explorer and Power Settings (PLAB-BCM)
- Configuring Antivirus Settings (PLAB-BCM)
- Managing Windows Update (PLAB-BCM)
- Configuring and Managing Hyper-V (PLAB-BCM)
- Configuring Disk Storage (PLAB-BCM)
- Configuring Encrypting File System (PLAB-BCM)
- Managing File System Permissions (PLAB-BCM)
- Managing Fixed Drives with BitLocker (PLAB-BCM)
- Configuring Shared Storage with iSCSI (PLAB-BCM)
- Configuring a Network Installation of Windows (PLAB-BCM)
- Managing System Maintenance Tools
- Managing Backup and Recovery—Part 1 (PLAB-BCM)
- Managing Backup and Recovery—Part 2 (PLAB-BCM)
- Create and Configure a Microsoft 365 Account (MD-102)
- Deploy a Windows Client Using Autopilot (MD-102)
- Configure Remote Management (MD-102)
- Manage Identities (MD-102)
- Implement Intune Compliance Policies (MD-102)
- Manage Device Lifecycle Using Intune (MD-102)
- Manage Device Configuration Using Intune (MD-102)
- Monitoring Devices Using Intune (MD-102)
- Managing Device Updates Using Intune (MD-102)
- Implement Endpoint Protection for Devices (MD-102)
- Deploy and Update Apps for Devices (MD-102)
- Implement App Protection and Configuration Policies (MD-102)
- Create and Configure a Microsoft 365 Account (MD-102)
- Deploy a Windows Client Using Autopilot (MD-102)
- Configure Remote Management (MD-102)
- Manage Identities (MD-102)
- Implement Intune Compliance Policies (MD-102)
- Manage Device Lifecycle Using Intune (MD-102)
- Manage Device Configuration Using Intune (MD-102)
- Monitoring Devices Using Intune (MD-102)
- Managing Device Updates Using Intune (MD-102)
- Implement Endpoint Protection for Devices (MD-102)
- Deploy and Update Apps for Devices (MD-102)
- Implement App Protection and Configuration Policies (MD-102)
- Worksheet and Workbook Navigation (MO-200)
- Formatting Worksheets and Workbooks (MO-200)
- Customizing the Quick Access Toolbar (MO-200)
- Importing Data from Text Files and Comma-Separated Value (CSV) Files (MO-200)
- Manipulating Data in Worksheets—Part 1 (MO-200)
- Manipulating Data in Worksheets—Part 2 (MO-200)
- Searching Data within a Workbook (MO-200)
- Working with Hyperlinks (MO-200)
- Working with Window Views (MO-200)
- Filtering Records (MO-200)
- Sorting Table Data (MO-200)
- Working with References (MO-200)
- Using Mathematical Functions (MO-200)
- Using COUNT Functions (MO-200)
- Using IF() Function (MO-200)
- Working with Text Functions (MO-200)
- Formatting Cells—Part 1 (MO-200)
- Formatting Cells—Part 2 (MO-200)
- Summarizing Data Visually (MO-200)
- Working with Excel Tables (MO-200)
- Formatting Excel Tables (MO-200)
- Creating Charts (MO-200)
- Modifying Charts (MO-200)
- Working with Sparklines and Chart Layouts and Styles (MO-200)
- Adding Alternative Text to Objects (MO-200)
- Inspecting Workbooks (MO-200)
- Modifying Workbook Properties and Display Formulas (MO-200)
- Saving Workbooks in Alternative File Formats (MO-200)
- Setting a Print Area (MO-200)
- Configure Print Settings (MO-200)
- Create and Manage Documents (77-725)
- Navigating Word (77-725)
- Format a Document (77-725)
- Customize Options and Views for Documents (77-725)
- Print and Save Documents (77-725)
- Insert Text and Paragraphs (77-725)
- Format Text and Paragraphs (77-725)
- Order and Group Text in Paragraphs (77-725)
- Creating Tables in a Document (77-725)
- Modifying Tables in a Document (77-725)
- Create and Modify a List (77-725)
- Create and Manage References (77-725)
- Insert and Use Content Building Blocks (77-725)
- Working with Graphic Elements (77-725)
- Format Graphic Elements (77-725)
- Insert and Format SmartArt Graphics (77-725)
- Embedding Excel into Word (77-725)
- Introduction to Building Blocks (77-725)
- Understanding Word Options (77-725)
- Working with Word Templates (77-725)
- Tracking and Reviewing Changes (77-725)
- Understanding Internal References (77-725)
