
Module 1: Installation
Module 2: Data Storag
Module 3: Data Recover
Module 4: Monitoring
Module 5: Security
Module 6: Maintenance
Module 1: What are Big Data Clusters?
Module 2: Big Data Cluster Architecture
Module 3: Deployment of Big Data Clusters
Module 4: Loading and Querying Data in Big Data Clusters
Module 5: Working with Spark in Big Data Clusters
Module 6: Machine Learning on Big Data Clusters
Module 7: Create and Consume Big Data Cluster Apps
Module 8: Maintenance of Big Data Clusters
Module 1 – Introduction to Business Intelligence and Data Modeling
Module 2 – Multidimensional Databases
Module 3 – Cubes and Dimensions
Module 4 – Measures and Measure Groups
Module 5 – Introduction to MDX
Module 6 – Customizing Cube Functionality
Module 7 – Tabular Data Models
Module 8 – Data Analysis Expressions (DAX)
Module 9 – Data Mining
Module 1 – Query Tools
Module 2 – Introduction to T-SQL Querying
Module 3 – Basic SELECT Queries
Module 4 – Querying Multiple Tables
Module 5 – Sorting and Filtering Data
Module 6 – Working with SQL Server Data Types
Module 7 – Using DML to Modify Data
Module 8 – Using Built-In Functions
Module 9 – Grouping and Aggregating Data
Module 10 – Using Subqueries
Module 11 – Using Table Expressions
Module 12 – Using Set Operators
Module 13 – Using Window Ranking, Offset, and Aggregate Functions
Module 14 – Pivoting and Grouping Sets
Module 15 – Implementing Error Handling
Module 16 – Managing Transactions
Module 1 – Query Tools
Module 2 – Introduction to T-SQL Querying
Module 3 – Basic SELECT Queries
Module 4 – Querying Multiple Tables
Module 5 – Sorting and Filtering Data
Module 6 – Introduction to Business Intelligence and Data Modeling
Module 7 – Prepare Data
Module 8 – Clean, Transform, and Load Data
Module 9 – Design a Data Model
Module 10 – Create Model Calculations using DAX
Module 11 – Create Reports
Module 12 – Create Dashboards
Module 13 – Create Paginated Reports
Module 14 – Perform Advanced Analytics
Module 15 – Create and Manage Workspaces
Module 16 – Create Power App Visuals
Module 17 – Analysis Services and Power BI
Module 1: Introduction
Module 2: Cloud Fundamentals
Module 3: Azure’s Architecture
Module 4: Compute
Module 5: Networking and CDN
Module 6: Storage
Module 7: Azure Solutions
Module 8: Administration
Module 9: Pricing and Service Level Agreements
Module 10: Exam Preparation
Module 11: Review Questions
Module 1: Implement VM Solutions
Module 2: Develop Azure Platform as a Service
Module 3: Develop for Azure Storage
Module 4: Implement Azure Security
Module 5: Monitor, Troubleshoot and Optimize Azure Solutions
Module 6: Connect to and Consume Azure and Third Party Services
Module 1 – Prepare Data
Module 2 – Clean, Transform, and Load Data
Module 3 – Design a Data Model
Module 4 – Create Model Calculations using DAX
Module 5 – Create Reports
Module 6 – Create Dashboards
Module 7 – Create Paginated Reports
Module 8 – Perform Advanced Analytics
Module 9 – Create and Manage Workspaces
Module 10 – Create Power App Visuals
Module 11 – Analysis Services and Power BI
Module 1 Understanding Local Area Networking
Module 2 Defining Networks with the OSI Model
Module 3 Understanding Wired and Wireless Networks
Module 4 Understanding Internet Protocol
Module 5 Implementing TCP-IP in the command line
Module 6 Working with Networking Services
Module 7 Understanding Wide Area Networks
Module 8 Defining Network Infrastructure and Security
Module 9 Key Takeaways
Module 10 Terms to Know
Module 1 Introducing Windows Server 2016
Module 2 Managing Windows Server 2016
Module 3 Managing Storage
Module 4 Monitoring and Troubleshooting Servers
Module 5 Essential Services
Module 6 Understanding File and Print Services
Module 7 Windows Network Services and Applications
Mod 8 Key Takeaways
Mod 9 Terms to Know
Mod 10 Hands on Labs
Module 1: Deploy a Microsoft Azure SQL Database
Module 2: Plan for SQL Server Installation
Module 3: Deploy SQL Server Instances
Module 4: Deploy SQL Server Databases to Azure Virtual Machines
Module 5: Configure Secure Access to Microsoft Azure SQL Databases
Module 6: Configure SQL Server performance settings
Module 7: Manage SQL Server instances
Module 8: Manage SQL Storage
Module 9: Perform Database Maintenance
Module 1: Configure Encryption
Module 2: Configure Data Access and Permissions
Module 3: Configure Auditing
Module 4: Develop a Backup Strategy
Module 5: Restore Databases
Module 6: Manage Database Integrity
Module 7: Monitor Database Activity
Module 8: Monitor Queries
Module 9: Manage Indexes
Module 10: Monitor SQL Server Instances
Module 11: Implement Log Shipping
Module 12: Implement Failover Cluster Instances
Module 13: Implement Always On Availability Groups
Module 1: Installing and Configuring Domain Controllers
Module 2: Managing AD DS Objects
Module 3: Securing Active Directory Domain Services
Module 4: Working with Complex AD Infrastructures
Module 5: Implementing Group Policy
Module 6: Understanding Microsoft Azure AD and Directory Synchronization
Module 7: Monitoring and Recovering AD DS
Module 8: Implementing Active Directory Certificate Services
Module 9: Implementing Active Directory Federation Services
Module 1: Plan and Implement IPv4 and IPv6 Networks
Module 2: Installing and Configuring DHCP
Module 3: Installing and Configuring DNS
Module 4: Implementing and Managing IP Address Management
Module 5: Implementing Remote Access
Module 6: Securing the Network Infrastructure
Module 1: Installing Windows Server 2016 in Host and Compute Environments
Module 2: Configuring Active Directory Networks for Host and Compute Environments
Module 3: Implementing Local and Enterprise Storage Solutions
Module 4: Implementing Hyper-V Virtualization and Containers
Module 5: Implementing High Availability
Module 6: Maintaining and Monitoring Windows Server 2016
Module 1 : Prepare for installation requirements
Module 2 : Install Windows
Module 3 : Configure devices and device drivers
Module 4 : Perform post-installation configuration
Module 5 : Implement Windows in an enterprise environment
Module 6 : Configure networking
Module 7 : Configure storage
Module 8 : Configure data access and usage
Module 9 : Implement Apps
Module 10 : Configure remote management
Module 11 : Configure Updates
Module 12 : Monitor Windows
Module 13 : Configure System and Data Recovery
Module 14 : Configure Authorization and Authentication
Module 15 : Configure Advanced Management Tools
Module 1: Introducing Windows 10
Module 2: Installing Windows 10
Module 3: Configuring Devices
Module 4: Configuring Network Connectivity
Module 5: Managing Storage, Data, And Printers
Module 6: Managing Apps
Module 7: Managing Device Security
Module 8: Maintaining Windows 10
Module 9: Troubleshooting And Recovery
Module 10: Deploying Windows 10 Enterprise Desktops
Module 11: Managing User Profiles And User State Virtualization
Module 12: Managing Desktop And Application Settings Using Group policy
Module 13: Configuring And Managing Client Hyper-V
Module 14: Configuring Windows Devices – December, 2017 Update – Part1
Module 15: Configuring Windows Devices – December, 2017 Update – Part2
Module 1: Introduction
Module 2: Troubleshooting Start Up Issues
Module 3: ​Managing Drivers And Hardware
Module 4: Troubleshooting Remote Computers
Module 5: Resolving Problems With Network Connectivity
Module 6: Troubleshooting Group Policy
Module 7: Troubleshooting User Settings
Module 8: Configuring And Troubleshooting Remote Connectivity
Module 9: ​Troubleshooting Resource Access In A Domain
Module 10: Configuring And Troubleshooting Resource Access For Non-Domain Members
Module 11: Troubleshooting Applications
Module 12: Maintaining Windows 8.1
Module 13: Recovering Windows 8.1
Lesson 1: Getting to Know PCs and the Windows 8 User Interface
Lesson 2: Using the Modern Apps and Navigation Features
Lesson 3: Working with Desktop Applications
Lesson 4: Using Internet Explorer 10
Lesson 5: Customizing the Windows 8 Environment
Lesson 6: Using Windows 8 Security Features
Module 1: Developing a Strategy for Windows® 7 Business Desktops Deployment
Module 2: Evaluating Application Compatibility in Windows® 7
Module 3: Assessing Deployment Methods for Windows® 7
Module 4: Designing Standard Images for Windows® 7
Module 5: Deploying Windows® 7 with Windows AIK
Module 6: Using Windows Deployment Services to Deploy Windows® 7
Module 7: Deploying Windows® 7 Using Lite Touch Installation
Module 8: Deploying Windows® 7 Using Zero Touch Installation
Module 9: Migrating User State Using USMT 4.0 and WET
Module 10: Planning, Configuring, and Managing the Client Environment
Module 11: Planning and Deploying Applications and Updates to Windows® 7 Clients
Module 1: Installing, Upgrading, and Migrating to Windows 7
Module 2: Configuring Disks And Device Drivers
Module 3: Configuring File Access And Printers
Module 4: Indentifying And Resolving Log on Problems
Module 5: Configuring Network Connectivity
Module 6: Troubleshooting Network Issues
Module 7: Mobile Computing And Remote Access
Module 8: Securing Windows 7 Desktops
Module 9: Optimizing And Troubleshooting Performance And Reliabilty
Module 10: Maintaining Windows 7 Desktops
Module 1: Installing, Upgrading and Migrating Windows 7
Module 2: Deploying Windows 7 in the Enterprise
Module 3: Enterprise Management in Windows 7
Module 4: Configuring Hardware and Applications
Module 5: Configuring Network Connectivity
Module 6: Configuring Access to Resources
Module 7: Configuring Mobile Computing
Module 8: Configuring Security Options
Module 9: Monitoring And Maintaining Systems
Module 10: Configuring Backup and Recovery Options
Module 1: Planning Server Deployment
Module 2: Automating Server Deployment
Module 3: Planning for Server Management
Module 4: Planning the Network Infrastructure
Module 5: Planning Name Resolution Services
Module 6: Planning File and Print Services
Module 7: Planning Active Directory Domain Services
Module 8: Planning Active Directory Certificate Services
Module 9: Planning High Availability
Module 10: Planning Backups For Windows Server
Module 11: Planning Server Monitoring and Maintenance
Module 1: Installing and Configuring Windows Services
Module 2: TCP/IP Protocol Suite
Module 3: Configuring IPv4 Addressing
Module 4: Configuring IP Address Assignment Services
Module 5: Configuring IPv6 Addressing
Module 6: Configuring Name Resolution Services
Module 1: Active Directory – An Identity And Access Solution
Module 2: Introduction To Active Directory Domain Services
Module 3: Configuring DNS To Support Active Directory Domain Services
Module 4: Active Directory Object Management
Module 5: Managing Active Directory Replication Using Sites
Module 6: Configuration Management Using Group Policy
Module 7: Desktop Environmental And Security Management
Module 8: Maintaining Active Directory
Module 9: Deploy and Manage a Public Key Infrastructure
Module 10: Supporting Applications with AD LDS
Module 11: Deploying Active Directory Federated Services
Module 12: Deploying Active Directory Rights Management Services
Module 1: Introduction To Creating Efficient Apps For Sharepoint
Module 2: Working With Managed Metadata Solutions
Module 3: Working With The Search Service
Module 4: Implementing Enterprise Content Management
Module 5: Developing Publishing Sites
Module 6: Interacting With Business Connectivity Services
Module 1: Overview of SharePoint Development
Module 2: Working With Objects, List, And Libraries
Module 3: Working With Features and Solutions
Module 4: Developing Server Side Code
Module 5: Managing Authentication And Authorization
Module 6: Client Side SharePoint Development
Module 7: Developing And Managing Apps
Module 8: Using Workflows To Automate Business Processes
Module 9: Customizing SharePoint Interfaces
Module 1: Accessing Data
Module 2: Designing And Implementing WCF Services
Module 3: Querying And Manipulating Data Using Entity Framework
Module 4: Creating And Consuming Web API Based Services
Module 5: Deploying Web Applications And Services
Module 6: Course Review
Module 1: Intro To Business Intelligence
Module 2: Database Essentials
Module 3: Business Intelligence Development
Module 4: Business Intelligence Results
Module 5: Advanced Reporting And Development
Module 6: SQL Server Integration Services (SSIS)
Module 7: SQL Server 2014 New Features
Module 8: Course Review And Exam Prep
Module 1: Introduction To Business Intelligence And Data Modeling
Module 2: Implementing Reports The SQL Server Reporting Services
Module 3: Supporting Self Service Reporting
Module 4: Managing Report Execution And Delivery
Module 5: Creating Multidimensional Databases
Module 6: Working With Cubes And Dimensions
Module 7: Working With Measures And Measure Groups
Module 8: Introduction To MDX
Module 9: Customizing Cube Functionality
Module 10: Implementing A Tabular Data Model
Module 11: Introduction To DAX
Module 12: Implementing An Analysis Services Tabular Data Model
Module 13: SQL Analysis Services
Module 14: Creating Data Visualizations With Power View
Module 15: Supporting Self Service Reporting
Module 16: Performing Predictive Analysis With Data Mining
Module 17: Predictive Analytics
Module 1: Designing A Database Server Infrastructure
Module 2: Designing A Logical Database Scheme
Module 3: Designing A Physical Database Implementation
Module 4: Incorporating Data Files Into the Database
Module 5: Tuning Database Performance
Module 6: Designing Database Security
Module 7: Policy Based Management
Module 8: Monitoring Server Health
Module 9: Designing Database Backup Solution
Module 10: Automating Multi Server Maintenance
Module 11: Managing SQL Server With Windows Powershell
Module 12: Replicating Data
Module 13: Planning High Availability
Module 14: Review of SQL Statements
Module 15: Eleven Rules of Database Design
Module 1: SQL 2012 And The 464 Test
Module 2: Working With Data Types
Module 3: Tables
Module 4: Data Constraints
Module 5: Planning In Indexing
Module 6: Table Structures
Module 7: Improving Performance with Non-Clustered Indexes
Module 8: Using Indexes And Execution Plans
Module 9: Working with Views
Module 10: Designing and Implementing Stored Procedures
Module 11: Merging Data and Passing Tables
Module 12: Designing and Implementing User Functions
Module 13: Creating Highly Concurrent SQL Server Applications
Module 14: Handling Errors in T-SQL
Module 15: Triggers
Module 16: Implementing Managed Code
Module 17: Storing XML in SQL
Module 18: Querying XML
Module 19: Working with the Spatial Data
Module 20: Working With Full-Text Indexes and Queries
Lesson 1: Introduction to Data Warehouse
Lesson 2: Creating Dimensions and Changing Granularity of Dimensions
Lesson 3: Creating Fact Tables and Column Store Indexes
Lesson 4: Implementing Data Warehouse in SQL Server 2012
Lesson 5: Working with Integration Services
Lesson 6: Managing Control Flow
Lesson 7: Working with Dynamic Variables
Lesson 8: Implementing Data Flow
Lesson 9: Managing Data Flow
Lesson 10: Managing SSIS Package Execution
Lesson 11: Debugging and Troubleshooting
Lesson 12: Deploying Packages
Lesson 13: Securing Packages and Databases
Lesson 14: Working with MDS and Windows
Lesson 1: Identifying the SQL Server Platform
Lesson 2: Deploying SQL Server
Lesson 3: Configuring SQL Server
Lesson 4: Managing Databases in SQL Server 2012
Lesson 5: Managing SQL Server Security
Lesson 6: Implementing Advanced Security Settings
Lesson 7: Applying Encryption and Compression
Lesson 8: Working with Indexes and Log Files
Lesson 9: Working with Backup and Restore
Lesson 10: Implementing High Availability
Lesson 11: Optimizing Server Performance
Lesson 12: Troubleshooting Issues and Recovering Databases
Lesson 13: Performing Advanced Database Management Tasks
Lesson 1: Getting Started with SQL Server 2012
Lesson 2: Working with T-SQL
Lesson 3: Writing SELECT Queries
Lesson 4: Working with SQL Data Types
Lesson 5: Sorting and Filtering Data
Lesson 6: Querying Data from Multiple Tables
Lesson 7: Modifying Data
Lesson 8: Working with SQL Server Built-in Functions
Lesson 9: Programming in T-SQL
Lesson 10: Implementing Stored Procedures
Lesson 11: Working with Sub queries and Table Expressions
Lesson 12: Working with Set Operators, Conditional Operators, and Window Functions
Lesson 13: Working with PIVOT, UNPIVOT, and Grouping Sets
Lesson 14: Managing Error Handling and Transactions
Lesson 15: Querying SQL Server System
Lesson 16: Optimizing Query Performance
Module 1: SSIS Packages
Module 2: Debugging and Error Handling in SSIS
Module 3: Deploying and Configuring SSIS Packages
Module 4: Securing and Executing SSIS Packages; Service Administration
Module 5: Data Analysis
Module 6: Extending SSAS Cubes
Module 7: Extending SSAS Cubes
Module 8: Securing and Administering SSAS
Module 9: Working With SSAS Data Mining
Module 10: Developing SSAS Reports
Module 11: Extending and Deploying SSRS Reports
Module 12: Scheduling Deployed Reports and Data Sources
Module 13: Configuring And Administering the SSRS Server
Installing on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
Getting familiar with SQL on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
Types of Data on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
Databases on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
Looking at Tables on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
Module 6: Looking at Views
Module 7: About Constraints
Module 8: Looking at Stored Procedures
Module 9: Functions
Modules 10: About Service Broker
Modules 11: Integrity
Modules 12: Permissions in SQL
Modules 13: Accounts
Modules 14: Security
Modules 15: Backups/Restores
Modules 16: Endpoints
Modules 17: Servers working together
Modules 18: Triggers in SQL
Modules 19: Replication between servers
Modules 20: Indexes
Modules 21: Transactions in SQL
Modules 22: Data moves
Modules 23: Data specialties in SQL
Modules 24: Fault Tolerance
Modules 25: SQL Management
Modules 26: SQL Management Monitoring
Modules 27: SQL Management tools
Module 28: Troubleshooting
Module 29: Course Review
Module 30: Common Questions
Module 31: Real World Scenarios
Module 1: Manage and Maintain a Server Infrastructure
Module 2: Plan and Implement a Highly Available Enterprise Infrastructure
Module 3: Plan and Implement a Server Virtualization Infrastructure
Module 4: Design and Implement Identity and Access Solutions
Module 1: Plan and Deploy Infrastructure
Module 2: Planning and Implementing
Module 3: Planning and Implementing Server Upgrade and Migration
Module 4: Planning and Deploying Virtual Machine Manager Resources
Module 5: Planning and Implementing File and Storage Services
Module 6: Design and Implement Network Infrastructure Services
Module 7: Design and Maintain a Dynamic Host Configuration Protocol Solution
Module 8: Design a Name Resolution Solution Strategy
Module 9: Design and Manage an IP Address Management Solution
Module 10: Design and Implement Network Access Services
Module 11: Design a VPN Solution
Module 12: Design a DirectAccess Solution
Module 13: Implement a Scalable Remote Access Solution
Module 14: Design and Implement a Network Protection Solution
Module 15: Design and Implement an Active Directory Infrastructure
Module 16: Design a Forest and Domain Infrastructure
Module 17: Implement a Forest and Domain Infrastructure
Module 18: Design a Group Policy Strategy
Module 19: Design an Active Directory Permission Model
Module 20: Design and Implement an Active Directory Infrastructure (Physical)
Module 21: Design an Active Directory Site Topology
Module 22: Design an Active Directory Site Topology
Module 23: Design and Implement a Branch Office Infrastructure
Module 1: Configuring Advanced DNS Services
Module 2: Advanced DHCP Services
Module 3: Active Directory Forest Configuration
Module 4: Active Directory Certificate Services
Module 5: ISCSI And ISNS
Module 6: Configuring IPAM
Module 7: Network Balancing
Module 8: Failover Clusters
Module 9: Configuring Hyper_V Virtual Machines
Module 10: Dynamic Access Control
Module 11: Active Directory Rights Management Services
Module 12: Active Directory Federation Services
Module 13: Disaster Recovery
Module 14: Configuring Additional Services
Module 1: Managing User and Service Accounts
Module 2: Administer Group Policy
Module 3: Managing Network File Services
Module 4: Domain Name System
Module 5: Windows Deployment Services
Module 6: Windows Server Update Services
Module 7: Remote Access
Module 8: Monitoring System
Module 9: Managing Active Directory Services
Module 1: Installing And Configuring Windows Server 2012 R2
Module 2: Installing and Configuring an Active Directory Domaine Control
Module 3: Administering Active Directory Objects
Module 4: Automating Administration Tasks
Module 5: Configuring IPv4
Module 6: Configuring IPv6
Module 7: Installing and Configuring DHCP
Module 8: Installing and Configuring DNS
Module 9: Configuring Storage Spaces And File And Print Services
Module 10: Configuring Group Policy
Module 11: Securing Windows Servers
Module 12: Installing and Configuring Virtual Servers and Clients
Module 1: Understanding Microsoft Applications
Module 2: Installing And Configuring The Hyper-V Role
Module 3: Creating And Managing Virtual Hard Disks, Virtual Machines, And Virtual
Module 4: Producing And Configuring Virtual Machine Networks
Module 5: Virtual Machine Movement And Hyper-V Replicas
Module 6: Implementing Failover Clustering Using Hyper-V
Module 7: Installing And Configuring Microsoft System Center 2012 R2 Virtual
Module 8: Managing The Network And Storage Infrastructure In Microsoft System
Module 9: Creating And Managing Virtual Machines Using Microsoft System Center 2012 R2Virtual Machine Manager
Module 10: Configuring And Managing The Microsoft System Center 2012 R2 Virtual Machine Manager Library
Module 11: Managing Clouds In Microsoft System Center 2012 R2 Virtual Machine
Module 12: Managing Services In Microsoft System Center 2012 R2 Virtual
Module 13: Protecting And Monitoring Virtualization Infrastructure
Module 14: Hyper-V And SCVMM Review
Module 1: Technology Review
Module 2: Device Management
Module 3: Office 365 Deployment Plan
Module 4: Windows Azure
Module 5: PowerShell
Module 6: SQL Server
Module 7: Azure Lync and SharePoint
Module 8: Course Review
Module 1: Introduction To Office 365
Module 2: Administration In Office 365
Module 3: Managing Clients
Module 4: Planning DNS And Exchange Migrations
Module 5: Planning And Configuring Exchange Online
Module 6: Configuring Sharepoint Online
Module 7: Configuring Lync Online
Module 8: Implementing Coexistence Technologies
Module 1: Overview
Module 2: Beginning Powershell
Module 3: Exhange Control Panel
Module 4: Create A New Mailbox with Powershell
Module 5: Mailbox Statistics With Powershell
Module 6: Intermediate Powershell
Module 7: Unified Messaging
Module 8: Installation and Configuration
Module 9: Exchange Online
Module 10: Advanced Design
Module 1: Overview
Module 2: Exchange Server 2013 Administration
Module 3: Fundamentals of Exchange Administration
Module 4: Archive Mailboxes
Module 5: Properties of User Mailboxes
Module 6: Distribution Groups
Module 7: Outlook and Outlook Web Apps
Module 8: Preparation Prerequisites
Module 9: Installation of Exchange 2013
Module 10: Exchange 2013 Design
Module 11: Labs and Demos
Module 1: Handling Design And Architecture For Microsoft Lync Server 2013
Module 2: Designing A Lync Server 2013
Module 3: Installing Lync
Module 4 Questions
Module 5: Deploying And Managing Clients And Devices
Module 6: Conferencing In Lync Server 2013
Module 7: Designing And Deploying External Access
Module 8: Deploying Microsoft Lync Server 2013 Persistant Chat
Module 9: Archiving And Monitoring
Module 10: Administering And Maintaining Lync Server 2013
Module 11: Configuring And Managing High Availability In Lync Server 2013
Module 12: Understanding Disaster Recover In Lync Server 2013
Module 13: Planning a Migration to Lync Server 2013
Module 1: Understanding Voice Architecture
Module 2: Configuring Key Enterprise Voice Functionality
Module 3: Designing Exchange Server 2013 Unified Messaging Intergration with
Module 4: Understanding Voice Applications
Module 5: Configuring and Deploying Emergency Calling
Module 6: Integrating the PSTN
Module 7: Understanding Lync Server 2013 and Networking
Module 8: Understanding Phones and Devices
Module 9: Configuring And Migrating Lync Online
Module 10: Monitoring
Module 11: Understanding Lync Server2013 Voice Resiliency
Module 1: Business Continuity
Module 2: Model, Design, and Test
Module 3: Upgrade and Migrate
Module 4: Create and Configure Service Applications
Module 5: SharePoint Management
Module 1: Comprehensive Introduction to Sharepoint
Module 2: Installing SharePoint
Module 3: SharePoint Architecture, Logical & Physical
Module 4: Web Applications and Site Collections
Module 5: Configure Service Applications
Module 6: Permissions
Module 7: Search
Module 8: User Profiles
Module 9: Ongoing Support and Maintenance
Module 1: Designing For The Cloud
Module 2: Using System Center Virtual Machine Manager R2
Module 3: Deploying And Maintaining Fabric Resources
Module 4: Building The Private Cloud
Module 5: Monitoring And Optimizing The Private Cloud
Module 6: Planning And Deploying Service Management
Module 7: Automating And Standardizing The Private Cloud
Module 8: Disaster Recovery And High Availability For The Private Cloud
Module 9: Implementing SelfService MultiTenant Private Clouds
Module 1: Introducing The Cloud Model
Module 2: Configuring The Private Cloud Environment
Module 3: Deploying Services For The Private Cloud
Module 4: Monitoring Cloud Based Applications
Module 5: Service Management For The New Cloud
Module 6: High Availability And Disaster Recovery For The Private Cloud
Module 7: Optimizing The Private Cloud Infrastructure
Module 8: Configuring MultiTenant SelfService Using Windows Azure Pack
Module 9: Configuring And Monitoring The Private Cloud Review
Module 1: Planning Configuration Manager Infrastructure
Module 2: Migrating To Configuration Manager 2012
Module 3: Installations and Site Role Configuration
Module 4: Cloud Integration
Module 5: Installing The Client
Module 6: Client Health
Module 7: Application Deployment
Module 8: Software Updates
Module 9: Operating System Deployment
Module 10: Inventory and Software Metering
Module 11: Asset Intelligence
Module 12: Reporting
Module 13: Compliance Settings
Module 14: Endpoint Protection
Module 15: Mobile Device Management
Module 16: Role-Based Administration
Module 17: Disaster Recovery
Module 18: Troubleshooting
Module 1: Getting Started With Windows 10
Module 2: Using File Explorer
Module 3: Using Windows Applications
Module 4: Browsing the Web With Microsoft Edge
Module 5: Customizing Windows
Module 6: Connecting Devices And Devices
Module 7: Managing User Accounts
Module 8: Backing Up Important Data
Module 9: Maintaining Windows
Module 10: Protecting Windows
Module 11: Monitoring Performance
Module 12: Working With Control Panel And Settings
Module 1: Introduction and Deploy Windows
Module 2: Manage Devices and Data
Module 3: Configure Connectivity
Module 4: Maintain Windows
Module 1: Introduction and Deploy Windows
Module 2: Manage Devices and Data
Module 3: Configure Connectivity
Module 4: Maintain Windows
Lesson 1: Getting to Know PCs and the Windows 8 User Interface
Lesson 2: Using the Modern Apps and Navigation Features
Lesson 3: Working with Desktop Applications
Lesson 4: Using Internet Explorer 10
Lesson 5: Customizing the Windows 8 Environment
Lesson 6: Using Windows 8 Security Features

