Module 1: Installation

Module 2: Data Storag

Module 3: Data Recover

Module 4: Monitoring

Module 5: Security

Module 6: Maintenance

Read More

Module 1: What are Big Data Clusters?

Module 2: Big Data Cluster Architecture

Module 3: Deployment of Big Data Clusters

Module 4: Loading and Querying Data in Big Data Clusters

Module 5: Working with Spark in Big Data Clusters

Module 6: Machine Learning on Big Data Clusters

Module 7: Create and Consume Big Data Cluster Apps

Module 8: Maintenance of Big Data Clusters

Read More

Module 1 – Introduction to Business Intelligence and Data Modeling

Module 2 – Multidimensional Databases

Module 3 – Cubes and Dimensions

Module 4 – Measures and Measure Groups

Module 5 – Introduction to MDX

Module 6 – Customizing Cube Functionality

Module 7 – Tabular Data Models

Module 8 – Data Analysis Expressions (DAX)

Module 9 – Data Mining

Read More

Module 1 – Query Tools

Module 2 – Introduction to T-SQL Querying

Module 3 – Basic SELECT Queries

Module 4 – Querying Multiple Tables

Module 5 – Sorting and Filtering Data

Module 6 – Working with SQL Server Data Types

Module 7 – Using DML to Modify Data

Module 8 – Using Built-In Functions

Module 9 – Grouping and Aggregating Data

Module 10 – Using Subqueries

Module 11 – Using Table Expressions

Module 12 – Using Set Operators

Module 13 – Using Window Ranking, Offset, and Aggregate Functions

Module 14 – Pivoting and Grouping Sets

Module 15 – Implementing Error Handling

Module 16 – Managing Transactions

Read More

Module 1 – Query Tools

Module 2 – Introduction to T-SQL Querying

Module 3 – Basic SELECT Queries

Module 4 – Querying Multiple Tables

Module 5 – Sorting and Filtering Data

Module 6 – Introduction to Business Intelligence and Data Modeling

Module 7 – Prepare Data

Module 8 – Clean, Transform, and Load Data

Module 9 – Design a Data Model

Module 10 – Create Model Calculations using DAX

Module 11 – Create Reports

Module 12 – Create Dashboards

Module 13 – Create Paginated Reports

Module 14 – Perform Advanced Analytics

Module 15 – Create and Manage Workspaces

Module 16 – Create Power App Visuals

Module 17 – Analysis Services and Power BI

Read More

Module 1: Introduction

Module 2: Cloud Fundamentals

Module 3: Azure’s Architecture

Module 4: Compute

Module 5: Networking and CDN

Module 6: Storage

Module 7: Azure Solutions

Module 8: Administration

Module 9: Pricing and Service Level Agreements

Module 10: Exam Preparation

Module 11: Review Questions

Read More

Module 1: Implement VM Solutions

Module 2: Develop Azure Platform as a Service

Module 3: Develop for Azure Storage

Module 4: Implement Azure Security

Module 5: Monitor, Troubleshoot and Optimize Azure Solutions

Module 6: Connect to and Consume Azure and Third Party Services

Read More

Module 1 – Prepare Data

Module 2 – Clean, Transform, and Load Data

Module 3 – Design a Data Model

Module 4 – Create Model Calculations using DAX

Module 5 – Create Reports

Module 6 – Create Dashboards

Module 7 – Create Paginated Reports

Module 8 – Perform Advanced Analytics

Module 9 – Create and Manage Workspaces

Module 10 – Create Power App Visuals

Module 11 – Analysis Services and Power BI

Read More

Module 1 Understanding Local Area Networking

Module 2 Defining Networks with the OSI Model

Module 3 Understanding Wired and Wireless Networks

Module 4 Understanding Internet Protocol

Module 5 Implementing TCP-IP in the command line

Module 6 Working with Networking Services

Module 7 Understanding Wide Area Networks

Module 8 Defining Network Infrastructure and Security

Module 9 Key Takeaways

Module 10 Terms to Know

Read More

Module 1 Introducing Windows Server 2016

Module 2 Managing Windows Server 2016

Module 3 Managing Storage

Module 4 Monitoring and Troubleshooting Servers

Module 5 Essential Services

Module 6 Understanding File and Print Services

Module 7 Windows Network Services and Applications

Mod 8 Key Takeaways

Mod 9 Terms to Know

Mod 10 Hands on Labs

Read More

Module 1: Deploy a Microsoft Azure SQL Database

Module 2: Plan for SQL Server Installation

Module 3: Deploy SQL Server Instances

Module 4: Deploy SQL Server Databases to Azure Virtual Machines

Module 5: Configure Secure Access to Microsoft Azure SQL Databases

Module 6: Configure SQL Server performance settings

Module 7: Manage SQL Server instances

Module 8: Manage SQL Storage

Module 9: Perform Database Maintenance

Read More

Module 1: Configure Encryption

Module 2: Configure Data Access and Permissions

Module 3: Configure Auditing

Module 4: Develop a Backup Strategy

Module 5: Restore Databases

Module 6: Manage Database Integrity

Module 7: Monitor Database Activity

Module 8: Monitor Queries

Module 9: Manage Indexes

Module 10: Monitor SQL Server Instances

Module 11: Implement Log Shipping

Module 12: Implement Failover Cluster Instances

Module 13: Implement Always On Availability Groups

Read More

Module 1: Installing and Configuring Domain Controllers

Module 2: Managing AD DS Objects

Module 3: Securing Active Directory Domain Services

Module 4: Working with Complex AD Infrastructures

Module 5: Implementing Group Policy

Module 6: Understanding Microsoft Azure AD and Directory Synchronization

Module 7: Monitoring and Recovering AD DS

Module 8: Implementing Active Directory Certificate Services

Module 9: Implementing Active Directory Federation Services

Read More

Module 1: Plan and Implement IPv4 and IPv6 Networks

Module 2: Installing and Configuring DHCP

Module 3: Installing and Configuring DNS

Module 4: Implementing and Managing IP Address Management

Module 5: Implementing Remote Access

Module 6: Securing the Network Infrastructure

Read More

Module 1: Installing Windows Server 2016 in Host and Compute Environments

Module 2: Configuring Active Directory Networks for Host and Compute Environments

Module 3: Implementing Local and Enterprise Storage Solutions

Module 4: Implementing Hyper-V Virtualization and Containers

Module 5: Implementing High Availability

Module 6: Maintaining and Monitoring Windows Server 2016

Read More

Module 1 : Prepare for installation requirements

Module 2 : Install Windows

Module 3 : Configure devices and device drivers

Module 4 : Perform post-installation configuration

Module 5 : Implement Windows in an enterprise environment

Module 6 : Configure networking

Module 7 : Configure storage

Module 8 : Configure data access and usage

Module 9 : Implement Apps

Module 10 : Configure remote management

Module 11 : Configure Updates

Module 12 : Monitor Windows

Module 13 : Configure System and Data Recovery

Module 14 : Configure Authorization and Authentication

Module 15 : Configure Advanced Management Tools

Read More

Module 1: Introducing Windows 10

Module 2: Installing Windows 10

Module 3: Configuring Devices

Module 4: Configuring Network Connectivity

Module 5: Managing Storage, Data, And Printers

Module 6: Managing Apps

Module 7: Managing Device Security

Module 8: Maintaining Windows 10

Module 9: Troubleshooting And Recovery

Module 10: Deploying Windows 10 Enterprise Desktops

Module 11: Managing User Profiles And User State Virtualization

Module 12: Managing Desktop And Application Settings Using Group policy

Module 13: Configuring And Managing Client Hyper-V

Module 14: Configuring Windows Devices – December, 2017 Update – Part1

Module 15: Configuring Windows Devices – December, 2017 Update – Part2

Read More

Module 1: Introduction

Module 2: Troubleshooting Start Up Issues

Module 3: ​Managing Drivers And Hardware

Module 4: Troubleshooting Remote Computers

Module 5: Resolving Problems With Network Connectivity

Module 6: Troubleshooting Group Policy

Module 7: Troubleshooting User Settings

Module 8: Configuring And Troubleshooting Remote Connectivity

Module 9: ​Troubleshooting Resource Access In A Domain

Module 10: Configuring And Troubleshooting Resource Access For Non-Domain Members

Module 11: Troubleshooting Applications

Module 12: Maintaining Windows 8.1

Module 13: Recovering Windows 8.1

Read More

Lesson 1: Getting to Know PCs and the Windows 8 User Interface

Lesson 2: Using the Modern Apps and Navigation Features

Lesson 3: Working with Desktop Applications

Lesson 4: Using Internet Explorer 10

Lesson 5: Customizing the Windows 8 Environment

Lesson 6: Using Windows 8 Security Features

Read More

Module 1: Developing a Strategy for Windows® 7 Business Desktops Deployment

Module 2: Evaluating Application Compatibility in Windows® 7

Module 3: Assessing Deployment Methods for Windows® 7

Module 4: Designing Standard Images for Windows® 7

Module 5: Deploying Windows® 7 with Windows AIK

Module 6: Using Windows Deployment Services to Deploy Windows® 7

Module 7: Deploying Windows® 7 Using Lite Touch Installation

Module 8: Deploying Windows® 7 Using Zero Touch Installation

Module 9: Migrating User State Using USMT 4.0 and WET

Module 10: Planning, Configuring, and Managing the Client Environment

Module 11: Planning and Deploying Applications and Updates to Windows® 7 Clients

Read More

Module 1: Installing, Upgrading, and Migrating to Windows 7

Module 2: Configuring Disks And Device Drivers

Module 3: Configuring File Access And Printers

Module 4: Indentifying And Resolving Log on Problems

Module 5: Configuring Network Connectivity

Module 6: Troubleshooting Network Issues

Module 7: Mobile Computing And Remote Access

Module 8: Securing Windows 7 Desktops

Module 9: Optimizing And Troubleshooting Performance And Reliabilty

Module 10: Maintaining Windows 7 Desktops

Read More

Module 1: Installing, Upgrading and Migrating Windows 7

Module 2: Deploying Windows 7 in the Enterprise

Module 3: Enterprise Management in Windows 7

Module 4: Configuring Hardware and Applications

Module 5: Configuring Network Connectivity

Module 6: Configuring Access to Resources

Module 7: Configuring Mobile Computing

Module 8: Configuring Security Options

Module 9: Monitoring And Maintaining Systems

Module 10: Configuring Backup and Recovery Options

Read More

Module 1: Planning Server Deployment

Module 2: Automating Server Deployment

Module 3: Planning for Server Management

Module 4: Planning the Network Infrastructure

Module 5: Planning Name Resolution Services

Module 6: Planning File and Print Services

Module 7: Planning Active Directory Domain Services

Module 8: Planning Active Directory Certificate Services

Module 9: Planning High Availability

Module 10: Planning Backups For Windows Server

Module 11: Planning Server Monitoring and Maintenance

Read More

Module 1: Installing and Configuring Windows Services

Module 2: TCP/IP Protocol Suite

Module 3: Configuring IPv4 Addressing

Module 4: Configuring IP Address Assignment Services

Module 5: Configuring IPv6 Addressing

Module 6: Configuring Name Resolution Services

Read More

Module 1: Active Directory – An Identity And Access Solution

Module 2: Introduction To Active Directory Domain Services

Module 3: Configuring DNS To Support Active Directory Domain Services

Module 4: Active Directory Object Management

Module 5: Managing Active Directory Replication Using Sites

Module 6: Configuration Management Using Group Policy

Module 7: Desktop Environmental And Security Management

Module 8: Maintaining Active Directory

Module 9: Deploy and Manage a Public Key Infrastructure

Module 10: Supporting Applications with AD LDS

Module 11: Deploying Active Directory Federated Services

Module 12: Deploying Active Directory Rights Management Services

Read More

Module 1: Introduction To Creating Efficient Apps For Sharepoint

Module 2: Working With Managed Metadata Solutions

Module 3: Working With The Search Service

Module 4: Implementing Enterprise Content Management

Module 5: Developing Publishing Sites

Module 6: Interacting With Business Connectivity Services

Read More

Module 1: Overview of SharePoint Development

Module 2: Working With Objects, List, And Libraries

Module 3: Working With Features and Solutions

Module 4: Developing Server Side Code

Module 5: Managing Authentication And Authorization

Module 6: Client Side SharePoint Development

Module 7: Developing And Managing Apps

Module 8: Using Workflows To Automate Business Processes

Module 9: Customizing SharePoint Interfaces

Read More

Module 1: Accessing Data

Module 2: Designing And Implementing WCF Services

Module 3: Querying And Manipulating Data Using Entity Framework

Module 4: Creating And Consuming Web API Based Services

Module 5: Deploying Web Applications And Services

Module 6: Course Review

Read More

Module 1: Intro To Business Intelligence

Module 2: Database Essentials

Module 3: Business Intelligence Development

Module 4: Business Intelligence Results

Module 5: Advanced Reporting And Development

Module 6: SQL Server Integration Services (SSIS)

Module 7: SQL Server 2014 New Features

Module 8: Course Review And Exam Prep

Read More

Module 1: Introduction To Business Intelligence And Data Modeling

Module 2: Implementing Reports The SQL Server Reporting Services

Module 3: Supporting Self Service Reporting

Module 4: Managing Report Execution And Delivery

Module 5: Creating Multidimensional Databases

Module 6: Working With Cubes And Dimensions

Module 7: Working With Measures And Measure Groups

Module 8: Introduction To MDX

Module 9: Customizing Cube Functionality

Module 10: Implementing A Tabular Data Model

Module 11: Introduction To DAX

Module 12: Implementing An Analysis Services Tabular Data Model

Module 13: SQL Analysis Services

Module 14: Creating Data Visualizations With Power View

Module 15: Supporting Self Service Reporting

Module 16: Performing Predictive Analysis With Data Mining

Module 17: Predictive Analytics

Read More

Module 1: Designing A Database Server Infrastructure

Module 2: Designing A Logical Database Scheme

Module 3: Designing A Physical Database Implementation

Module 4: Incorporating Data Files Into the Database

Module 5: Tuning Database Performance

Module 6: Designing Database Security

Module 7: Policy Based Management

Module 8: Monitoring Server Health

Module 9: Designing Database Backup Solution

Module 10: Automating Multi Server Maintenance

Module 11: Managing SQL Server With Windows Powershell

Module 12: Replicating Data

Module 13: Planning High Availability

Module 14: Review of SQL Statements

Module 15: Eleven Rules of Database Design

Read More

Module 1: SQL 2012 And The 464 Test

Module 2: Working With Data Types

Module 3: Tables

Module 4: Data Constraints

Module 5: Planning In Indexing

Module 6: Table Structures

Module 7: Improving Performance with Non-Clustered Indexes

Module 8: Using Indexes And Execution Plans

Module 9: Working with Views

Module 10: Designing and Implementing Stored Procedures

Module 11: Merging Data and Passing Tables

Module 12: Designing and Implementing User Functions

Module 13: Creating Highly Concurrent SQL Server Applications

Module 14: Handling Errors in T-SQL

Module 15: Triggers

Module 16: Implementing Managed Code

Module 17: Storing XML in SQL

Module 18: Querying XML

Module 19: Working with the Spatial Data

Module 20: Working With Full-Text Indexes and Queries

Read More

Lesson 1: Introduction to Data Warehouse

Lesson 2: Creating Dimensions and Changing Granularity of Dimensions

Lesson 3: Creating Fact Tables and Column Store Indexes

Lesson 4: Implementing Data Warehouse in SQL Server 2012

Lesson 5: Working with Integration Services

Lesson 6: Managing Control Flow

Lesson 7: Working with Dynamic Variables

Lesson 8: Implementing Data Flow

Lesson 9: Managing Data Flow

Lesson 10: Managing SSIS Package Execution

Lesson 11: Debugging and Troubleshooting

Lesson 12: Deploying Packages

Lesson 13: Securing Packages and Databases

Lesson 14: Working with MDS and Windows

Read More

Lesson 1: Identifying the SQL Server Platform

Lesson 2: Deploying SQL Server

Lesson 3: Configuring SQL Server

Lesson 4: Managing Databases in SQL Server 2012

Lesson 5: Managing SQL Server Security

Lesson 6: Implementing Advanced Security Settings

Lesson 7: Applying Encryption and Compression

Lesson 8: Working with Indexes and Log Files

Lesson 9: Working with Backup and Restore

Lesson 10: Implementing High Availability

Lesson 11: Optimizing Server Performance

Lesson 12: Troubleshooting Issues and Recovering Databases

Lesson 13: Performing Advanced Database Management Tasks

Read More

Lesson 1: Getting Started with SQL Server 2012

Lesson 2: Working with T-SQL

Lesson 3: Writing SELECT Queries

Lesson 4: Working with SQL Data Types

Lesson 5: Sorting and Filtering Data

Lesson 6: Querying Data from Multiple Tables

Lesson 7: Modifying Data

Lesson 8: Working with SQL Server Built-in Functions

Lesson 9: Programming in T-SQL

Lesson 10: Implementing Stored Procedures

Lesson 11: Working with Sub queries and Table Expressions

Lesson 12: Working with Set Operators, Conditional Operators, and Window Functions

Lesson 13: Working with PIVOT, UNPIVOT, and Grouping Sets

Lesson 14: Managing Error Handling and Transactions

Lesson 15: Querying SQL Server System

Lesson 16: Optimizing Query Performance

Read More

Module 1: SSIS Packages

Module 2: Debugging and Error Handling in SSIS

Module 3: Deploying and Configuring SSIS Packages

Module 4: Securing and Executing SSIS Packages; Service Administration

Module 5: Data Analysis

Module 6: Extending SSAS Cubes

Module 7: Extending SSAS Cubes

Module 8: Securing and Administering SSAS

Module 9: Working With SSAS Data Mining

Module 10: Developing SSAS Reports

Module 11: Extending and Deploying SSRS Reports

Module 12: Scheduling Deployed Reports and Data Sources

Module 13: Configuring And Administering the SSRS Server

Read More

Installing on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance

Getting familiar with SQL on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance

Types of Data on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance

Databases on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance

Looking at Tables on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance

Module 6: Looking at Views

Module 7: About Constraints

Module 8: Looking at Stored Procedures

Module 9: Functions

Modules 10: About Service Broker

Modules 11: Integrity

Modules 12: Permissions in SQL

Modules 13: Accounts

Modules 14: Security

Modules 15: Backups/Restores

Modules 16: Endpoints

Modules 17: Servers working together

Modules 18: Triggers in SQL

Modules 19: Replication between servers

Modules 20: Indexes

Modules 21: Transactions in SQL

Modules 22: Data moves

Modules 23: Data specialties in SQL

Modules 24: Fault Tolerance

Modules 25: SQL Management

Modules 26: SQL Management Monitoring

Modules 27: SQL Management tools

Module 28: Troubleshooting

Module 29: Course Review

Module 30: Common Questions

Module 31: Real World Scenarios

Read More

Module 1: Manage and Maintain a Server Infrastructure

Module 2: Plan and Implement a Highly Available Enterprise Infrastructure

Module 3: Plan and Implement a Server Virtualization Infrastructure

Module 4: Design and Implement Identity and Access Solutions

Read More

Module 1: Plan and Deploy Infrastructure

Module 2: Planning and Implementing

Module 3: Planning and Implementing Server Upgrade and Migration

Module 4: Planning and Deploying Virtual Machine Manager Resources

Module 5: Planning and Implementing File and Storage Services

Module 6: Design and Implement Network Infrastructure Services

Module 7: Design and Maintain a Dynamic Host Configuration Protocol Solution

Module 8: Design a Name Resolution Solution Strategy

Module 9: Design and Manage an IP Address Management Solution

Module 10: Design and Implement Network Access Services

Module 11: Design a VPN Solution

Module 12: Design a DirectAccess Solution

Module 13: Implement a Scalable Remote Access Solution

Module 14: Design and Implement a Network Protection Solution

Module 15: Design and Implement an Active Directory Infrastructure

Module 16: Design a Forest and Domain Infrastructure

Module 17: Implement a Forest and Domain Infrastructure

Module 18: Design a Group Policy Strategy

Module 19: Design an Active Directory Permission Model

Module 20: Design and Implement an Active Directory Infrastructure (Physical)

