Module 1: Installation

Module 2: Data Storag

Module 3: Data Recover

Module 4: Monitoring

Module 5: Security

Module 6: Maintenance

Read More

Module 1: What are Big Data Clusters?

Module 2: Big Data Cluster Architecture

Module 3: Deployment of Big Data Clusters

Module 4: Loading and Querying Data in Big Data Clusters

Module 5: Working with Spark in Big Data Clusters

Module 6: Machine Learning on Big Data Clusters

Module 7: Create and Consume Big Data Cluster Apps

Module 8: Maintenance of Big Data Clusters

Read More

Module 1 – Introduction to Business Intelligence and Data Modeling

Module 2 – Multidimensional Databases

Module 3 – Cubes and Dimensions

Module 4 – Measures and Measure Groups

Module 5 – Introduction to MDX

Module 6 – Customizing Cube Functionality

Module 7 – Tabular Data Models

Module 8 – Data Analysis Expressions (DAX)

Module 9 – Data Mining

Read More

Module 1 – Query Tools

Module 2 – Introduction to T-SQL Querying

Module 3 – Basic SELECT Queries

Module 4 – Querying Multiple Tables

Module 5 – Sorting and Filtering Data

Module 6 – Working with SQL Server Data Types

Module 7 – Using DML to Modify Data

Module 8 – Using Built-In Functions

Module 9 – Grouping and Aggregating Data

Module 10 – Using Subqueries

Module 11 – Using Table Expressions

Module 12 – Using Set Operators

Module 13 – Using Window Ranking, Offset, and Aggregate Functions

Module 14 – Pivoting and Grouping Sets

Module 15 – Implementing Error Handling

Module 16 – Managing Transactions

Read More

Module 1 – Query Tools

Module 2 – Introduction to T-SQL Querying

Module 3 – Basic SELECT Queries

Module 4 – Querying Multiple Tables

Module 5 – Sorting and Filtering Data

Module 6 – Introduction to Business Intelligence and Data Modeling

Module 7 – Prepare Data

Module 8 – Clean, Transform, and Load Data

Module 9 – Design a Data Model

Module 10 – Create Model Calculations using DAX

Module 11 – Create Reports

Module 12 – Create Dashboards

Module 13 – Create Paginated Reports

Module 14 – Perform Advanced Analytics

Module 15 – Create and Manage Workspaces

Module 16 – Create Power App Visuals

Module 17 – Analysis Services and Power BI

Read More

Module 1: Introduction

Module 2: Cloud Fundamentals

Module 3: Azure’s Architecture

Module 4: Compute

Module 5: Networking and CDN

Module 6: Storage

Module 7: Azure Solutions

Module 8: Administration

Module 9: Pricing and Service Level Agreements

Module 10: Exam Preparation

Module 11: Review Questions

Read More

Module 1: Implement VM Solutions

Module 2: Develop Azure Platform as a Service

Module 3: Develop for Azure Storage

Module 4: Implement Azure Security

Module 5: Monitor, Troubleshoot and Optimize Azure Solutions

Module 6: Connect to and Consume Azure and Third Party Services

Read More

Module 1 – Prepare Data

Module 2 – Clean, Transform, and Load Data

Module 3 – Design a Data Model

Module 4 – Create Model Calculations using DAX

Module 5 – Create Reports

Module 6 – Create Dashboards

Module 7 – Create Paginated Reports

Module 8 – Perform Advanced Analytics

Module 9 – Create and Manage Workspaces

Module 10 – Create Power App Visuals

Module 11 – Analysis Services and Power BI

Read More

Module 1 Understanding Local Area Networking

Module 2 Defining Networks with the OSI Model

Module 3 Understanding Wired and Wireless Networks

Module 4 Understanding Internet Protocol

Module 5 Implementing TCP-IP in the command line

Module 6 Working with Networking Services

Module 7 Understanding Wide Area Networks

Module 8 Defining Network Infrastructure and Security

Module 9 Key Takeaways

Module 10 Terms to Know

Read More

Module 1 Introducing Windows Server 2016

Module 2 Managing Windows Server 2016

Module 3 Managing Storage

Module 4 Monitoring and Troubleshooting Servers

Module 5 Essential Services

Module 6 Understanding File and Print Services

Module 7 Windows Network Services and Applications

Mod 8 Key Takeaways

Mod 9 Terms to Know

Mod 10 Hands on Labs

Read More

Module 1: Deploy a Microsoft Azure SQL Database

Module 2: Plan for SQL Server Installation

Module 3: Deploy SQL Server Instances

Module 4: Deploy SQL Server Databases to Azure Virtual Machines

Module 5: Configure Secure Access to Microsoft Azure SQL Databases

Module 6: Configure SQL Server performance settings

Module 7: Manage SQL Server instances

Module 8: Manage SQL Storage

Module 9: Perform Database Maintenance

Read More

Module 1: Configure Encryption

Module 2: Configure Data Access and Permissions

Module 3: Configure Auditing

Module 4: Develop a Backup Strategy

Module 5: Restore Databases

Module 6: Manage Database Integrity

Module 7: Monitor Database Activity

Module 8: Monitor Queries

Module 9: Manage Indexes

Module 10: Monitor SQL Server Instances

Module 11: Implement Log Shipping

Module 12: Implement Failover Cluster Instances

Module 13: Implement Always On Availability Groups

Read More

Module 1: Installing and Configuring Domain Controllers

Module 2: Managing AD DS Objects

Module 3: Securing Active Directory Domain Services

Module 4: Working with Complex AD Infrastructures

Module 5: Implementing Group Policy

Module 6: Understanding Microsoft Azure AD and Directory Synchronization

Module 7: Monitoring and Recovering AD DS

Module 8: Implementing Active Directory Certificate Services

Module 9: Implementing Active Directory Federation Services

Read More

Module 1: Plan and Implement IPv4 and IPv6 Networks

Module 2: Installing and Configuring DHCP

Module 3: Installing and Configuring DNS

Module 4: Implementing and Managing IP Address Management

Module 5: Implementing Remote Access

Module 6: Securing the Network Infrastructure

Read More

Module 1: Installing Windows Server 2016 in Host and Compute Environments

Module 2: Configuring Active Directory Networks for Host and Compute Environments