Module 1: Getting Started
Module 2: Getting to Know Adobe Audition
Module 3: The Interface
Module 4: Waveform Editing
Module 5: Effects
Module 6: Audio Restoration
Module 7: Mastering
Module 8: Sound Design
Module 9: Creating and Recording Files
Module 10: Multitrack Sessions
Module 11: Multitrack Session Editing
Module 12: Additional Features and Summary
Module 1: Introduction to After Effects
Module 2: Intermediate Effects and Techniques in After Effects
Module 3: More Advanced Effects and Techniques in After Effects
Module 1: Getting Started
Module 2: Getting to Know the Workflow
Module 3: Creating a Basic Animation Using Effects and Presets
Module 4: Animating Text
Module 5: Working With Shape Layers
Module 6: Animating a Multimedia Presentation
Module 7: Animating Photoshop Layers
Module 8: Working With Masks
Module 9: Distorting Objects with the Puppet Tools
Module 10: Using the Roto Brush Tool
Module 11: Performing Color Correction
Module 12: Creating Motion Graphics Templates
Module 1
Module 1
Module 1
Module 1
Module 2
Module 3
Module 4
Module 5
Module 6
Module 7
Module 8
Module 9
Module 10
Module 11
Module 1: Welcome
Module 2: Why use Lightroom
Module 3: Lightroom library and organization
Module 4: Edit your photo – global adjustments
Module 5: Edit your photo – local adjustments
Module 6: Saving and exporting
Module 7: Lightroom CC overview
Module 8: Outro
Module 1
Module 1: Introduction to Premiere and Getting Started on an Editing Project
Module 2: More Editing Techniques and Completing a Project
Module 1
Module 1: Intro
Module 2: Camera Anatomy
Module 3: Scene Camera Modes
Module 4: Achieve Exposure
Module 5: Filetypes
Module 6: Sensor
Module 7: Resolution
Module 8: White Balance
Module 9: Color Theory
Module 10: Depth of Field
Module 11: Focusing
Module 12: Lighting
Module 13: Metering
Module 14: Composition
Module 1: Introduction
Module 2: Getting Started
Module 3: Drawing
Module 4: Colors and Gradients
Module 5: Intermediate Illustration
Module 6: Typography
Module 7: Live Trace, Paint Brush and Blob Brush
Module 8: Exporting
Module 1: Getting Started
Module 2: Layers and More
Module 3: Editing, Techniques and More