Module 21: Design an Active Directory Site Topology

Module 22: Design an Active Directory Site Topology

Module 23: Design and Implement a Branch Office Infrastructure

Read More

Module 1: Configuring Advanced DNS Services

Module 2: Advanced DHCP Services

Module 3: Active Directory Forest Configuration

Module 4: Active Directory Certificate Services

Module 5: ISCSI And ISNS

Module 6: Configuring IPAM

Module 7: Network Balancing

Module 8: Failover Clusters

Module 9: Configuring Hyper_V Virtual Machines

Module 10: Dynamic Access Control

Module 11: Active Directory Rights Management Services

Module 12: Active Directory Federation Services

Module 13: Disaster Recovery

Module 14: Configuring Additional Services

Read More

Module 1: Managing User and Service Accounts

Module 2: Administer Group Policy

Module 3: Managing Network File Services

Module 4: Domain Name System

Module 5: Windows Deployment Services

Module 6: Windows Server Update Services

Module 7: Remote Access

Module 8: Monitoring System

Module 9: Managing Active Directory Services

Read More

Module 1: Installing And Configuring Windows Server 2012 R2

Module 2: Installing and Configuring an Active Directory Domaine Control

Module 3: Administering Active Directory Objects

Module 4: Automating Administration Tasks

Module 5: Configuring IPv4

Module 6: Configuring IPv6

Module 7: Installing and Configuring DHCP

Module 8: Installing and Configuring DNS

Module 9: Configuring Storage Spaces And File And Print Services

Module 10: Configuring Group Policy

Module 11: Securing Windows Servers

Module 12: Installing and Configuring Virtual Servers and Clients

Read More

Module 1: Understanding Microsoft Applications

Module 2: Installing And Configuring The Hyper-V Role

Module 3: Creating And Managing Virtual Hard Disks, Virtual Machines, And Virtual

Module 4: Producing And Configuring Virtual Machine Networks

Module 5: Virtual Machine Movement And Hyper-V Replicas

Module 6: Implementing Failover Clustering Using Hyper-V

Module 7: Installing And Configuring Microsoft System Center 2012 R2 Virtual

Module 8: Managing The Network And Storage Infrastructure In Microsoft System

Module 9: Creating And Managing Virtual Machines Using Microsoft System Center 2012 R2Virtual Machine Manager

Module 10: Configuring And Managing The Microsoft System Center 2012 R2 Virtual Machine Manager Library

Module 11: Managing Clouds In Microsoft System Center 2012 R2 Virtual Machine

Module 12: Managing Services In Microsoft System Center 2012 R2 Virtual

Module 13: Protecting And Monitoring Virtualization Infrastructure

Module 14: Hyper-V And SCVMM Review

Read More

Module 1: Technology Review

Module 2: Device Management

Module 3: Office 365 Deployment Plan

Module 4: Windows Azure

Module 5: PowerShell

Module 6: SQL Server

Module 7: Azure Lync and SharePoint

Module 8: Course Review

Read More

Module 1: Introduction To Office 365

Module 2: Administration In Office 365

Module 3: Managing Clients

Module 4: Planning DNS And Exchange Migrations

Module 5: Planning And Configuring Exchange Online

Module 6: Configuring Sharepoint Online

Module 7: Configuring Lync Online

Module 8: Implementing Coexistence Technologies

Read More

Module 1: Overview

Module 2: Beginning Powershell

Module 3: Exhange Control Panel

Module 4: Create A New Mailbox with Powershell

Module 5: Mailbox Statistics With Powershell

Module 6: Intermediate Powershell

Module 7: Unified Messaging

Module 8: Installation and Configuration

Module 9: Exchange Online

Module 10: Advanced Design

Read More

Module 1: Overview

Module 2: Exchange Server 2013 Administration

Module 3: Fundamentals of Exchange Administration

Module 4: Archive Mailboxes

Module 5: Properties of User Mailboxes

Module 6: Distribution Groups

Module 7: Outlook and Outlook Web Apps

Module 8: Preparation Prerequisites

Module 9: Installation of Exchange 2013

Module 10: Exchange 2013 Design

Module 11: Labs and Demos

Read More

Module 1: Handling Design And Architecture For Microsoft Lync Server 2013

Module 2: Designing A Lync Server 2013

Module 3: Installing Lync

Module 4 Questions

Module 5: Deploying And Managing Clients And Devices

Module 6: Conferencing In Lync Server 2013

Module 7: Designing And Deploying External Access

Module 8: Deploying Microsoft Lync Server 2013 Persistant Chat

Module 9: Archiving And Monitoring

Module 10: Administering And Maintaining Lync Server 2013

Module 11: Configuring And Managing High Availability In Lync Server 2013

Module 12: Understanding Disaster Recover In Lync Server 2013

Module 13: Planning a Migration to Lync Server 2013

Read More

Module 1: Understanding Voice Architecture

Module 2: Configuring Key Enterprise Voice Functionality

Module 3: Designing Exchange Server 2013 Unified Messaging Intergration with

Module 4: Understanding Voice Applications

Module 5: Configuring and Deploying Emergency Calling

Module 6: Integrating the PSTN

Module 7: Understanding Lync Server 2013 and Networking

Module 8: Understanding Phones and Devices

Module 9: Configuring And Migrating Lync Online

Module 10: Monitoring

Module 11: Understanding Lync Server2013 Voice Resiliency

Read More

Module 1: Business Continuity

Module 2: Model, Design, and Test

Module 3: Upgrade and Migrate

Module 4: Create and Configure Service Applications

Module 5: SharePoint Management

Read More

Module 1: Comprehensive Introduction to Sharepoint

Module 2: Installing SharePoint

Module 3: SharePoint Architecture, Logical & Physical

Module 4: Web Applications and Site Collections

Module 5: Configure Service Applications

Module 6: Permissions

Module 7: Search

Module 8: User Profiles

Module 9: Ongoing Support and Maintenance

Read More

Module 1: Designing For The Cloud

Module 2: Using System Center Virtual Machine Manager R2

Module 3: Deploying And Maintaining Fabric Resources

Module 4: Building The Private Cloud

Module 5: Monitoring And Optimizing The Private Cloud

Module 6: Planning And Deploying Service Management

Module 7: Automating And Standardizing The Private Cloud

Module 8: Disaster Recovery And High Availability For The Private Cloud

Module 9: Implementing Self­Service Multi­Tenant Private Clouds

Read More

Module 1: Introducing The Cloud Model

Module 2: Configuring The Private Cloud Environment

Module 3: Deploying Services For The Private Cloud

Module 4: Monitoring Cloud Based Applications

Module 5: Service Management For The New Cloud

Module 6: High Availability And Disaster Recovery For The Private Cloud

Module 7: Optimizing The Private Cloud Infrastructure

Module 8: Configuring Multi­Tenant Self­Service Using Windows Azure Pack

Module 9: Configuring And Monitoring The Private Cloud Review

Read More

Module 1: Planning Configuration Manager Infrastructure

Module 2: Migrating To Configuration Manager 2012

Module 3: Installations and Site Role Configuration

Module 4: Cloud Integration

Module 5: Installing The Client

Module 6: Client Health

Module 7: Application Deployment

Module 8: Software Updates

Module 9: Operating System Deployment

Module 10: Inventory and Software Metering

Module 11: Asset Intelligence

Module 12: Reporting

Module 13: Compliance Settings

Module 14: Endpoint Protection

Module 15: Mobile Device Management

Module 16: Role-Based Administration

Module 17: Disaster Recovery

Module 18: Troubleshooting

Read More

Module 1: Getting Started With Windows 10

Module 2: Using File Explorer

Module 3: Using Windows Applications

Module 4: Browsing the Web With Microsoft Edge

Module 5: Customizing Windows

Module 6: Connecting Devices And Devices

Module 7: Managing User Accounts

Module 8: Backing Up Important Data

Module 9: Maintaining Windows

Module 10: Protecting Windows

Module 11: Monitoring Performance

Module 12: Working With Control Panel And Settings

Read More

Module 1: Introduction and Deploy Windows

Module 2: Manage Devices and Data

Module 3: Configure Connectivity

Module 4: Maintain Windows

Module 1: Introduction and Deploy Windows

Module 2: Manage Devices and Data

Module 3: Configure Connectivity

Module 4: Maintain Windows

Read More

Lesson 1: Getting to Know PCs and the Windows 8 User Interface

Lesson 2: Using the Modern Apps and Navigation Features

Lesson 3: Working with Desktop Applications

Lesson 4: Using Internet Explorer 10

Lesson 5: Customizing the Windows 8 Environment

Lesson 6: Using Windows 8 Security Features

Read More

Module 1: Getting Started

Module 2: Getting to Know Adobe Audition

Module 3: The Interface

Module 4: Waveform Editing

Module 5: Effects

Module 6: Audio Restoration

Module 7: Mastering

Module 8: Sound Design

Module 9: Creating and Recording Files

Module 10: Multitrack Sessions

Module 11: Multitrack Session Editing

Module 12: Additional Features and Summary

Read More

Module 1: Introduction to After Effects

Module 2: Intermediate Effects and Techniques in After Effects

Module 3: More Advanced Effects and Techniques in After Effects

Read More

Module 1: Getting Started

Module 2: Getting to Know the Workflow

Module 3: Creating a Basic Animation Using Effects and Presets

Module 4: Animating Text

Module 5: Working With Shape Layers

Module 6: Animating a Multimedia Presentation

Module 7: Animating Photoshop Layers

Module 8: Working With Masks

Module 9: Distorting Objects with the Puppet Tools

Module 10: Using the Roto Brush Tool

Module 11: Performing Color Correction

Module 12: Creating Motion Graphics Templates

Read More

Module 1

Module 2

Read More

Module 1: Tools and Effects in Illustrator

Module 2: Creating Projects in Illustrator

Read More

Module 1

Module 2

Read More

Module 1

Module 2

Module 3

Module 4

Module 5

Module 6

Module 7

Module 8

Module 9

Module 10

Module 11

Read More

Module 1: What is Animation and the Basics

Module 2: Intermediate Animation Techniques

Read More

Module 1: Welcome

Module 2: Why use Lightroom

Module 3: Lightroom library and organization

Module 4: Edit your photo – global adjustments

Module 5: Edit your photo – local adjustments

Module 6: Saving and exporting

Module 7: Lightroom CC overview

Module 8: Outro

Read More

Module 1: Tools and Effects in Photoshop

Module 2: Creating Projects in Photoshop

Read More

Module 1: Introduction to Premiere and Getting Started on an Editing Project

Module 2: More Editing Techniques and Completing a Project

Read More

Module 1

Module 2

Read More

Module 1

Module 2

Read More

Module 1

Module 2

Read More

Module 1: Intro

Module 2: Camera Anatomy

Module 3: Scene Camera Modes

Module 4: Achieve Exposure

Module 5: Filetypes

Module 6: Sensor

Module 7: Resolution

Module 8: White Balance

Module 9: Color Theory

Module 10: Depth of Field

Module 11: Focusing

Module 12: Lighting

Module 13: Metering

Module 14: Composition

Read More

Module 1: Introduction

Module 2: Getting Started

Module 3: Drawing

Module 4: Colors and Gradients

Module 5: Intermediate Illustration

Module 6: Typography

Module 7: Live Trace, Paint Brush and Blob Brush

Module 8: Exporting

Read More

Module 1: Getting Started

Module 2: Layers and More

Module 3: Editing, Techniques and More

Read More

Module 1: Getting Started

Module 2: Motion, Sound, and More

Read More

Module 1 – Google Analytics 4 – Course Overview

  • 1.0 About Google Analytics 4
  • 1.1 Course Intro Welcome
  • 1.2 Instructor Intro

Module 2 – Fundamentals of Google Analytics

  • 2.1 What is a Digital Product
  • 2.2 Google Market Platform
  • 2.3 Google Analytics Overview
  • 2.4 Google Analytics 4 Overview
  • 2.5 Whiteboad Discussion-How Does GA Work
  • 2.6 Comparing GA3 to GA4
  • 2.7 Whiteboard Compare Data Models
  • 2.8 Demo- GA Console Walkthru
  • 2.9 Admin Panel
  • 2.10 Demo Admin Panel
  • 2.11 Tag Manager
  • 2.12 Demo Tag Manager
  • 2.13 Segment Review
  • 2.14 Segment Review Questions

Module 3 – Advanced Topics with Google Analytics

  • 3.1 Upgrading and Running Parallel
  • 3.2 Whiteboard Discussion – Parallel
  • 3.3 Demo Console Parallel
  • 3.4 Hands on Demo – Install GA4 on a Live Site
  • 3.5 Understand Reporting Options, Lifecycle Collections
  • 3.6 Hands on Demo – Exploring reports
  • 3.7 Hands on Demo – Set up GA4 Custom Eventsmp4
  • 3.8 Hands on Demo – Conversions, Audiences, DebugView
  • 3.9 Hands on Demo – Advertising
  • 3.10 Hands on Demo – Explorations:Insights
  • 3.11 Hands on Demo – Lifecycle and Users
  • 3.12 Google Big Query Connections
  • 3.13 Demo – BigQuery Data Integrations
  • 3.14 Google Ads
  • 3.15 Demo – Google Ads
  • 3.16 Google Signals
  • 3.17 Demo – Google Signals
  • 3.18 Certification Options
  • 3.19 Segment Summary
  • 3.20 Review Questions
  • 3.21 Resources
  • 3.22 Course Closeout

Module 1: Introduction to Google Analytics

Module 2: Fundamentals of Google Analytics

Module 3: Basics of Google Anayltics

Module 4: Reports in Google Analytics

Module 5: Behavioral Reports

Module 6: Audience

Module 7: Conversions

Read More

Module 1: Course Overview

Module 2: DevOps Basics

Module 3: App Engine PaaS

Module 4: Kubenetes Engine Overview

Module 5: DevOps Developer Tools

Module 6: Microservices

Module 7: Management of your DevOps Services

Module 8: Resources and Closeout

Read More

Module 1 – Google Cloud Digital Leader Course Overview
1.0 About Google Cloud Digital Leader
1.1 Course and Instructor Intro
1.2 Course PreReqs
1.3 GCP Certification Overview
1.4 GCP Digital Leader Exam Objectives
Module 2 – General Cloud Knowledge
2.0 General Cloud Knowledge
2.1 Domain Objectives
2.2 Intro to Cloud Computing
2.3 Essential Characteristics of Cloud Computing
2.4 Service Models
2.5 Deployment Models
2.6 Multitenancy
2.7 Resilency
2.8 Replication
2.9 Automation and Orchestration
2.10 Chargeback
2.11 Vendor Lockin
2.12 Cloud Standards
2.13 OpEx, CapEx
2.14 TCO-ROI
2.15 Business Enablers
2.16 Section Summary
2.17 Review Questions
Module 3 – General Google Cloud Knowledge
3.0 General GCP Knowledge
3.1 Domain Objectives
3.2 GCP Overview
3.3 Cloud Infrastructure
3.4 Cloud Hierarchy
3.5 Project Demo
3.6 Whiteboard Hierarchy and Projects
3.7 Service Options
3.8 Demo – Services Overview
3.9 Pricing Calculator
3.10 Demo – Pricing Calculator
3.11 Billing models and Discounts
3.12 Demo Billing
3.13 Compliance Resources
3.14 Demo – Compliance Reports Manager
3.15 Support Options
3.16 Service Level Agreement (SLA)
3.17 Google Cloud Framework and Maturity Model
3.18 Demo – Maturity Assessment
3.19 Access to GCP
3.20 Demo – GCP ACCESS
3.21 Section Summary
3.22 Review Questions
Module 4 – Google Cloud Products and Services
4.0 Google Cloud Products and Services
4.1 Domain Objectives
4.2 Core Services
4.3 Google Compute Engine, Google Cloud VMware Engine, and Bare Metal
4.4 Compute Storage and Disk Options
4.5 App Engine, Google Cloud Functions, and Cloud Run
4.6 Google Kubernetes Engine
4.7 Demo Compute Services
4.8 Container registry
4.9 Cost and Performance Tradeoffs of Scale To Zero
4.10 Database Options – Cloud SQL, Cloud Spanner, Cloud Bigtable, BigQuery
4.11 Demo – Database Offerings
4.12 Vision API, AI Platform, TPUs
4.13 Pre Trained Models
4.14 Data Pipeline Offerings
4.15 Data Ingestion Options
4.16 Software Development Life Cycle (SDLC)
4.17 Visibility and Alerting Offerings
4.18 Identify Data Migration Options
4.19 Compute VM Migration
4.20 Whiteboard – Migrations
4.21 Application Modernization
4.22 Define Software-Defined WAN (SD-WAN)
4.23 Connectivity Options
4.24 Whiteboard – Connectivity
4.25 IAM and Security
4.26 Whiteboard Cloud Architecture
4.27 Section Summary
4.28 Review Questions
Module 5 – Google Cloud Digital Leader Course Closeout
5.0 Google Cloud Digital Leader Course Closeout
5.1 Course Review
5.2 Resources
5.3 Exam Overview

Module 1: Introduction to CSS3

Module 2: Understanding The CSS Box Model

Module 3: Working With Page Layouts

Module 4: Using Colors And Backgrounds

Module 5: Web Typography

Module 6: Links, Lists, And Tables

Module 7: Dynamic CSS3 Properties

Read More

Module 1: What Is HTML?

Module 2: The Structure And Components

Module 3: Formatting The Page

Module 4: Structuring Content

Module 5: Adding Links, Images And Other Media

Module 6: Styling Web Pages

Module 7: Creating Your Own Website

Read More

Module 1: Introduction to CSS3

Module 2: Understanding The CSS Box Model

Module 3: Working With Page Layouts

Module 4: Using Colors And Backgrounds

Module 5: Web Typography

Module 6: Links, Lists, And Tables

Module 7: Dynamic CSS3 Properties

Read More

Module 1: What Is HTML?

Module 2: The Structure And Components

Module 3: Formatting The Page

Module 4: Structuring Content

Module 5: Adding Links, Images And Other Media

Module 6: Styling Web Pages

Module 7: Creating Your Own Website

Read More

Module 1: Getting Started with Python

Module 2: Working with Primitive Data Types

Module 3: Working with Multiple Assignments Statements

Module 4: Convert Types in Python

Module 5: Creating Lists

Module 6: Modifying Lists

Module 7: Sorting and Reversing Lists

Module 8: Slicing Lists

Module 9: Working With Operators

Module 10: Determining Operator Precedence

Module 11: Working with IF Statements

Module 12: Working With For Loops

Module 13: Working With While Loops

Module 14: Nesting for Loops

Module 15: Reading Files

Module 16: More on Files

Module 17: Merging Emails

Module 18: Reading Console Inputs and Formatting Outputs

Module 19: Reading Command Line Argument

Module 20: Defining Functions

Module 21: Using Default Argument

Module 22: Using Keyword and Positional Arguments

Module 23: Handling Exceptions

Module 24: Using Math and Random Modules

Module 25: Displaying Daytime Working Directory and File Metadata

Read More

Module 1

Module 2

Module 3

Module 4

Module 5

Module 6

Read More

Module 1: Introduction to Web Development

Module 2: C ­ Sharp

Module 3: HTML and CSS Comprehensive Review

Module 4: Intro to SQL Server

Module 5: Java Script A Comprehensive Introduction

Module 6: Object Based Java Script

Module 7: Model View and Controller

Module 8: A Comprehensive Introduction to jQuery

Module 9: Course Review

Read More

Module 1

Module 2

Module 3

Module 4

Module 5

Module 6

Module 7

Module 8

Read More

Module 1: Organization­ – Wide Planning and Deployment

Module 2: Leadership

Module 3: Organizational Process Measures and Management

Module 4: Team Management

Module 5: Define Phase­ – Overview of the Define Phase and the Voice of the Customer

Module 6: Define Phase – Business Case and Project Charter

Module 7: Define Phase­ – Analytical Tools

Module 8: Measure Phase­ – Process Analysis and Documentation

Module 9: Measure Phase­ – Data Collection

Module 10: Measure Phase – ­Measurement Systems

Module 11: Measure Phase­ – Basic Statistics

Module 12: Measure Phase­ – Probability

Module 13: Measure Phase­ – Process Capability

Module 14: Analyze Phase – Measuring and Modeling Relationships

Module 15: Analyze Phase­ – Hypothesis Testing

Module 16: Analyze Phase­ – FEMA and Additional Analysis Methods

Module 17: Improve Phase­ – Design of Experiments (DOE)

Module 18: Improve Phase­ – Lean Method

Module 19: Improve Phase -­ Implementation

Module 20: Control Phase­ – Statistical Process Control (SPC)

Module 21: Control Phase­ – Other Controls

Module 22: Control Phase­ – Maintain Controls and Sustain Improvements

Module 23: DFSS

Module 24: Exam Review­ – Prep and Key Concepts

Read More

Module 1: Six Sigma And The Organization

Module 2: Define Phase ­Project Identification

Module 3: Define Phase­Voice Of The Customer

Module 4: Define Phase­ Project Management Basics on Six Sigma Green Belt

Module 5: Define Phase­Management And Planning Tools

Module 6: Define Phase­Business Results For Projects

Module 7: Define Phase­Team Dynamics And Define Phase Summary Review Questions

Module 8: Measure Phase­Process Analysis And Documentation

Module 9: Measure Phase­Probability And Statistics

Module 10: Measure Phase­Statistical Distributions

Module 11: Measure Phase­Collecting And Summarizing Data

Module 12: Measure Phase­Measurements System Analysis (MSA)

Module 13: Measure Phase­Process And Performance Capability And Measure Phase Summary And Review

Module 14: Analyze Phase­Exploratory Data Analysis And Hypothesis Testing

Module 15: Analyze Phase ­ Process Drivers

Module 16: Improve Phase­Design Of Experiment (DOE)