- Working with Word Index Entries (77-725)
- Citing External Sources in Word Documents (77-725)
- Configuring Recipient Lists and Mail Merge (77-725)
- Working with Envelopes and Labels (77-725)
- Recording and Managing Macros (77-725)
- Working with Forms (77-725)
Cisco
- Performing Initial Device Configuration (200-125)
- Troubleshooting Methodologies (200-125)
- Configure, Verify, and Troubleshoot IPv4 Addressing and Subnetting (200-125)
- Configure Verify and Troubleshoot IPv6 Addressing (200-125)
- Configure and Verify Switching Concepts (200-125)
- Interface Configuration and Cabling (200-125)
- Configuring and Verifying VLANs (200-125)
- Configure, Verify, and Troubleshoot Interswitch Connectivity (200-125)
- Configure, Verify, and Troubleshoot Inter-VLAN Routing (200-125)
- Compare Static and Dynamic Routing (200-125)
- Configure and Verify DHCP and DNS (200-125)
- Configure and Verify Standard Access Lists (200-125)
- Configure and Verify NAT (200-125)
- Configure and Verify Device Management (200-125)
- Device Maintenance Procedures (200-125)
- Configure, Verify, and Troubleshoot Spanning Tree Protocols (200-125)
- Configure, Verify, and Troubleshoot STP Related Features (200-125)
- Configure, Verify, and Troubleshoot EtherChannel (200-125)
- Configure and Verify RIPv2 for IPv4 (200-125)
- Configure, Verify, and Troubleshoot Single Area OSPFv2 for IPv4 (200-125)
- Configure, Verify, and Troubleshoot Multi Area OSPFv2 for IPv4 (200-125)
- Configure, Verify, and Troubleshoot Single Area OSPFv3 for IPv6 (200-125)
- Configure, Verify, and Troubleshoot Multi Area OSPFv3 for IPv6 (200-125)
- Configure and Verify EIGRP for IPv4 (200-125)
- Configure and Verify EIGRP for IPv6 (200-125)
- Configure and Verify PPP on WAN Interfaces (200-125)
- Configure and Verify PPPoE Client-Side Interfaces (200-125)
- Troubleshoot Network Connectivity Issues Using ICMP Echo-Based IP SLA (200-125)
- Cisco IOS Troubleshooting Tools (200-125)
- Introduction to CISSP (ISC2-CISSP)
- Security and Risk Management (ISC2-CISSP)
- Encryption and Hashing (ISC2-CISSP)
- SCCM Configuration Items and Baselines (ISC2-CISSP)
- Implement OpenPGP (ISC2-CISSP)
- Two Factor Authentication with SSH (ISC2-CISSP)
- Implement SSL VPN using ASA Device Manager (ISC2-CISSP)
- Configure and Verify IPv4 and IPv6 Access Lists for Traffic Filtering (ISC2-CISSP)
- Configuring IPtables (ISC2-CISSP)
- Windows Command Line Tools (ISC2-CISSP)
- Administering and Deploying Endpoint Protection (ISC2-CISSP)
- BitLocker on Portable Media (ISC2-CISSP)
- Managing Remote Desktop (ISC2-CISSP)
- Manage Role-Based Security (ISC2-CISSP)
- Configuring MBSA Scanner (ISC2-CISSP)
- Compliance Patching (ISC2-CISSP)
- Passive Topology Discovery (ISC2-CISSP)
- Scanning and Remediating Vulnerabilities with OpenVAS (ISC2-CISSP)
- Installing Kali (ISC2-CISSP)
- Implement Backup and Recovery (ISC2-CISSP)
- Installation and Verification of Snort (ISC2-CISSP)
- Configuring and Securing IIS (ISC2-CISSP)
- Upgrading and Securing SSH Connection (ISC2-CISSP)
- DVWA – Manual SQL Injection and Password Cracking (ISC2-CISSP)
CompTIA
- Cloud Service Models
- Service Availability Concepts
- Introduction to Cloud Networking Concepts
- Cloud Storage Concepts
- Introduction to Virtualization
- Cloud Database Concepts
- Cloud Deployment Models (CV0-004)
- Code-based Cloud Deployment and Configuration
- Provisioning Cloud Resources (CV0-004)
- Configuring Logging in the Cloud
- Implementing Cloud Security Controls
- Implementing Cloud Backup Solutions
- Cloud Vulnerability Management
- Cloud Resource Access Management
- Cloud Security Best Practices
- Cloud Security Monitoring Techniques (CV0-004)
- Cloud DevOps Fundamentals
- System & Network Security Implementation Concepts (CS0-003)
- Threat Intelligence & Threat Gathering Concepts (CS0-003)
- Techniques to Determine Malicious Activity (CS0-003)