Module 3: Implementing Local and Enterprise Storage Solutions

Module 4: Implementing Hyper-V Virtualization and Containers

Module 5: Implementing High Availability

Module 6: Maintaining and Monitoring Windows Server 2016

Read More

Module 1 : Prepare for installation requirements

Module 2 : Install Windows

Module 3 : Configure devices and device drivers

Module 4 : Perform post-installation configuration

Module 5 : Implement Windows in an enterprise environment

Module 6 : Configure networking

Module 7 : Configure storage

Module 8 : Configure data access and usage

Module 9 : Implement Apps

Module 10 : Configure remote management

Module 11 : Configure Updates

Module 12 : Monitor Windows

Module 13 : Configure System and Data Recovery

Module 14 : Configure Authorization and Authentication

Module 15 : Configure Advanced Management Tools

Read More

Module 1: Introducing Windows 10

Module 2: Installing Windows 10

Module 3: Configuring Devices

Module 4: Configuring Network Connectivity

Module 5: Managing Storage, Data, And Printers

Module 6: Managing Apps

Module 7: Managing Device Security

Module 8: Maintaining Windows 10

Module 9: Troubleshooting And Recovery

Module 10: Deploying Windows 10 Enterprise Desktops

Module 11: Managing User Profiles And User State Virtualization

Module 12: Managing Desktop And Application Settings Using Group policy

Module 13: Configuring And Managing Client Hyper-V

Module 14: Configuring Windows Devices – December, 2017 Update – Part1

Module 15: Configuring Windows Devices – December, 2017 Update – Part2

Read More

Module 1: Introduction

Module 2: Troubleshooting Start Up Issues

Module 3: ​Managing Drivers And Hardware

Module 4: Troubleshooting Remote Computers

Module 5: Resolving Problems With Network Connectivity

Module 6: Troubleshooting Group Policy

Module 7: Troubleshooting User Settings

Module 8: Configuring And Troubleshooting Remote Connectivity

Module 9: ​Troubleshooting Resource Access In A Domain

Module 10: Configuring And Troubleshooting Resource Access For Non-Domain Members

Module 11: Troubleshooting Applications

Module 12: Maintaining Windows 8.1

Module 13: Recovering Windows 8.1

Read More

Lesson 1: Getting to Know PCs and the Windows 8 User Interface

Lesson 2: Using the Modern Apps and Navigation Features

Lesson 3: Working with Desktop Applications

Lesson 4: Using Internet Explorer 10

Lesson 5: Customizing the Windows 8 Environment

Lesson 6: Using Windows 8 Security Features

Read More

Module 1: Developing a Strategy for Windows® 7 Business Desktops Deployment

Module 2: Evaluating Application Compatibility in Windows® 7

Module 3: Assessing Deployment Methods for Windows® 7

Module 4: Designing Standard Images for Windows® 7

Module 5: Deploying Windows® 7 with Windows AIK

Module 6: Using Windows Deployment Services to Deploy Windows® 7

Module 7: Deploying Windows® 7 Using Lite Touch Installation

Module 8: Deploying Windows® 7 Using Zero Touch Installation

Module 9: Migrating User State Using USMT 4.0 and WET

Module 10: Planning, Configuring, and Managing the Client Environment

Module 11: Planning and Deploying Applications and Updates to Windows® 7 Clients

Read More

Module 1: Installing, Upgrading, and Migrating to Windows 7

Module 2: Configuring Disks And Device Drivers

Module 3: Configuring File Access And Printers

Module 4: Indentifying And Resolving Log on Problems

Module 5: Configuring Network Connectivity

Module 6: Troubleshooting Network Issues

Module 7: Mobile Computing And Remote Access

Module 8: Securing Windows 7 Desktops

Module 9: Optimizing And Troubleshooting Performance And Reliabilty

Module 10: Maintaining Windows 7 Desktops

Read More

Module 1: Installing, Upgrading and Migrating Windows 7

Module 2: Deploying Windows 7 in the Enterprise

Module 3: Enterprise Management in Windows 7

Module 4: Configuring Hardware and Applications

Module 5: Configuring Network Connectivity

Module 6: Configuring Access to Resources

Module 7: Configuring Mobile Computing

Module 8: Configuring Security Options

Module 9: Monitoring And Maintaining Systems

Module 10: Configuring Backup and Recovery Options

Read More

Module 1: Planning Server Deployment

Module 2: Automating Server Deployment

Module 3: Planning for Server Management

Module 4: Planning the Network Infrastructure

Module 5: Planning Name Resolution Services

Module 6: Planning File and Print Services

Module 7: Planning Active Directory Domain Services

Module 8: Planning Active Directory Certificate Services

Module 9: Planning High Availability

Module 10: Planning Backups For Windows Server

Module 11: Planning Server Monitoring and Maintenance

Read More

Module 1: Installing and Configuring Windows Services

Module 2: TCP/IP Protocol Suite

Module 3: Configuring IPv4 Addressing

Module 4: Configuring IP Address Assignment Services

Module 5: Configuring IPv6 Addressing

Module 6: Configuring Name Resolution Services

Read More

Module 1: Active Directory – An Identity And Access Solution

Module 2: Introduction To Active Directory Domain Services

Module 3: Configuring DNS To Support Active Directory Domain Services

Module 4: Active Directory Object Management

Module 5: Managing Active Directory Replication Using Sites

Module 6: Configuration Management Using Group Policy

Module 7: Desktop Environmental And Security Management

Module 8: Maintaining Active Directory

Module 9: Deploy and Manage a Public Key Infrastructure

Module 10: Supporting Applications with AD LDS

Module 11: Deploying Active Directory Federated Services

Module 12: Deploying Active Directory Rights Management Services

Read More

Module 1: Introduction To Creating Efficient Apps For Sharepoint

Module 2: Working With Managed Metadata Solutions

Module 3: Working With The Search Service

Module 4: Implementing Enterprise Content Management

Module 5: Developing Publishing Sites

Module 6: Interacting With Business Connectivity Services

Read More

Module 1: Overview of SharePoint Development

Module 2: Working With Objects, List, And Libraries

Module 3: Working With Features and Solutions

Module 4: Developing Server Side Code

Module 5: Managing Authentication And Authorization

Module 6: Client Side SharePoint Development

Module 7: Developing And Managing Apps

Module 8: Using Workflows To Automate Business Processes

Module 9: Customizing SharePoint Interfaces

Read More

Module 1: Accessing Data

Module 2: Designing And Implementing WCF Services

Module 3: Querying And Manipulating Data Using Entity Framework

Module 4: Creating And Consuming Web API Based Services

Module 5: Deploying Web Applications And Services

Module 6: Course Review

Read More

Module 1: Intro To Business Intelligence

Module 2: Database Essentials

Module 3: Business Intelligence Development

Module 4: Business Intelligence Results

Module 5: Advanced Reporting And Development

Module 6: SQL Server Integration Services (SSIS)