Module 17: Improve Phase­Root Cause Analysis

Module 18: Improve Phase­Lean Tools

Module 19: Control Phase­ Statistical Process Control

Module 20: Control Phase­Lean Tools For Process Control

Module 21: Review Exam­Prep And Key Concepts

Read More

Module 1: Virtual Box

Module 2: Basic Commands

Module 3: Special Characters

Module 4: File Editing

Module 5: File System Structure

Module 6: Finding Files

Module 7: Shell Special Characters

Module 8: Regular Expressions

Module 9: Process Management

Module 10: Job Scheduling

Module 11: Customizing Your Account

Module 12: Unix Printing

Module 13: Networking

Module 14: X Windows

Module 15: Back Up And Compression

Module 16: Text Utility

Module 17: Shell Scripting

Module 18: System Administration Basics

Read More

Module 1: Introduction To Application Virtualization

Module 2: XenApp Server Setup

Module 3: Plan For High Availability

Module 4: Scripting Primer

Module 5: Using VMware vSphere

Module 6: Virtualization Using Microsoft Hyper-V

Module 7: Course Review

Read More

Module 1: Introduction To Virtualization

Module 2: Introduction To Desktop Virtualization

Module 3: XenDesktop 7.6 Requirements and Implementations

Module 4: Plan and Design XenDesktop Infrastructure

Module 5: Data And Network Redundancy

Module 6: Automating Using Powershell

Module 7: Virtualizing Using Hyper-V

Module 8: Build Test And Deploy VM To Xen Desktop

Module 9: Internet Information Services

Module 10: Course Review

Read More

Module 1: Intro To XenServer And Virtualization

Module 2: Comprehensive Introduction To Linux

Module 3: Hosts, Storage, And Networking

Module 4: Comprehensive Introduction To Powershell

Module 5: XenServer Components And Features

Module 6: Problem Resolution

Module 7: Review

Read More

  • Introduction
  • Business Entities
  • Beginning Your Business
  • Financial Basics Part 1
  • Financial Basics Part 2
  • Employees Payroll
  • Getting Your Business Out There
  • SEO
  • Other Topics
  • Closing

Read More

Module 1: Setup and Maintenance

Module 2: List Management

Module 3: Sales (Money-In)

Module 4: Purchased (Money-Out)

Module 5: Accounting

Module 6: Reports

Module 7: Customizations and Time Savers

Module 8: Extra

Read More

Module 1: Creating and Setting Up Your Point of Sale Company File

Module 2: Installing your System

Module 3: Navigating and Customizing the Home Page

Module 4: Company Preferences

Module 5: Financial- Setting up QuickBooks Connection

Module 6: Setting up Sales Tax

Module 7: Workstation Preferences

Module 8: Additional Features

Module 9: Employees and Security

Module 10: Customers

Module 11: Rewards Program

Module 12: Vendors

Module 13: Setting Up Your Inventory

Module 14: Item Styles, Assemblies, and Group

Module 15: Working with Inventory

Module 16: Sales

Module 17: Working with Price Levels and Discounts

Module 18: Collecting Sales Tax

Module 19: Adding Shipping Information (Pro/MS)

Module 20: Tracking Sales Commissions

Module 21: Taking Payment and Giving Change

Module 22: Recording Tips

Module 23: Handling Tricky Sales Returns

Module 24: Working with Sales Orders, Work Orders, and Layaways

Module 25: Purchasing Merchandise

Module 26: Receiving from a PO

Module 27: Managing Inventory

Module 28: Reporting

Module 29: QuickBooks Financial

Module 30: Multi-Store

Module 31: Protect your data

Module 32: Adding Third Party Applications

Module 1: Intro and Setup

Module 2: Tools

Module 3: Preferences

Module 4: Security & Users

Module 5: Estimates

Module 6: Sales Orders

Module 7: Receiving Money

Module 8: Bounced Checks

Module 9: Specific Tracking

Module 10: Receiving and Depositing

Module 11: Credit Cards and Bank Accounts

Module 12: Payroll

Module 13: Transactions

Module 14: Accounts and Reports

Module 15: Integrating with Word

Module 16: Data Types

Module 17: Conclusion

Read More

Module 1: Sage 50 2013

Module 2: Sage 50 Basics

Module 3: Inventory

Module 4: Employee

Module 5: Banking

Module 6: Maintenance

Module 7: File Handling

Module 8: Manager

Module 9: Jobs

Module 10: Budgets

Module 11: Charts of Accounts

Module 12: Accounts Management

Module 13: Customer Setup

Module 14: Jobs Setup

Module 15: Vendor Setup

Module 16: Inventory Setup

Module 17: Employee Setup

Module 18: Security Setup

Module 19: ACTI Link

Module 20: Task Overview

Module 21: Forms, Reports, and Recap

Read More

Module 1: Intro to SalesForce Automation

Module 2: Working With The SalesForce System

Module 3: SalesForce Solution

Module 4: SalesForce Admin

Module 5: Migrating To SalesForce

Module 6: Course Conclusion

Read More

Module 1: The Phone

Module 2: The Screen

Module 3: The Keyboard

Module 4: Contacts

Module 5: Phone Calls

Module 6: Messaging

Module 7: Internet

Module 8: Email

Module 9: Music

Module 10: Android Specifics

Module 11: Photos & Video

Module 12: Conclusion

Read More

Module 1: iPhone Basics

Module 2: The Screen

Module 3: The Keyboard

Module 4: Basic Calls and Settings

Module 5: Contacts

Module 6: Phone Calls

Module 7: Messaging

Module 8: Web

Module 9: Email

Module 10: Siri

Module 11: Music

Module 12: Photos and Video

Module 13: Maps

Module 14: Conclusion

Read More

  • Aerobic Bootcamp
  • Baking Cupcakes
  • Chess
  • Cooking
  • Cooking with Children
  • DIY Home Improvement Basics
  • Harassment in the Workplace
  • HIPAA, Fraud, and Abuse
  • Holiday Baking
  • How to Become a Personal Trainer
  • How to Handle Stress in the Workplace
  • ICD 10 & 11 Medical Coding and Billing
  • Jewelry
  • Juicing and Blending
  • Managing Different Personality Types
  • Marketing Tools and Tips for Success
  • Massage Therapy
  • Mastering Bartending in a Week or Less
  • Mastering Beer Brewing
  • Mastering Makeup Application Techniques at Home
  • Medical Coding and Billing ICD 10
  • Medical Coding and Billing ICD-9
  • OSHA Training
  • Photography Basics
  • Special Effects (fx) Makeup Level 1
  • Special Effects (fx) Makeup Level 2
  • Starting Your Own YouTube Channel 101
  • The Key to Nutrition and Wellness
  • Ultimate Resume Building
  • Wedding Makeup and Hair
  • Weight Loss
  • Wine Making
  • Wine Pairing and Tasting
  • Yoga
Module 1 – ChatGPT Fundamentals

  • 1.1 Course Welcome
  • 1.2 Instructor Introduction
  • 1.3 Download Course Resources
  • 1.4 ChatGPT Fundamentals
  • 1.5 What is ChatGPT
  • 1.6 Use Cases for ChatGPT
  • 1.7 Role of ChatGPT
  • 1.8 Future of ChatGPT
  • 1.9 ChatGPT Statistics, Facts & Trends
  • 1.10 Limitations
  • 1.11 What is a Chatbot
  • 1.12 Understanding AI-ML
  • 1.13 Demonstration – Tools to Use with ChatGPT
  • 1.14 Business Benefits
  • 1.15 Whiteboard – How it all works
  • 1.16 Demonstration – How to Get Started with ChatGPT
  • 1.17 Demonstration – Example Prompts
  • 1.18 Discussion – ChatGPT Performance Issues
  • 1.19 Module Summary

Module 2 – ChatGPT Prompt Demonstrations

  • 2.1 ChatGPT Prompt Demonstrations
  • 2.2 What is a Prompt
  • 2.3 Best Practices For Writing Prompts
  • 2.4 Prompt Demonstration – Asking Questions
  • 2.5 Prompt Demonstration – Top Ten Lists
  • 2.6 Prompt Demonstration – Long Form Docs
  • 2.7 Prompt Demonstration – Complex Form and Code
  • 2.8 Prompt Demonstration – Feedback
  • 2.9 Prompt Demonstration – Content Modification
  • 2.10 Prompt Demonstration – Instruction Generation
  • 2.11 Prompt Demonstration – Information Extraction
  • 2.12 Prompt Demonstration – Writing Computer Code
  • 2.13 Prompt Demonstration – Solving Math Problems
  • 2.14 Prompt Demonstration – Create YT Video Outline
  • 2.15 Prompt Demonstration – Write a Blog Article
  • 2.16 Prompt Demonstration – SEO Keywords
  • 2.17 Comparing Google Bard vs ChatGPT
  • 2.18 Module Summary
  • 2.19 Course Closeout

Module 1: Exploring the Functions of Networking

Module 2: Introducing the Host-To-Host Communications Model

Module 3: Introducing LANs

Module 4: Exploring the TCP/IP Link Layer

Module 5: Subnetting

Module 6: Explaining the TCP/IP Transport Layer and Application Layer

Module 7: Exploring the Functions of Routing

Module 8: Exploring the Packet Delivery Process

Module 9: Troubleshooting a Simple Network

Module 10: Introducing Basic IPv6

Module 11: Configuring Static Routing

Module 12: Implementing VLANs and Trunks

Module 13: Routing Between VLANs

Module 14: Introducing OSPF

Module 15: Building Redundant Switched Topologies

Module 16: Improving Redundant Switched Topologies with Ether Channel

Module 17: Exploring Layer 3 Redundancy

Module 18: Introducing WAN Technologies

Module 19: Explaining Basics of ACL

Module 20: Enabling Internet Connectivity

Module 21: Introducing QoS

Module 22: Introducing Architectures and Virtualization

Module 23: Introducing System Monitoring

Module 24: Managing Cisco Devices

Module 25: Examining the Security Threat Landscape

Module 26: Implementing Threat Defense Technologies

Module 27: Exam Preparation

Module 28: Practice Demos

Read More

Module 1: Architecture

Module 2: Virtualization

Module 3: Infrastructure

Module 4: Network Assurance

Module 5: Security

Module 6: Automation

Read More

Module 1: Networking Fundamentals

Module 2: Basic Ethernet LAN Implementation

Module 3: Designing Ethernet LANS

Module 4: Understanding IPv4

Module 5: Working With Cisco Routers

Module 6: IPv4 Design And Troubleshooting

Module 7: IPv4 Services

Module 8: Implementing IPv6

Read More

Module 1: Configuring Ethernet LANs

Module 2: Configuring IPv4 Routing Protocols

Module 3: Wide Area Networks

Module 4: IPv4 Services

Module 5: IPv4 Routing And Troubleshooting

Module 6: IPv6 Routing

Module 7: Cloud Based Networking

Read More

Module 1: Wireless Basics

Module 2: Wireless Standards

Module 3: Wireless Signals

Module 4: Antennas

Module 5: Topologies

Module 6: Frame Types

Module 7: Planning Coverage

Module 8: Architectures

Module 9: Stand Alone And Cloud Deployments

Module 10: Controller Based Deployment

Module 11: Controller Discovery

Module 12: Roaming

Module 13: Radio Resource Management

Module 14: Wireless Security

Module 15: WLAN Configuration

Module 16: Guest Networks

Module 17: Client Connectivity

Module 18: Managing Wireless

Module 19: Interference

Module 20: Troubleshooting

Read More

Module 1: Introducing Cisco Collaboration Architecture

Module 2: Telephony And Call Routing

Module 3: Preparing The Network And Phone Behavior

Module 4: CUCM Administration Interfaces

Module 5: Call Configuration

Read More

Module 1: Pre-Course Chapter 1

Module 2: Pre-Course Chapter 2

Module 3: Cisco Video And Content Delivery

Module 4: Cisco Video Surveillance

Module 5: Cisco Collaboration

Module 6: Central Collaboration Endpoint Control

Module 7: Unified IP Phones, Desk Endpoints And Cisco Jabber

Module 8: Configuring Unified IP Phones And Cisco Jabber

Module 9: Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber

Module 10: Cisco Telepresence Endpoints Installation And Characteristics

Module 11: Configuring Cisco Telepresence CTS And Cisco DX650 Endpoint

Module 12: Configuring Cisco Telepresence TC Endpoints

Module 13: Operating And Troubleshooting Cisco Telepresence Endpoints

Module 14: Cisco Multipoint Conferencing Solutions

Module 15: Configuring And Monitoring Cisco Multipoint

Module 16: Cisco DMP Characteristics And Installation

Module 17: Configuring Cisco DMPs

Module 18: Managing Cisco Edge 340 DMPs

Module 19: Labs

Read More

Module 1: Network Review

Module 2: Terminology And Fundamentals

Module 3: PKI And Cryptography

Module 4: AAA

Module 5: Bring Your Own Device

Module 6: Secure Access

Module 7: VPNs

Module 8: Secure Routing And Switching

Module 9: Firewalls

Module 10: Intrusion Protection System (IPS)

Module 11: Content And Endpoint Security

Read More

Module 1: Plan And Design

Module 2: EIGRP Enhanced Interior Gateway Routing Protocol

Module 3: IPv6

Module 4: OSPF

Module 5: Border Gateway Protocol BGP

Module 6: Course Review

Read More

Module 1: Plan And Design

Module 2: Switch Configuration

Module 3: IP Configuration

Module 4: STP And RTP

Module 5: Routing

Module 6: HSRP, VRRP, GLBP

Module 7: Course Review

Read More

Module 1: Introduction to Cisco Troubleshooting

Module 2: Troubleshooting Switches

Module 3: Troubleshooting VLANS and Trunking

Module 4: Troubleshooting Spanning Tree Protocol, EtherChannel

Module 5: Troubleshooting Inter­VLAN Routing and Layer 3 EtherChannel

Module 6: Troubleshooting Switch Security Features

Module 7: Troubleshooting First­Hop Redundancy Protocols

Module 8: Troubleshooting IPv4 and IPv4 Addressing

Module 9: IPv6 Addressing and Addressing Technologies

Module 10: Troubleshooting IPv4 and IPv6 ACLs and Prefix Lists

Module 11: Troubleshooting GRE and Basic Routing Tunnels

Module 12: Troubleshooting RIPv2 and RIPng

Module 13: Troubleshooting EIGRP

Module 14: OSPF and OSPFv3

Module 15: Troubleshooting Route Maps and Policy Based Routing

Module 16: Troubleshooting Redistribution

Module 17: Troubleshooting BGP

Module 18: Troubleshooting Management Protocols and Tools

Module 19: Troubleshooting Management Access

Read More

Module 1: Introduction

Module 2: Telephony

Module 3: Basic Call Routing

Module 4: VOIP Call Routing

Module 5: CUCME Call Routing Basics

Module 6: Preparing Network For Voice

Module 7: IP Phone Behavior

Module 8: CUCME Administration Basics

Module 9: CUCME StandUp

Module 10: CUCME StandUp Part 2

Module 11: CUCME StandUp CUCME

Module 12: End Users and End User Interfaces

Module 13: Endpoint Implementation

Module 14: Call Coverage

Module 15: Calling Restrictions and Routing

Module 16: CUCME Advance Call Coverage

Module 17: Implementing Unity Connection

Read More

Module 1: Methodologies Used To Design A Network

Module 2: Network Structure And Modularity

Module 3: Basic Enterprise Campus Networks

Module 4: Enterprise Edge And Remote Network Modules

Module 5: IP Addressing And Routing Protocols

Module 6: Enterprise Switching I

Module 7: Enterprise Switching II

Module 8: Subnetting

Module 9: Designing Advanced Services

Read More

Chapter 1: Course Introduction and Methodology

Chapter 2: Virtualization Overview

Chapter 3: Planning and Installing ESXi

Chapter 4: Using tools to Administer a VMware Environment

Chapter 5: vCenter and Licensing

Chapter 6: Configuring Networking

Chapter 7: Configuring Storage

Chapter 8: VM Creation, Configuration, and Snapshots

Chapter 9: Security and Permissions

Chapter 10: Host and VM Monitoring

Chapter 11: Advanced ESXi and vCenter Server Management

Chapter 12: Patching and Upgrading ESXi

Chapter 13: Disaster Recovery and Backup

Read More

Module 1: VM And VMWARE

Module 2: Working With ESX And ESXI

Module 3: Configuring Virtual Machines

Module 4: Vcenter Server

Module 5: VM Storage Option

Module 6: Managing A Virtual World

Module 7: Migrations, High Availability And VM Utilities

Read More

Blockchain

Module 1: Certified Blockchain Developer Hyperledger Overview

Module 2: Hyperledger Framework

Module 3: Hyperledger Fabric Blockchain

Module 4: Access Controls and Secure Chaincode

Module 5: Plan and Prepare Apps for Deployment

Module 6: Hyperledger Fabric Explorer

Module 7: Chaincode and Development

Module 8: Course Wrap Up

Read More

Module 1: Certified Blockchain Developer Hyperledger Overview

Module 2: Hyperledger Framework

Module 3: Hyperledger Fabric Blockchain

Module 4: Access Controls and Secure Chaincode

Module 5: Plan and Prepare Apps for Deployment

Module 6: Hyperledger Fabric Explorer

Module 7: Chaincode and Development

Module 8: Course Wrap Up

Read More

Module 1: Course Overview

Module 2: Pre-Sales Activities

Module 3: Blockchain Fundamentals

Module 4: Enterprise Blockchains

Module 5: Use Cases

Module 6: Course Closeout

Read More

Module 1 – CompTIA CySA+ CS0-003 Basics
1.1 Course Introduction
1.2 Instructor Introduction
1.3 What is CySA
1.4 Exam Objectives
1.5 Cybersecurity Pathway
1.6 DoD Baseline Certfication
Module 2 – CompTIA CySA+ CS0-003 Domain 1 – Security Operations
2.1 Domain 1 – Security Operations Overview
2.2 System and Network Architecture Concepts in Security Operations
2.3 Log Files
2.4 Operating Systems
2.5 Infrastructure Concepts
2.6 Network Architecture
2.7 Software Defined Networking
2.8 Whiteboard Discussion – Network Architectures
2.9 Identity and Access Management IAM Basics
2.10 Demonstration – IAM
2.11 Encryption
2.12 Sensitive Data
2.13 1.2 Analyze Indicators of Potentially Malicious Activity
2.14 Network Attack
2.15 Host Attacks
2.16 Application Related Attacks
2.17 Social Attacks
2.18 Tools or Techniques to Determine Malicious Activity Overview
2.19 Tools and Toolsets For Identifying Malicious Activity
2.20 Common Techniques
2.21 Programming Concerns
2.22 Threat-Intelligence and Threat-Hunting Concepts Overview
2.23 Threat Actors
2.24 Tactics, Techniques and Procedures
2.25 Confidence Levels IOC
2.26 Collection Sources
2.27 Threat Intelligence
2.28 Cyber Response Teams
2.29 Security Operations
2.30 Standardized Processes and Operations
2.31 Security Operations Tools and Toolsets
2.32 Module 2 Review
Module 3 – CompTIA CySA+ CS0-003 Domain 2 – Vulnerability Management
3.1 Domain 2 – Vulnerability Management Overview
3.2 Vulnerability Discovery and Scanning
3.3 Asset Discovery and Scanning
3.4 Industry Frameworks
3.5 Mitigating Attacks
3.6 CVSS and CVE
3.7 Common Vulnerability Scoring System (CVSS) interpretation
3.8 CVE Databases
3.9 Cross Site Scripting (XSS)
3.10 Vulnerability Response, Handling, and Management
3.11 Control Types (Defense in Depth, Zero Trust)
3.12 Patching and Configurations
3.13 Attack Surface Management
3.14 Risk Management Principles
3.15 Threat Modeling
3.16 Threat Models
3.17 Secure Coding and Development (SDLC)
3.18 Module 3 Review
Module 4 – CompTIA CySA+ CS0-003 Domain 3 – Incident Response and
Management
4.1 Domain 3 – Incident Response and Management Overview
4.2 Attack Methodology Frameworks
4.3 Cyber Kill Chain
4.4 Frameworks to Know
4.5 Incident Response and Post Reponse
4.6 Detection and Analysis
4.7 Post Incident Activities
4.8 Containment, Eradication and Recovery
4.9 Module 4 Review
Module 5 – CompTIA CySA+ CS0-003 Domain 4 – Reporting and Communication
5.1 Domain 4 – Reporting and Communication Overview
5.2 Reporting Vulnerabilities Overview
5.2.1 Vulnerability Reporting
5.3 Compliance Reports
5.4 Inhibitors to Remediation
5.5 Metrics and KPI’s
5.6 Incident Response Reporting and Communications Overview
5.7 Incident Declaration
5.8 Communication with Stakeholders
5.9 Root Cause Analysis
5.10 Lessons Learned and Incident Closure
5.11 Module 5 Review
Module 6 – CompTIA CySA+ CS0-003 – Course Closeout
6.1 Course Closeout Overview
6.2 Practice Questions
6.3 Exam Process
6.4 Continuing Education
6.5 Course Closeout