Module 1: Introduction to Google Analytics
Module 2: Fundamentals of Google Analytics
Module 3: Basics of Google Anayltics
Module 4: Reports in Google Analytics
Module 5: Behavioral Reports
Module 6: Audience
Module 7: Conversions
Module 1: Course Overview
Module 2: DevOps Basics
Module 3: App Engine PaaS
Module 4: Kubenetes Engine Overview
Module 5: DevOps Developer Tools
Module 6: Microservices
Module 7: Management of your DevOps Services
Module 8: Resources and Closeout

Module 1: Introduction to CSS3
Module 2: Understanding The CSS Box Model
Module 3: Working With Page Layouts
Module 4: Using Colors And Backgrounds
Module 5: Web Typography
Module 6: Links, Lists, And Tables
Module 7: Dynamic CSS3 Properties
Module 1: What Is HTML?
Module 2: The Structure And Components
Module 3: Formatting The Page
Module 4: Structuring Content
Module 5: Adding Links, Images And Other Media
Module 6: Styling Web Pages
Module 7: Creating Your Own Website
Module 1: Introduction to CSS3
Module 2: Understanding The CSS Box Model
Module 3: Working With Page Layouts
Module 4: Using Colors And Backgrounds
Module 5: Web Typography
Module 6: Links, Lists, And Tables
Module 7: Dynamic CSS3 Properties
Module 1: What Is HTML?
Module 2: The Structure And Components
Module 3: Formatting The Page
Module 4: Structuring Content
Module 5: Adding Links, Images And Other Media
Module 6: Styling Web Pages
Module 7: Creating Your Own Website
Module 1: Getting Started with Python
Module 2: Working with Primitive Data Types
Module 3: Working with Multiple Assignments Statements
Module 4: Convert Types in Python
Module 5: Creating Lists
Module 6: Modifying Lists
Module 7: Sorting and Reversing Lists
Module 8: Slicing Lists
Module 9: Working With Operators
Module 10: Determining Operator Precedence
Module 11: Working with IF Statements
Module 12: Working With For Loops
Module 13: Working With While Loops
Module 14: Nesting for Loops
Module 15: Reading Files
Module 16: More on Files
Module 17: Merging Emails
Module 18: Reading Console Inputs and Formatting Outputs
Module 19: Reading Command Line Argument
Module 20: Defining Functions
Module 21: Using Default Argument
Module 22: Using Keyword and Positional Arguments
Module 23: Handling Exceptions
Module 24: Using Math and Random Modules
Module 25: Displaying Daytime Working Directory and File Metadata
Module 1: Introduction to Web Development
Module 2: C Sharp
Module 3: HTML and CSS Comprehensive Review
Module 4: Intro to SQL Server
Module 5: Java Script A Comprehensive Introduction
Module 6: Object Based Java Script
Module 7: Model View and Controller
Module 8: A Comprehensive Introduction to jQuery
Module 9: Course Review

Module 1: Organization – Wide Planning and Deployment
Module 2: Leadership
Module 3: Organizational Process Measures and Management
Module 4: Team Management
Module 5: Define Phase – Overview of the Define Phase and the Voice of the Customer
Module 6: Define Phase – Business Case and Project Charter
Module 7: Define Phase – Analytical Tools
Module 8: Measure Phase – Process Analysis and Documentation
Module 9: Measure Phase – Data Collection
Module 10: Measure Phase – Measurement Systems
Module 11: Measure Phase – Basic Statistics
Module 12: Measure Phase – Probability
Module 13: Measure Phase – Process Capability
Module 14: Analyze Phase – Measuring and Modeling Relationships
Module 15: Analyze Phase – Hypothesis Testing
Module 16: Analyze Phase – FEMA and Additional Analysis Methods
Module 17: Improve Phase – Design of Experiments (DOE)
Module 18: Improve Phase – Lean Method
Module 19: Improve Phase - Implementation
Module 20: Control Phase – Statistical Process Control (SPC)
Module 21: Control Phase – Other Controls
Module 22: Control Phase – Maintain Controls and Sustain Improvements
Module 23: DFSS
Module 24: Exam Review – Prep and Key Concepts
Module 1: Six Sigma And The Organization
Module 2: Define Phase Project Identification
Module 3: Define PhaseVoice Of The Customer
Module 4: Define Phase Project Management Basics on Six Sigma Green Belt
Module 5: Define PhaseManagement And Planning Tools
Module 6: Define PhaseBusiness Results For Projects
Module 7: Define PhaseTeam Dynamics And Define Phase Summary Review Questions
Module 8: Measure PhaseProcess Analysis And Documentation
Module 9: Measure PhaseProbability And Statistics
Module 10: Measure PhaseStatistical Distributions
Module 11: Measure PhaseCollecting And Summarizing Data
Module 12: Measure PhaseMeasurements System Analysis (MSA)
Module 13: Measure PhaseProcess And Performance Capability And Measure Phase Summary And Review
Module 14: Analyze PhaseExploratory Data Analysis And Hypothesis Testing
Module 15: Analyze Phase Process Drivers
Module 16: Improve PhaseDesign Of Experiment (DOE)
Module 17: Improve PhaseRoot Cause Analysis
Module 18: Improve PhaseLean Tools
Module 19: Control Phase Statistical Process Control
Module 20: Control PhaseLean Tools For Process Control
Module 21: Review ExamPrep And Key Concepts

Module 1: Virtual Box
Module 2: Basic Commands
Module 3: Special Characters
Module 4: File Editing
Module 5: File System Structure
Module 6: Finding Files
Module 7: Shell Special Characters
Module 8: Regular Expressions
Module 9: Process Management
Module 10: Job Scheduling
Module 11: Customizing Your Account
Module 12: Unix Printing
Module 13: Networking
Module 14: X Windows
Module 15: Back Up And Compression
Module 16: Text Utility
Module 17: Shell Scripting
Module 18: System Administration Basics

Module 1: Introduction To Application Virtualization
Module 2: XenApp Server Setup
Module 3: Plan For High Availability
Module 4: Scripting Primer
Module 5: Using VMware vSphere
Module 6: Virtualization Using Microsoft Hyper-V
Module 7: Course Review
Module 1: Introduction To Virtualization
Module 2: Introduction To Desktop Virtualization
Module 3: XenDesktop 7.6 Requirements and Implementations
Module 4: Plan and Design XenDesktop Infrastructure
Module 5: Data And Network Redundancy
Module 6: Automating Using Powershell
Module 7: Virtualizing Using Hyper-V
Module 8: Build Test And Deploy VM To Xen Desktop
Module 9: Internet Information Services
Module 10: Course Review
Module 1: Intro To XenServer And Virtualization
Module 2: Comprehensive Introduction To Linux
Module 3: Hosts, Storage, And Networking
Module 4: Comprehensive Introduction To Powershell
Module 5: XenServer Components And Features
Module 6: Problem Resolution
Module 7: Review