Module 7: SQL Server 2014 New Features

Module 8: Course Review And Exam Prep

Read More

Module 1: Introduction To Business Intelligence And Data Modeling

Module 2: Implementing Reports The SQL Server Reporting Services

Module 3: Supporting Self Service Reporting

Module 4: Managing Report Execution And Delivery

Module 5: Creating Multidimensional Databases

Module 6: Working With Cubes And Dimensions

Module 7: Working With Measures And Measure Groups

Module 8: Introduction To MDX

Module 9: Customizing Cube Functionality

Module 10: Implementing A Tabular Data Model

Module 11: Introduction To DAX

Module 12: Implementing An Analysis Services Tabular Data Model

Module 13: SQL Analysis Services

Module 14: Creating Data Visualizations With Power View

Module 15: Supporting Self Service Reporting

Module 16: Performing Predictive Analysis With Data Mining

Module 17: Predictive Analytics

Read More

Module 1: Designing A Database Server Infrastructure

Module 2: Designing A Logical Database Scheme

Module 3: Designing A Physical Database Implementation

Module 4: Incorporating Data Files Into the Database

Module 5: Tuning Database Performance

Module 6: Designing Database Security

Module 7: Policy Based Management

Module 8: Monitoring Server Health

Module 9: Designing Database Backup Solution

Module 10: Automating Multi Server Maintenance

Module 11: Managing SQL Server With Windows Powershell

Module 12: Replicating Data

Module 13: Planning High Availability

Module 14: Review of SQL Statements

Module 15: Eleven Rules of Database Design

Read More

Module 1: SQL 2012 And The 464 Test

Module 2: Working With Data Types

Module 3: Tables

Module 4: Data Constraints

Module 5: Planning In Indexing

Module 6: Table Structures

Module 7: Improving Performance with Non-Clustered Indexes

Module 8: Using Indexes And Execution Plans

Module 9: Working with Views

Module 10: Designing and Implementing Stored Procedures

Module 11: Merging Data and Passing Tables

Module 12: Designing and Implementing User Functions

Module 13: Creating Highly Concurrent SQL Server Applications

Module 14: Handling Errors in T-SQL

Module 15: Triggers

Module 16: Implementing Managed Code

Module 17: Storing XML in SQL

Module 18: Querying XML

Module 19: Working with the Spatial Data

Module 20: Working With Full-Text Indexes and Queries

Read More

Lesson 1: Introduction to Data Warehouse

Lesson 2: Creating Dimensions and Changing Granularity of Dimensions

Lesson 3: Creating Fact Tables and Column Store Indexes

Lesson 4: Implementing Data Warehouse in SQL Server 2012

Lesson 5: Working with Integration Services

Lesson 6: Managing Control Flow

Lesson 7: Working with Dynamic Variables

Lesson 8: Implementing Data Flow

Lesson 9: Managing Data Flow

Lesson 10: Managing SSIS Package Execution

Lesson 11: Debugging and Troubleshooting

Lesson 12: Deploying Packages

Lesson 13: Securing Packages and Databases

Lesson 14: Working with MDS and Windows

Read More

Lesson 1: Identifying the SQL Server Platform

Lesson 2: Deploying SQL Server

Lesson 3: Configuring SQL Server

Lesson 4: Managing Databases in SQL Server 2012

Lesson 5: Managing SQL Server Security

Lesson 6: Implementing Advanced Security Settings

Lesson 7: Applying Encryption and Compression

Lesson 8: Working with Indexes and Log Files

Lesson 9: Working with Backup and Restore

Lesson 10: Implementing High Availability

Lesson 11: Optimizing Server Performance

Lesson 12: Troubleshooting Issues and Recovering Databases

Lesson 13: Performing Advanced Database Management Tasks

Read More

Lesson 1: Getting Started with SQL Server 2012

Lesson 2: Working with T-SQL

Lesson 3: Writing SELECT Queries

Lesson 4: Working with SQL Data Types

Lesson 5: Sorting and Filtering Data

Lesson 6: Querying Data from Multiple Tables

Lesson 7: Modifying Data

Lesson 8: Working with SQL Server Built-in Functions

Lesson 9: Programming in T-SQL

Lesson 10: Implementing Stored Procedures

Lesson 11: Working with Sub queries and Table Expressions

Lesson 12: Working with Set Operators, Conditional Operators, and Window Functions

Lesson 13: Working with PIVOT, UNPIVOT, and Grouping Sets

Lesson 14: Managing Error Handling and Transactions

Lesson 15: Querying SQL Server System

Lesson 16: Optimizing Query Performance

Read More

Module 1: SSIS Packages

Module 2: Debugging and Error Handling in SSIS

Module 3: Deploying and Configuring SSIS Packages

Module 4: Securing and Executing SSIS Packages; Service Administration

Module 5: Data Analysis

Module 6: Extending SSAS Cubes

Module 7: Extending SSAS Cubes

Module 8: Securing and Administering SSAS

Module 9: Working With SSAS Data Mining

Module 10: Developing SSAS Reports

Module 11: Extending and Deploying SSRS Reports

Module 12: Scheduling Deployed Reports and Data Sources

Module 13: Configuring And Administering the SSRS Server

Read More

Installing on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance

Getting familiar with SQL on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance

Types of Data on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance

Databases on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance

Looking at Tables on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance

Module 6: Looking at Views

Module 7: About Constraints

Module 8: Looking at Stored Procedures

Module 9: Functions

Modules 10: About Service Broker

Modules 11: Integrity

Modules 12: Permissions in SQL

Modules 13: Accounts

Modules 14: Security

Modules 15: Backups/Restores

Modules 16: Endpoints

Modules 17: Servers working together

Modules 18: Triggers in SQL

Modules 19: Replication between servers

Modules 20: Indexes

Modules 21: Transactions in SQL

Modules 22: Data moves

Modules 23: Data specialties in SQL

Modules 24: Fault Tolerance

Modules 25: SQL Management

Modules 26: SQL Management Monitoring

Modules 27: SQL Management tools

Module 28: Troubleshooting

Module 29: Course Review

Module 30: Common Questions

Module 31: Real World Scenarios

Read More

Module 1: Manage and Maintain a Server Infrastructure

Module 2: Plan and Implement a Highly Available Enterprise Infrastructure

Module 3: Plan and Implement a Server Virtualization Infrastructure

Module 4: Design and Implement Identity and Access Solutions

Read More

Module 1: Plan and Deploy Infrastructure

Module 2: Planning and Implementing

Module 3: Planning and Implementing Server Upgrade and Migration

Module 4: Planning and Deploying Virtual Machine Manager Resources

Module 5: Planning and Implementing File and Storage Services

Module 6: Design and Implement Network Infrastructure Services

Module 7: Design and Maintain a Dynamic Host Configuration Protocol Solution

Module 8: Design a Name Resolution Solution Strategy

Module 9: Design and Manage an IP Address Management Solution

Module 10: Design and Implement Network Access Services

Module 11: Design a VPN Solution

Module 12: Design a DirectAccess Solution

Module 13: Implement a Scalable Remote Access Solution

Module 14: Design and Implement a Network Protection Solution

Module 15: Design and Implement an Active Directory Infrastructure

Module 16: Design a Forest and Domain Infrastructure

Module 17: Implement a Forest and Domain Infrastructure

Module 18: Design a Group Policy Strategy

Module 19: Design an Active Directory Permission Model

Module 20: Design and Implement an Active Directory Infrastructure (Physical)