Module 1 – CompTIA Cloud+ CV0-003 Course Overview

  • 1.0 Course Trailer
  • 1.1 Course Overview
  • 1.2 What is the Cloud + Exam
  • 1.3 Cloud + Domain Obectives Overview
  • 1.4 CompTIA Certification Pathways
  • 1.5 DoD and ISO Requirements

Module 2 – General Cloud Knowledge

  • 2.1 Domain Overview
  • 2.2 Compare and Contrast Cloud Models
  • 2.3 Cloud Computing Defined
  • 2.4 Deployment Models
  • 2.5 Service Models
  • 2.6 Cloud Characteristics
  • 2.7 Cloud Roles
  • 2.8 Evaluate Cloud Providers and Services
  • 2.9 Regions and Zones
  • 2.10 Shared Responsibility Model
  • 2.11 Demonstration – AWS Shared Security Model
  • 2.12 Comparing Cloud to Virtualization
  • 2.13 Comparing Cloud to On Premises
  • 2.14 What is a Virtual Machine
  • 2.15 Demonstration – Deploy a Cloud VM (AWS EC2)
  • 2.16 What is an API
  • 2.17 Capacity Planning Factors
  • 2.18 Licensing, Factors, Requirements and Planning
  • 2.19 Capacity Planning
  • 2.20 Demonstration – AWS Trusted Advisor
  • 2.21 HA and Scaling
  • 2.22 High Availability and Disaster Recovery
  • 2.23 Virtual, System and Communication Protection
  • 2.24 Hypervisor Affinity
  • 2.25 Analyze the solution design
  • 2.26 Business Requirements
  • 2.27 Business Enablers
  • 2.28 Demonstration -AWS Well Architected Tool
  • 2.29 Testing Techniques
  • 2.30 Testing Success Factors
  • 2.31 Module Review Questions
  • 2.32 Module Summary Review

Module 3 – Cloud Security

  • 3.1 Domain Overview
  • 3.2 Configure Identity and Access Management
  • 3.3 Identification and Authorization Management (IAM)
  • 3.4 SDLC
  • 3.5 Directory Services
  • 3.6 Security and Access Controls
  • 3.7 Federation
  • 3.8 SSO and MFA
  • 3.9 Certificates and Key Management
  • 3.10 Secure a Network in a Cloud Environment
  • 3.11 Networking Devices and Segmentation
  • 3.12 Firewalls and Proxies
  • 3.13 NAT and PAT
  • 3.14 Secure Network Configurations (Tunnelling and Encryption)
  • 3.15 Demo Hardening and Configuration Changes
  • 3.16 OS Application Controls and Security Credentials
  • 3.17 Policies and Permissions
  • 3.18 Host and Network Protections (HIDSIPS)
  • 3.19 Virtualization Security
  • 3.20 Monitoring
  • 3.21 Data Security and Compliance Controls in Cloud Environments
  • 3.22 Structured, Unstructured and Semi Structured Data
  • 3.23 Data Classification and Labeling
  • 3.24 Data Loss Prevention
  • 3.25 Demonstration – Google Cloud DLP
  • 3.26 Chain of Custody and Non-Repudiation
  • 3.27 Discussion – CASB
  • 3.28 Module Summary Review
  • 3.29 Module Review Questions

Module 4 – Cloud Deployment

  • 4.1 Domain Overview
  • 4.2 Integrate Components into Cloud Solutions
  • 4.3 Subscription Services
  • 4.4 Demonstration – Provision VM
  • 4.5 Cloud Infrastructure Components
  • 4.6 Whiteboard – Design a Resilent AWS Cloud Architecture
  • 4.7 Containers
  • 4.8 Microservices
  • 4.9 Demonstration – Deploy Containers
  • 4.10 Scaling
  • 4.11 Provision Storage
  • 4.12 Cloud Storage Protocols
  • 4.13 Storage Features
  • 4.14 Storage Cost Considerations
  • 4.15 Storage Performance
  • 4.16 RAID and Tiering
  • 4.17 Demonstration – AWS S3
  • 4.18 Deploy Cloud Networking Solutions
  • 4.19 Connecting to The Cloud
  • 4.20 Network Protocols
  • 4.21 VPNS, VPC and Connectivity
  • 4.22 Whiteboard – AWS VPC Connectivity
  • 4.23 Demonstration – AWS VPC
  • 4.24 Software Defined Networking (SDN)
  • 4.25 Compute Sizing
  • 4.26 Virtualization Considerations
  • 4.27 Resource Rightsizing (CPU, Memory, etc)
  • 4.28 Module Summary Review
  • 4.29 Module Review Questions

Module 5 – Operations and Support

  • 5.1 Domain Overview
  • 5.2 Logging Monitoring and Alerting
  • 5.3 Logging, Storage and Analysis of Data Events
  • 5.4 Monitoring Cloud Resources
  • 5.5 Service Level Agreements
  • 5.6 Demonstration – SLAs in AWS
  • 5.7 Maintain Efficient Operations of a Cloud Environment
  • 5.8 Lifecycle Management
  • 5.9 Change and Asset Management
  • 5.10 SOP, Patching and Upgrades
  • 5.11 Orchestration and Automation
  • 5.12 Orchestration or Automation
  • 5.13 DevOps, IaC and CICD Pipelines
  • 5.14 Playbooks and Templates
  • 5.15 Backup and Restore Operations
  • 5.16 Backup Types, Objects, Targets
  • 5.17 Restore and Recovery
  • 5.18 Module Summary Review
  • 5.19 Module Review Questions

Module 6 – Troubleshooting

  • 6.1 Domain Overview
  • 6.2 Troubleshooting Methodology Intro
  • 6.3 Troubleshooting Methodology
  • 6.4 Troubleshoot Security Issues
  • 6.5 Cloud Attacks
  • 6.6 Security Groups and NACLS
  • 6.7 Troubleshoot Deployment Issues
  • 6.8 Discussion Site Connectivity Issues
  • 6.9 Discussion – Capacity Issues
  • 6.10 Connectivity Issues
  • 6.11 Connectivity Troubleshooting Tools
  • 6.12 Demonstration – GCP AWS Azure Latency Test
  • 6.13 Module Summary Review
  • 6.14 Module Review Questions

Module 7 – Course Closeout

  • 7.1 Exam Preparation
  • 7.2 Course Closeout

Module 1 – Mobile Devices

Module 2 – Networking

Module 3 – Hardware

Module 4 – Virtualization and Cloud Computing

Module 5 – Hardware and Network Troubleshooting

Read More

Module 1 – Operating Systems

Module 2 – Security

Module 3 – Software Troubleshooting

Module 4 – Operational Procedures

Read More

Module 1 – Risk Management

Module 2 – Enterprise Security Architecture

Module 3 – Enterprise Security Operations

Module 4 – Technical Integration of Enterprise Security

Module 5 – Research, Development and Collaboration

Read More

Domain 1 – Characteristics of Cloud Services from a Business Perspect

Domain 2 – Cloud Computing and Business Value

Domain 3 – Technical Perspectives/Cloud Types

Domain 4 – Steps to Successful Adoption of Cloud

Domain 5 – Impact and Changes of Cloud Computing on IT Service Management

Domain 6 – Risks and Consequences of Cloud Computing

Read More

Module 1

Module 2

Module 3

Module 4

Module 5

Module 6

Module 7

Read More

Module 1: Threat Management

Module 2: Vulnerability Management

Module 3: Cyber Incident Response

Module 4: Security Architecture and Tool Sets

Read More

Module 1: Threat and Vulnerability Management

Module 2: Software and Systems Security

Module 3: Security Operations and Monitoring

Module 4: Incident Response

Module 5: Compliance and Assessment

Module 6: Afterword

Read More

Module 1 – IT Concepts and Terminology

Module 2 – Infrastructure

Module 3 – Applications and Software

Module 4 – Software Development

Module 5 – Database Fundamentals

Module 6 – Security

Read More

Module 1: Intro & Performing Basic Linux Tasks

Module 2: Managing Users and Groups

Module 3: Managing Permissions and Ownership

Module 4: Managing Storage

Module 5: Managing Files and Directories

Module 6: Managing Kernel Modules

Module 7: Managing the Linux Boot Process

Module 8: Managing System Components

Module 9: Managing Devices

Module 10: Managing Networking

Module 11: Managing Packages and Software

Module 12: Securing Linux Systems

Module 13: Working with Bash Scripts

Module 14: Automating Tasks

Module 15: Installing Linux

Read More

Module 1: Instructions

Module 2: Managing Software

Module 3: Configuring Hardware

Module 4: Managing Files

Module 5: Booting Files

Module 6: X

Module 7: Admin

Module 8: Basic Networking

Module 9: Scripts

Module 10: Security

Read More

Module 1: Over-The-Air Technologies

Module 2: Network Infrastructure

Module 3: Mobile Device Manager

Module 4: Security

Module 5: Troubleshooting

Read More

Module 1 – Networking Concepts

Module 2 – Infrastructure

Module 3 – Network Operation

Module 4 – Network Security

Module 5 – Network Troubleshooting and Tools

Read More

Module 1 – The Pen Test Engagement

Module 2 – Passive Reconnaissance

Module 3 – Active Reconnaissance

Module 4 – Physical Security

Module 5 – Social Engineering

Module 6 – Vulnerability Scan Analysis

Module 7 – Password Cracking

Module 8 – Penetrating Wired Networks

Module 9 – Penetrating Wireless Networks

Module 10 – Windows Exploits

Module 11 – Linux Exploits

Module 12 – Mobile Devices

Module 13 – Specialized Systems

Module 14 – Scripts

Module 15 – Application Testing

Module 16 – Web App Exploits

Module 17 – Lateral Movement

Module 18 – Persistence

Module 19 – Cover Your Tracks

Module 20 – The Report

Module 21 – Post Engagement Cleanup

Read More

Module 1 – SY0-701 General Security Concepts
1.0 Introduction to the Course
1.1 Fundamental Security Concepts
1.2 Zero Trust
1.3 Deception and Disruption
1.3.1 ACTIVITY – Testing a Honeypot
1.4 Security Controls
1.5 Change Management and Security
1.6 Cryptography Basics
1.6.1 ACTIVITY – Examining Symmetric Encryption
1.7 Asymmetric Encryption
1.7.1 ACTIVITY – Exploring Asymmetric Encryption
1.8 Hashing
1.8.1 ACTIVITY – Verifying Integrity with Hashing
1.9 Digital Certificates
1.10 Public Key Infrastructure
1.11 Data and Keys
1.12 Crypto Implementations
1.13 Blockchain
1.14 Non-Cryptographic Data Protection
Module 2 – SY0-701 Threats, Vulnerabilities, and Mitigations
2.1 Threat Actors and Motivations
2.2 Threat Vectors
2.2.1 ACTIVITY – O.MG Cable Baiting
2.2.2 O.MG-No Cable
2.3 Social Engineering
2.4 Operating System Vulnerabilities and Attacks
2.5 Application Vulnerabilities and Attacks
2.5.1 ACTIVITY – Performing a Buffer Overflow
2.6 Web-based Vulnerabilities and Attacks
2.6.1 ACTIVITY – Abusing Unsanitized Input
2.6.2 ACTIVITY – Grabbing Passwords with SQL Injection
2.6.3 ACTIVITY – Swiping a Token with XSS
2.7 Other Vulnerabilities
2.8 Common Malicious Activity Indicators
2.9 Insider Threat Indicators
2.10 Social Engineering Indicators
2.10.1 ACTIVITY – Capturing Credentials through Social Engineering
2.11 Malware Activity Indicators
2.12 Operating System Attack Indicators
2.13 Application Attack Indicators
2.13.1 ACTIVITY – Recognizing Directory Traversal
2.14 Physical Attack Indicators
2.14.1 ACTIVITY – Quickly Cloning an RFID Badge
2.15 Network Attack Indicators
2.15.1 ACTIVITY – Crashing a Target with DoS
2.16 Cryptographic Attack Indicators
2.17 Password Attack Indicators
2.17.1 ACTIVITY – Password Cracking
2.18 Network Segmentation
2.19 Access Control
2.20 Enterprise Device Hardening
Module 3 – SY0-701 Security Architecture
3.1 Network Segmentation
3.1.1 ACTIVITY – Segementing a Network
3.2 High Availability
3.3 Virtualization
3.3.1 ACTIVITY – Deploying Docker Containers
3.4 Cloud
3.5 Serverless Computing
3.6 IoT
3.7 ICS SCADA
3.7.1 ACTIVITY – Operating a SCADA System
3.8 RTOS and Embedded Systems
3.9 Reducing the Attack Surface
3.10 Firewalls
3.11 IDS IPS.mp4
3.12 Secure Communications – Access
3.13 Port Security
3.14 SD-WAN and SASE
3.15 Data Classifications
3.16 Protecting Data Types
3.17 Data Considerations
3.18 Redundancy
3.19 Alternate Sites
3.20 Multiple Platforms
3.21 Business Continuity
Module 4 – SY0-701 Security Operations
4.1 Secure Baselines
4.2 Attack Surface Reduction
4.3 Wireless Installation
4.4 Wireless Security Settings
4.5 Mobile Solutions
4.5.1 ACTIVITY – Pwning a Mobile Device
4.6 Application Security Management
4.7 Asset Management
4.8 Vulnerability Management
4.9 Monitoring Activities
4.10 Monitoring Tools
4.10.1 ACTIVITY – Scanning a Network for Vulnerabilities
4.11 Firewall Configuration
4.11.1 ACTIVITY – Configuring Firewall Rules
4.12 Intrusion Detection Configuration
4.13 Web Traffic Filtering
4.14 Operating System Policy
4.14.1 ACTIVITY – Examining Windows Group Policy
4.15 Network Service Security
4.16 Data Loss Protection
4.16.1 ACTIVITY – Checking File Integrity
4.17 Network Access Control
4.17.1 ACTIVITY – Require Multifactor Authentication
4.18 Identity Management
4.19 Access Management
4.19.1 ACTIVITY – Implementing Access Control
4.20 Security Automation
4.21 Incident Response
4.22 Digital Forensics
Module 5 – SY0-701 Security Program Management and Oversight
5.1 Elements of Effective Security Governance
5.2 Elements of the Risk Management Process
5.3 Third Party Risk Assessment and Management
5.3.1 ACTIVITY – Analyzing the Solar Winds Supply Chain Failure
5.4 Effective Security Compliance
5.5 Audits and Assessments
5.5.1 ACTIVITY – Conducting OSINT
5.5.2 ACTIVITY – Performing Active Reconnaissance
5.6 Security Awareness Practices
5.7 Course Outro

Module 1: Information Security Roles Security Control and Framework Types

Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources

Module 3: Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing

Module 4: Social Engineering, Indicators of Malware Attacks

Module 5: Cryptography

Module 6: Certificates and PKI

Module 7: Authentication

Module 8: Identity and Accounts, Authorization, Personnel Polices

Module 9: Network Design and Hardware (Part 1)

Module 10: Network Hardware (Part 2)

Module 11: Network Protocols

Module 12: Endpoint Security

Module 13: Mobile Devices

Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation

Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualization

Module 16: Privacy and Data Protection

Module 17: Incident Response

Module 18: Forensics

Module 19: Risk Management and Business Impact Analysis

Module 20: Redundancy and Backup Strategies

Module 21: Physical Security

Module 22: Afterword

Read More

Module 1: Threats, Attacks and Vulnerabilities

Module 2: Technologies and Tools

Module 3: Architecture and Design

Module 4: Identity and Access Management

Module 5: Risk Management

Module 6: Cryptography and PKI

Read More

Module 1: Course Overview

Module 2: Kubernetes and Container Fundamentals

Module 3: Configuration

Module 4: Multi Container Pods

Module 5: Observability

Module 6: Pod Design

Module 7: Services and Networking

Module 8: State Persistence

Module 9: CKA Practice Exams

Module 10: Course Closeout

Read More

Module 1: Course Overview

Module 2: Kubernetes and Container Fundamentals

Module 3: Kubernetes Installation

Module 4: Working with Kubernetes Clusters and Nodes

Module 5: API Access and Commands

Module 6: Running Pods and DeploymentsModule 7: Configuring Storage

Module 8: Kubernetes Networking

Module 9: Managing Security

Module 10: Managing Kubernetes In the Enterprise

Module 11: Kubernetes Monitoring and Troubleshooting

Module 12: CKA Practice Exams

Module 13: Course Closeout

Read More

Module 1: Course Overview

Module 2: Basics of Kubernetes

Module 3: Kubernetes Design and Architecture

Module 4: Deployments

Module 5: Course Closeout

Read More

Module 1: Course Overview

Module 2: The Basics

Module 3: Development

Module 4: Infrastructure

Module 5: Key Performance Indicators (KPIs)

Module 6: Course Closeout

Read More

Module 1: Introduction to AWS Basics

Module 2: AWS Web Services and Cloud Platform Services

Module 3: AWS Basic Summary

Module 4: Introduction to AWS Deep Dive

Module 5: AWS Management of Services and Features Deep Dive

Module 6: AWS Deep Dive Summary

Read More

Module 1: Introduction to Cloud Computing

Module 2: Identity and Access Management IAM

Module 3: Elastic Cloud Computing EC2

Module 4: EC2 Storage

Module 5: Elastic Load Balancer and Auto Scaling Group ELB and ESG

Module 6: Amazon S3

Module 7: Database and Analytics

Module 8: Other Services

Module 9: Scaling Your Infrastructure

Module 10: Global Applications

Module 11: Cloud Integration

Module 12: Cloud Monitoring

Module 13: Virtual Private Network

Module 14: Security and Compliance

Module 15: Machine Learning

Module 16: Advanced Identity

Module 17: Are You Well Architected?

Module 18: Congratulations & Exam Preparation

Read More

Module 1: Introduction

Module 2: Information Security Governance

Module 3: Information Security Risk Management

Module 4: InfoSec Prog Development and Management

Module 5: Information Security Incident Management

Module 6: Exam Prep

Read More

Domain 1: Information Security Governance

Domain 2: Risk Management

Domain 3: Information Security Program

Domain 4: Information Security Program Implementation

Domain 5: Information Security Program Management

Domain 6: Incident Management and Response

Read More

Cloud Concepts, Architecture and Design

Legal, Risk and Compliance

Cloud Data Security

Cloud Platform and Infrastructure Security

Cloud Application Security

Cloud Security Operations

Read More

Module 1 – Introduction to Ethical Hacking

Module 2 – Footprinting and Reconnaissance

Module 3 – Network Scanning

Module 4 – Enumeration

Module 5 – Vulnerability Analysis

Module 6 – Malware Threats

Module 7 – Sniffing

Module 8 – Social Engineering

Module 9 – Denial of Service

Module 10 – Session Hijacking

Module 11 – Hacking Webservers

Module 12 – Hacking Web Applications

Module 13 – SQL Injection

Module 14 – Hacking Wireless Networks

Module 15 – System Hacking

Module 16 – Hacking Mobile Platforms

Module 17 – Evading IDS, Firewalls, and Honeypots

Module 18 – Cryptography

Module 19 – Cloud Computing

Module 20 – IoT Hacking

Read More

Module 1 – CEH v11 Foundations Course Introduction

  • 1.1 About this course: CEH Foundations
  • 1.2 About the Instructor

Module 2 – CEH v11 Introduction To Networking

  • 2.1 Networking Overview
  • 2.2 Network Scope
  • 2.3 Network Addressing
  • 2.4 Activity – Examining Network Addressing

Module 3 – CEH v11 Lan Components

  • 3.1 Protocols, Ports, Sockets
  • 3.2 Network Topologies
  • 3.3 LAN Devices
  • 3.4 LAN Devices Part 2
  • 3.5 VLANs
  • 3.6 Activity – Examining Ports and Sockets
  • 3.7 Activity – Examining Switches and VLANs

Module 4 – CEH v11 Routing and Network Access

  • 4.1 Routers
  • 4.2 Layer 3 Switches
  • 4.3 Modems and Remote Access
  • 4.4 Firewalls and Proxies
  • 4.5 Activity – Examining Routing
  • 4.6 Activity – Examining VLAN Routing
  • 4.7 Activity – Examining Firewall Rules

Module 5 – CEH v11 Intrusion Detection and Network Layers

  • 5.1 IDS and IPS
  • 5.2 OSI Model
  • 5.3 TCP-IP
  • 5.4 Activity – Examining Network Layers

Module 6 – CEH v11 Networking Protocols and Addressing

  • 6.1 Layer 4 Protocols
  • 6.2 Layer 3 Protocols
  • 6.3 Layer 2 Protocols
  • 6.4 IP Addressing
  • 6.5 Subnetting
  • 6.6 DHCP
  • 6.7 Activity – Examining TCP
  • 6.8 Activity – Examining UDP
  • 6.9 Activity – Examining IP
  • 6.10 Activity – Examining ICMP
  • 6.11 Activity – Examining ARP

Module 7 – CEH v11 Network Services

  • 7.1 DNS
  • 7.2 DNS Records
  • 7.3 NTP
  • 7.4 Authentication
  • 7.5 Biometrics
  • 7.6 Activity – Examining DNS
  • 7.7 Activity – Examining DNS Records