- Vulnerability Scanning Tools & Techniques (CS0-003)
- Identifying & Analyzing Malicious Activity (CS0-003)
- Tools for Identifying Malicious Activity (CS0-003)
- Attack Methodology Frameworks (CS0-003)
- Vulnerability Data Analysis and Prioritization (CS0-003)
- Incident Response Management Techniques (CS0-003)
- Incident Response Communication & Reporting (CS0-003)
- Vulnerability Reporting Concepts (CS0-003)
- Vulnerability Patching & Attack Surface Management (CS0-003)
- Managing Units of Measure—Disks, Network Throughput, and Processor (FC0-U71)
- Installation of Peripheral Devices (FC0-U71)
- Introduction to Virtualization and Cloud Technologies (FC0-U71)
- Basic Networking Concepts (FC0-U71)
- Filesystem Management and Operating System Utilities (FC0-U71)
- Compare Different Operating Systems and Functionalities (FC0-U71)
- Management of Business and Productivity Software (FC0-U71)
- Web Browser Configuration and Settings Part 1 (FC0-U71)
- Web Browser Configuration and Settings Part 2 (FC0-U71)
- Common Uses of Artificial Intelligence (FC0-U71)
- Software Programming Fundamentals (FC0-U71)
- Python Programming Fundamentals (FC0-U71)
- Introduction to Database Concepts (FC0-U71)
- Securing and Administering Databases (FC0-U71)
- Securing Workstations (FC0-U71)
- Implementing Password Policies (FC0-U71)
- Introduction to Encryption (FC0-U71)
- Introduction to Linux
- File and Directory Management in Linux
- Editing Files in Linux
- Access Control Utilities
- Linux Backup and File Compression Concepts
- Package Management and Updating Linux Devices
- Linux Identity Management
- Elevated User Privilege Management
- Remote Connectivity Management
- Managing Processes in Linux
- Managing & Configuring Linux System Services
- Storage Management Concepts
- Logical Volume Manager Commands
- Managing Linux Shared Storage
- Linux Scripting Techniques
- Container Creation & Management
- Versioning Control using GIT
- Configuring Networking in Linux
- Name Resolution Concepts & Tools
- Remote Access Tools
- Securing Linux Devices
- Configuring Linux Firewalls
- Certificate Configuration & Management
- Authentication Methods
- Introduction to the OSI Model (N10-009)
- Networking Appliances and Functionality (N10-009)
- Cloud Networking Concepts (N10-009)
- Networking Ports and Protocols (N10-009)
- Networking Topologies and Architecture (N10-009)
- IPv4 Network Addressing (N10-009)
- Software Defined Networking Concepts (N10-009)
- Routing Concepts (N10-009)
- Switching Concepts (N10-009)
- Network Monitoring Concepts (N10-009)
- Disaster Recovery Concepts (N10-009)
- Implementing IPv4 Network Services (N10-009)
- Network Access and Management (N10-009)
- Network Security Concepts (N10-009)
- General Network Attacks (N10-009)
- Network Hardening Techniques (N10-009)
- Network Troubleshooting Tools and Techniques (N10-009)
- Penetration Testing Information Gathering Techniques (PT0-003)
- Enumeration Tools and Techniques (PT0-003)
- Vulnerability Scanning Techniques (PT0-003)
- Conducting Network Attacks (PT0-003)
- Conducting Authentication Attacks (PT0-003)
- Conducting Host-Based Attacks (PT0-003)
- Conducting Web Application Attacks (PT0-003)
- Performing a Social Engineering Attack (PT0-003)
- Automating Attacks Using Scripts (PT0-003)
- Compromising a System and Maintaining Persistence (PT0-003)
- Penetration Testing Management Engagement (PT0-003)
- Security Concept Fundamentals
- Cryptographic Solutions
- Threat Vectors and Attack Surfaces
- Identifying Security Vulnerabilities
- Analyze Malicious Activity
- Security Architecture Models
- Securing Enterprise Infrastructures
- Data Protection Strategies
- Resilience in Security Architecture
- Securing Computing Resources
- Asset Management Techniques
- Vulnerability Management
- Monitoring Computing Resources
- Enhancing Enterprise Security