Module 21: Design an Active Directory Site Topology

Module 22: Design an Active Directory Site Topology

Module 23: Design and Implement a Branch Office Infrastructure

Read More

Module 1: Configuring Advanced DNS Services

Module 2: Advanced DHCP Services

Module 3: Active Directory Forest Configuration

Module 4: Active Directory Certificate Services

Module 5: ISCSI And ISNS

Module 6: Configuring IPAM

Module 7: Network Balancing

Module 8: Failover Clusters

Module 9: Configuring Hyper_V Virtual Machines

Module 10: Dynamic Access Control

Module 11: Active Directory Rights Management Services

Module 12: Active Directory Federation Services

Module 13: Disaster Recovery

Module 14: Configuring Additional Services

Read More

Module 1: Managing User and Service Accounts

Module 2: Administer Group Policy

Module 3: Managing Network File Services

Module 4: Domain Name System

Module 5: Windows Deployment Services

Module 6: Windows Server Update Services

Module 7: Remote Access

Module 8: Monitoring System

Module 9: Managing Active Directory Services

Read More

Module 1: Installing And Configuring Windows Server 2012 R2

Module 2: Installing and Configuring an Active Directory Domaine Control

Module 3: Administering Active Directory Objects

Module 4: Automating Administration Tasks

Module 5: Configuring IPv4

Module 6: Configuring IPv6

Module 7: Installing and Configuring DHCP

Module 8: Installing and Configuring DNS

Module 9: Configuring Storage Spaces And File And Print Services

Module 10: Configuring Group Policy

Module 11: Securing Windows Servers

Module 12: Installing and Configuring Virtual Servers and Clients

Read More

Module 1: Understanding Microsoft Applications

Module 2: Installing And Configuring The Hyper-V Role

Module 3: Creating And Managing Virtual Hard Disks, Virtual Machines, And Virtual

Module 4: Producing And Configuring Virtual Machine Networks

Module 5: Virtual Machine Movement And Hyper-V Replicas

Module 6: Implementing Failover Clustering Using Hyper-V

Module 7: Installing And Configuring Microsoft System Center 2012 R2 Virtual

Module 8: Managing The Network And Storage Infrastructure In Microsoft System

Module 9: Creating And Managing Virtual Machines Using Microsoft System Center 2012 R2Virtual Machine Manager

Module 10: Configuring And Managing The Microsoft System Center 2012 R2 Virtual Machine Manager Library