Module 8 – CEH v11 Access Control

  • 8.1 Local Authentication
  • 8.2 Directory Service Authentication
  • 8.3 Extending Authentication
  • 8.4 Authorization
  • 8.5 Activity – Testing Access Control

Module 9 – CEH v11 Intro to Linux

  • 9.1 Linux Overview
  • 9.2 Linux File System
  • 9.3 Linux Core Commands
  • 9.4 Linux Search and Read Commands
  • 9.5 Activity – Exploring Linux
  • 9.6 Activity – Using Linux Core Commands
  • 9.7 Activity – Using Linux Search Commands
  • 9.8 Activity – Using Linux Read Commands

Module 10 – CEH v11 Configuring Linux

  • 10.1 Linux File Permissions
  • 10.2 Linux Special Permissions
  • 10.3 Linux Configuration
  • 10.4 Linux Packages
  • 10.5 Linux User Management

Module 11 – CEH v11 Practicing Linux Configuration

  • 11.1 Activity – Setting Linux Permissions
  • 11.2 Activity – Setting Linux Special Permissions
  • 11.3 Activity – Managing Packages in Kali Linux
  • 11.4 Activity – Managing Users and Groups in Linux

Module 12 – CEH v11 Managing Linux

  • 12.1 Linux Job Scheduling
  • 12.2 Linux File, Directory, and Download Commands
  • 12.3 Linux System Commands
  • 12.4 Linux Network Management
  • 12.5 Linux Firewall

Module 13 – CEH v11 Practicing Linux Management

  • 13.1 Activity – Scheduling Tasks in Linux
  • 13.2 Activity – Using Linux File, Directory, and Download Commands
  • 13.3 Activity – Using Linux Edit and Archive Commands
  • 13.4 Activity – Compiling Malicious Code
  • 13.5 Activity – Using Linux Process and System Commands
  • 13.6 Activity – Using Linux Disk, Hardware, and Network Commands

Module 14 – CEH v11 Intro to Windows

  • 14.1 Windows Overview
  • 14.2 Windows Registry
  • 14.3 Windows Security

Module 15 – CEH v11 Windows Commands

  • 15.1 Windows Commands
  • 15.2 Windows Admin Commands
  • 15.3 Windows Network Commands
  • 15.4 Windows Run Line Commands
  • 15.5 Windows PowerShell

Module 16 – CEH v11 Practicing Windows Commands

  • 16.1 Activity – Using Windows Built-in Commands
  • 16.2 Activity – Using Windows Task Commands
  • 16.3 Activity – Using Windows Admin Commands
  • 16.4 Activity – Using Windows Network Commands
  • 16.5 Activity – Using Windows PowerShell
  • 16.6 Networking and OS Penetration Testing
  • 16.7 Review

Module 17 – CEH v11 Intro to Hacking

  • 17.1 Information Security Overview
  • 17.2 Hacking Concepts
  • 17.3 Ethical Hacking Concepts
  • 17.4 Penetration Testing
  • 17.5 Penetration Testing Part 2
  • 17.6 Activity – Performing a Static Code Review

Module 18 – CEH v11 Information Security

  • 18.1 Cyber Kill Chain Concepts
  • 18.2 Activity – Performing Weaponization
  • 18.3 Information Security
  • 18.4 Security Policies
  • 18.5 Security Controls
  • 18.6 Access Control

Module 19 – CEH v11 Protecting Data

  • 19.1 Data Protection
  • 19.2 Backup Sites
  • 19.3 Vulnerability Management
  • 19.4 SIEM
  • 19.5 Risks

Module 20 – CEH v11 Managing Risk

  • 20.1 Risk Management
  • 20.2 Incident Handling
  • 20.3 Information Security Laws and Standards
  • 20.4 Activity – Assessing Risk
  • 20.5 Ethical Hacking Penetration Testing
  • 20.6 Review
  • 20.7 Conclusion
Module 21 – CEH v11 Ethical Hacker Course Intro

  • 21.1 About this course – Ethical Hacker
  • 21.2 About the Instructor

Module 22 – CEH v11 Intro to Footprinting

  • 22.1 Footprinting Concepts
  • 22.2 Footprinting Methodology
  • 22.3 OSINT Tools
  • 22.4 Advanced Google Search
  • 22.5 Whois Footprinting
  • 22.6 Activity – Performing a Whois Lookup

Module 23 – CEH v11 Footprinting Network Services

  • 23.1 DNS Footprinting
  • 23.2 Website Footprinting
  • 23.3 Email Footprinting
  • 23.4 Network Footprinting
  • 23.5 Footprinting through Social Networking Sites

Module 24 – CEH v11 Defend Against Footprinting

  • 24.1 Competitive Intelligence Gathering
  • 24.2 Footprinting Countermeasures
  • 24.3 Footprinting Penetration Testing
  • 24.4 Review

Module 25 – CEH v11 Intro to Scanning

  • 25.1 Scanning Concepts
  • 25.2 ICMP Discovery Scans
  • 25.3 Other Discovery Scans

Module 26 – CEH v11 Port Scanning

  • 26.1 Ports
  • 26.2 TCP Flags and Handshakes
  • 26.3 TCP Scan Types
  • 26.4 Other Scanning Techniques

Module 27 – CEH v11 Vulnerability Scanning

  • 27.1 Banner Grabbing
  • 27.2 Vulnerability Scanning
  • 27.3 SSDP Scanning

Module 28 – CEH v11 NMAP

  • 28.1 Nmap
  • 28.2 Common Nmap Scans
  • 28.3 Nmap Options
  • 28.4 Nmap Stealth Scans
  • 28.5 Hping and Other Scanners

Module 29 – CEH v11 Firewalls and Intrusion Detection

  • 29.1 Firewall Types
  • 29.2 Firewall Features
  • 29.3 Firewall Features Part 2
  • 29.4 Firewall Configurations
  • 29.5 Intrusion Detection and Prevention

Module 30 – CEH v11 Evading Detection

  • 30.1 Firewall and IDS Evasion
  • 30.2 Firewall and IDS Evasion Part 2
  • 30.3 Firewalking
  • 30.4 Probing a Firewall
  • 30.5 Probing a Firewall Part 2

Module 31 – CEH v11 Proxies and VPNs

  • 31.1 Proxies
  • 31.2 VPNs
  • 31.3 Tor
  • 31.4 Scanning Countermeasures
  • 31.5 Scanning Penetration Testing
  • 31.6 Review

Module 32 – CEH v11 Accessing Vulnerability

  • 32.1 Vulnerability Assessment Overview
  • 32.2 Vulnerability Scoring Systems
  • 32.3 Vulnerability Assessment Tools

Module 33 – CEH v11 Vulnerability Research

  • 33.1 Scanner Output and Reports
  • 33.2 Vulnerability Research
  • 33.3 Review

Module 34 – CEH v11 Intro to Enumeration

  • 34.1 Enumeration Concepts
  • 34.2 Enumeration Techniques and Tools
  • 34.3 Service and Application Enumeration
  • 34.4 SMB and NetBIOS Enumeration

Module 35 – CEH v11 Service Enumeration

  • 35.1 SNMP Enumeration
  • 35.2 LDAP Enumeration
  • 35.3 DNS Enumeration
  • 35.4 SMTP Enumeration
  • 35.5 NTP Enumeration

Module 36 – CEH v11 Advanced Enumeration

  • 36.1 Remote Connection Enumeration
  • 36.2 File Transfer Enumeration
  • 36.3 VoIP Enumeration
  • 36.4 IPSEC Enumeration
  • 36.5 IPv6 Enumeration
  • 36.6 BGP Enumeration

Module 37 – CEH v11 Command Line Enumeration

  • 37.1 Windows Command Line Enumeration
  • 37.2 Linux Command Line Enumeration
  • 37.3 Linux Command Line Enumeration Part 2

Module 38 – CEH v11 Defending Against Enumeration

  • 38.1 Enumeration Countermeasures
  • 38.2 Enumeration Countermeasures Part 2
  • 38.3 Enumeration Penetration Testing
  • 38.4 Review

Module 39 – CEH v11 Intro to System Hacking

  • 39.1 System Hacking Concepts
  • 39.2 System Hacking Tools and Frameworks
  • 39.3 Searchsploit
  • 39.4 Compiling and Running Exploits

Module 40 – CEH v11 System Hacking with Metasploit

  • 40.1 Metasploit
  • 40.2 Metasploit Search
  • 40.3 Metasploit Exploits and Payloads
  • 40.4 Metasploit Meterpreter
  • 40.5 Metasploit Connectivity
  • 40.6 Metasploit Impersonation and Migration

Module 41 – CEH v11 Further Attacking a Compromised System

  • 41.1 Netcat
  • 41.2 Pivoting
  • 41.3 Netcat Relays
  • 41.4 Metasploit Post Exploitation Modules
  • 41.5 Common Operating System Exploits

Module 42 – CEH v11 Hacking an Operating System

  • 42.1 Hacking Windows
  • 42.2 Hacking Linux
  • 42.3 Network Service Exploits
  • 42.4 Password Attacks

Module 43 – CEH v11 Password Cracking Overview

  • 43.1 Dictionary Attack
  • 43.2 Brute Force Attack
  • 43.3 Password Spraying
  • 43.4 Rainbow Tables

Module 44 – CEH v11 Performing Password Attacks

  • 44.1 Network Service Password Attacks
  • 44.2 Password Cracking Tools
  • 44.3 Online Password Cracking Sites
  • 44.4 Windows Password Cracking
  • 44.5 Linux Password Cracking
  • 44.6 Other Methods for Obtaining Passwords

Module 45 – CEH v11 Using Exploits

  • 45.1 Keylogging
  • 45.2 Spyware
  • 45.3 Rootkits
  • 45.4 Buffer Overflows
  • 45.5 Privilege Escalation
  • 45.6 Hiding Files

Module 46 – CEH v11 Hiding Information

  • 46.1 Alternate Data Streams
  • 46.2 Steganography
  • 46.3 Creating and Maintaining Remote Access
  • 46.4 Hiding Evidence

Module 47 – CEH v11 Covering Tracks

  • 47.1 Covering Tracks in Windows
  • 47.2 Covering Tracks in Linux
  • 47.3 System Hacking Counter-Measures
  • 47.4 System Hacking Penetration Testing
  • 47.5 Review

Module 48 – CEH v11 Malware Overview

  • 48.1 Intro to Malware
  • 48.2 Virus Overview
  • 48.3 Virus Types
  • 48.4 Self-Hiding Viruses
  • 48.5 Worms
  • 48.6 Trojans
  • 48.7 Trojan Types
  • 48.8 RATS

Module 49 – CEH v11 Hacking With Malware

  • 49.1 Ransomware
  • 49.2 Botnets
  • 49.3 Covert Channel Trojans
  • 49.4 Banking Trojans
  • 49.5 Rootkits

Module 50 – CEH v11 Creating Malware

  • 50.1 Other Malware
  • 50.2 Malware Makers
  • 50.3 Dropper and Stage Creation
  • 50.4 Exploit Kits

Module 51 – CEH v11 Detecting Malware

  • 51.1 Malware Detection
  • 51.2 Malware Detection Part 2
  • 51.3 Malware Analysis

Module 52 – CEH v11 Defending Against Malware

  • 52.1 Malware Reverse Engineering
  • 52.2 Malware Countermeasures
  • 52.3 Malware Penetration Testing
  • 52.4 Review

Module 53 – CEH v11 Sniffing

  • 53.1 Sniffing Concepts
  • 53.2 Types of Sniffing
  • 53.3 Sniffing Protocols
  • 53.4 Sniffing Tools

Module 54 – CEH v11 Spoofing and MITM

  • 54.1 ARP
  • 54.2 ARP Spoofing
  • 54.3 MITM
  • 54.4 MAC Attacks
  • 54.5 MAC Spoofing
  • 54.6 DHCP Attacks

Module 55 – CEH v11 Defending Against Poisoning and Sniffing

  • 55.1 Name Resolution Poisoning
  • 55.2 VLAN Hopping
  • 55.3 Sniffing Counter Measures
  • 55.4 Sniffing Penetration Testing
  • 55.5 Review

Module 56 – CEH v11 Social Engineering

  • 56.1 Social Engineering Concepts
  • 56.2 Social Engineering Techniques
  • 56.3 Social Engineering Examples
  • 56.4 Social Engineering Tools

Module 57 – CEH v11 Defending Against Social Engineering

  • 57.1 Social Media
  • 57.2 Identity Theft
  • 57.3 Insider Threats
  • 57.4 Social Engineering Countermeasures
  • 57.5 Social Engineering Penetration Testing
  • 57.6 Review

Module 58 – CEH v11 Denial-of-Service

  • 58.1 DoS-DDoS Concepts
  • 58.2 Volumetric Attacks
  • 58.3 Fragmentation Attacks
  • 58.4 State Exhaustion Attacks
  • 58.5 Application Layer Attacks

Module 59 – CEH v11 Advanced DoS Attacks

  • 59.1 Protocol Attacks
  • 59.2 Other Attacks
  • 59.3 Botnets

Module 60 – CEH v11 Defending Against Denial-of-Service

  • 60.1 DoS-DDoS Attack Tools
  • 60.2 DoS-DDoS Countermeasures
  • 60.3 Dos Penetration Testing
  • 60.4 Review
Module 61 – CEH v11 Advanced Ethical Hacker Course Intro

  • 61.1 About This Course: Advanced Ethical Hacker
  • 61.2 About the Instructor

Module 62 – CEH v11 Session Hjacking

  • 62.1 Session Hijacking Concepts
  • 62.2 Token-based Authentication
  • 62.3 Compromising a Session Token
  • 62.4 XSS
  • 62.5 CSRF
  • 62.6 Other Attacks

Module 63 – CEH v11 Defending Against Hijacking

  • 63.1 Network Level Hijacking
  • 63.2 Session Hijacking Tools
  • 63.3 Session Hijacking Countermeasures
  • 63.4 Session Penetration Hijacking
  • 63.5 Review

Module 64 – CEH v11 Implementing Intrusion Detection

  • 64.1 IDS-IPS
  • 64.2 Snort
  • 64.3 Snort Rules
  • 64.4 Syslog

Module 65 – CEH v11 Testing Intrusion Detection

  • 65.1 WIPS
  • 65.2 IDS Considerations
  • 65.3 IDS Tools
  • 65.4 IDS Evasion
  • 65.5 IDS-Firewall Evasion Tools
  • 65.6 IDS Scenerios

Module 66 – CEH v11 Implementing Firewalls

  • 66.1 Firewalls
  • 66.2 Packet Filtering Rules
  • 66.3 Firewall Deployments
  • 66.4 Traffic Flow through Firewalls
  • 66.5 Split DNS

Module 67 – CEH v11 Testing Firewallls

  • 67.1 Firewall Tools
  • 67.2 Firewall Evasion
  • 67.3 Firewall Scenarios

Module 68 – CEH v11 Implementing Honeypots

  • 68.1 Honeypots
  • 68.2 Honeypot Detection
  • 68.3 IDS-Firewall Evasion Countermeasures
  • 68.4 IDS-Firewall Honeypot Penetration Testing
  • 68.5 Review

Module 69 – CEH v11 Attacker Webserver

  • 69.1 Webserver Security Overview
  • 69.2 Common Webservers
  • 69.3 Webserver Attacks
  • 69.4 Misconfiguration Attack Examples

Module 70 – CEH v11 Webserver Defense

  • 70.1 Webserver Attack Tools
  • 70.2 Attack Countermeasures
  • 70.3 Webserver Penetration Testing
  • 70.4 Review

Module 71 – CEH v11 Intro To Web Apps

  • 71.1 Web Application Concepts
  • 71.2 Attacking Web Apps

Module 72 – CEH v11 OWASP Top 5 Web App Vulnerabilities

  • 72.1 A01 – Broken Access Control
  • 72.2 A02 – Cryptographic Failures
  • 72.3 A03 – Injection
  • 72.4 A04 – Insecure Design
  • 72.5 A05 – Security Misconfiguration

Module 73 – CEH v11 OWASP Additional Web App Vulnerabilities

  • 73.1 A06 – Vulnerable and Outdated Components
  • 73.2 A07 – Identification and Authentication Failures
  • 73.3 A08 – Software and Data Integrity Failures
  • 73.4 A09 – Security Logging and Monitoring
  • 73.5 A10 – Server Side Request Forgery

Module 74 – CEH v11 Common Web App Attacks

  • 74.1 XSS Attacks
  • 74.2 CSRF
  • 74.3 Parameter Tampering
  • 74.4 Clickjacking
  • 74.5 SQL Injection

Module 75 – CEH v11 Unauthorized Access Through Web Apps

  • 75.1 Insecure Deserialization Attacks
  • 75.2 IDOR
  • 75.3 Directory Traversal
  • 75.4 Session Management Attacks
  • 75.5 Response Splitting

Module 76 – CEH v11 Web App Overflow Attacks

  • 76.1 Denial of Service
  • 76.2 Overflow Attacks
  • 76.3 XXE Attacks
  • 76.4 Soap Attacks
  • 76.5 Ajax Attacks

Module 77 – CEH v11 Defending Web Apps

  • 77.1 Web App Hacking Tools
  • 77.2 Web Hacking Countermeasures
  • 77.3 Web Application Penetration Testing
  • 77.4 Review

Module 78 – CEH v11 Intro To SQL Injection

  • 78.1 SQL Overview
  • 78.2 SQL Injection Concepts
  • 78.3 Basic SQL Injection

Module 79 – CEH v11 Performing SQL Injection

  • 79.1 Finding Vulnerable Websites
  • 79.2 Error-based SQL Injection
  • 79.3 Union SQL Injection
  • 79.4 Blind SQL Injection
  • 79.5 SQL Injection Scenarios
  • 79.6 Evading Detection

Module 80 – CEH v11 Defending Against SQL Injection

  • 80.1 SQL Injection Tools
  • 80.2 SQL Injection Countermeasures
  • 80.3 Safe Coding Examples
  • 80.4 SQL Wildcards
  • 80.5 SQL Injection Penetration Testing
  • 80.6 Review

Module 81 – CEH v11 Wireless Networking Overview

  • 81.1 Wireless Concepts
  • 81.2 Wireless Signal Encoding
  • 81.3 Wi-Fi Standards
  • 81.4 Wi-Fi Antennas
  • 81.5 Wireless Authentication

Module 82 – CEH v11 Wi-Fi Security

  • 82.1 Wi-Fi Security Standards
  • 82.2 Wireless Network Troubleshooting Tools
  • 82.3 Wi-Fi Discovery Tools
  • 82.4 Sniffing Wi-Fi

Module 83 – CEH v11 Hacking Wi-Fi

  • 83.1 Wi-Fi Attack Types
  • 83.2 Wi-Fi Rogue Access Point Attacks
  • 83.3 Wi-Fi Denial of Service Attacks
  • 83.4 Wi-Fi Password Cracking Attacks
  • 83.5 WEP Cracking

Module 84 – CEH v11 Advanced Wireless Attacks

  • 84.1 WPA-WPA2 Cracking
  • 84.2 WPA3 Attacks
  • 84.3 WPS Cracking
  • 84.4 Wi-Fi Attack Tools for Mobile Devices
  • 84.5 Bluetooth Hacking
  • 84.6 Other Wireless Hacking

Module 85 – CEH v11 Defending Wireless Networks

  • 85.1 Wireless Hacking Countermeasures
  • 85.2 Wireless Security Tools
  • 85.3 Wireless Penetration Testing
  • 85.4 Review

Module 86 – CEH v11 Mobile Platform Overview

  • 86.1 Mobile Platform Overview
  • 86.2 Mobile Device Vulnerabilities
  • 86.3 Mobile Device Attacks

Module 87 – CEH v11 Hacking Android

  • 87.1 Android
  • 87.2 Android Vulnerabilities
  • 87.3 Rooting Android
  • 87.4 Android Exploits
  • 87.5 Android Hacking Tools
  • 87.6 Reverse Engineering an Android App
  • 87.7 Securing Android

Module 88 – CEH v11 Hacking iOS

  • 88.1 iOS
  • 88.2 iOS Vulnerabilities
  • 88.3 Jailbreaking iOS
  • 88.4 iOS Exploits
  • 88.5 iOS Hacking Tools
  • 88.6 Securing iOS

Module 89 – CEH v11 Mobile Platform Defense

  • 89.1 Mobile Device Management
  • 89.2 BYOD
  • 89.3 Mobile Security Guidelines and Tools
  • 89.4 Mobile Device Penetration Testing
  • 89.5 Review

Module 90 – CEH v11 IoT Hacking

  • 90.1 loT Concepts
  • 90.2 loT Infrastructure
  • 90.3 Fog Computing
  • 90.4 loT Vulnerabilities
  • 90.5 loT Threats