- Introduction
- Business Entities
- Beginning Your Business
- Financial Basics Part 1
- Financial Basics Part 2
- Employees Payroll
- Getting Your Business Out There
- SEO
- Other Topics
- Closing
Module 1: Setup and Maintenance
Module 2: List Management
Module 3: Sales (Money-In)
Module 4: Purchased (Money-Out)
Module 5: Accounting
Module 6: Reports
Module 7: Customizations and Time Savers
Module 8: Extra
Module 1: Creating and Setting Up Your Point of Sale Company File
Module 2: Installing your System
Module 3: Navigating and Customizing the Home Page
Module 4: Company Preferences
Module 5: Financial- Setting up QuickBooks Connection
Module 6: Setting up Sales Tax
Module 7: Workstation Preferences
Module 8: Additional Features
Module 9: Employees and Security
Module 10: Customers
Module 11: Rewards Program
Module 12: Vendors
Module 13: Setting Up Your Inventory
Module 14: Item Styles, Assemblies, and Group
Module 15: Working with Inventory
Module 16: Sales
Module 17: Working with Price Levels and Discounts
Module 18: Collecting Sales Tax
Module 19: Adding Shipping Information (Pro/MS)
Module 20: Tracking Sales Commissions
Module 21: Taking Payment and Giving Change
Module 22: Recording Tips
Module 23: Handling Tricky Sales Returns
Module 24: Working with Sales Orders, Work Orders, and Layaways
Module 25: Purchasing Merchandise
Module 26: Receiving from a PO
Module 27: Managing Inventory
Module 28: Reporting
Module 29: QuickBooks Financial
Module 30: Multi-Store
Module 31: Protect your data
Module 32: Adding Third Party Applications
Module 1: Intro and Setup
Module 2: Tools
Module 3: Preferences
Module 4: Security & Users
Module 5: Estimates
Module 6: Sales Orders
Module 7: Receiving Money
Module 8: Bounced Checks
Module 9: Specific Tracking
Module 10: Receiving and Depositing
Module 11: Credit Cards and Bank Accounts
Module 12: Payroll
Module 13: Transactions
Module 14: Accounts and Reports
Module 15: Integrating with Word
Module 16: Data Types
Module 17: Conclusion
Module 1: Sage 50 2013
Module 2: Sage 50 Basics
Module 3: Inventory
Module 4: Employee
Module 5: Banking
Module 6: Maintenance
Module 7: File Handling
Module 8: Manager
Module 9: Jobs
Module 10: Budgets
Module 11: Charts of Accounts
Module 12: Accounts Management
Module 13: Customer Setup
Module 14: Jobs Setup
Module 15: Vendor Setup
Module 16: Inventory Setup
Module 17: Employee Setup
Module 18: Security Setup
Module 19: ACTI Link
Module 20: Task Overview
Module 21: Forms, Reports, and Recap
Module 1: Intro to SalesForce Automation
Module 2: Working With The SalesForce System
Module 3: SalesForce Solution
Module 4: SalesForce Admin
Module 5: Migrating To SalesForce
Module 6: Course Conclusion
Module 1: The Phone
Module 2: The Screen
Module 3: The Keyboard
Module 4: Contacts
Module 5: Phone Calls
Module 6: Messaging
Module 7: Internet
Module 8: Email
Module 9: Music
Module 10: Android Specifics
Module 11: Photos & Video
Module 12: Conclusion
Module 1: iPhone Basics
Module 2: The Screen
Module 3: The Keyboard
Module 4: Basic Calls and Settings
Module 5: Contacts
Module 6: Phone Calls
Module 7: Messaging
Module 8: Web
Module 9: Email
Module 10: Siri
Module 11: Music
Module 12: Photos and Video
Module 13: Maps
Module 14: Conclusion

- Aerobic Bootcamp
- Baking Cupcakes
- Chess
- Cooking
- Cooking with Children
- DIY Home Improvement Basics
- Harassment in the Workplace
- HIPAA, Fraud, and Abuse
- Holiday Baking
- How to Become a Personal Trainer
- How to Handle Stress in the Workplace
- ICD 10 & 11 Medical Coding and Billing
- Jewelry
- Juicing and Blending
- Managing Different Personality Types
- Marketing Tools and Tips for Success
- Massage Therapy
- Mastering Bartending in a Week or Less
- Mastering Beer Brewing
- Mastering Makeup Application Techniques at Home
- Medical Coding and Billing ICD 10
- Medical Coding and Billing ICD-9
- OSHA Training
- Photography Basics
- Special Effects (fx) Makeup Level 1
- Special Effects (fx) Makeup Level 2
- Starting Your Own YouTube Channel 101
- The Key to Nutrition and Wellness
- Ultimate Resume Building
- Wedding Makeup and Hair
- Weight Loss
- Wine Making
- Wine Pairing and Tasting
- Yoga

Module 1: Exploring the Functions of Networking
Module 2: Introducing the Host-To-Host Communications Model
Module 3: Introducing LANs
Module 4: Exploring the TCP/IP Link Layer
Module 5: Subnetting
Module 6: Explaining the TCP/IP Transport Layer and Application Layer
Module 7: Exploring the Functions of Routing
Module 8: Exploring the Packet Delivery Process
Module 9: Troubleshooting a Simple Network
Module 10: Introducing Basic IPv6
Module 11: Configuring Static Routing
Module 12: Implementing VLANs and Trunks
Module 13: Routing Between VLANs
Module 14: Introducing OSPF
Module 15: Building Redundant Switched Topologies
Module 16: Improving Redundant Switched Topologies with Ether Channel
Module 17: Exploring Layer 3 Redundancy
Module 18: Introducing WAN Technologies
Module 19: Explaining Basics of ACL
Module 20: Enabling Internet Connectivity
Module 21: Introducing QoS
Module 22: Introducing Architectures and Virtualization
Module 23: Introducing System Monitoring
Module 24: Managing Cisco Devices
Module 25: Examining the Security Threat Landscape
Module 26: Implementing Threat Defense Technologies
Module 27: Exam Preparation
Module 28: Practice Demos
Module 1: Architecture
Module 2: Virtualization
Module 3: Infrastructure
Module 4: Network Assurance
Module 5: Security
Module 6: Automation
Module 1: Networking Fundamentals
Module 2: Basic Ethernet LAN Implementation
Module 3: Designing Ethernet LANS
Module 4: Understanding IPv4
Module 5: Working With Cisco Routers
Module 6: IPv4 Design And Troubleshooting
Module 7: IPv4 Services
Module 8: Implementing IPv6
Module 1: Configuring Ethernet LANs
Module 2: Configuring IPv4 Routing Protocols
Module 3: Wide Area Networks
Module 4: IPv4 Services
Module 5: IPv4 Routing And Troubleshooting
Module 6: IPv6 Routing
Module 7: Cloud Based Networking
Module 1: Wireless Basics
Module 2: Wireless Standards
Module 3: Wireless Signals
Module 4: Antennas
Module 5: Topologies
Module 6: Frame Types
Module 7: Planning Coverage
Module 8: Architectures
Module 9: Stand Alone And Cloud Deployments
Module 10: Controller Based Deployment
Module 11: Controller Discovery
Module 12: Roaming
Module 13: Radio Resource Management
Module 14: Wireless Security
Module 15: WLAN Configuration
Module 16: Guest Networks
Module 17: Client Connectivity
Module 18: Managing Wireless
Module 19: Interference
Module 20: Troubleshooting
Module 1: Introducing Cisco Collaboration Architecture
Module 2: Telephony And Call Routing
Module 3: Preparing The Network And Phone Behavior
Module 4: CUCM Administration Interfaces
Module 5: Call Configuration
Module 1: Pre-Course Chapter 1
Module 2: Pre-Course Chapter 2
Module 3: Cisco Video And Content Delivery
Module 4: Cisco Video Surveillance
Module 5: Cisco Collaboration
Module 6: Central Collaboration Endpoint Control
Module 7: Unified IP Phones, Desk Endpoints And Cisco Jabber
Module 8: Configuring Unified IP Phones And Cisco Jabber
Module 9: Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber
Module 10: Cisco Telepresence Endpoints Installation And Characteristics
Module 11: Configuring Cisco Telepresence CTS And Cisco DX650 Endpoint
Module 12: Configuring Cisco Telepresence TC Endpoints
Module 13: Operating And Troubleshooting Cisco Telepresence Endpoints
Module 14: Cisco Multipoint Conferencing Solutions
Module 15: Configuring And Monitoring Cisco Multipoint
Module 16: Cisco DMP Characteristics And Installation
Module 17: Configuring Cisco DMPs
Module 18: Managing Cisco Edge 340 DMPs
Module 19: Labs
Module 1: Network Review
Module 2: Terminology And Fundamentals
Module 3: PKI And Cryptography
Module 4: AAA
Module 5: Bring Your Own Device
Module 6: Secure Access
Module 7: VPNs
Module 8: Secure Routing And Switching
Module 9: Firewalls
Module 10: Intrusion Protection System (IPS)
Module 11: Content And Endpoint Security
Module 1: Plan And Design
Module 2: EIGRP Enhanced Interior Gateway Routing Protocol
Module 3: IPv6
Module 4: OSPF
Module 5: Border Gateway Protocol BGP
Module 6: Course Review
Module 1: Plan And Design
Module 2: Switch Configuration
Module 3: IP Configuration
Module 4: STP And RTP
Module 5: Routing
Module 6: HSRP, VRRP, GLBP
Module 7: Course Review
Module 1: Introduction to Cisco Troubleshooting
Module 2: Troubleshooting Switches
Module 3: Troubleshooting VLANS and Trunking
Module 4: Troubleshooting Spanning Tree Protocol, EtherChannel
Module 5: Troubleshooting InterVLAN Routing and Layer 3 EtherChannel
Module 6: Troubleshooting Switch Security Features
Module 7: Troubleshooting FirstHop Redundancy Protocols
Module 8: Troubleshooting IPv4 and IPv4 Addressing
Module 9: IPv6 Addressing and Addressing Technologies
Module 10: Troubleshooting IPv4 and IPv6 ACLs and Prefix Lists
Module 11: Troubleshooting GRE and Basic Routing Tunnels
Module 12: Troubleshooting RIPv2 and RIPng
Module 13: Troubleshooting EIGRP
Module 14: OSPF and OSPFv3
Module 15: Troubleshooting Route Maps and Policy Based Routing
Module 16: Troubleshooting Redistribution
Module 17: Troubleshooting BGP
Module 18: Troubleshooting Management Protocols and Tools
Module 19: Troubleshooting Management Access
Module 1: Introduction
Module 2: Telephony
Module 3: Basic Call Routing
Module 4: VOIP Call Routing
Module 5: CUCME Call Routing Basics
Module 6: Preparing Network For Voice
Module 7: IP Phone Behavior
Module 8: CUCME Administration Basics
Module 9: CUCME StandUp
Module 10: CUCME StandUp Part 2
Module 11: CUCME StandUp CUCME
Module 12: End Users and End User Interfaces
Module 13: Endpoint Implementation
Module 14: Call Coverage
Module 15: Calling Restrictions and Routing
Module 16: CUCME Advance Call Coverage
Module 17: Implementing Unity Connection
Module 1: Methodologies Used To Design A Network
Module 2: Network Structure And Modularity
Module 3: Basic Enterprise Campus Networks
Module 4: Enterprise Edge And Remote Network Modules
Module 5: IP Addressing And Routing Protocols
Module 6: Enterprise Switching I
Module 7: Enterprise Switching II
Module 8: Subnetting
Module 9: Designing Advanced Services