Module 11: Managing Clouds In Microsoft System Center 2012 R2 Virtual Machine

Module 12: Managing Services In Microsoft System Center 2012 R2 Virtual

Module 13: Protecting And Monitoring Virtualization Infrastructure

Module 14: Hyper-V And SCVMM Review

Read More

Module 1: Technology Review

Module 2: Device Management

Module 3: Office 365 Deployment Plan

Module 4: Windows Azure

Module 5: PowerShell

Module 6: SQL Server

Module 7: Azure Lync and SharePoint

Module 8: Course Review

Read More

Module 1: Introduction To Office 365

Module 2: Administration In Office 365

Module 3: Managing Clients

Module 4: Planning DNS And Exchange Migrations

Module 5: Planning And Configuring Exchange Online

Module 6: Configuring Sharepoint Online

Module 7: Configuring Lync Online

Module 8: Implementing Coexistence Technologies

Read More

Module 1: Overview

Module 2: Beginning Powershell

Module 3: Exhange Control Panel

Module 4: Create A New Mailbox with Powershell

Module 5: Mailbox Statistics With Powershell

Module 6: Intermediate Powershell

Module 7: Unified Messaging

Module 8: Installation and Configuration

Module 9: Exchange Online

Module 10: Advanced Design

Read More

Module 1: Overview

Module 2: Exchange Server 2013 Administration

Module 3: Fundamentals of Exchange Administration

Module 4: Archive Mailboxes

Module 5: Properties of User Mailboxes

Module 6: Distribution Groups

Module 7: Outlook and Outlook Web Apps

Module 8: Preparation Prerequisites

Module 9: Installation of Exchange 2013

Module 10: Exchange 2013 Design

Module 11: Labs and Demos

Read More

Module 1: Handling Design And Architecture For Microsoft Lync Server 2013

Module 2: Designing A Lync Server 2013

Module 3: Installing Lync

Module 4 Questions

Module 5: Deploying And Managing Clients And Devices

Module 6: Conferencing In Lync Server 2013

Module 7: Designing And Deploying External Access

Module 8: Deploying Microsoft Lync Server 2013 Persistant Chat

Module 9: Archiving And Monitoring

Module 10: Administering And Maintaining Lync Server 2013

Module 11: Configuring And Managing High Availability In Lync Server 2013

Module 12: Understanding Disaster Recover In Lync Server 2013

Module 13: Planning a Migration to Lync Server 2013

Read More

Module 1: Understanding Voice Architecture

Module 2: Configuring Key Enterprise Voice Functionality

Module 3: Designing Exchange Server 2013 Unified Messaging Intergration with

Module 4: Understanding Voice Applications

Module 5: Configuring and Deploying Emergency Calling

Module 6: Integrating the PSTN

Module 7: Understanding Lync Server 2013 and Networking

Module 8: Understanding Phones and Devices

Module 9: Configuring And Migrating Lync Online

Module 10: Monitoring

Module 11: Understanding Lync Server2013 Voice Resiliency

Read More

Module 1: Business Continuity

Module 2: Model, Design, and Test

Module 3: Upgrade and Migrate

Module 4: Create and Configure Service Applications

Module 5: SharePoint Management

Read More

Module 1: Comprehensive Introduction to Sharepoint

Module 2: Installing SharePoint

Module 3: SharePoint Architecture, Logical & Physical

Module 4: Web Applications and Site Collections

Module 5: Configure Service Applications

Module 6: Permissions

Module 7: Search

Module 8: User Profiles

Module 9: Ongoing Support and Maintenance

Read More

Module 1: Designing For The Cloud

Module 2: Using System Center Virtual Machine Manager R2

Module 3: Deploying And Maintaining Fabric Resources

Module 4: Building The Private Cloud

Module 5: Monitoring And Optimizing The Private Cloud

Module 6: Planning And Deploying Service Management

Module 7: Automating And Standardizing The Private Cloud

Module 8: Disaster Recovery And High Availability For The Private Cloud

Module 9: Implementing Self­Service Multi­Tenant Private Clouds

Read More

Module 1: Introducing The Cloud Model

Module 2: Configuring The Private Cloud Environment

Module 3: Deploying Services For The Private Cloud

Module 4: Monitoring Cloud Based Applications

Module 5: Service Management For The New Cloud

Module 6: High Availability And Disaster Recovery For The Private Cloud

Module 7: Optimizing The Private Cloud Infrastructure

Module 8: Configuring Multi­Tenant Self­Service Using Windows Azure Pack

Module 9: Configuring And Monitoring The Private Cloud Review

Read More

Module 1: Planning Configuration Manager Infrastructure

Module 2: Migrating To Configuration Manager 2012

Module 3: Installations and Site Role Configuration

Module 4: Cloud Integration

Module 5: Installing The Client

Module 6: Client Health

Module 7: Application Deployment

Module 8: Software Updates

Module 9: Operating System Deployment

Module 10: Inventory and Software Metering

Module 11: Asset Intelligence

Module 12: Reporting

Module 13: Compliance Settings

Module 14: Endpoint Protection

Module 15: Mobile Device Management

Module 16: Role-Based Administration

Module 17: Disaster Recovery

Module 18: Troubleshooting

Read More

Module 1: Getting Started With Windows 10

Module 2: Using File Explorer

Module 3: Using Windows Applications

Module 4: Browsing the Web With Microsoft Edge

Module 5: Customizing Windows

Module 6: Connecting Devices And Devices

Module 7: Managing User Accounts

Module 8: Backing Up Important Data

Module 9: Maintaining Windows

Module 10: Protecting Windows

Module 11: Monitoring Performance

Module 12: Working With Control Panel And Settings

Read More

Module 1: Introduction and Deploy Windows

Module 2: Manage Devices and Data

Module 3: Configure Connectivity

Module 4: Maintain Windows

Module 1: Introduction and Deploy Windows

Module 2: Manage Devices and Data

Module 3: Configure Connectivity

Module 4: Maintain Windows

Read More

Lesson 1: Getting to Know PCs and the Windows 8 User Interface

Lesson 2: Using the Modern Apps and Navigation Features

Lesson 3: Working with Desktop Applications

Lesson 4: Using Internet Explorer 10

Lesson 5: Customizing the Windows 8 Environment

Lesson 6: Using Windows 8 Security Features

Read More

Module 1: Getting Started

Module 2: Getting to Know Adobe Audition

Module 3: The Interface

Module 4: Waveform Editing

Module 5: Effects

Module 6: Audio Restoration

Module 7: Mastering

Module 8: Sound Design

Module 9: Creating and Recording Files

Module 10: Multitrack Sessions

Module 11: Multitrack Session Editing

Module 12: Additional Features and Summary

Read More

Module 1: Introduction to After Effects

Module 2: Intermediate Effects and Techniques in After Effects

Module 3: More Advanced Effects and Techniques in After Effects

Read More

Module 1: Getting Started

Module 2: Getting to Know the Workflow

Module 3: Creating a Basic Animation Using Effects and Presets

Module 4: Animating Text

Module 5: Working With Shape Layers

Module 6: Animating a Multimedia Presentation

Module 7: Animating Photoshop Layers

Module 8: Working With Masks

Module 9: Distorting Objects with the Puppet Tools

Module 10: Using the Roto Brush Tool

Module 11: Performing Color Correction

Module 12: Creating Motion Graphics Templates

Read More

Module 1

Module 2

Read More

Module 1: Tools and Effects in Illustrator

Module 2: Creating Projects in Illustrator

Read More

Module 1

Module 2

Read More

Module 1

Module 2

Module 3

Module 4

Module 5

Module 6

Module 7

Module 8

Module 9

Module 10

Module 11

Read More

Module 1: What is Animation and the Basics

Module 2: Intermediate Animation Techniques

Read More

Module 1: Welcome

Module 2: Why use Lightroom

Module 3: Lightroom library and organization

Module 4: Edit your photo – global adjustments

Module 5: Edit your photo – local adjustments

Module 6: Saving and exporting

Module 7: Lightroom CC overview

Module 8: Outro

Read More

Module 1: Tools and Effects in Photoshop

Module 2: Creating Projects in Photoshop

Read More

Module 1: Introduction to Premiere and Getting Started on an Editing Project

Module 2: More Editing Techniques and Completing a Project

Read More

Module 1

Module 2

Read More

Module 1

Module 2

Read More

Module 1

Module 2

Read More

Module 1: Intro

Module 2: Camera Anatomy

Module 3: Scene Camera Modes

Module 4: Achieve Exposure

Module 5: Filetypes

Module 6: Sensor

Module 7: Resolution

Module 8: White Balance

Module 9: Color Theory

Module 10: Depth of Field

Module 11: Focusing

Module 12: Lighting

Module 13: Metering

Module 14: Composition

Read More

Module 1: Introduction

Module 2: Getting Started

Module 3: Drawing

Module 4: Colors and Gradients

Module 5: Intermediate Illustration

Module 6: Typography

Module 7: Live Trace, Paint Brush and Blob Brush

Module 8: Exporting

Read More

Module 1: Getting Started

Module 2: Layers and More

Module 3: Editing, Techniques and More

Read More

Module 1: Getting Started

Module 2: Motion, Sound, and More

Read More

Module 1: Introduction to Google Analytics

Module 2: Fundamentals of Google Analytics

Module 3: Basics of Google Anayltics

Module 4: Reports in Google Analytics

Module 5: Behavioral Reports

Module 6: Audience

Module 7: Conversions

Read More

Module 1: Course Overview

Module 2: DevOps Basics

Module 3: App Engine PaaS

Module 4: Kubenetes Engine Overview

Module 5: DevOps Developer Tools

Module 6: Microservices

Module 7: Management of your DevOps Services

Module 8: Resources and Closeout

Read More

Module 1: Introduction to CSS3

Module 2: Understanding The CSS Box Model

Module 3: Working With Page Layouts

Module 4: Using Colors And Backgrounds

Module 5: Web Typography

Module 6: Links, Lists, And Tables

Module 7: Dynamic CSS3 Properties

Read More

Module 1: What Is HTML?

Module 2: The Structure And Components

Module 3: Formatting The Page

Module 4: Structuring Content

Module 5: Adding Links, Images And Other Media

Module 6: Styling Web Pages

Module 7: Creating Your Own Website

Read More

Module 1: Introduction to CSS3

Module 2: Understanding The CSS Box Model

Module 3: Working With Page Layouts

Module 4: Using Colors And Backgrounds

Module 5: Web Typography

Module 6: Links, Lists, And Tables

Module 7: Dynamic CSS3 Properties

Read More

Module 1: What Is HTML?

Module 2: The Structure And Components

Module 3: Formatting The Page

Module 4: Structuring Content

Module 5: Adding Links, Images And Other Media

Module 6: Styling Web Pages

Module 7: Creating Your Own Website

Read More

Module 1: Getting Started with Python

Module 2: Working with Primitive Data Types

Module 3: Working with Multiple Assignments Statements

Module 4: Convert Types in Python

Module 5: Creating Lists

Module 6: Modifying Lists

Module 7: Sorting and Reversing Lists

Module 8: Slicing Lists

Module 9: Working With Operators

Module 10: Determining Operator Precedence

Module 11: Working with IF Statements

Module 12: Working With For Loops

Module 13: Working With While Loops

Module 14: Nesting for Loops

Module 15: Reading Files

Module 16: More on Files

Module 17: Merging Emails

Module 18: Reading Console Inputs and Formatting Outputs

Module 19: Reading Command Line Argument

Module 20: Defining Functions

Module 21: Using Default Argument

Module 22: Using Keyword and Positional Arguments

Module 23: Handling Exceptions

Module 24: Using Math and Random Modules

Module 25: Displaying Daytime Working Directory and File Metadata

Read More

Module 1

Module 2

Module 3

Module 4

Module 5

Module 6

Read More

Module 1: Introduction to Web Development

Module 2: C ­ Sharp

Module 3: HTML and CSS Comprehensive Review

Module 4: Intro to SQL Server

Module 5: Java Script A Comprehensive Introduction

Module 6: Object Based Java Script

Module 7: Model View and Controller

Module 8: A Comprehensive Introduction to jQuery

Module 9: Course Review

Read More

Module 1

Module 2

Module 3

Module 4

Module 5

Module 6

Module 7

Module 8

Read More

Module 1: Organization­ – Wide Planning and Deployment

Module 2: Leadership

Module 3: Organizational Process Measures and Management

Module 4: Team Management

Module 5: Define Phase­ – Overview of the Define Phase and the Voice of the Customer