Module 91 – CEH v11 IoT Defense

  • 91.1 IoT Hacking Methodologies and Tools
  • 91.2 IoT Hacking Methodolgies and Tools Part 2
  • 91.3 Hacking Countermeasures
  • 91.4 IoT Penetration Testing
  • 91.5 OT Concepts
  • 91.6 Industrial IoT

Module 92 – CEH v11 Operational Technology Overview

  • 92.1 IT-OT Convergence
  • 92.2 ICS
  • 92.3 SCADA
  • 92.4 DCS
  • 92.5 RTU
  • 92.6 PLC
  • 92.7 Addition OT Components

Module 93 – CEH v11 Hacking OT

  • 93.1 OT Variables
  • 93.2 Well-known OT attacks
  • 93.3 OT Attack Methodology and Basic Tools
  • 93.4 OT Reconnaissance
  • 93.5 OT Penetration and Control

Module 94 – CEH v11 Defending OT

  • 94.1 OT Attack Tools
  • 94.2 OT Hacking Countermeasures
  • 94.3 OT Penetration Testing
  • 94.4 Review

Module 95 – CEH v11 Attacking The Cloud

  • 95.1 Cloud Computing Concepts
  • 95.2 Virtualization
  • 95.3 Cloud Types
  • 95.4 Cloud Benefits and Considerations
  • 95.5 Cloud Risks and Vulnerablilities

Module 96 – CEH v11 Cloud Defense

  • 96.1 Cloud Threats and Countermeasures
  • 96.2 Cloud Security Tools
  • 96.3 Cloud Security Best Practices
  • 96.4 Cloud Penetration Testing
  • 96.5 Review

Module 97 – CEH v11 Cryptography Overview

  • 97.1 Cryptography Concepts
  • 97.2 Symetric Encryption
  • 97.3 Asymmetric Encryption
  • 97.4 Public Key Exchange
  • 97.5 PKI

Module 98 – CEH v11 Protecting Data With Crytography

  • 98.1 Digital Certificates
  • 98.2 Digital Signatures
  • 98.3 Hashing
  • 98.4 Email Encryption
  • 98.5 Network Communication Encryption

Module 99 – CEH v11 Protecting Data at Home and in Transit

  • 99.1 Disk Encryption
  • 99.2 VPN Encryption
  • 99.3 Cryptography Tools

Module 100 – CEH v11 Pentesting Cryptography

  • 100.1 Cryptography Attacks
  • 100.2 Cryptography Penetration Testing
  • 100.3 Review
  • 100.4 Conclusion
Module 1 – Introduction To Ethical Hacking

  • 1.0 Introduction to CEH v12
  • 1.1 Elements of Security
  • 1.2 Cyber Kill Chain
  • 1.3 MITRE ATT&CK Framework
  • 1.3.1 Activity – Researching the MITRE ATTACK Framework
  • 1.4 Hacking
  • 1.5 Ethical Hacking
  • 1.6 Information Assurance
  • 1.7 Risk Management
  • 1.8 Incident Management
  • 1.9 Information Security Laws and Standards
  • 1.10 Introduction to Ethical Hacking Review

Module 2: Footprinting and Reconnaissance

  • 2.1 Footprinting Concepts
  • 2.2 OSINT Tools
  • 2.2.1 Activity – Conduct OSINT with OSR Framework
  • 2.2.2 Activity – OSINT with theHarvester
  • 2.2.3 Activity – Add API Keys to theHarvester
  • 2.2.4 Activity – Extract Document Metadata with FOCA
  • 2.2.5 Activity – Extract Document Metadata with FOCA
  • 2.3 Advanced Google Search
  • 2.3.1 Activity – Google Hacking
  • 2.4 Whois Footprinting
  • 2.4.1 Activity – Conducting Whois Research
  • 2.5 DNS Footprinting
  • 2.5.1 Activity – Query DNS with NSLOOKUP
  • 2.6 Website Footprinting
  • 2.6.1 Activity – Fingerprint a Webserver with ID Serve
  • 2.6.2 Activity – Extract Data from Websites
  • 2.6.3 Activity – Mirror a Website with HTTrack
  • 2.7 Email Footprinting
  • 2.7.1 Activity – Trace a Suspicious Email
  • 2.8 Network Footprinting
  • 2.9 Social Network Footprinting
  • 2.10 Footprinting and Reconnaissance Countermeasures
  • 2.11 Footprinting and Reconnaissance Review

Module 3: Scanning Networks

  • 3.1 Scanning Concepts
  • 3.2 Discovery Scans
  • 3.2.1 Activity – ICMP ECHO and ARP Pings
  • 3.2.2 Activity – Host Discovery with Angry IP Scanner
  • 3.3 Port Scans
  • 3.3.1 Activity – Port Scan with Angry IP Scanner
  • 3.4 Other Scan Types
  • 3.5 Scanning Tools
  • 3.5.1 Activity – Hping3 Packet Crafting
  • 3.5.2 Activity – Fingerprinting with Zenmap
  • 3.6 NMAP
  • 3.6.1 Activity – Nmap Basic Scans
  • 3.6.2 Activity – Host Discovery with Nmap
  • 3.6.3 – Activity – Nmap Version Detection
  • 3.6.4 Activity – Nmap Idle (Zombie) Scan
  • 3.6.5 Activity – Nmap FTP Bounce Scan
  • 3.6.6 – Activity – NMAP Scripts
  • 3.7 Firewall and IDS Evasion
  • 3.7.1 Activity – Nmap Advanced Scans
  • 3.8 Proxies
  • 3.9 Scanning Countermeasures
  • 3.10 Scanning Networks Review

Module 4: Enumeration

  • 4.1 Enumeration Overview
  • 4.2 SMB_NetBIOS_Enumeration
  • 4.2.1 Activity – Enumerate NetBIOS Information with Hyena
  • 4.3 File Transfer Enumeration
  • 4.4 WMI Enumeration
  • 4.4.1 – Activity – Enumerating WMI with Hyena
  • 4.5 SNMP Enumeration
  • 4.5.1 Activity – Enumerate WMI, SNMP and Other Information Using SoftPerfect
  • 4.6 LDAP Enumeration
  • 4.7 DNS Enumeration
  • 4.8 SMTP Enumeration
  • 4.8.1 Activity – Enumerate Email Users with SMTP
  • 4.9 Remote Connection Enumeration
  • 4.10 Website Enumeration
  • 4.10.1 Activity – Enumerate a Website with DirBuster
  • 4.11 Other Enumeration Types
  • 4.12 Enumeration Countermeasures and Review

Module 5: Vulnerability Analysis

  • 5.1 Vulnerability Scanning
  • 5.1.1 Vulnerability Scanning with OpenVAS
  • 5.2 Vulnerability Assessment
  • 5.3 Vulnerability Analysis Review

Module 6: System Hacking

  • 6.1 System Hacking Concepts
  • 6.2 Common OS Exploits
  • 6.3 Buffer Overflows
  • 6.3.1 Activity – Performing a Buffer Overflow
  • 6.4 System Hacking Tools and Frameworks
  • 6.4.1 Activity – Hack a Linux Target from Start to Finish
  • 6.5 Metasploit
  • 6.5.1 Activity – Get Started with Metasploit
  • 6.6 Meterpreter
  • 6.7 Keylogging and Spyware
  • 6.7.1 Activity – Keylogging with Meterpreter
  • 6.8 Netcat
  • 6.8.1 Activity – Using Netcat
  • 6.9 Hacking Windows
  • 6.9.1 Activity – Hacking Windows with Eternal Blue
  • 6.10 Hacking Linux
  • 6.11 Password Attacks
  • 6.11.1 Activity – Pass the Hash
  • 6.11.2 Activity – Password Spraying
  • 6.12 Password Cracking Tools
  • 6.13 Windows Password Cracking
  • 6.13.1 Activity – Cracking Windows Passwords
  • 6.13.2 Activity – Cracking Password Hashes with Hashcat
  • 6.14 Linux Password Cracking
  • 6.15 Other Methods for Obtaining Passwords
  • 6.16 Network Service Attacks
  • 6.16.1 Activity – Brute Forcing a Network Service with Medusa
  • 6.17 Post Exploitation
  • 6.18 Pivoting
  • 6.18.1 Activity – Pivoting Setup
  • 6.19 Maintaining Access
  • 6.19.1 Activity – Persistence
  • 6.20 Hiding Data
  • 6.20.1 Activity – Hiding Data Using Least Significant Bit Steganography
  • 6.21 Covering Tracks
  • 6.21.1 Activity – Clearing Tracks in Windows
  • 6.21.2 Activity – View and Clear Audit Policies with Auditpol
  • 6.22 System Hacking Countermeasures
  • 6.23 System Hacking Review

Module 7: Malware Threats

  • 7.1 Malware Overview
  • 7.2 Viruses
  • 7.3 Trojans
  • 7.3.1 Activity – Deploying a RAT
  • 7.4 Rootkits
  • 7.5 Other Malware
  • 7.6 Advanced Persistent Threat
  • 7.7 Malware Makers
  • 7.7.1 Activity – Creating a Malware Dropper and Handler
  • 7.8 Malware Detection
  • 7.9 Malware Analysis
  • 7.9.1 Activity – Performing a Static Code Review
  • 7.9.2 Activity – Analyzing the SolarWinds Orion Hack
  • 7.10 Malware Countermeasures
  • 7.11 Malware Threats Review

Module 8: Sniffing

  • 8.1 Network Sniffing
  • 8.2 Sniffing Tools
  • 8.2.1 Activity- Sniffing HTTP with Wireshark
  • 8.2.2 Activity – Capturing Files from SMB
  • 8.3 ARP and MAC Attacks
  • 8.3.1 Activity – Performing an MITM Attack with Ettercap
  • 8.4 Name Resolution Attacks
  • 8.4.1 Activity – Spoofing Responses with Responder
  • 8.5 Other Layer 2 Attacks
  • 8.6 Sniffing Countermeasures
  • 8.7 Sniffing Review

Module 9: Social Engineering

  • 9.1 Social Engineering Concepts
  • 9.2 Social Engineering Techniques
  • 9.2.1 Activity – Deploying a Baited USB Stick
  • 9.2.2 Activity – Using an O.MG Lightning Cable
  • 9.3 Social Engineering Tools
  • 9.3.1 Activity – Phishing for Credentials
  • 9.4 Social Media, Identity Theft, Insider Threats
  • 9.5 Social Engineering Countermeasures
  • 9.6 Social Engineering Review

Module 10: Denial-of-Service

  • 10.1 DoS-DDoS Concepts
  • 10.2 Volumetric Attacks
  • 10.3 Fragmentation Attacks
  • 10.4 State Exhaustion Attacks
  • 10.5 Application Layer Attacks
  • 10.5.1 Activity – Performing a LOIC Attack
  • 10.5.2 Activity – Performing a HOIC Attack
  • 10.5.3 Activity – Conducting a Slowloris Attack
  • 10.6 Other Attacks
  • 10.7 DoS Tools
  • 10.8 DoS Countermeasures
  • 10.9 DoS Review

Module 11: Session Hijacking

  • 11.1 Session Hijacking
  • 11.2 Compromising a Session Token
  • 11.3 XSS
  • 11.4 CSRF
  • 11.5 Other Web Hijacking Attacks
  • 11.6 Network-Level Session Hijacking
  • 11.6.1 Activity – Hijack a Telnet Session
  • 11.7 Session Hijacking Tools
  • 11.8 Session Hijacking Countermeasures
  • 11.9 Session Hijacking Review

Module 12: Evading IDS, Firewalls, and Honeypots

  • 12.1 Types of IDS
  • 12.2 Snort
  • 12.3 System Logs
  • 12.4 IDS Considerations
  • 12.5 IDS Evasion
  • 12.5.1 Activity – Fly Below IDS Radar
  • 12.6 Firewalls
  • 12.7 Packet Filtering Rules
  • 12.8 Firewall Deployments
  • 12.9 Split DNS
  • 12.10 Firewall Product Types
  • 12.11 Firewall Evasion
  • 12.11.1 Activity – Use Social Engineering to Bypass a Windows Firewall
  • 12.11.2 Activity – Busting the DOM for WAF Evasion
  • 12.12 Honeypots
  • 12.13 Honeypot Detection and Evasion
  • 12.13.1 Activity – Test and Analyze a Honey Pot
  • 12.14 Evading IDS, Firewalls, and Honeypots Review

Module 13: Hacking Web Servers

  • 13.1 Web Server Operations
  • 13.2 Hacking Web Servers
  • 13.3 Common Web Server Attacks
  • 13.3.1 Activity – Defacing a Website
  • 13.4 Web Server Attack Tools
  • 13.5 Hacking Web Servers Countermeasures
  • 13.6 Hacking Web Servers Review

Module 14: Hacking Web Applications

  • 14.1 Web Application Concepts
  • 14.2 Attacking Web Apps
  • 14.3 A01 Broken Access Control
  • 14.4 A02 Cryptographic Failures
  • 14.5 A03 Injection
  • 14.5.1 Activity – Command Injection
  • 14.6 A04 Insecure Design
  • 14.7 A05 Security Misconfiguration
  • 14.8 A06 Vulnerable and Outdated Components
  • 14.9 A07 Identification and Authentication Failures
  • 14.10 A08 Software and Data integrity Failures
  • 14.11 A09 Security Logging and Monitoring Failures
  • 14.12 A10 Server-Side Request Forgery
  • 14.13 XSS Attacks
  • 14.13.1 Activity – XSS Walkthrough
  • 14.13.2 Activity – Inject a Malicious iFrame with XXS
  • 14.14 CSRF
  • 14.15 Parameter Tampering
  • 14.15.1 Activity – Parameter Tampering with Burp
  • 14.16 Clickjacking
  • 14.17 SQL Injection
  • 14.18 Insecure Deserialization Attacks
  • 14.19 IDOR
  • 14.19.1 Activity – Hacking with IDOR
  • 14.20 Directory Traversal
  • 14.21 Session Management Attacks
  • 14.22 Response Splitting
  • 14.23 Overflow Attacks
  • 14.24 XXE Attacks
  • 14.25 Web App DoS
  • 14.26 Soap Attacks
  • 14.27 AJAX Attacks
  • 14.28 Web API Hacking
  • 14.29 Webhooks and Web Shells
  • 14.30 Web App Hacking Tools
  • 14.31 Hacking Web Applications Countermeasures
  • 14.32 Hacking Web Applications Review

Module 15: SQL Injection

  • 15.1 SQL Injection Overview
  • 15.2 Basic SQL Injection
  • 15.3 Finding Vulnerable Websites
  • 15.4 Error-based SQL Injection
  • 15.5 Union SQL Injection
  • 15.5.1 Activity – Testing SQLi on a Live Website – Part 1
  • 15.5.2 Activity – Testing SQLi on a Live Website – Part 2
  • 15.6 Blind SQL Injection
  • 15.7 SQL Injection Tools
  • 15.7.1 Activity – SQL Injection Using SQLmap
  • 15.8 Evading Detection
  • 15.9 Analyzing SQL Injection
  • 15.10 SQL Injection Countermeasures
  • 15.11 SQL Injection Review

Module 16: Hacking Wireless Networks

  • 16.1 Wireless Concepts
  • 16.2 Wireless Security Standards
  • 16.3 WI-FI Discovery Tools
  • 16.4 Common Wi-Fi Attacks
  • 16.5 Wi-Fi Password Cracking
  • 16.6 WEP Cracking
  • 16.6.1 Activity – Cracking WEP
  • 16.7 WPA,WPA2,WPA3 Cracking
  • 16.7.1 Activity – WPA KRACK Attack
  • 16.8 WPS Cracking
  • 16.9 Bluetooth Hacking
  • 16.10 Other Wireless Hacking
  • 16.10.1 Activity – Cloning an RFID badge
  • 16.10.2 Activity – Hacking with a Flipper Zero
  • 16.11 Wireless Security Tools
  • 16.12 Wireless Hacking Countermeasures
  • 16.13 Hacking Wireless Networks Review

Module 17: Hacking Mobile Platforms

  • 17.1 Mobile Device Overview
  • 17.2 Mobile Device Attacks
  • 17.3 Android Vulnerabilities
  • 17.4 Rooting Android
  • 17.5 Android Exploits
  • 17.5.1 Activity – Hacking Android
  • 17.5.2 Activity – Using a Mobile Device in a DDoS Campaign
  • 17.6 Android-based Hacking Tools
  • 17.7 Reverse Engineering an Android App
  • 17.8 Securing Android
  • 17.9 iOS Overview
  • 17.10 Jailbreaking iOS
  • 17.11 iOS Exploits
  • 17.12 iOS-based Hacking Tools
  • 17.13 Reverse Engineering an iOS App
  • 17.14 Securing iOS
  • 17.15 Mobile Device Management
  • 17.16 Hacking Mobile Platforms Countermeasures
  • 17.17 Hacking Mobile Platforms Review

Module 18: IoT AND OT Hacking

  • 18.1 IoT Overview
  • 18.2 IoT Infrastructure
  • 18.3 IoT Vulnerabilities and Threats
  • 18.3.1 Activity – Searching for Vulnerable IoT Devices
  • 18.4 IoT Hacking Methodology and Tools
  • 18.5 IoT Hacking Countermeasures
  • 18.6 OT Concepts
  • 18.7 IT-OT Convergence
  • 18.8 OT Components
  • 18.9 OT Vulnerabilities
  • 18.10 OT Attack Methodology and Tools
  • 18.11 OT Hacking Countermeasures
  • 18.12 IoT and OT Hacking Review

Module 19: Cloud Computing

  • 19.1 Cloud Computing Concepts
  • 19.2 Cloud Types
  • 19.3 Cloud Benefits and Considerations
  • 19.4 Cloud Risks and Vulnerabilities
  • 19.5 Cloud Threats and Countermeasures
  • 19.5.1 Activity – Hacking S3 Buckets
  • 19.6 Cloud Security Tools And Best Practices
  • 19.7 Cloud Computing Review

Module 20: Cryptography

  • 20.1 Cryptography Concepts
  • 20.2 Symmetric Encryption
  • 20.2.1 Activity – Symmetric Encryption
  • 20.3 Asymmetric Encryption
  • 20.3.1 Activity – Asymmetric Encryption
  • 20.4 Public Key Exchange20.5 PKI
  • 20.5.1 Activity – Generating and Using an Asymmetric Key Pair
  • 20.6 Digital Signatures
  • 20.7 Hashing
  • 20.7.1 Activity – Calculating Hashes
  • 20.8 Common Cryptography Use Cases
  • 20.9 Cryptography Tools
  • 20.10 Cryptography Attacks
  • 20.11 Cryptography Review
  • 20.12 Course Conclusion

Lesson 1

Lesson 2

Lesson 3

Lesson 4

Lesson 5

Lesson 6

Lesson 7

Read More

Module 1: Security and Risk Management

Module 2: Asset Security

Module 3: Security Engineering

Module 4: Communication and Network Security

Module 5: Identity and Access Management

Module 6: Security Assessment Testing

Module 7: Security Operations

Module 8: Software Development Security

Read More

Module 1: Security and Risk Management

Module 2: Asset Security

Module 3: Security Architecture and Engineering

Module 4: Communication and Network Security

Module 5: Identity and Access Management (IAM)

Module 6: Security Assessment and Testing

Module 7: Security Operations

Module 8: Software Development Security

Read More

Module 1: Computer Forensics Introduction

Module 2: Forensics Investigation Process

Module 3: Searching and Seizing

Module 4: Digital Evidence

Module 5: First Responder Procedures

Module 6: Forensics Lab

Module 7: Hard Disks and File Systems

Module 8: Windows Forensics

Module 9: Data Acquisition and Duplication

Module 10: Recovering Deleted Files and Partitions

Module 11: Using Access Data FTK

Module 12: Using EnCase

Module 13: Steganography

Module 14: Password Crackers

Module 15: Log Correlation

Module 16: Network Forensics

Module 17: Wireless Attacks

Module 18: Web Attacks

Module 19: Email Crimes

Module 20: Mobile Investigation

Module 21: Investigative Reports

Module 22: Expert Witness

Read More

Module 1: Cyber Security Awareness and Prevention

Module 2: Managing Mobile Device Security

Read More

Module 1: Data Breaches And ID Theft

Module 2: Device Security Basics

Module 3: Avoiding Inadvertent Disclosure

Module 4: Physical And Technical Safeguards

Read More

Module 1: What Is Agile

Module 2: Projects And Projects Management In An Agile World

Module 3: Agile and Scrum

Module 4: Common Scrum Terminology

Module 5: Other Iterative Methods

Module 6: Communication Skills In Agile World

Module 7: Using Agile Outside Software Development

Module 8: Case Studies Of Transitioning to Agile

Module 9: Critique Of Agile

Module 10: Review Of Agile

Read More

Module 1 : Agile Principles and Mindset

Module 2 : Value Driven Delivery

Module 3 : Stakeholder Engagement

Module 4 : Team Performance

Module 5 : Adaptive Planning

Module 6 : Problem Detection and Resolution

Module 7 : Continuous Improvement

Read More

Module 1 : Agile Principles and Mindset

Module 2 : Value Driven Delivery

Module 3 : Stakeholder Engagement

Module 4 : Team Performance

Module 5 : Adaptive Planning

Module 6 : Problem Detection and Resolution

Module 7 : Continuous Improvement

Read More

Module 1: Architecture

Module 2: Governance and Enterprise Risk

Module 3: Legal Issues- Contracts and Electronic

Module 4: Compliance and Audit Management

Module 5: Information Management and Data Security

Module 6: Interoperability and Portability

Module 7: Traditional Security, Business Continuity, and Disaster Recovery

Module 8: Data Center Operations

Module 9: Incident Response

Module 10: Application Security

Module 11: Encryption and Key Management

Module 12: Identity, Entitlement, and Access Management

Module 13: Virtualization

Module 14: Security as a Service

Read More

Module 1: The principles of CC

Module 2: Implementing and Managing CC

Module 3: Using the Cloud

Module 4: Security and Compliance

Module 5: Evaluation of CC

Read More

Module 1: Foundations (Beginner)