Chapter 1: Course Introduction and Methodology
Chapter 2: Virtualization Overview
Chapter 3: Planning and Installing ESXi
Chapter 4: Using tools to Administer a VMware Environment
Chapter 5: vCenter and Licensing
Chapter 6: Configuring Networking
Chapter 7: Configuring Storage
Chapter 8: VM Creation, Configuration, and Snapshots
Chapter 9: Security and Permissions
Chapter 10: Host and VM Monitoring
Chapter 11: Advanced ESXi and vCenter Server Management
Chapter 12: Patching and Upgrading ESXi
Chapter 13: Disaster Recovery and Backup
Module 1: VM And VMWARE
Module 2: Working With ESX And ESXI
Module 3: Configuring Virtual Machines
Module 4: Vcenter Server
Module 5: VM Storage Option
Module 6: Managing A Virtual World
Module 7: Migrations, High Availability And VM Utilities
Blockchain
Module 1: Certified Blockchain Developer Hyperledger Overview
Module 2: Hyperledger Framework
Module 3: Hyperledger Fabric Blockchain
Module 4: Access Controls and Secure Chaincode
Module 5: Plan and Prepare Apps for Deployment
Module 6: Hyperledger Fabric Explorer
Module 7: Chaincode and Development
Module 8: Course Wrap Up
Module 1: Certified Blockchain Developer Hyperledger Overview
Module 2: Hyperledger Framework
Module 3: Hyperledger Fabric Blockchain
Module 4: Access Controls and Secure Chaincode
Module 5: Plan and Prepare Apps for Deployment
Module 6: Hyperledger Fabric Explorer
Module 7: Chaincode and Development
Module 8: Course Wrap Up
Module 1: Course Overview
Module 2: Pre-Sales Activities
Module 3: Blockchain Fundamentals
Module 4: Enterprise Blockchains
Module 5: Use Cases
Module 6: Course Closeout

Module 1 – Mobile Devices
Module 2 – Networking
Module 3 – Hardware
Module 4 – Virtualization and Cloud Computing
Module 5 – Hardware and Network Troubleshooting
Module 1 – Operating Systems
Module 2 – Security
Module 3 – Software Troubleshooting
Module 4 – Operational Procedures
Module 1 – Risk Management
Module 2 – Enterprise Security Architecture
Module 3 – Enterprise Security Operations
Module 4 – Technical Integration of Enterprise Security
Module 5 – Research, Development and Collaboration
Domain 1 – Characteristics of Cloud Services from a Business Perspect
Domain 2 – Cloud Computing and Business Value
Domain 3 – Technical Perspectives/Cloud Types
Domain 4 – Steps to Successful Adoption of Cloud
Domain 5 – Impact and Changes of Cloud Computing on IT Service Management
Domain 6 – Risks and Consequences of Cloud Computing
Module 1: Threat Management
Module 2: Vulnerability Management
Module 3: Cyber Incident Response
Module 4: Security Architecture and Tool Sets
Module 1: Threat and Vulnerability Management
Module 2: Software and Systems Security
Module 3: Security Operations and Monitoring
Module 4: Incident Response
Module 5: Compliance and Assessment
Module 6: Afterword
Module 1 – IT Concepts and Terminology
Module 2 – Infrastructure
Module 3 – Applications and Software
Module 4 – Software Development
Module 5 – Database Fundamentals
Module 6 – Security
Module 1: Intro & Performing Basic Linux Tasks
Module 2: Managing Users and Groups
Module 3: Managing Permissions and Ownership
Module 4: Managing Storage
Module 5: Managing Files and Directories
Module 6: Managing Kernel Modules
Module 7: Managing the Linux Boot Process
Module 8: Managing System Components
Module 9: Managing Devices
Module 10: Managing Networking
Module 11: Managing Packages and Software
Module 12: Securing Linux Systems
Module 13: Working with Bash Scripts
Module 14: Automating Tasks
Module 15: Installing Linux
Module 1: Instructions
Module 2: Managing Software
Module 3: Configuring Hardware
Module 4: Managing Files
Module 5: Booting Files
Module 6: X
Module 7: Admin
Module 8: Basic Networking
Module 9: Scripts
Module 10: Security
Module 1: Over-The-Air Technologies
Module 2: Network Infrastructure
Module 3: Mobile Device Manager
Module 4: Security
Module 5: Troubleshooting
Module 1 – Networking Concepts
Module 2 – Infrastructure
Module 3 – Network Operation
Module 4 – Network Security
Module 5 – Network Troubleshooting and Tools
Module 1 – The Pen Test Engagement
Module 2 – Passive Reconnaissance
Module 3 – Active Reconnaissance
Module 4 – Physical Security
Module 5 – Social Engineering
Module 6 – Vulnerability Scan Analysis
Module 7 – Password Cracking
Module 8 – Penetrating Wired Networks
Module 9 – Penetrating Wireless Networks
Module 10 – Windows Exploits
Module 11 – Linux Exploits
Module 12 – Mobile Devices
Module 13 – Specialized Systems
Module 14 – Scripts
Module 15 – Application Testing
Module 16 – Web App Exploits
Module 17 – Lateral Movement
Module 18 – Persistence
Module 19 – Cover Your Tracks
Module 20 – The Report
Module 21 – Post Engagement Cleanup
Module 1: Information Security Roles Security Control and Framework Types
Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources
Module 3: Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing
Module 4: Social Engineering, Indicators of Malware Attacks
Module 5: Cryptography
Module 6: Certificates and PKI
Module 7: Authentication
Module 8: Identity and Accounts, Authorization, Personnel Polices
Module 9: Network Design and Hardware (Part 1)
Module 10: Network Hardware (Part 2)
Module 11: Network Protocols
Module 12: Endpoint Security
Module 13: Mobile Devices
Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation
Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualization
Module 16: Privacy and Data Protection
Module 17: Incident Response
Module 18: Forensics
Module 19: Risk Management and Business Impact Analysis
Module 20: Redundancy and Backup Strategies
Module 21: Physical Security
Module 22: Afterword
Module 1: Threats, Attacks and Vulnerabilities
Module 2: Technologies and Tools
Module 3: Architecture and Design
Module 4: Identity and Access Management
Module 5: Risk Management
Module 6: Cryptography and PKI

Module 1: Course Overview
Module 2: Kubernetes and Container Fundamentals
Module 3: Configuration
Module 4: Multi Container Pods
Module 5: Observability
Module 6: Pod Design
Module 7: Services and Networking
Module 8: State Persistence
Module 9: CKA Practice Exams
Module 10: Course Closeout
Module 1: Course Overview
Module 2: Kubernetes and Container Fundamentals
Module 3: Kubernetes Installation
Module 4: Working with Kubernetes Clusters and Nodes
Module 5: API Access and Commands
Module 6: Running Pods and DeploymentsModule 7: Configuring Storage
Module 8: Kubernetes Networking
Module 9: Managing Security
Module 10: Managing Kubernetes In the Enterprise
Module 11: Kubernetes Monitoring and Troubleshooting
Module 12: CKA Practice Exams
Module 13: Course Closeout
Module 1: Course Overview
Module 2: Basics of Kubernetes
Module 3: Kubernetes Design and Architecture
Module 4: Deployments
Module 5: Course Closeout

Module 1: Course Overview
Module 2: The Basics
Module 3: Development
Module 4: Infrastructure
Module 5: Key Performance Indicators (KPIs)
Module 6: Course Closeout

Module 1: Introduction to AWS Basics
Module 2: AWS Web Services and Cloud Platform Services
Module 3: AWS Basic Summary
Module 4: Introduction to AWS Deep Dive
Module 5: AWS Management of Services and Features Deep Dive
Module 6: AWS Deep Dive Summary
Module 1: Introduction to Cloud Computing
Module 2: Identity and Access Management IAM
Module 3: Elastic Cloud Computing EC2
Module 4: EC2 Storage
Module 5: Elastic Load Balancer and Auto Scaling Group ELB and ESG
Module 6: Amazon S3
Module 7: Database and Analytics
Module 8: Other Services
Module 9: Scaling Your Infrastructure
Module 10: Global Applications
Module 11: Cloud Integration
Module 12: Cloud Monitoring
Module 13: Virtual Private Network
Module 14: Security and Compliance
Module 15: Machine Learning
Module 16: Advanced Identity
Module 17: Are You Well Architected?
Module 18: Congratulations & Exam Preparation

Module 1: Introduction
Module 2: Information Security Governance
Module 3: Information Security Risk Management
Module 4: InfoSec Prog Development and Management
Module 5: Information Security Incident Management
Module 6: Exam Prep
Domain 1: Information Security Governance
Domain 2: Risk Management
Domain 3: Information Security Program
Domain 4: Information Security Program Implementation
Domain 5: Information Security Program Management
Domain 6: Incident Management and Response
Cloud Concepts, Architecture and Design
Legal, Risk and Compliance
Cloud Data Security
Cloud Platform and Infrastructure Security
Cloud Application Security
Cloud Security Operations
Module 1 – Introduction to Ethical Hacking
Module 2 – Footprinting and Reconnaissance
Module 3 – Network Scanning
Module 4 – Enumeration
Module 5 – Vulnerability Analysis
Module 6 – Malware Threats
Module 7 – Sniffing
Module 8 – Social Engineering
Module 9 – Denial of Service
Module 10 – Session Hijacking
Module 11 – Hacking Webservers
Module 12 – Hacking Web Applications
Module 13 – SQL Injection
Module 14 – Hacking Wireless Networks
Module 15 – System Hacking
Module 16 – Hacking Mobile Platforms
Module 17 – Evading IDS, Firewalls, and Honeypots
Module 18 – Cryptography
Module 19 – Cloud Computing
Module 20 – IoT Hacking
Module 1: Security and Risk Management
Module 2: Asset Security
Module 3: Security Engineering
Module 4: Communication and Network Security
Module 5: Identity and Access Management
Module 6: Security Assessment Testing
Module 7: Security Operations
Module 8: Software Development Security
Module 1: Security and Risk Management
Module 2: Asset Security
Module 3: Security Architecture and Engineering
Module 4: Communication and Network Security
Module 5: Identity and Access Management (IAM)
Module 6: Security Assessment and Testing
Module 7: Security Operations
Module 8: Software Development Security
Module 1: Computer Forensics Introduction
Module 2: Forensics Investigation Process
Module 3: Searching and Seizing
Module 4: Digital Evidence
Module 5: First Responder Procedures
Module 6: Forensics Lab
Module 7: Hard Disks and File Systems
Module 8: Windows Forensics
Module 9: Data Acquisition and Duplication
Module 10: Recovering Deleted Files and Partitions
Module 11: Using Access Data FTK
Module 12: Using EnCase
Module 13: Steganography
Module 14: Password Crackers
Module 15: Log Correlation
Module 16: Network Forensics
Module 17: Wireless Attacks
Module 18: Web Attacks
Module 19: Email Crimes
Module 20: Mobile Investigation
Module 21: Investigative Reports
Module 22: Expert Witness
Module 1: Cyber Security Awareness and Prevention
Module 2: Managing Mobile Device Security
Module 1: Data Breaches And ID Theft
Module 2: Device Security Basics
Module 3: Avoiding Inadvertent Disclosure
Module 4: Physical And Technical Safeguards

Module 1: What Is Agile
Module 2: Projects And Projects Management In An Agile World
Module 3: Agile and Scrum
Module 4: Common Scrum Terminology
Module 5: Other Iterative Methods
Module 6: Communication Skills In Agile World
Module 7: Using Agile Outside Software Development
Module 8: Case Studies Of Transitioning to Agile
Module 9: Critique Of Agile
Module 10: Review Of Agile
Module 1 : Agile Principles and Mindset
Module 2 : Value Driven Delivery
Module 3 : Stakeholder Engagement
Module 4 : Team Performance
Module 5 : Adaptive Planning
Module 6 : Problem Detection and Resolution
Module 7 : Continuous Improvement

Module 1: Architecture
Module 2: Governance and Enterprise Risk
Module 3: Legal Issues- Contracts and Electronic
Module 4: Compliance and Audit Management
Module 5: Information Management and Data Security
Module 6: Interoperability and Portability
Module 7: Traditional Security, Business Continuity, and Disaster Recovery
Module 8: Data Center Operations
Module 9: Incident Response
Module 10: Application Security
Module 11: Encryption and Key Management
Module 12: Identity, Entitlement, and Access Management
Module 13: Virtualization
Module 14: Security as a Service
Module 1: The principles of CC
Module 2: Implementing and Managing CC
Module 3: Using the Cloud
Module 4: Security and Compliance
Module 5: Evaluation of CC

Module 1: Foundations (Beginner)
Module 2: Terms and Tools (Beginner)
Module 3: Identifiers, Variables, and Data Types (Beginner)
Module 4: Object-Orientated Programming (Intermediate)
Module 5: Predefined Classes (Intermediate)
Module 6: Methods Part 1 (Intermediate)
Module 7: Methods Part 2 (Advanced)
Module 8: Constructors (Advanced)
Module 9: Control of Flow (Advanced)
Module 10: Arrays and Exceptions (Advanced)
Module 1: Introduction To Javascript
Module 2: Core Concepts And Syntax
Module 3: Getting A Handle On The DOM
Module 4: Working With Libraries