Module 6: Define Phase – Business Case and Project Charter

Module 7: Define Phase­ – Analytical Tools

Module 8: Measure Phase­ – Process Analysis and Documentation

Module 9: Measure Phase­ – Data Collection

Module 10: Measure Phase – ­Measurement Systems

Module 11: Measure Phase­ – Basic Statistics

Module 12: Measure Phase­ – Probability

Module 13: Measure Phase­ – Process Capability

Module 14: Analyze Phase – Measuring and Modeling Relationships

Module 15: Analyze Phase­ – Hypothesis Testing

Module 16: Analyze Phase­ – FEMA and Additional Analysis Methods

Module 17: Improve Phase­ – Design of Experiments (DOE)

Module 18: Improve Phase­ – Lean Method

Module 19: Improve Phase -­ Implementation

Module 20: Control Phase­ – Statistical Process Control (SPC)

Module 21: Control Phase­ – Other Controls

Module 22: Control Phase­ – Maintain Controls and Sustain Improvements

Module 23: DFSS

Module 24: Exam Review­ – Prep and Key Concepts

Read More

Module 1: Six Sigma And The Organization

Module 2: Define Phase ­Project Identification

Module 3: Define Phase­Voice Of The Customer

Module 4: Define Phase­ Project Management Basics on Six Sigma Green Belt

Module 5: Define Phase­Management And Planning Tools

Module 6: Define Phase­Business Results For Projects

Module 7: Define Phase­Team Dynamics And Define Phase Summary Review Questions

Module 8: Measure Phase­Process Analysis And Documentation

Module 9: Measure Phase­Probability And Statistics

Module 10: Measure Phase­Statistical Distributions

Module 11: Measure Phase­Collecting And Summarizing Data

Module 12: Measure Phase­Measurements System Analysis (MSA)

Module 13: Measure Phase­Process And Performance Capability And Measure Phase Summary And Review

Module 14: Analyze Phase­Exploratory Data Analysis And Hypothesis Testing

Module 15: Analyze Phase ­ Process Drivers

Module 16: Improve Phase­Design Of Experiment (DOE)

Module 17: Improve Phase­Root Cause Analysis

Module 18: Improve Phase­Lean Tools

Module 19: Control Phase­ Statistical Process Control

Module 20: Control Phase­Lean Tools For Process Control

Module 21: Review Exam­Prep And Key Concepts

Read More

Module 1: Virtual Box

Module 2: Basic Commands

Module 3: Special Characters

Module 4: File Editing

Module 5: File System Structure

Module 6: Finding Files

Module 7: Shell Special Characters

Module 8: Regular Expressions

Module 9: Process Management

Module 10: Job Scheduling

Module 11: Customizing Your Account

Module 12: Unix Printing

Module 13: Networking

Module 14: X Windows

Module 15: Back Up And Compression

Module 16: Text Utility

Module 17: Shell Scripting

Module 18: System Administration Basics

Read More

Module 1: Introduction To Application Virtualization

Module 2: XenApp Server Setup

Module 3: Plan For High Availability

Module 4: Scripting Primer

Module 5: Using VMware vSphere

Module 6: Virtualization Using Microsoft Hyper-V

Module 7: Course Review

Read More

Module 1: Introduction To Virtualization

Module 2: Introduction To Desktop Virtualization

Module 3: XenDesktop 7.6 Requirements and Implementations

Module 4: Plan and Design XenDesktop Infrastructure

Module 5: Data And Network Redundancy

Module 6: Automating Using Powershell

Module 7: Virtualizing Using Hyper-V

Module 8: Build Test And Deploy VM To Xen Desktop

Module 9: Internet Information Services

Module 10: Course Review

Read More

Module 1: Intro To XenServer And Virtualization

Module 2: Comprehensive Introduction To Linux

Module 3: Hosts, Storage, And Networking

Module 4: Comprehensive Introduction To Powershell

Module 5: XenServer Components And Features

Module 6: Problem Resolution

Module 7: Review

Read More

  • Introduction
  • Business Entities
  • Beginning Your Business
  • Financial Basics Part 1
  • Financial Basics Part 2
  • Employees Payroll
  • Getting Your Business Out There
  • SEO
  • Other Topics
  • Closing

Read More

Module 1: Setup and Maintenance

Module 2: List Management

Module 3: Sales (Money-In)

Module 4: Purchased (Money-Out)

Module 5: Accounting

Module 6: Reports

Module 7: Customizations and Time Savers

Module 8: Extra

Read More

Module 1: Creating and Setting Up Your Point of Sale Company File

Module 2: Installing your System

Module 3: Navigating and Customizing the Home Page

Module 4: Company Preferences

Module 5: Financial- Setting up QuickBooks Connection

Module 6: Setting up Sales Tax

Module 7: Workstation Preferences

Module 8: Additional Features

Module 9: Employees and Security

Module 10: Customers

Module 11: Rewards Program

Module 12: Vendors

Module 13: Setting Up Your Inventory

Module 14: Item Styles, Assemblies, and Group

Module 15: Working with Inventory

Module 16: Sales

Module 17: Working with Price Levels and Discounts

Module 18: Collecting Sales Tax

Module 19: Adding Shipping Information (Pro/MS)