- Implement Identity & Access Management
- Implementation of Automation & Orchestration for Security Operations
- Investigative Data Sources
- Mitigation Techniques
- Operating System Types, Filesystems, and Lifecycle Compatibility (A+1202)
- Operating System Installations and Upgrades (A+1202)
- Windows Edition Features and Comparison (A+1202)
- Windows Graphical and Command-line Management Tools (A+1202)
- Windows Settings and Personalization (A+1202)
- Windows Security Controls (A+1202)
- Windows Networking Configuration (A+1202)
- macOS and Linux Desktop Features and Utilities (A+1202)
- Application and Cloud Service Deployment (A+1202)
- Windows Local Security Controls (A+1202)
- Windows Local Security Configuration (A+1202)
- Wireless Security Protocols and Authentication (A+1202)
- Malware Defense (A+1202)
- Social Engineering Attacks (A+1202)
- SOHO Malware Removal (A+1202)
- System Hardening (A+1202)
- Mobile Device Security Configuration (A+1202)
- Data Destruction and Disposal Methods (A+1202)
- SOHO Networking (A+1202)
- Browser Security Hardening (A+1202)
- Windows OS Troubleshooting (A+1202)
- Mobile OS and Application Troubleshooting (A+1202)
- Mobile Security Issue Troubleshooting (A+1202)
- Personal Computer Security Troubleshooting (A+1202)
- Documentation and Asset Management Best Practices (A+1202)
- Change Management Process Implementation (A+1202)
- Backup and Recovery Strategies (A+1202)
- Safety Procedures and Environmental Controls (A+1202)
- Policy, Licensing, and Privacy Compliance (A+1202)
- Scripting and AI (A+1202)
- Identifying Different Windows Operating Systems Editions
- Managing a Windows Device using the Command Line Interface
- Managing a Windows Device using the Graphical User Interface (GUI)
- Configuring a Windows Device using the Control Panel
- Configuring and Managing a Windows Device Using Settings
- Configuring Networking Settings on a Windows Device
- Install and Configure Applications on a Windows Device
- Identify Different Operating Systems and Functionality
- Different Operating System Installation Methods
- Tools for Managing and Maintaining Linux Operating Systems
- Implementing Physical Security Measures
- Implementing Network Security Measures
- Authentication and Authorization Methods
- Security Implementation on a Windows Device
- Password and Account Management on a Windows Device
- Mobile Security Solutions (A+)
- Secure Data Disposal Methods
- Securing a SOHO Network
- Securing Web Browsers on a Windows Device
- Malware Removal and Remediating Best Practices
- Documentation Best Practices
- Backup and Recovery Implementation
- Privacy, Licensing & Policy Concepts
- Basic Scripting Techniques
- Remote Access Methods
Cyber Security
- Understanding the Digital Forensics Profession and Investigations
- Data Acquisition
- Processing Crime and Incident Scenes
- Working with Windows and CLI Systems
- Current Digital Forensics Tools
- Linux and Macintosh File Systems
- Recovering Graphics Files
- Digital Forensics Analysis and Validation
- Virtual Machine Forensics, Live Acquisitions, and Network Forensics
- E-mail and Social Media Investigations
- Mobile Device Forensics
- Cloud Forensics
- Report Writing for High-Tech Investigations
- Expert Testimony in Digital Investigations
- Ethics for the Expert Witness
- Introduction to Data Security
- Configuring Endpoint Security
- Common Threats to a Wireless Network
- Configuring a Web Browser
- Email Security Concepts
- Securing Mobile Platforms
- Securing the Cloud
- Securing Network Connections
- Using Data Destruction and Disposal Methods (PLAB-CS-FUND)
- Configuring File System Security
- Administering User and Group Accounts
- Securing Windows
- Configuring and Running Windows Update
- Configuring Firewall on Windows
- Encryption
- Data Backup and Disaster Recovery
- Implementing Basic Disaster Prevention and Recovery Methods