Module 2: Terms and Tools (Beginner)

Module 3: Identifiers, Variables, and Data Types (Beginner)

Module 4: Object-Orientated Programming (Intermediate)

Module 5: Predefined Classes (Intermediate)

Module 6: Methods Part 1 (Intermediate)

Module 7: Methods Part 2 (Advanced)

Module 8: Constructors (Advanced)

Module 9: Control of Flow (Advanced)

Module 10: Arrays and Exceptions (Advanced)

Read More

Module 1: Introduction To Javascript

Module 2: Core Concepts And Syntax

Module 3: Getting A Handle On The DOM

Module 4: Working With Libraries

Read More

Module 1: The ITIL Qualification Scheme

Module 2: Introduction to Service Management

Module 3: ITIL and the Service Lifecycle

Module 4: Service Strategy

Module 5: Service Design

Module 6: Service Transition

Module 7: Service Operation

Module 8: Continual Service Improvement

Module 9: Service Management Technology

Module 10: How it all Fits Together

Module 11: Bonus Material

Read More

Module 1: Service Operation Introduction

Module 2: Service Management As a Practice

Module 3: Service Operation Principles

Module 4: Service Operation Process

Module 5: Common Service Operation Activities

Module 6: Organizing For Service Operation

Module 7: Technology Considerations

Module 8: Service Operation

Read More

Module 1: Introduction To Oracle 12c SQL Fundamentals

Module 2: Retrieving Data

Module 3: SQL Functions

Module 4: Subqueries

Module 5: Data Manipulation Language

Module 6: Data Control Language

Module 7: Data Definition Language

Module 8: Combining Queries

Module 9: Oracle 12C SQL Fundamentals Review

Read More

Module 1: Database Concepts And Tools

Module 2: Memory Structure

Module 3: Tables

Module 4: Indexes

Module 5: Constraints And Triggers

Module 6: Users

Module 7: Internal Structures

Module 8: Starting Up and Shutting Down Database

Module 9: Critical Storage Files

Module 10: Data Manipulation Language

Module 11: Data Concurrency

Module 12: BackUp And Recovery

Module 13: Installation

Module 14: Course Review

Read More

Module 1: Database Admininstration

Module 2: Oracle Architecture

Module 3: Database Schema

Module 4: Recovery Manager

Module 5: Introduction to SQL

Module 6: Filtering and Sorting Data

Module 7: Functions

Module 8: SET Operators and Subqueries

Module 9: Regular Expressions and SQL Loader

Read More

Module 1: What Is Microsoft 365

Module 2: Word Online

Module 3: Excel Online

Module 4: Powerpoint Online

Module 5: Outlook Online

Module 6: One Note Online

Read More

Module 1: Beginner

Module 2: Intermediate

Module 3: Advanced

Read More

Module 1: Beginner

Module 2: Intermediate

Module 3: Advanced

Read More

Word 2016 Basic

Word 2016 Advanced

Read More

Excel 2016 Basic

Excel 2016 Intermediate

Excel 2016 Advanced

Read More

Basic Microsoft PowerPoint 2016

Intermediate Microsoft PowerPoint 2016

Advanced Microsoft PowerPoint 2016

Read More

Outlook 2016 Basic

Outlook 2016 Intermediate

Outlook 2016 Advanced

Read More

Access 2016 Basic

Access 2016 Intermediate

Access 2016 Advanced

Read More

Word 2013 Basic

Word 2013 Intermediate

Word 2013 Advanced

Read More

Excel 2013 Basic

Excel 2013 Intermediate

Excel 2013 Advanced

Read More

Powerpoint 2013 Basic

Powerpoint 2013 Intermediate

Powerpoint 2013 Advanced

Read More

Outlook 2013 Basic

Outlook 2013 Intermediate

Outlook 2013 Advanced

Read More

Access 2013 Introduction

Access 2013 Intermediate

Access 2013 Advanced

Read More

Word 2010 Basic

Word 2010 Intermediate

Word 2010 Advanced

Read More

Excel 2010 Basic

Excel 2010 Intermediate

Excel 2010 Advanced

Read More

Powerpoint 2010 Basic

Powerpoint 2010 Intermediate

Powerpoint 2010 Advanced

Read More

Outlook 2010 Basic

Outlook 2010 Intermediate

Outlook 2010 Advanced

Read More

Access 2010 Basic

Access 2010 Intermediate

Access 2010 Advanced

Read More

Module 1: Preparing for and Taking the Exam

Module 2: Process Domain

Module 3: People Domain

Module 4: Business Environment Domain

Read More

Module 1 : Getting Certified to take the Examination

Module 2 : Techniques for Preparing for and Taking the Examination

Module 3 : Project Management Framework

Module 4 : Project Integration Management

Module 5 : Project Scope Management

Module 6 : Project Schedule Management

Module 7 : Project Cost Management

Module 8 : Project Quality Management

Module 9 : Project Resource Management

Module 10 : Project Communications Management

Module 11 : Project Risk Management

Module 12 : Project Procurement Management

Module 13 : Project Stakeholder Management

Read More

Module 1: Introduction

Module 2: Risk Management Concepts

Module 3: Risk Management Environment

Module 4: Project Definition

Module 5: Risk Management Planning

Module 6: Risk Identification

Module 7: Qualitative Risk Analysis

Module 8: Quantitative Risk Analysis

Module 9: Risk Response Planning

Module 10: Risk Monitoring And Controlling

Read More

Module 1: Risk Management Fundamentals

Module 2: Test Requirements

Module 3: Test Domains

Module 4: Risk Strategy and Planning

Module 5: Stakeholder Engagement

Module 6: Risk Process Facilitation

Module 7: Risk Monitoring and Reporting

Module 8: Specialized Risk Analyses

Module 9: RMP Recap

Module 10: RMP Review Questions

Read More

Module 1 : Getting Certified to take the Examination

Module 2 : Project Management Framework

Module 3 : Project Integration Management

Module 4 : Project Scope Management

Module 5 : Project Schedule Management

Module 6 : Project Cost Management

Module 7 : Project Quality Management

Module 8 : Project Resource Management

Module 9 : Project Communications Management

Module 10 : Project Risk Management

Module 11 : Project Procurement Management

Module 12 : Project Stakeholder Management

Module 13 : Review

Read More

Module 1: Development Methods

Module 2: Agile Manifesto Principles

Module 3: Scrum

Module 4: Why Scrum

Module 5: Scrum-Roles Overview

Module 6: Product Owner

Module 7: Scrum Master

Module 8: Scrum Team

Module 9: Scrum Process

Module 10: Scrum Project Phase

Module 11: Plan and Estimate

Module 12: Implement

Module 13: Review and Retrospect

Module 14: Release

Module 15: Project Vision

Module 16: Scrum Master and Stake Holder(s)

Module 17: Form Scrum Team

Module 18: Develop Epics

Module 19: User Stories

Module 20: Justifications and Sample Change(s)

Module 21: Creating a Prioritized Backlog

Module 22: Conduct Release Planning

Module 23: Sprints

Module 24: Scrum Framework

Module 25: Scrum of Scrums

Module 26: Scrum Demo

Module 27: Review

Read More

Module 1: Development Methods

Module 2: Agile Manifesto Principles

Module 3: Scrum

Module 4: Why Scrum

Module 5: Scrum-Roles Overview

Module 6: Product Owner

Module 7: Scrum Master

Module 8: Scrum Team

Module 9: Scrum Process

Module 10: Scrum Project Phase

Module 11: Plan and Estimate

Module 12: Implement

Module 13: Review and Retrospect

Module 14: Release

Module 15: Project Vision

Module 17: Form Scrum Team

Module 18: Develop Epics

Module 19: User Stories

Module 20: Justifications and Sample Change(s)

Module 21: Creating a Prioritized Backlog

Module 22: Conduct Release Planning

Module 23: Sprints

Module 24: Scrum Framework

Module 25: Scrum of Scrums

Module 26: Scrum Demo

Module 27: Review

Read More

  • Social Media Introduction
  • Creating A Google Account
  • Setting Up Your Twitter Account
  • Getting Your Twitter House In Order
  • Why Facebook For Your Business
  • Using Facebook As A Business
  • Setting Up Your Business Page
  • Setting Your Cover Photo
  • Tying It All Together
  • Tip-Adding Admins In Facebook

Read More

  • Adjusting Your Settings- Part 1
  • Adjusting Your Settings- Part 2
  • Adjusting Your Settings- Part 3
  • Updating Your Page Info- Part 1
  • Updating Your Page Info- Part 2
  • Tips For Getting 25 Likes
  • Using Facebook As Your Business Page
  • What Kind Of Person Would Your Business Be
  • How To Post To Facebook
  • What To Post
  • Sharing Posts
  • Sharing Links
  • Pinning And Highlighting With Posts
  • Tips For Generating Traffic
  • Getting Notifications And Staying In Clients News Feed
  • Comment Moderation
  • The Activity Log- Where Do Hidden Posts Go
  • Scheduling Posts

Read More

  • Intro To Facebook Advertising
  • Setup Advertising Account
  • Types Of Advertising On Facebook
  • Ad Testing
  • Choosing Our Audience-Location
  • Choosing Our Audience-Age And Gender
  • Choosing Our Audience-Precise Interests
  • Choosing Our Audience-Broad Categories
  • Choosing Our Audience-Connections
  • Choosing Our Audience-Advanced Targeting Options
  • Choosing Our Audience-Campaign And Budget
  • Other Types Of Ads-Part 1
  • Other Types Of Ads-Part 2
  • Ad Campaign Manager-Part 1
  • Ad Campaign Manager-Part 2
  • Outside URLs
  • Building Ad Text
  • News Feed Format And Creating Your Audience
  • Campaign Pricing And Schedule
  • Ad Campaign Tracker
  • Facebook Insights-Overview Intro
  • Analyzing Page Posts
  • Engaged Users
  • Talking About This
  • Virality
  • Likes
  • Reach
  • Reach And Frequency
  • Page Visits
  • Talking About This
  • Conclusion

Read More

  • Introduction To LinkedIn
  • Overview Of The Interface And Settings
  • Open Link Settings
  • LinkedIn Groups
  • Adding And Removing Applications
  • Basic Account Settings
  • Updating Your Public Profile
  • LinkedIn Connections Groups And Pages
  • LinkedIn Channels And Today
  • Advertising on LinkedIn

Read More

  • Determine Your Goals
  • Create Your Persona Or Voice
  • Decide On Your Platforms
  • Establishing A Social Media Manager
  • Coordinate With Customer Service
  • Create A Predetermined Crisis Management Plan
  • Stick To The Script
  • Building Relationships With The Media
  • Find Your Evangelist
  • Stay Informed Part 1
  • Stay Informed Part 2
  • Bitly
  • Woobox Part 1
  • Woobox Part 2
  • HootSuite Part 1
  • HootSuite Part 2
  • Storify
  • Social Media Rules And Tips
  • Social Media Conclusion
  • Tweetdeck-Boolean Search

Read More

  • Introduction To Google Plus
  • Overview Of The Interface
  • Setting Up A Google Plus Page
  • Linking Your Other Social Networks
  • Linking Your Website To Your Google Plus Page
  • Review Of Your Google Plus Dashboard
  • Notification Settings For Google Plus
  • Photo Settings In Google Plus
  • Google Plus And YouTube
  • YouTube Advanced Settings
  • Interface For Uploaded Videos
  • Sharing Videos Across Your Social Network
  • Updating Your About Section
  • Quick Recap Of Everything Covered So Far

Read More

  • Overview Of Pinterest
  • How Does Pinterest Relate To Your Business
  • Industry Specific Sites
  • The Uses of Pinterest
  • Conclusion Of Pinterest

Read More

  • Introduction to Reddit
  • The Rules of Reddit

Read More

  • Module 1.0 IntroductionModule 2.0 Adjusting Your Facebook SettingsModule 3.0 Posting on FacebookModule 7.0 TwitterModule 8.0 PinterestModule 9.0 RedditModule 11.0 LinkedInModule 12.0 Google+ and YoutubeModule 14.0 Additional ToolsModule 4.0 Facebook AdvertisingModule 5.0 Facebook InsightsModule 6.0 Facebook AnalyticsModule 10.0 TumblrModule 13.0 Best Practices

Read More

  • Module 1 Online Lead GenerationModule 2 Facebook, LinkedIn, and YouTube 101Module 3 List Building & Email MarketingModule 4 Creating Social Media Content and Marketing Materials with Canva and other AppsModule 5 Sales FunnelsModule 6 Apps & Tools Review

Read More

  • Module 1: Social Media Marketing
  • Module 2: Social Media Marketing
  • Module 3: Social Media Marketing

Read More

    • Tumblr Introduction
    • Setting Up A Tumblr
    • Dashboard
    • Posting To Tumblr
    • Testing Your Post
    • URL Post
    • Chat Post
    • Audio On Tumblr
    • Video On Tumblr
    • Tumblr Conclusion

Read More

    • Limiting the Number Of Actions
    • Setting Your Twitter Preferences
    • Finish Setting Up Your Profile
    • Twitter Widgets
    • Who To Follow
    • Connect
    • Bringing Followers From Facebook
    • Intro To Hashtags
    • Examples Of Hashtags
    • Monitoring What’s Going On
    • Using Twitter For Social Listening
    • Hashtags Across Social Media
  • Read More

Chapter 1: Course Introduction and Methodology

Chapter 2: Virtualization Overview

Chapter 3: Planning and Installing ESXi

Chapter 4: Using tools to Administer a VMware Environment

Chapter 5: vCenter and Licensing

Chapter 6: Configuring Networking

Chapter 7: Configuring Storage

Chapter 8: VM Creation, Configuration, and Snapshots

Chapter 9: Security and Permissions

Chapter 10: Host and VM Monitoring

Chapter 11: Advanced ESXi and vCenter Server Management

Chapter 12: Patching and Upgrading ESXi

Chapter 13: Disaster Recovery and Backup

Read More

Module 1: VM And VMWARE

Module 2: Working With ESX And ESXI

Module 3: Configuring Virtual Machines

Module 4: Vcenter Server

Module 5: VM Storage Option

Module 6: Managing A Virtual World

Module 7: Migrations, High Availability And VM Utilities

Read More

Module 1 – Mobile Devices

Module 2 – Networking

Module 3 – Hardware

Module 4 – Virtualization and Cloud Computing

Module 5 – Hardware and Network Troubleshooting

Read More

Module 1 – Operating Systems

Module 2 – Security

Module 3 – Software Troubleshooting

Module 4 – Operational Procedures

Read More

Module 1 – Risk Management

Module 2 – Enterprise Security Architecture

Module 3 – Enterprise Security Operations

Module 4 – Technical Integration of Enterprise Security

Module 5 – Research, Development and Collaboration

Read More

Domain 1 – Characteristics of Cloud Services from a Business Perspect

Domain 2 – Cloud Computing and Business Value

Domain 3 – Technical Perspectives/Cloud Types

Domain 4 – Steps to Successful Adoption of Cloud

Domain 5 – Impact and Changes of Cloud Computing on IT Service Management

Domain 6 – Risks and Consequences of Cloud Computing

Read More

Module 1

Module 2

Module 3

Module 4

Module 5

Module 6

Module 7

Read More

Module 1: Threat Management

Module 2: Vulnerability Management

Module 3: Cyber Incident Response

Module 4: Security Architecture and Tool Sets

Read More

Module 1: Threat and Vulnerability Management

Module 2: Software and Systems Security

Module 3: Security Operations and Monitoring

Module 4: Incident Response

Module 5: Compliance and Assessment

Module 6: Afterword

Read More

Module 1 – IT Concepts and Terminology

Module 2 – Infrastructure

Module 3 – Applications and Software

Module 4 – Software Development

Module 5 – Database Fundamentals

Module 6 – Security

Read More

Module 1: Intro & Performing Basic Linux Tasks

Module 2: Managing Users and Groups

Module 3: Managing Permissions and Ownership

Module 4: Managing Storage

Module 5: Managing Files and Directories

Module 6: Managing Kernel Modules

Module 7: Managing the Linux Boot Process

Module 8: Managing System Components

Module 9: Managing Devices

Module 10: Managing Networking

Module 11: Managing Packages and Software

Module 12: Securing Linux Systems

Module 13: Working with Bash Scripts

Module 14: Automating Tasks

Module 15: Installing Linux

Read More

Module 1: Instructions

Module 2: Managing Software

Module 3: Configuring Hardware

Module 4: Managing Files

Module 5: Booting Files

Module 6: X

Module 7: Admin

Module 8: Basic Networking

Module 9: Scripts

Module 10: Security

Read More

Module 1: Over-The-Air Technologies

Module 2: Network Infrastructure

Module 3: Mobile Device Manager

Module 4: Security

Module 5: Troubleshooting

Read More

Module 1 – Networking Concepts

Module 2 – Infrastructure

Module 3 – Network Operation

Module 4 – Network Security

Module 5 – Network Troubleshooting and Tools

Read More

Module 1 – The Pen Test Engagement

Module 2 – Passive Reconnaissance

Module 3 – Active Reconnaissance

Module 4 – Physical Security

Module 5 – Social Engineering

Module 6 – Vulnerability Scan Analysis

Module 7 – Password Cracking

Module 8 – Penetrating Wired Networks

Module 9 – Penetrating Wireless Networks

Module 10 – Windows Exploits

Module 11 – Linux Exploits

Module 12 – Mobile Devices

Module 13 – Specialized Systems

Module 14 – Scripts

Module 15 – Application Testing

Module 16 – Web App Exploits

Module 17 – Lateral Movement

Module 18 – Persistence

Module 19 – Cover Your Tracks

Module 20 – The Report

Module 21 – Post Engagement Cleanup

Read More

Module 1: Information Security Roles Security Control and Framework Types

Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources

Module 3: Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing

Module 4: Social Engineering, Indicators of Malware Attacks

Module 5: Cryptography

Module 6: Certificates and PKI

Module 7: Authentication

Module 8: Identity and Accounts, Authorization, Personnel Polices

Module 9: Network Design and Hardware (Part 1)

Module 10: Network Hardware (Part 2)

Module 11: Network Protocols

Module 12: Endpoint Security

Module 13: Mobile Devices

Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation

Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualization

Module 16: Privacy and Data Protection

Module 17: Incident Response

Module 18: Forensics

Module 19: Risk Management and Business Impact Analysis

Module 20: Redundancy and Backup Strategies

Module 21: Physical Security

Module 22: Afterword

Read More

Module 1: Threats, Attacks and Vulnerabilities

Module 2: Technologies and Tools

Module 3: Architecture and Design

Module 4: Identity and Access Management

Module 5: Risk Management

Module 6: Cryptography and PKI

Read More

Module 1: Introduction to AWS Basics

Module 2: AWS Web Services and Cloud Platform Services

Module 3: AWS Basic Summary

Module 4: Introduction to AWS Deep Dive

Module 5: AWS Management of Services and Features Deep Dive

Module 6: AWS Deep Dive Summary

Read More

Module 1: Introduction to Cloud Computing

Module 2: Identity and Access Management IAM

Module 3: Elastic Cloud Computing EC2

Module 4: EC2 Storage

Module 5: Elastic Load Balancer and Auto Scaling Group ELB and ESG

Module 6: Amazon S3

Module 7: Database and Analytics

Module 8: Other Services

Module 9: Scaling Your Infrastructure

Module 10: Global Applications

Module 11: Cloud Integration

Module 12: Cloud Monitoring

Module 13: Virtual Private Network

Module 14: Security and Compliance

Module 15: Machine Learning

Module 16: Advanced Identity

Module 17: Are You Well Architected?