Module 20: Tracking Sales Commissions

Module 21: Taking Payment and Giving Change

Module 22: Recording Tips

Module 23: Handling Tricky Sales Returns

Module 24: Working with Sales Orders, Work Orders, and Layaways

Module 25: Purchasing Merchandise

Module 26: Receiving from a PO

Module 27: Managing Inventory

Module 28: Reporting

Module 29: QuickBooks Financial

Module 30: Multi-Store

Module 31: Protect your data

Module 32: Adding Third Party Applications

Module 1: Intro and Setup

Module 2: Tools

Module 3: Preferences

Module 4: Security & Users

Module 5: Estimates

Module 6: Sales Orders

Module 7: Receiving Money

Module 8: Bounced Checks

Module 9: Specific Tracking

Module 10: Receiving and Depositing

Module 11: Credit Cards and Bank Accounts

Module 12: Payroll

Module 13: Transactions

Module 14: Accounts and Reports

Module 15: Integrating with Word

Module 16: Data Types

Module 17: Conclusion

Read More

Module 1: Sage 50 2013

Module 2: Sage 50 Basics

Module 3: Inventory

Module 4: Employee

Module 5: Banking

Module 6: Maintenance

Module 7: File Handling

Module 8: Manager

Module 9: Jobs

Module 10: Budgets

Module 11: Charts of Accounts

Module 12: Accounts Management

Module 13: Customer Setup

Module 14: Jobs Setup

Module 15: Vendor Setup

Module 16: Inventory Setup

Module 17: Employee Setup

Module 18: Security Setup

Module 19: ACTI Link

Module 20: Task Overview

Module 21: Forms, Reports, and Recap

Read More

Module 1: Intro to SalesForce Automation

Module 2: Working With The SalesForce System

Module 3: SalesForce Solution

Module 4: SalesForce Admin

Module 5: Migrating To SalesForce

Module 6: Course Conclusion

Read More

Module 1: The Phone

Module 2: The Screen

Module 3: The Keyboard

Module 4: Contacts

Module 5: Phone Calls

Module 6: Messaging

Module 7: Internet

Module 8: Email

Module 9: Music

Module 10: Android Specifics

Module 11: Photos & Video

Module 12: Conclusion

Read More

Module 1: iPhone Basics

Module 2: The Screen

Module 3: The Keyboard

Module 4: Basic Calls and Settings

Module 5: Contacts

Module 6: Phone Calls

Module 7: Messaging

Module 8: Web

Module 9: Email

Module 10: Siri

Module 11: Music

Module 12: Photos and Video

Module 13: Maps

Module 14: Conclusion

Read More

  • Aerobic Bootcamp
  • Baking Cupcakes
  • Chess
  • Cooking
  • Cooking with Children
  • DIY Home Improvement Basics
  • Harassment in the Workplace
  • HIPAA, Fraud, and Abuse
  • Holiday Baking
  • How to Become a Personal Trainer
  • How to Handle Stress in the Workplace
  • ICD 10 & 11 Medical Coding and Billing
  • Jewelry
  • Juicing and Blending
  • Managing Different Personality Types
  • Marketing Tools and Tips for Success
  • Massage Therapy
  • Mastering Bartending in a Week or Less
  • Mastering Beer Brewing
  • Mastering Makeup Application Techniques at Home
  • Medical Coding and Billing ICD 10
  • Medical Coding and Billing ICD-9
  • OSHA Training
  • Photography Basics
  • Special Effects (fx) Makeup Level 1
  • Special Effects (fx) Makeup Level 2
  • Starting Your Own YouTube Channel 101
  • The Key to Nutrition and Wellness
  • Ultimate Resume Building
  • Wedding Makeup and Hair
  • Weight Loss
  • Wine Making
  • Wine Pairing and Tasting
  • Yoga

Module 1: Exploring the Functions of Networking

Module 2: Introducing the Host-To-Host Communications Model

Module 3: Introducing LANs

Module 4: Exploring the TCP/IP Link Layer

Module 5: Subnetting

Module 6: Explaining the TCP/IP Transport Layer and Application Layer

Module 7: Exploring the Functions of Routing

Module 8: Exploring the Packet Delivery Process

Module 9: Troubleshooting a Simple Network

Module 10: Introducing Basic IPv6

Module 11: Configuring Static Routing

Module 12: Implementing VLANs and Trunks

Module 13: Routing Between VLANs

Module 14: Introducing OSPF

Module 15: Building Redundant Switched Topologies

Module 16: Improving Redundant Switched Topologies with Ether Channel

Module 17: Exploring Layer 3 Redundancy

Module 18: Introducing WAN Technologies

Module 19: Explaining Basics of ACL

Module 20: Enabling Internet Connectivity

Module 21: Introducing QoS

Module 22: Introducing Architectures and Virtualization

Module 23: Introducing System Monitoring

Module 24: Managing Cisco Devices

Module 25: Examining the Security Threat Landscape

Module 26: Implementing Threat Defense Technologies

Module 27: Exam Preparation

Module 28: Practice Demos

Read More

Module 1: Architecture

Module 2: Virtualization

Module 3: Infrastructure

Module 4: Network Assurance

Module 5: Security

Module 6: Automation

Read More

Module 1: Networking Fundamentals

Module 2: Basic Ethernet LAN Implementation

Module 3: Designing Ethernet LANS

Module 4: Understanding IPv4

Module 5: Working With Cisco Routers

Module 6: IPv4 Design And Troubleshooting

Module 7: IPv4 Services

Module 8: Implementing IPv6

Read More

Module 1: Configuring Ethernet LANs

Module 2: Configuring IPv4 Routing Protocols

Module 3: Wide Area Networks

Module 4: IPv4 Services

Module 5: IPv4 Routing And Troubleshooting

Module 6: IPv6 Routing

Module 7: Cloud Based Networking

Read More

Module 1: Wireless Basics

Module 2: Wireless Standards

Module 3: Wireless Signals

Module 4: Antennas

Module 5: Topologies

Module 6: Frame Types

Module 7: Planning Coverage

Module 8: Architectures

Module 9: Stand Alone And Cloud Deployments

Module 10: Controller Based Deployment

Module 11: Controller Discovery

Module 12: Roaming

Module 13: Radio Resource Management

Module 14: Wireless Security

Module 15: WLAN Configuration

Module 16: Guest Networks

Module 17: Client Connectivity

Module 18: Managing Wireless

Module 19: Interference

Module 20: Troubleshooting

Read More

Module 1: Introducing Cisco Collaboration Architecture

Module 2: Telephony And Call Routing

Module 3: Preparing The Network And Phone Behavior

Module 4: CUCM Administration Interfaces

Module 5: Call Configuration

Read More

Module 1: Pre-Course Chapter 1

Module 2: Pre-Course Chapter 2

Module 3: Cisco Video And Content Delivery

Module 4: Cisco Video Surveillance

Module 5: Cisco Collaboration

Module 6: Central Collaboration Endpoint Control

Module 7: Unified IP Phones, Desk Endpoints And Cisco Jabber

Module 8: Configuring Unified IP Phones And Cisco Jabber

Module 9: Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber

Module 10: Cisco Telepresence Endpoints Installation And Characteristics

Module 11: Configuring Cisco Telepresence CTS And Cisco DX650 Endpoint

Module 12: Configuring Cisco Telepresence TC Endpoints

Module 13: Operating And Troubleshooting Cisco Telepresence Endpoints

Module 14: Cisco Multipoint Conferencing Solutions

Module 15: Configuring And Monitoring Cisco Multipoint

Module 16: Cisco DMP Characteristics And Installation

Module 17: Configuring Cisco DMPs

Module 18: Managing Cisco Edge 340 DMPs

Module 19: Labs

Read More

Module 1: Network Review

Module 2: Terminology And Fundamentals

Module 3: PKI And Cryptography

Module 4: AAA

Module 5: Bring Your Own Device

Module 6: Secure Access

Module 7: VPNs

Module 8: Secure Routing And Switching

Module 9: Firewalls

Module 10: Intrusion Protection System (IPS)