- Managing System Maintenance Tools
- Social Networking Security
- Instant Messaging Security
- Introduction to AI in Ethical Hacking (CEHv13)
- Footprinting and Reconnaissance Techniques with AI (CEHv13)
- Network Reconnaissance Techniques with AI (CEHv13)
- Enumeration Reconnaissance Techniques with AI (CEHv13)
- Vulnerability Analysis Tools & Techniques with AI (CEHv13)
- System Hacking Methodologies with AI (CEHv13)
- Malware Threat Concepts with AI (CEHv13)
- Network Sniffing Techniques with AI (CEHv13)
- Social Engineering Techniques and Exploits with AI (CEHv13)
- Denial-of-Service Attacks w/AI (CEHv13)
- Session Hijacking Concepts with AI (CEHv13)
- Compromising Web Servers with AI (CEHv13)
- Web Application Hacking with AI (CEHv13)
- SQL Injection Methodologies with AI (CEHv13)
- Introduction to Cloud Computing with AI (CEHv13)
- Cryptography Techniques with AI (CEHv13)
Oracle
- Features of Oracle Database 12c (ORACLE-1Z0-061)
- Retrieving Data Using SQL Statements (ORACLE-1Z0-061)
- Restricting and Sorting Data (ORACLE-1Z0-061)
- Using Single Row Functions to Customize Output (ORACLE-1Z0-061)
- Conversion Functions and Conditional Expressions (ORACLE-1Z0-061)
- Reporting Aggregated Data Using Group Function (ORACLE-1Z0-061)
- Displaying Data from Multiple Tables Using JOIN (ORACLE-1Z0-061)
- Using Subqueries (ORACLE-1Z0-061)
- Managing Tables Using DML Statements (ORACLE-1Z0-061)
- Introduction to DDL Language (ORACLE-1Z0-061)
Python
- Working with Primitive Data Types (PLAB-PYTH)
- Working with Multiple Assignment Statements (PLAB-PYTH)
- Converting Types in Python (PLAB-PYTH)
- Creating Lists (PLAB-PYTH)
- Modifying Lists (PLAB-PYTH)
- Sorting and Reversing Lists (PLAB-PYTH)
- Slicing Lists (PLAB-PYTH)
- Working with Operators (PLAB-PYTH)
- Determining Operator Precedence (PLAB-PYTH)
- Working with If Statements (PLAB-PYTH)
- Using Compound Conditional Expressions (PLAB-PYTH)
- Working with For Loops (PLAB-PYTH)
- Working with While Loops (PLAB-PYTH)
- Nesting For Loops (PLAB-PYTH)
- Reading Files (PLAB-PYTH)
- Copying Files (PLAB-PYTH)
- Merging Mails (PLAB-PYTH)
- Reading Console Inputs and Formatting Outputs (PLAB-PYTH)
- Reading Command-Line Arguments (PLAB-PYTH)
- Defining Functions (PLAB-PYTH)
- Using Default Arguments (PLAB-PYTH)
- Using Keyword and Positional Arguments (PLAB-PYTH)
- Handling Exceptions (PLAB-PYTH)
- Using Math and Random Modules (PLAB-PYTH)
- Displaying Datetime, Working Directory, and File Metadata (PLAB-PYTH)
Networking
- Configuring Port Redirection
- Implementing NAT and Allowing Remote Access
- IPv4 vs IPv6 – Calculating, Configuring, and Testing
- Network Management
- Business Continuity – Disaster Recovery
- Breaking WEP and WPA and Decrypting the Traffic
- Closing Ports and Unnecessary Services
- Implementing Security Policies on Windows and Linux
- Network Security – Firewalls
- Network Troubleshooting
- TCP/IP Utilities
- The OSI Model
- TCP/IP Protocols – The Core Protocols
- TCP/IP Protocols – Other Key Protocols
- Types of Networks
- Remote Access – RDP
Simulations
- Replacing a Laptop SSD
- Replacing a Laptop Battery
- Replacing a Laptop Keyboard
- Setting up a Bluetooth Device
- Installing a Network TAP
- Connecting to Network-based Devices
- Configuring a Wi-Fi Network Connection
- Using Crimpers and Cable Testers
- Using Punch Down Tools
- Using Toner Probes
- CMOS Battery Replacement
- Verifying UEFI Settings
- Cooling a Desktop System
- Changing Inkjet Cartridges
- Installing a Desktop RAM Module
- Configuring RAID
- Installing a Desktop Expansion Card
- Setting up 2FA
- Synchronizing Microsoft 365
- Troubleshooting Network Connectivity
- Testing with a Loopback Plug
- Choosing Power Supply Units
- Configuring a Wi-Fi Network Router
- Configuring Computer Accessories – Webcam
- Inspecting Desktop Motherboards
- Replacing a Laptop RAM Module