Module 1: The ITIL Qualification Scheme
Module 2: Introduction to Service Management
Module 3: ITIL and the Service Lifecycle
Module 4: Service Strategy
Module 5: Service Design
Module 6: Service Transition
Module 7: Service Operation
Module 8: Continual Service Improvement
Module 9: Service Management Technology
Module 10: How it all Fits Together
Module 11: Bonus Material
Module 1: Service Operation Introduction
Module 2: Service Management As a Practice
Module 3: Service Operation Principles
Module 4: Service Operation Process
Module 5: Common Service Operation Activities
Module 6: Organizing For Service Operation
Module 7: Technology Considerations
Module 8: Service Operation

Module 1: Introduction To Oracle 12c SQL Fundamentals
Module 2: Retrieving Data
Module 3: SQL Functions
Module 4: Subqueries
Module 5: Data Manipulation Language
Module 6: Data Control Language
Module 7: Data Definition Language
Module 8: Combining Queries
Module 9: Oracle 12C SQL Fundamentals Review
Module 1: Database Concepts And Tools
Module 2: Memory Structure
Module 3: Tables
Module 4: Indexes
Module 5: Constraints And Triggers
Module 6: Users
Module 7: Internal Structures
Module 8: Starting Up and Shutting Down Database
Module 9: Critical Storage Files
Module 10: Data Manipulation Language
Module 11: Data Concurrency
Module 12: BackUp And Recovery
Module 13: Installation
Module 14: Course Review
Module 1: Database Admininstration
Module 2: Oracle Architecture
Module 3: Database Schema
Module 4: Recovery Manager
Module 5: Introduction to SQL
Module 6: Filtering and Sorting Data
Module 7: Functions
Module 8: SET Operators and Subqueries
Module 9: Regular Expressions and SQL Loader

Module 1: What Is Microsoft 365
Module 2: Word Online
Module 3: Excel Online
Module 4: Powerpoint Online
Module 5: Outlook Online
Module 6: One Note Online
Basic Microsoft PowerPoint 2016
Intermediate Microsoft PowerPoint 2016
Advanced Microsoft PowerPoint 2016

Module 1: Preparing for and Taking the Exam
Module 2: Process Domain
Module 3: People Domain
Module 4: Business Environment Domain
Module 1 : Getting Certified to take the Examination
Module 2 : Techniques for Preparing for and Taking the Examination
Module 3 : Project Management Framework
Module 4 : Project Integration Management
Module 5 : Project Scope Management
Module 6 : Project Schedule Management
Module 7 : Project Cost Management
Module 8 : Project Quality Management
Module 9 : Project Resource Management
Module 10 : Project Communications Management
Module 11 : Project Risk Management
Module 12 : Project Procurement Management
Module 13 : Project Stakeholder Management
Module 1: Introduction
Module 2: Risk Management Concepts
Module 3: Risk Management Environment
Module 4: Project Definition
Module 5: Risk Management Planning
Module 6: Risk Identification
Module 7: Qualitative Risk Analysis
Module 8: Quantitative Risk Analysis
Module 9: Risk Response Planning
Module 10: Risk Monitoring And Controlling
Module 1: Risk Management Fundamentals
Module 2: Test Requirements
Module 3: Test Domains
Module 4: Risk Strategy and Planning
Module 5: Stakeholder Engagement
Module 6: Risk Process Facilitation
Module 7: Risk Monitoring and Reporting
Module 8: Specialized Risk Analyses
Module 9: RMP Recap
Module 10: RMP Review Questions
Module 1 : Getting Certified to take the Examination
Module 2 : Project Management Framework
Module 3 : Project Integration Management
Module 4 : Project Scope Management
Module 5 : Project Schedule Management
Module 6 : Project Cost Management
Module 7 : Project Quality Management
Module 8 : Project Resource Management
Module 9 : Project Communications Management
Module 10 : Project Risk Management
Module 11 : Project Procurement Management
Module 12 : Project Stakeholder Management
Module 13 : Review

Module 1: Development Methods
Module 2: Agile Manifesto Principles
Module 3: Scrum
Module 4: Why Scrum
Module 5: Scrum-Roles Overview
Module 6: Product Owner
Module 7: Scrum Master
Module 8: Scrum Team
Module 9: Scrum Process
Module 10: Scrum Project Phase
Module 11: Plan and Estimate
Module 12: Implement
Module 13: Review and Retrospect
Module 14: Release
Module 15: Project Vision
Module 16: Scrum Master and Stake Holder(s)
Module 17: Form Scrum Team
Module 18: Develop Epics
Module 19: User Stories
Module 20: Justifications and Sample Change(s)
Module 21: Creating a Prioritized Backlog
Module 22: Conduct Release Planning
Module 23: Sprints
Module 24: Scrum Framework
Module 25: Scrum of Scrums
Module 26: Scrum Demo
Module 27: Review
Module 1: Development Methods
Module 2: Agile Manifesto Principles
Module 3: Scrum
Module 4: Why Scrum
Module 5: Scrum-Roles Overview
Module 6: Product Owner
Module 7: Scrum Master
Module 8: Scrum Team
Module 9: Scrum Process
Module 10: Scrum Project Phase
Module 11: Plan and Estimate
Module 12: Implement
Module 13: Review and Retrospect
Module 14: Release
Module 15: Project Vision
Module 17: Form Scrum Team
Module 18: Develop Epics
Module 19: User Stories
Module 20: Justifications and Sample Change(s)
Module 21: Creating a Prioritized Backlog
Module 22: Conduct Release Planning
Module 23: Sprints
Module 24: Scrum Framework
Module 25: Scrum of Scrums
Module 26: Scrum Demo
Module 27: Review

- Social Media Introduction
- Creating A Google Account
- Setting Up Your Twitter Account
- Getting Your Twitter House In Order
- Why Facebook For Your Business
- Using Facebook As A Business
- Setting Up Your Business Page
- Setting Your Cover Photo
- Tying It All Together
- Tip-Adding Admins In Facebook
- Adjusting Your Settings- Part 1
- Adjusting Your Settings- Part 2
- Adjusting Your Settings- Part 3
- Updating Your Page Info- Part 1
- Updating Your Page Info- Part 2
- Tips For Getting 25 Likes
- Using Facebook As Your Business Page
- What Kind Of Person Would Your Business Be
- How To Post To Facebook
- What To Post
- Sharing Posts
- Sharing Links
- Pinning And Highlighting With Posts
- Tips For Generating Traffic
- Getting Notifications And Staying In Clients News Feed
- Comment Moderation
- The Activity Log- Where Do Hidden Posts Go
- Scheduling Posts
- Intro To Facebook Advertising
- Setup Advertising Account
- Types Of Advertising On Facebook
- Ad Testing
- Choosing Our Audience-Location
- Choosing Our Audience-Age And Gender
- Choosing Our Audience-Precise Interests
- Choosing Our Audience-Broad Categories
- Choosing Our Audience-Connections
- Choosing Our Audience-Advanced Targeting Options
- Choosing Our Audience-Campaign And Budget
- Other Types Of Ads-Part 1
- Other Types Of Ads-Part 2
- Ad Campaign Manager-Part 1
- Ad Campaign Manager-Part 2
- Outside URLs
- Building Ad Text
- News Feed Format And Creating Your Audience
- Campaign Pricing And Schedule
- Ad Campaign Tracker
- Facebook Insights-Overview Intro
- Analyzing Page Posts
- Engaged Users
- Talking About This
- Virality
- Likes
- Reach
- Reach And Frequency
- Page Visits
- Talking About This
- Conclusion
- Introduction To LinkedIn
- Overview Of The Interface And Settings
- Open Link Settings
- LinkedIn Groups
- Adding And Removing Applications
- Basic Account Settings
- Updating Your Public Profile
- LinkedIn Connections Groups And Pages
- LinkedIn Channels And Today
- Advertising on LinkedIn
- Determine Your Goals
- Create Your Persona Or Voice
- Decide On Your Platforms
- Establishing A Social Media Manager
- Coordinate With Customer Service
- Create A Predetermined Crisis Management Plan
- Stick To The Script
- Building Relationships With The Media
- Find Your Evangelist
- Stay Informed Part 1
- Stay Informed Part 2
- Bitly
- Woobox Part 1
- Woobox Part 2
- HootSuite Part 1
- HootSuite Part 2
- Storify
- Social Media Rules And Tips
- Social Media Conclusion
- Tweetdeck-Boolean Search
- Introduction To Google Plus
- Overview Of The Interface
- Setting Up A Google Plus Page
- Linking Your Other Social Networks
- Linking Your Website To Your Google Plus Page
- Review Of Your Google Plus Dashboard
- Notification Settings For Google Plus
- Photo Settings In Google Plus
- Google Plus And YouTube
- YouTube Advanced Settings
- Interface For Uploaded Videos
- Sharing Videos Across Your Social Network
- Updating Your About Section
- Quick Recap Of Everything Covered So Far
- Overview Of Pinterest
- How Does Pinterest Relate To Your Business
- Industry Specific Sites
- The Uses of Pinterest
- Conclusion Of Pinterest
- Module 1.0 IntroductionModule 2.0 Adjusting Your Facebook SettingsModule 3.0 Posting on FacebookModule 7.0 TwitterModule 8.0 PinterestModule 9.0 RedditModule 11.0 LinkedInModule 12.0 Google+ and YoutubeModule 14.0 Additional ToolsModule 4.0 Facebook AdvertisingModule 5.0 Facebook InsightsModule 6.0 Facebook AnalyticsModule 10.0 TumblrModule 13.0 Best Practices
- Module 1 Online Lead GenerationModule 2 Facebook, LinkedIn, and YouTube 101Module 3 List Building & Email MarketingModule 4 Creating Social Media Content and Marketing Materials with Canva and other AppsModule 5 Sales FunnelsModule 6 Apps & Tools Review
- Module 1: Social Media Marketing
- Module 2: Social Media Marketing
- Module 3: Social Media Marketing
-
- Tumblr Introduction
- Setting Up A Tumblr
- Dashboard
- Posting To Tumblr
- Testing Your Post
- URL Post
- Chat Post
- Audio On Tumblr
- Video On Tumblr
- Tumblr Conclusion
-
- Limiting the Number Of Actions
- Setting Your Twitter Preferences
- Finish Setting Up Your Profile
- Twitter Widgets
- Who To Follow
- Connect
- Bringing Followers From Facebook
- Intro To Hashtags
- Examples Of Hashtags
- Monitoring What’s Going On
- Using Twitter For Social Listening
- Hashtags Across Social Media
- Read More

Chapter 1: Course Introduction and Methodology
Chapter 2: Virtualization Overview
Chapter 3: Planning and Installing ESXi
Chapter 4: Using tools to Administer a VMware Environment
Chapter 5: vCenter and Licensing
Chapter 6: Configuring Networking
Chapter 7: Configuring Storage
Chapter 8: VM Creation, Configuration, and Snapshots
Chapter 9: Security and Permissions
Chapter 10: Host and VM Monitoring
Chapter 11: Advanced ESXi and vCenter Server Management
Chapter 12: Patching and Upgrading ESXi
Chapter 13: Disaster Recovery and Backup
Module 1: VM And VMWARE
Module 2: Working With ESX And ESXI
Module 3: Configuring Virtual Machines
Module 4: Vcenter Server
Module 5: VM Storage Option
Module 6: Managing A Virtual World
Module 7: Migrations, High Availability And VM Utilities