Module 18: Congratulations & Exam Preparation

Read More

Module 1: Introduction

Module 2: Information Security Governance

Module 3: Information Security Risk Management

Module 4: InfoSec Prog Development and Management

Module 5: Information Security Incident Management

Module 6: Exam Prep

Read More

Domain 1: Information Security Governance

Domain 2: Risk Management

Domain 3: Information Security Program

Domain 4: Information Security Program Implementation

Domain 5: Information Security Program Management

Domain 6: Incident Management and Response

Read More

Cloud Concepts, Architecture and Design

Legal, Risk and Compliance

Cloud Data Security

Cloud Platform and Infrastructure Security

Cloud Application Security

Cloud Security Operations

Read More

Module 1 – Introduction to Ethical Hacking

Module 2 – Footprinting and Reconnaissance

Module 3 – Network Scanning

Module 4 – Enumeration

Module 5 – Vulnerability Analysis

Module 6 – Malware Threats

Module 7 – Sniffing

Module 8 – Social Engineering

Module 9 – Denial of Service

Module 10 – Session Hijacking

Module 11 – Hacking Webservers

Module 12 – Hacking Web Applications

Module 13 – SQL Injection

Module 14 – Hacking Wireless Networks

Module 15 – System Hacking

Module 16 – Hacking Mobile Platforms

Module 17 – Evading IDS, Firewalls, and Honeypots

Module 18 – Cryptography

Module 19 – Cloud Computing

Module 20 – IoT Hacking

Read More

Lesson 1

Lesson 2

Lesson 3

Lesson 4

Lesson 5

Lesson 6

Lesson 7

Read More

Module 1: Security and Risk Management

Module 2: Asset Security

Module 3: Security Engineering

Module 4: Communication and Network Security

Module 5: Identity and Access Management

Module 6: Security Assessment Testing

Module 7: Security Operations

Module 8: Software Development Security

Read More

Module 1: Security and Risk Management

Module 2: Asset Security

Module 3: Security Architecture and Engineering

Module 4: Communication and Network Security

Module 5: Identity and Access Management (IAM)

Module 6: Security Assessment and Testing

Module 7: Security Operations

Module 8: Software Development Security

Read More

Module 1: Computer Forensics Introduction

Module 2: Forensics Investigation Process

Module 3: Searching and Seizing

Module 4: Digital Evidence

Module 5: First Responder Procedures

Module 6: Forensics Lab

Module 7: Hard Disks and File Systems

Module 8: Windows Forensics

Module 9: Data Acquisition and Duplication

Module 10: Recovering Deleted Files and Partitions

Module 11: Using Access Data FTK

Module 12: Using EnCase

Module 13: Steganography

Module 14: Password Crackers

Module 15: Log Correlation

Module 16: Network Forensics

Module 17: Wireless Attacks

Module 18: Web Attacks

Module 19: Email Crimes

Module 20: Mobile Investigation

Module 21: Investigative Reports

Module 22: Expert Witness

Read More

Module 1: Cyber Security Awareness and Prevention

Module 2: Managing Mobile Device Security

Read More

Module 1: Data Breaches And ID Theft

Module 2: Device Security Basics

Module 3: Avoiding Inadvertent Disclosure

Module 4: Physical And Technical Safeguards

Read More

Module 1: What Is Agile

Module 2: Projects And Projects Management In An Agile World

Module 3: Agile and Scrum

Module 4: Common Scrum Terminology

Module 5: Other Iterative Methods

Module 6: Communication Skills In Agile World

Module 7: Using Agile Outside Software Development

Module 8: Case Studies Of Transitioning to Agile

Module 9: Critique Of Agile

Module 10: Review Of Agile

Read More

Module 1 : Agile Principles and Mindset

Module 2 : Value Driven Delivery

Module 3 : Stakeholder Engagement

Module 4 : Team Performance

Module 5 : Adaptive Planning

Module 6 : Problem Detection and Resolution

Module 7 : Continuous Improvement

Read More

Module 1 : Agile Principles and Mindset

Module 2 : Value Driven Delivery

Module 3 : Stakeholder Engagement

Module 4 : Team Performance

Module 5 : Adaptive Planning

Module 6 : Problem Detection and Resolution

Module 7 : Continuous Improvement

Read More

Module 1: Getting Started

Module 2: Getting to Know Adobe Audition

Module 3: The Interface

Module 4: Waveform Editing

Module 5: Effects

Module 6: Audio Restoration

Module 7: Mastering

Module 8: Sound Design

Module 9: Creating and Recording Files

Module 10: Multitrack Sessions

Module 11: Multitrack Session Editing

Module 12: Additional Features and Summary

Read More

Module 1: Introduction to After Effects

Module 2: Intermediate Effects and Techniques in After Effects

Module 3: More Advanced Effects and Techniques in After Effects

Read More

Module 1: Getting Started

Module 2: Getting to Know the Workflow

Module 3: Creating a Basic Animation Using Effects and Presets

Module 4: Animating Text

Module 5: Working With Shape Layers

Module 6: Animating a Multimedia Presentation

Module 7: Animating Photoshop Layers

Module 8: Working With Masks

Module 9: Distorting Objects with the Puppet Tools

Module 10: Using the Roto Brush Tool

Module 11: Performing Color Correction

Module 12: Creating Motion Graphics Templates

Read More

Module 1

Module 2

Read More

Module 1: Tools and Effects in Illustrator

Module 2: Creating Projects in Illustrator

Read More

Module 1

Module 2

Read More

Module 1

Module 2

Module 3

Module 4

Module 5

Module 6

Module 7

Module 8

Module 9

Module 10

Module 11

Read More

Module 1: What is Animation and the Basics

Module 2: Intermediate Animation Techniques

Read More

Module 1: Welcome

Module 2: Why use Lightroom

Module 3: Lightroom library and organization

Module 4: Edit your photo – global adjustments

Module 5: Edit your photo – local adjustments

Module 6: Saving and exporting

Module 7: Lightroom CC overview

Module 8: Outro

Read More

Module 1: Tools and Effects in Photoshop

Module 2: Creating Projects in Photoshop

Read More

Module 1: Introduction to Premiere and Getting Started on an Editing Project

Module 2: More Editing Techniques and Completing a Project

Read More

Module 1

Module 2

Read More

Module 1

Module 2

Read More

Module 1

Module 2

Read More

Module 1: Intro

Module 2: Camera Anatomy

Module 3: Scene Camera Modes

Module 4: Achieve Exposure

Module 5: Filetypes

Module 6: Sensor

Module 7: Resolution

Module 8: White Balance

Module 9: Color Theory

Module 10: Depth of Field

Module 11: Focusing

Module 12: Lighting

Module 13: Metering

Module 14: Composition

Read More

Module 1: Introduction

Module 2: Getting Started

Module 3: Drawing

Module 4: Colors and Gradients

Module 5: Intermediate Illustration

Module 6: Typography

Module 7: Live Trace, Paint Brush and Blob Brush

Module 8: Exporting

Read More

Module 1: Getting Started

Module 2: Layers and More

Module 3: Editing, Techniques and More

Read More

Module 1: Getting Started

Module 2: Motion, Sound, and More

Read More

Module 1: Architecture

Module 2: Governance and Enterprise Risk

Module 3: Legal Issues- Contracts and Electronic

Module 4: Compliance and Audit Management

Module 5: Information Management and Data Security

Module 6: Interoperability and Portability

Module 7: Traditional Security, Business Continuity, and Disaster Recovery

Module 8: Data Center Operations

Module 9: Incident Response

Module 10: Application Security

Module 11: Encryption and Key Management

Module 12: Identity, Entitlement, and Access Management

Module 13: Virtualization

Module 14: Security as a Service

Read More

Module 1: The principles of CC

Module 2: Implementing and Managing CC

Module 3: Using the Cloud

Module 4: Security and Compliance

Module 5: Evaluation of CC

Read More

Module 1: Foundations (Beginner)

Module 2: Terms and Tools (Beginner)

Module 3: Identifiers, Variables, and Data Types (Beginner)

Module 4: Object-Orientated Programming (Intermediate)

Module 5: Predefined Classes (Intermediate)

Module 6: Methods Part 1 (Intermediate)

Module 7: Methods Part 2 (Advanced)

Module 8: Constructors (Advanced)

Module 9: Control of Flow (Advanced)

Module 10: Arrays and Exceptions (Advanced)

Read More

Module 1: Introduction To Javascript

Module 2: Core Concepts And Syntax

Module 3: Getting A Handle On The DOM

Module 4: Working With Libraries

Read More

Module 1: Introduction To Oracle 12c SQL Fundamentals

Module 2: Retrieving Data

Module 3: SQL Functions

Module 4: Subqueries

Module 5: Data Manipulation Language

Module 6: Data Control Language

Module 7: Data Definition Language

Module 8: Combining Queries

Module 9: Oracle 12C SQL Fundamentals Review

Read More

Module 1: Database Concepts And Tools

Module 2: Memory Structure

Module 3: Tables

Module 4: Indexes

Module 5: Constraints And Triggers

Module 6: Users

Module 7: Internal Structures

Module 8: Starting Up and Shutting Down Database

Module 9: Critical Storage Files

Module 10: Data Manipulation Language

Module 11: Data Concurrency

Module 12: BackUp And Recovery

Module 13: Installation

Module 14: Course Review

Read More

Module 1: Database Admininstration

Module 2: Oracle Architecture

Module 3: Database Schema

Module 4: Recovery Manager

Module 5: Introduction to SQL

Module 6: Filtering and Sorting Data

Module 7: Functions

Module 8: SET Operators and Subqueries

Module 9: Regular Expressions and SQL Loader

Read More

Module 1: Preparing for and Taking the Exam

Module 2: Process Domain

Module 3: People Domain

Module 4: Business Environment Domain

Read More

Module 1 : Getting Certified to take the Examination

Module 2 : Techniques for Preparing for and Taking the Examination

Module 3 : Project Management Framework

Module 4 : Project Integration Management

Module 5 : Project Scope Management

Module 6 : Project Schedule Management

Module 7 : Project Cost Management

Module 8 : Project Quality Management

Module 9 : Project Resource Management

Module 10 : Project Communications Management

Module 11 : Project Risk Management

Module 12 : Project Procurement Management

Module 13 : Project Stakeholder Management

Read More

Module 1: Introduction

Module 2: Risk Management Concepts

Module 3: Risk Management Environment

Module 4: Project Definition

Module 5: Risk Management Planning

Module 6: Risk Identification

Module 7: Qualitative Risk Analysis

Module 8: Quantitative Risk Analysis

Module 9: Risk Response Planning

Module 10: Risk Monitoring And Controlling

Read More

Module 1: Risk Management Fundamentals

Module 2: Test Requirements

Module 3: Test Domains

Module 4: Risk Strategy and Planning

Module 5: Stakeholder Engagement

Module 6: Risk Process Facilitation

Module 7: Risk Monitoring and Reporting

Module 8: Specialized Risk Analyses

Module 9: RMP Recap

Module 10: RMP Review Questions

Read More

Module 1 : Getting Certified to take the Examination

Module 2 : Project Management Framework

Module 3 : Project Integration Management

Module 4 : Project Scope Management

Module 5 : Project Schedule Management

Module 6 : Project Cost Management

Module 7 : Project Quality Management

Module 8 : Project Resource Management

Module 9 : Project Communications Management

Module 10 : Project Risk Management

Module 11 : Project Procurement Management

Module 12 : Project Stakeholder Management

Module 13 : Review

Read More

Module 1: Organization­ – Wide Planning and Deployment

Module 2: Leadership

Module 3: Organizational Process Measures and Management

Module 4: Team Management

Module 5: Define Phase­ – Overview of the Define Phase and the Voice of the Customer

Module 6: Define Phase – Business Case and Project Charter

Module 7: Define Phase­ – Analytical Tools

Module 8: Measure Phase­ – Process Analysis and Documentation

Module 9: Measure Phase­ – Data Collection

Module 10: Measure Phase – ­Measurement Systems

Module 11: Measure Phase­ – Basic Statistics

Module 12: Measure Phase­ – Probability

Module 13: Measure Phase­ – Process Capability

Module 14: Analyze Phase – Measuring and Modeling Relationships

Module 15: Analyze Phase­ – Hypothesis Testing

Module 16: Analyze Phase­ – FEMA and Additional Analysis Methods

Module 17: Improve Phase­ – Design of Experiments (DOE)

Module 18: Improve Phase­ – Lean Method

Module 19: Improve Phase -­ Implementation

Module 20: Control Phase­ – Statistical Process Control (SPC)

Module 21: Control Phase­ – Other Controls

Module 22: Control Phase­ – Maintain Controls and Sustain Improvements

Module 23: DFSS

Module 24: Exam Review­ – Prep and Key Concepts

Read More

Module 1: Six Sigma And The Organization

Module 2: Define Phase ­Project Identification

Module 3: Define Phase­Voice Of The Customer

Module 4: Define Phase­ Project Management Basics on Six Sigma Green Belt

Module 5: Define Phase­Management And Planning Tools

Module 6: Define Phase­Business Results For Projects

Module 7: Define Phase­Team Dynamics And Define Phase Summary Review Questions

Module 8: Measure Phase­Process Analysis And Documentation

Module 9: Measure Phase­Probability And Statistics

Module 10: Measure Phase­Statistical Distributions

Module 11: Measure Phase­Collecting And Summarizing Data

Module 12: Measure Phase­Measurements System Analysis (MSA)

Module 13: Measure Phase­Process And Performance Capability And Measure Phase Summary And Review

Module 14: Analyze Phase­Exploratory Data Analysis And Hypothesis Testing

Module 15: Analyze Phase ­ Process Drivers

Module 16: Improve Phase­Design Of Experiment (DOE)

Module 17: Improve Phase­Root Cause Analysis

Module 18: Improve Phase­Lean Tools

Module 19: Control Phase­ Statistical Process Control

Module 20: Control Phase­Lean Tools For Process Control

Module 21: Review Exam­Prep And Key Concepts

Read More

Module 1: Development Methods

Module 2: Agile Manifesto Principles

Module 3: Scrum

Module 4: Why Scrum

Module 5: Scrum-Roles Overview

Module 6: Product Owner

Module 7: Scrum Master

Module 8: Scrum Team

Module 9: Scrum Process

Module 10: Scrum Project Phase

Module 11: Plan and Estimate

Module 12: Implement

Module 13: Review and Retrospect

Module 14: Release

Module 15: Project Vision

Module 16: Scrum Master and Stake Holder(s)

Module 17: Form Scrum Team

Module 18: Develop Epics

Module 19: User Stories

Module 20: Justifications and Sample Change(s)

Module 21: Creating a Prioritized Backlog

Module 22: Conduct Release Planning

Module 23: Sprints

Module 24: Scrum Framework

Module 25: Scrum of Scrums

Module 26: Scrum Demo

Module 27: Review

Read More

Module 1: Development Methods

Module 2: Agile Manifesto Principles

Module 3: Scrum

Module 4: Why Scrum

Module 5: Scrum-Roles Overview

Module 6: Product Owner

Module 7: Scrum Master

Module 8: Scrum Team

Module 9: Scrum Process

Module 10: Scrum Project Phase

Module 11: Plan and Estimate

Module 12: Implement

Module 13: Review and Retrospect

Module 14: Release

Module 15: Project Vision

Module 17: Form Scrum Team

Module 18: Develop Epics

Module 19: User Stories

Module 20: Justifications and Sample Change(s)

Module 21: Creating a Prioritized Backlog

Module 22: Conduct Release Planning

Module 23: Sprints

Module 24: Scrum Framework

Module 25: Scrum of Scrums

Module 26: Scrum Demo

Module 27: Review

Read More

  • Introduction
  • Business Entities
  • Beginning Your Business
  • Financial Basics Part 1
  • Financial Basics Part 2
  • Employees Payroll
  • Getting Your Business Out There
  • SEO
  • Other Topics
  • Closing

Read More

Module 1: Setup and Maintenance

Module 2: List Management

Module 3: Sales (Money-In)

Module 4: Purchased (Money-Out)

Module 5: Accounting

Module 6: Reports

Module 7: Customizations and Time Savers

Module 8: Extra

Read More

Module 1: Creating and Setting Up Your Point of Sale Company File

Module 2: Installing your System

Module 3: Navigating and Customizing the Home Page

Module 4: Company Preferences

Module 5: Financial- Setting up QuickBooks Connection

Module 6: Setting up Sales Tax

Module 7: Workstation Preferences

Module 8: Additional Features

Module 9: Employees and Security

Module 10: Customers

Module 11: Rewards Program

Module 12: Vendors

Module 13: Setting Up Your Inventory

Module 14: Item Styles, Assemblies, and Group

Module 15: Working with Inventory

Module 16: Sales

Module 17: Working with Price Levels and Discounts

Module 18: Collecting Sales Tax

Module 19: Adding Shipping Information (Pro/MS)

Module 20: Tracking Sales Commissions

Module 21: Taking Payment and Giving Change

Module 22: Recording Tips

Module 23: Handling Tricky Sales Returns

Module 24: Working with Sales Orders, Work Orders, and Layaways

Module 25: Purchasing Merchandise

Module 26: Receiving from a PO

Module 27: Managing Inventory

Module 28: Reporting

Module 29: QuickBooks Financial

Module 30: Multi-Store

Module 31: Protect your data

Module 32: Adding Third Party Applications

Module 1: Intro and Setup

Module 2: Tools

Module 3: Preferences

Module 4: Security & Users

Module 5: Estimates

Module 6: Sales Orders

Module 7: Receiving Money

Module 8: Bounced Checks

Module 9: Specific Tracking

Module 10: Receiving and Depositing

Module 11: Credit Cards and Bank Accounts

Module 12: Payroll

Module 13: Transactions

Module 14: Accounts and Reports

Module 15: Integrating with Word

Module 16: Data Types

Module 17: Conclusion

Read More

Module 1: Sage 50 2013

Module 2: Sage 50 Basics

Module 3: Inventory

Module 4: Employee

Module 5: Banking

Module 6: Maintenance

Module 7: File Handling

Module 8: Manager

Module 9: Jobs

Module 10: Budgets

Module 11: Charts of Accounts

Module 12: Accounts Management

Module 13: Customer Setup

Module 14: Jobs Setup

Module 15: Vendor Setup

Module 16: Inventory Setup

Module 17: Employee Setup

Module 18: Security Setup

Module 19: ACTI Link

Module 20: Task Overview

Module 21: Forms, Reports, and Recap

Read More

Module 1: Intro to SalesForce Automation

Module 2: Working With The SalesForce System

Module 3: SalesForce Solution

Module 4: SalesForce Admin

Module 5: Migrating To SalesForce

Module 6: Course Conclusion

Read More

Module 1: The Phone

Module 2: The Screen

Module 3: The Keyboard

Module 4: Contacts

Module 5: Phone Calls

Module 6: Messaging

Module 7: Internet

Module 8: Email

Module 9: Music

Module 10: Android Specifics

Module 11: Photos & Video

Module 12: Conclusion

Read More

Module 1: iPhone Basics

Module 2: The Screen

Module 3: The Keyboard

Module 4: Basic Calls and Settings

Module 5: Contacts

Module 6: Phone Calls

Module 7: Messaging

Module 8: Web

Module 9: Email

Module 10: Siri

Module 11: Music

Module 12: Photos and Video

Module 13: Maps

Module 14: Conclusion

Read More

Coming Soon

    • Certified Blockchain Developer – Hyperledger (CBDH)
    • Certified Blockchain Solutions Architect (CBSA)
    • Enterprise Blockchain Bootcamp for Solutions Engineers
    • Module 1: Introduction and Deploy Windows
      • 1.1 Instructor and Course Introduction
      • 1.2 Exam Overview
      • 1.3 Deploy Windows Intro
      • 1.4 Deploy Windows 10
      • 1.5 Deploy Windows 10 Pt 2
      • 1.6 Preparing Virtual Lab Setup for the Client 1
      • 1.7 Installation of Windows 10 Enterprise
      • 1.8 Troubleshooting Failed Installations with Setup Logs
      • 1.9 Configuring Locales
      • 1.10 Perform Post-Installation Configuration
      • 1.11 Navigating Microsoft Edge
      • 1.12 Modifying Microsoft Edge Settings
      • 1.13 Customizing Your Computer Setting

      Module 2: Manage Devices and Data

      • 2.1 Manage devices and data intro
      • 2.2 Manage local users, groups, and devices
      • 2.3 Configure data access and protection
      • 2.4 Adding and accessing local users and groups
      • 2.5 Managing NTFS permissions in Windows 10
      • 2.6 Configure devices by using local policies
      • 2.7 Configuring Audit Policies on Windows 10
      • 2.8 Manage Windows security
      • 2.9 How to change user account settings

      Module 3: Configure Connectivity

      • 3.1 Configure connectivity intro
      • 3.2 Configure networking
      • 3.3 Configuring network adapter advanced properties
      • 3.4 Configuring a static TCP/IP address
      • 3.5 Viewing the networking connection details
      • 3.6 Setting up a VPN connection
      • 3.7 Configure remote connectivity
      • 3.8 Configure remote management

      Module 4: Maintain Windows

      • 4.1 Maintain Windows intro
      • 4.2 Configure system and data recovery
      • 4.3 Backing up files in Windows 10
      • 4.4 Using the recycle bin
      • 4.5 Manage updates
      • 4.6 Check for updates in Windows 10
      • 4.7 Configuring hardware in Windows 10
      • 4.8 Monitor and manage Windows
      • 4.9 Configuring Windows 20 desktop options
      • 4.10 Installing new features