Module 1 – Mobile Devices
Module 2 – Networking
Module 3 – Hardware
Module 4 – Virtualization and Cloud Computing
Module 5 – Hardware and Network Troubleshooting
Module 1 – Operating Systems
Module 2 – Security
Module 3 – Software Troubleshooting
Module 4 – Operational Procedures
Module 1 – Risk Management
Module 2 – Enterprise Security Architecture
Module 3 – Enterprise Security Operations
Module 4 – Technical Integration of Enterprise Security
Module 5 – Research, Development and Collaboration
Domain 1 – Characteristics of Cloud Services from a Business Perspect
Domain 2 – Cloud Computing and Business Value
Domain 3 – Technical Perspectives/Cloud Types
Domain 4 – Steps to Successful Adoption of Cloud
Domain 5 – Impact and Changes of Cloud Computing on IT Service Management
Domain 6 – Risks and Consequences of Cloud Computing
Module 1: Threat Management
Module 2: Vulnerability Management
Module 3: Cyber Incident Response
Module 4: Security Architecture and Tool Sets
Module 1: Threat and Vulnerability Management
Module 2: Software and Systems Security
Module 3: Security Operations and Monitoring
Module 4: Incident Response
Module 5: Compliance and Assessment
Module 6: Afterword
Module 1 – IT Concepts and Terminology
Module 2 – Infrastructure
Module 3 – Applications and Software
Module 4 – Software Development
Module 5 – Database Fundamentals
Module 6 – Security
Module 1: Intro & Performing Basic Linux Tasks
Module 2: Managing Users and Groups
Module 3: Managing Permissions and Ownership
Module 4: Managing Storage
Module 5: Managing Files and Directories
Module 6: Managing Kernel Modules
Module 7: Managing the Linux Boot Process
Module 8: Managing System Components
Module 9: Managing Devices
Module 10: Managing Networking
Module 11: Managing Packages and Software
Module 12: Securing Linux Systems
Module 13: Working with Bash Scripts
Module 14: Automating Tasks
Module 15: Installing Linux
Module 1: Instructions
Module 2: Managing Software
Module 3: Configuring Hardware
Module 4: Managing Files
Module 5: Booting Files
Module 6: X
Module 7: Admin
Module 8: Basic Networking
Module 9: Scripts
Module 10: Security
Module 1: Over-The-Air Technologies
Module 2: Network Infrastructure
Module 3: Mobile Device Manager
Module 4: Security
Module 5: Troubleshooting
Module 1 – Networking Concepts
Module 2 – Infrastructure
Module 3 – Network Operation
Module 4 – Network Security
Module 5 – Network Troubleshooting and Tools
Module 1 – The Pen Test Engagement
Module 2 – Passive Reconnaissance
Module 3 – Active Reconnaissance
Module 4 – Physical Security
Module 5 – Social Engineering
Module 6 – Vulnerability Scan Analysis
Module 7 – Password Cracking
Module 8 – Penetrating Wired Networks
Module 9 – Penetrating Wireless Networks
Module 10 – Windows Exploits
Module 11 – Linux Exploits
Module 12 – Mobile Devices
Module 13 – Specialized Systems
Module 14 – Scripts
Module 15 – Application Testing
Module 16 – Web App Exploits
Module 17 – Lateral Movement
Module 18 – Persistence
Module 19 – Cover Your Tracks
Module 20 – The Report
Module 21 – Post Engagement Cleanup
Module 1: Information Security Roles Security Control and Framework Types
Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources
Module 3: Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing
Module 4: Social Engineering, Indicators of Malware Attacks
Module 5: Cryptography
Module 6: Certificates and PKI
Module 7: Authentication
Module 8: Identity and Accounts, Authorization, Personnel Polices
Module 9: Network Design and Hardware (Part 1)
Module 10: Network Hardware (Part 2)
Module 11: Network Protocols
Module 12: Endpoint Security
Module 13: Mobile Devices
Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation
Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualization
Module 16: Privacy and Data Protection
Module 17: Incident Response
Module 18: Forensics
Module 19: Risk Management and Business Impact Analysis
Module 20: Redundancy and Backup Strategies
Module 21: Physical Security
Module 22: Afterword
Module 1: Threats, Attacks and Vulnerabilities
Module 2: Technologies and Tools
Module 3: Architecture and Design
Module 4: Identity and Access Management
Module 5: Risk Management
Module 6: Cryptography and PKI

Module 1: Introduction to AWS Basics
Module 2: AWS Web Services and Cloud Platform Services
Module 3: AWS Basic Summary
Module 4: Introduction to AWS Deep Dive
Module 5: AWS Management of Services and Features Deep Dive
Module 6: AWS Deep Dive Summary
Module 1: Introduction to Cloud Computing
Module 2: Identity and Access Management IAM
Module 3: Elastic Cloud Computing EC2
Module 4: EC2 Storage
Module 5: Elastic Load Balancer and Auto Scaling Group ELB and ESG
Module 6: Amazon S3
Module 7: Database and Analytics
Module 8: Other Services
Module 9: Scaling Your Infrastructure
Module 10: Global Applications
Module 11: Cloud Integration
Module 12: Cloud Monitoring
Module 13: Virtual Private Network
Module 14: Security and Compliance
Module 15: Machine Learning
Module 16: Advanced Identity
Module 17: Are You Well Architected?
Module 18: Congratulations & Exam Preparation

Module 1: Introduction
Module 2: Information Security Governance
Module 3: Information Security Risk Management
Module 4: InfoSec Prog Development and Management
Module 5: Information Security Incident Management
Module 6: Exam Prep
Domain 1: Information Security Governance
Domain 2: Risk Management
Domain 3: Information Security Program
Domain 4: Information Security Program Implementation
Domain 5: Information Security Program Management
Domain 6: Incident Management and Response
Cloud Concepts, Architecture and Design
Legal, Risk and Compliance
Cloud Data Security
Cloud Platform and Infrastructure Security
Cloud Application Security
Cloud Security Operations
Module 1 – Introduction to Ethical Hacking
Module 2 – Footprinting and Reconnaissance
Module 3 – Network Scanning
Module 4 – Enumeration
Module 5 – Vulnerability Analysis
Module 6 – Malware Threats
Module 7 – Sniffing
Module 8 – Social Engineering
Module 9 – Denial of Service
Module 10 – Session Hijacking
Module 11 – Hacking Webservers
Module 12 – Hacking Web Applications
Module 13 – SQL Injection
Module 14 – Hacking Wireless Networks
Module 15 – System Hacking
Module 16 – Hacking Mobile Platforms
Module 17 – Evading IDS, Firewalls, and Honeypots
Module 18 – Cryptography
Module 19 – Cloud Computing
Module 20 – IoT Hacking
Module 1: Security and Risk Management
Module 2: Asset Security
Module 3: Security Engineering
Module 4: Communication and Network Security
Module 5: Identity and Access Management
Module 6: Security Assessment Testing
Module 7: Security Operations
Module 8: Software Development Security
Module 1: Security and Risk Management
Module 2: Asset Security
Module 3: Security Architecture and Engineering
Module 4: Communication and Network Security
Module 5: Identity and Access Management (IAM)
Module 6: Security Assessment and Testing
Module 7: Security Operations
Module 8: Software Development Security
Module 1: Computer Forensics Introduction
Module 2: Forensics Investigation Process
Module 3: Searching and Seizing
Module 4: Digital Evidence
Module 5: First Responder Procedures
Module 6: Forensics Lab
Module 7: Hard Disks and File Systems
Module 8: Windows Forensics
Module 9: Data Acquisition and Duplication
Module 10: Recovering Deleted Files and Partitions
Module 11: Using Access Data FTK
Module 12: Using EnCase
Module 13: Steganography
Module 14: Password Crackers
Module 15: Log Correlation
Module 16: Network Forensics
Module 17: Wireless Attacks
Module 18: Web Attacks
Module 19: Email Crimes
Module 20: Mobile Investigation
Module 21: Investigative Reports
Module 22: Expert Witness
Module 1: Cyber Security Awareness and Prevention
Module 2: Managing Mobile Device Security
Module 1: Data Breaches And ID Theft
Module 2: Device Security Basics
Module 3: Avoiding Inadvertent Disclosure
Module 4: Physical And Technical Safeguards

Module 1: What Is Agile
Module 2: Projects And Projects Management In An Agile World
Module 3: Agile and Scrum
Module 4: Common Scrum Terminology
Module 5: Other Iterative Methods
Module 6: Communication Skills In Agile World
Module 7: Using Agile Outside Software Development
Module 8: Case Studies Of Transitioning to Agile
Module 9: Critique Of Agile
Module 10: Review Of Agile
Module 1 : Agile Principles and Mindset
Module 2 : Value Driven Delivery
Module 3 : Stakeholder Engagement
Module 4 : Team Performance
Module 5 : Adaptive Planning
Module 6 : Problem Detection and Resolution
Module 7 : Continuous Improvement

Module 1: Getting Started
Module 2: Getting to Know Adobe Audition
Module 3: The Interface
Module 4: Waveform Editing
Module 5: Effects
Module 6: Audio Restoration
Module 7: Mastering
Module 8: Sound Design
Module 9: Creating and Recording Files
Module 10: Multitrack Sessions
Module 11: Multitrack Session Editing
Module 12: Additional Features and Summary
Module 1: Introduction to After Effects
Module 2: Intermediate Effects and Techniques in After Effects
Module 3: More Advanced Effects and Techniques in After Effects
Module 1: Getting Started
Module 2: Getting to Know the Workflow
Module 3: Creating a Basic Animation Using Effects and Presets
Module 4: Animating Text
Module 5: Working With Shape Layers
Module 6: Animating a Multimedia Presentation
Module 7: Animating Photoshop Layers
Module 8: Working With Masks
Module 9: Distorting Objects with the Puppet Tools
Module 10: Using the Roto Brush Tool
Module 11: Performing Color Correction
Module 12: Creating Motion Graphics Templates
Module 1
Module 1
Module 1
Module 1
Module 2
Module 3
Module 4
Module 5
Module 6
Module 7
Module 8
Module 9
Module 10
Module 11
Module 1: Welcome
Module 2: Why use Lightroom
Module 3: Lightroom library and organization
Module 4: Edit your photo – global adjustments
Module 5: Edit your photo – local adjustments
Module 6: Saving and exporting
Module 7: Lightroom CC overview
Module 8: Outro
Module 1
Module 1: Introduction to Premiere and Getting Started on an Editing Project
Module 2: More Editing Techniques and Completing a Project
Module 1
Module 1: Intro
Module 2: Camera Anatomy
Module 3: Scene Camera Modes
Module 4: Achieve Exposure
Module 5: Filetypes
Module 6: Sensor
Module 7: Resolution
Module 8: White Balance
Module 9: Color Theory
Module 10: Depth of Field
Module 11: Focusing
Module 12: Lighting
Module 13: Metering
Module 14: Composition
Module 1: Introduction
Module 2: Getting Started
Module 3: Drawing
Module 4: Colors and Gradients
Module 5: Intermediate Illustration
Module 6: Typography
Module 7: Live Trace, Paint Brush and Blob Brush
Module 8: Exporting
Module 1: Getting Started
Module 2: Layers and More
Module 3: Editing, Techniques and More

Module 1: Architecture
Module 2: Governance and Enterprise Risk
Module 3: Legal Issues- Contracts and Electronic
Module 4: Compliance and Audit Management
Module 5: Information Management and Data Security
Module 6: Interoperability and Portability
Module 7: Traditional Security, Business Continuity, and Disaster Recovery
Module 8: Data Center Operations
Module 9: Incident Response
Module 10: Application Security
Module 11: Encryption and Key Management
Module 12: Identity, Entitlement, and Access Management
Module 13: Virtualization
Module 14: Security as a Service
Module 1: The principles of CC
Module 2: Implementing and Managing CC
Module 3: Using the Cloud
Module 4: Security and Compliance
Module 5: Evaluation of CC

Module 1: Foundations (Beginner)
Module 2: Terms and Tools (Beginner)
Module 3: Identifiers, Variables, and Data Types (Beginner)
Module 4: Object-Orientated Programming (Intermediate)
Module 5: Predefined Classes (Intermediate)
Module 6: Methods Part 1 (Intermediate)
Module 7: Methods Part 2 (Advanced)
Module 8: Constructors (Advanced)
Module 9: Control of Flow (Advanced)
Module 10: Arrays and Exceptions (Advanced)
Module 1: Introduction To Javascript
Module 2: Core Concepts And Syntax
Module 3: Getting A Handle On The DOM
Module 4: Working With Libraries

Module 1: Introduction To Oracle 12c SQL Fundamentals
Module 2: Retrieving Data
Module 3: SQL Functions
Module 4: Subqueries
Module 5: Data Manipulation Language
Module 6: Data Control Language
Module 7: Data Definition Language
Module 8: Combining Queries
Module 9: Oracle 12C SQL Fundamentals Review
Module 1: Database Concepts And Tools
Module 2: Memory Structure
Module 3: Tables
Module 4: Indexes
Module 5: Constraints And Triggers
Module 6: Users
Module 7: Internal Structures
Module 8: Starting Up and Shutting Down Database
Module 9: Critical Storage Files
Module 10: Data Manipulation Language
Module 11: Data Concurrency
Module 12: BackUp And Recovery
Module 13: Installation
Module 14: Course Review
Module 1: Database Admininstration
Module 2: Oracle Architecture
Module 3: Database Schema
Module 4: Recovery Manager
Module 5: Introduction to SQL
Module 6: Filtering and Sorting Data
Module 7: Functions
Module 8: SET Operators and Subqueries
Module 9: Regular Expressions and SQL Loader

Module 1: Preparing for and Taking the Exam
Module 2: Process Domain
Module 3: People Domain
Module 4: Business Environment Domain
Module 1 : Getting Certified to take the Examination
Module 2 : Techniques for Preparing for and Taking the Examination
Module 3 : Project Management Framework
Module 4 : Project Integration Management
Module 5 : Project Scope Management
Module 6 : Project Schedule Management
Module 7 : Project Cost Management
Module 8 : Project Quality Management
Module 9 : Project Resource Management
Module 10 : Project Communications Management
Module 11 : Project Risk Management
Module 12 : Project Procurement Management
Module 13 : Project Stakeholder Management
Module 1: Introduction
Module 2: Risk Management Concepts
Module 3: Risk Management Environment
Module 4: Project Definition
Module 5: Risk Management Planning
Module 6: Risk Identification
Module 7: Qualitative Risk Analysis
Module 8: Quantitative Risk Analysis
Module 9: Risk Response Planning
Module 10: Risk Monitoring And Controlling
Module 1: Risk Management Fundamentals
Module 2: Test Requirements
Module 3: Test Domains
Module 4: Risk Strategy and Planning
Module 5: Stakeholder Engagement
Module 6: Risk Process Facilitation
Module 7: Risk Monitoring and Reporting
Module 8: Specialized Risk Analyses
Module 9: RMP Recap
Module 10: RMP Review Questions
Module 1 : Getting Certified to take the Examination
Module 2 : Project Management Framework
Module 3 : Project Integration Management
Module 4 : Project Scope Management
Module 5 : Project Schedule Management
Module 6 : Project Cost Management
Module 7 : Project Quality Management
Module 8 : Project Resource Management
Module 9 : Project Communications Management
Module 10 : Project Risk Management
Module 11 : Project Procurement Management
Module 12 : Project Stakeholder Management
Module 13 : Review

Module 1: Organization – Wide Planning and Deployment
Module 2: Leadership
Module 3: Organizational Process Measures and Management
Module 4: Team Management
Module 5: Define Phase – Overview of the Define Phase and the Voice of the Customer
Module 6: Define Phase – Business Case and Project Charter
Module 7: Define Phase – Analytical Tools
Module 8: Measure Phase – Process Analysis and Documentation
Module 9: Measure Phase – Data Collection
Module 10: Measure Phase – Measurement Systems
Module 11: Measure Phase – Basic Statistics
Module 12: Measure Phase – Probability
Module 13: Measure Phase – Process Capability
Module 14: Analyze Phase – Measuring and Modeling Relationships
Module 15: Analyze Phase – Hypothesis Testing
Module 16: Analyze Phase – FEMA and Additional Analysis Methods
Module 17: Improve Phase – Design of Experiments (DOE)
Module 18: Improve Phase – Lean Method
Module 19: Improve Phase - Implementation
Module 20: Control Phase – Statistical Process Control (SPC)
Module 21: Control Phase – Other Controls
Module 22: Control Phase – Maintain Controls and Sustain Improvements
Module 23: DFSS
Module 24: Exam Review – Prep and Key Concepts
Module 1: Six Sigma And The Organization
Module 2: Define Phase Project Identification
Module 3: Define PhaseVoice Of The Customer
Module 4: Define Phase Project Management Basics on Six Sigma Green Belt
Module 5: Define PhaseManagement And Planning Tools
Module 6: Define PhaseBusiness Results For Projects
Module 7: Define PhaseTeam Dynamics And Define Phase Summary Review Questions
Module 8: Measure PhaseProcess Analysis And Documentation
Module 9: Measure PhaseProbability And Statistics
Module 10: Measure PhaseStatistical Distributions
Module 11: Measure PhaseCollecting And Summarizing Data
Module 12: Measure PhaseMeasurements System Analysis (MSA)
Module 13: Measure PhaseProcess And Performance Capability And Measure Phase Summary And Review
Module 14: Analyze PhaseExploratory Data Analysis And Hypothesis Testing
Module 15: Analyze Phase Process Drivers
Module 16: Improve PhaseDesign Of Experiment (DOE)
Module 17: Improve PhaseRoot Cause Analysis
Module 18: Improve PhaseLean Tools
Module 19: Control Phase Statistical Process Control
Module 20: Control PhaseLean Tools For Process Control
Module 21: Review ExamPrep And Key Concepts

Module 1: Development Methods
Module 2: Agile Manifesto Principles
Module 3: Scrum
Module 4: Why Scrum
Module 5: Scrum-Roles Overview
Module 6: Product Owner
Module 7: Scrum Master
Module 8: Scrum Team
Module 9: Scrum Process
Module 10: Scrum Project Phase
Module 11: Plan and Estimate
Module 12: Implement
Module 13: Review and Retrospect
Module 14: Release
Module 15: Project Vision
Module 16: Scrum Master and Stake Holder(s)
Module 17: Form Scrum Team
Module 18: Develop Epics
Module 19: User Stories
Module 20: Justifications and Sample Change(s)
Module 21: Creating a Prioritized Backlog
Module 22: Conduct Release Planning
Module 23: Sprints
Module 24: Scrum Framework
Module 25: Scrum of Scrums
Module 26: Scrum Demo
Module 27: Review
Module 1: Development Methods
Module 2: Agile Manifesto Principles
Module 3: Scrum
Module 4: Why Scrum
Module 5: Scrum-Roles Overview
Module 6: Product Owner
Module 7: Scrum Master
Module 8: Scrum Team
Module 9: Scrum Process
Module 10: Scrum Project Phase
Module 11: Plan and Estimate
Module 12: Implement
Module 13: Review and Retrospect
Module 14: Release
Module 15: Project Vision
Module 17: Form Scrum Team
Module 18: Develop Epics
Module 19: User Stories
Module 20: Justifications and Sample Change(s)
Module 21: Creating a Prioritized Backlog
Module 22: Conduct Release Planning
Module 23: Sprints
Module 24: Scrum Framework
Module 25: Scrum of Scrums
Module 26: Scrum Demo
Module 27: Review

- Introduction
- Business Entities
- Beginning Your Business
- Financial Basics Part 1
- Financial Basics Part 2
- Employees Payroll
- Getting Your Business Out There
- SEO
- Other Topics
- Closing
Module 1: Setup and Maintenance
Module 2: List Management
Module 3: Sales (Money-In)
Module 4: Purchased (Money-Out)
Module 5: Accounting
Module 6: Reports
Module 7: Customizations and Time Savers
Module 8: Extra
Module 1: Creating and Setting Up Your Point of Sale Company File
Module 2: Installing your System
Module 3: Navigating and Customizing the Home Page
Module 4: Company Preferences
Module 5: Financial- Setting up QuickBooks Connection
Module 6: Setting up Sales Tax
Module 7: Workstation Preferences
Module 8: Additional Features
Module 9: Employees and Security
Module 10: Customers
Module 11: Rewards Program
Module 12: Vendors
Module 13: Setting Up Your Inventory
Module 14: Item Styles, Assemblies, and Group
Module 15: Working with Inventory
Module 16: Sales
Module 17: Working with Price Levels and Discounts
Module 18: Collecting Sales Tax
Module 19: Adding Shipping Information (Pro/MS)
Module 20: Tracking Sales Commissions
Module 21: Taking Payment and Giving Change
Module 22: Recording Tips
Module 23: Handling Tricky Sales Returns
Module 24: Working with Sales Orders, Work Orders, and Layaways
Module 25: Purchasing Merchandise
Module 26: Receiving from a PO
Module 27: Managing Inventory
Module 28: Reporting
Module 29: QuickBooks Financial
Module 30: Multi-Store
Module 31: Protect your data
Module 32: Adding Third Party Applications
Module 1: Intro and Setup
Module 2: Tools
Module 3: Preferences
Module 4: Security & Users
Module 5: Estimates
Module 6: Sales Orders
Module 7: Receiving Money
Module 8: Bounced Checks
Module 9: Specific Tracking
Module 10: Receiving and Depositing
Module 11: Credit Cards and Bank Accounts
Module 12: Payroll
Module 13: Transactions
Module 14: Accounts and Reports
Module 15: Integrating with Word
Module 16: Data Types
Module 17: Conclusion
Module 1: Sage 50 2013
Module 2: Sage 50 Basics
Module 3: Inventory
Module 4: Employee
Module 5: Banking
Module 6: Maintenance
Module 7: File Handling
Module 8: Manager
Module 9: Jobs
Module 10: Budgets
Module 11: Charts of Accounts
Module 12: Accounts Management
Module 13: Customer Setup
Module 14: Jobs Setup
Module 15: Vendor Setup
Module 16: Inventory Setup
Module 17: Employee Setup
Module 18: Security Setup
Module 19: ACTI Link
Module 20: Task Overview
Module 21: Forms, Reports, and Recap
Module 1: Intro to SalesForce Automation
Module 2: Working With The SalesForce System
Module 3: SalesForce Solution
Module 4: SalesForce Admin
Module 5: Migrating To SalesForce
Module 6: Course Conclusion
Module 1: The Phone
Module 2: The Screen
Module 3: The Keyboard
Module 4: Contacts
Module 5: Phone Calls
Module 6: Messaging
Module 7: Internet
Module 8: Email
Module 9: Music
Module 10: Android Specifics
Module 11: Photos & Video
Module 12: Conclusion
Module 1: iPhone Basics
Module 2: The Screen
Module 3: The Keyboard
Module 4: Basic Calls and Settings
Module 5: Contacts
Module 6: Phone Calls
Module 7: Messaging
Module 8: Web
Module 9: Email
Module 10: Siri
Module 11: Music
Module 12: Photos and Video
Module 13: Maps
Module 14: Conclusion
Coming Soon
-
- Certified Blockchain Developer – Hyperledger (CBDH)
- Certified Blockchain Solutions Architect (CBSA)
- Enterprise Blockchain Bootcamp for Solutions Engineers
-
- Module 1: Introduction and Deploy Windows
- 1.1 Instructor and Course Introduction
- 1.2 Exam Overview
- 1.3 Deploy Windows Intro
- 1.4 Deploy Windows 10
- 1.5 Deploy Windows 10 Pt 2
- 1.6 Preparing Virtual Lab Setup for the Client 1
- 1.7 Installation of Windows 10 Enterprise
- 1.8 Troubleshooting Failed Installations with Setup Logs
- 1.9 Configuring Locales
- 1.10 Perform Post-Installation Configuration
- 1.11 Navigating Microsoft Edge
- 1.12 Modifying Microsoft Edge Settings
- 1.13 Customizing Your Computer Setting
Module 2: Manage Devices and Data
- 2.1 Manage devices and data intro
- 2.2 Manage local users, groups, and devices
- 2.3 Configure data access and protection
- 2.4 Adding and accessing local users and groups
- 2.5 Managing NTFS permissions in Windows 10
- 2.6 Configure devices by using local policies
- 2.7 Configuring Audit Policies on Windows 10
- 2.8 Manage Windows security
- 2.9 How to change user account settings
Module 3: Configure Connectivity
- 3.1 Configure connectivity intro
- 3.2 Configure networking
- 3.3 Configuring network adapter advanced properties
- 3.4 Configuring a static TCP/IP address
- 3.5 Viewing the networking connection details
- 3.6 Setting up a VPN connection
- 3.7 Configure remote connectivity
- 3.8 Configure remote management
Module 4: Maintain Windows
- 4.1 Maintain Windows intro
- 4.2 Configure system and data recovery
- 4.3 Backing up files in Windows 10
- 4.4 Using the recycle bin
- 4.5 Manage updates
- 4.6 Check for updates in Windows 10
- 4.7 Configuring hardware in Windows 10
- 4.8 Monitor and manage Windows
- 4.9 Configuring Windows 20 desktop options
- 4.10 Installing new features
- Module 1: Introduction and Deploy Windows