Module 11: Content And Endpoint Security

Read More

Module 1: Plan And Design

Module 2: EIGRP Enhanced Interior Gateway Routing Protocol

Module 3: IPv6

Module 4: OSPF

Module 5: Border Gateway Protocol BGP

Module 6: Course Review

Read More

Module 1: Plan And Design

Module 2: Switch Configuration

Module 3: IP Configuration

Module 4: STP And RTP

Module 5: Routing

Module 6: HSRP, VRRP, GLBP

Module 7: Course Review

Read More

Module 1: Introduction to Cisco Troubleshooting

Module 2: Troubleshooting Switches

Module 3: Troubleshooting VLANS and Trunking

Module 4: Troubleshooting Spanning Tree Protocol, EtherChannel

Module 5: Troubleshooting Inter­VLAN Routing and Layer 3 EtherChannel

Module 6: Troubleshooting Switch Security Features

Module 7: Troubleshooting First­Hop Redundancy Protocols

Module 8: Troubleshooting IPv4 and IPv4 Addressing

Module 9: IPv6 Addressing and Addressing Technologies

Module 10: Troubleshooting IPv4 and IPv6 ACLs and Prefix Lists

Module 11: Troubleshooting GRE and Basic Routing Tunnels

Module 12: Troubleshooting RIPv2 and RIPng

Module 13: Troubleshooting EIGRP

Module 14: OSPF and OSPFv3

Module 15: Troubleshooting Route Maps and Policy Based Routing

Module 16: Troubleshooting Redistribution

Module 17: Troubleshooting BGP

Module 18: Troubleshooting Management Protocols and Tools

Module 19: Troubleshooting Management Access

Read More

Module 1: Introduction

Module 2: Telephony

Module 3: Basic Call Routing

Module 4: VOIP Call Routing

Module 5: CUCME Call Routing Basics

Module 6: Preparing Network For Voice

Module 7: IP Phone Behavior

Module 8: CUCME Administration Basics

Module 9: CUCME StandUp

Module 10: CUCME StandUp Part 2

Module 11: CUCME StandUp CUCME

Module 12: End Users and End User Interfaces

Module 13: Endpoint Implementation

Module 14: Call Coverage

Module 15: Calling Restrictions and Routing

Module 16: CUCME Advance Call Coverage

Module 17: Implementing Unity Connection

Read More

Module 1: Methodologies Used To Design A Network

Module 2: Network Structure And Modularity

Module 3: Basic Enterprise Campus Networks

Module 4: Enterprise Edge And Remote Network Modules

Module 5: IP Addressing And Routing Protocols

Module 6: Enterprise Switching I

Module 7: Enterprise Switching II

Module 8: Subnetting

Module 9: Designing Advanced Services

Read More

Chapter 1: Course Introduction and Methodology

Chapter 2: Virtualization Overview

Chapter 3: Planning and Installing ESXi

Chapter 4: Using tools to Administer a VMware Environment

Chapter 5: vCenter and Licensing

Chapter 6: Configuring Networking

Chapter 7: Configuring Storage

Chapter 8: VM Creation, Configuration, and Snapshots

Chapter 9: Security and Permissions

Chapter 10: Host and VM Monitoring

Chapter 11: Advanced ESXi and vCenter Server Management

Chapter 12: Patching and Upgrading ESXi

Chapter 13: Disaster Recovery and Backup

Read More

Module 1: VM And VMWARE

Module 2: Working With ESX And ESXI

Module 3: Configuring Virtual Machines

Module 4: Vcenter Server

Module 5: VM Storage Option

Module 6: Managing A Virtual World

Module 7: Migrations, High Availability And VM Utilities

Read More

Blockchain

Module 1: Certified Blockchain Developer Hyperledger Overview

Module 2: Hyperledger Framework

Module 3: Hyperledger Fabric Blockchain

Module 4: Access Controls and Secure Chaincode

Module 5: Plan and Prepare Apps for Deployment

Module 6: Hyperledger Fabric Explorer

Module 7: Chaincode and Development

Module 8: Course Wrap Up

Read More

Module 1: Certified Blockchain Developer Hyperledger Overview

Module 2: Hyperledger Framework

Module 3: Hyperledger Fabric Blockchain

Module 4: Access Controls and Secure Chaincode

Module 5: Plan and Prepare Apps for Deployment

Module 6: Hyperledger Fabric Explorer

Module 7: Chaincode and Development

Module 8: Course Wrap Up

Read More

Module 1: Course Overview

Module 2: Pre-Sales Activities

Module 3: Blockchain Fundamentals

Module 4: Enterprise Blockchains

Module 5: Use Cases

Module 6: Course Closeout

Read More

Module 1 – Mobile Devices

Module 2 – Networking

Module 3 – Hardware

Module 4 – Virtualization and Cloud Computing

Module 5 – Hardware and Network Troubleshooting

Read More

Module 1 – Operating Systems

Module 2 – Security

Module 3 – Software Troubleshooting

Module 4 – Operational Procedures

Read More

Module 1 – Risk Management

Module 2 – Enterprise Security Architecture

Module 3 – Enterprise Security Operations

Module 4 – Technical Integration of Enterprise Security

Module 5 – Research, Development and Collaboration

Read More

Domain 1 – Characteristics of Cloud Services from a Business Perspect

Domain 2 – Cloud Computing and Business Value

Domain 3 – Technical Perspectives/Cloud Types

Domain 4 – Steps to Successful Adoption of Cloud

Domain 5 – Impact and Changes of Cloud Computing on IT Service Management

Domain 6 – Risks and Consequences of Cloud Computing

Read More

Module 1

Module 2

Module 3

Module 4

Module 5

Module 6

Module 7

Read More

Module 1: Threat Management

Module 2: Vulnerability Management

Module 3: Cyber Incident Response

Module 4: Security Architecture and Tool Sets

Read More

Module 1: Threat and Vulnerability Management

Module 2: Software and Systems Security

Module 3: Security Operations and Monitoring

Module 4: Incident Response

Module 5: Compliance and Assessment

Module 6: Afterword

Read More

Module 1 – IT Concepts and Terminology

Module 2 – Infrastructure

Module 3 – Applications and Software

Module 4 – Software Development

Module 5 – Database Fundamentals

Module 6 – Security

Read More

Module 1: Intro & Performing Basic Linux Tasks

Module 2: Managing Users and Groups

Module 3: Managing Permissions and Ownership

Module 4: Managing Storage

Module 5: Managing Files and Directories

Module 6: Managing Kernel Modules

Module 7: Managing the Linux Boot Process

Module 8: Managing System Components

Module 9: Managing Devices

Module 10: Managing Networking

Module 11: Managing Packages and Software

Module 12: Securing Linux Systems

Module 13: Working with Bash Scripts

Module 14: Automating Tasks

Module 15: Installing Linux

Read More

Module 1: Instructions

Module 2: Managing Software

Module 3: Configuring Hardware

Module 4: Managing Files

Module 5: Booting Files

Module 6: X

Module 7: Admin

Module 8: Basic Networking

Module 9: Scripts

Module 10: Security

Read More

Module 1: Over-The-Air Technologies

Module 2: Network Infrastructure

Module 3: Mobile Device Manager

Module 4: Security

Module 5: Troubleshooting

Read More

Module 1 – Networking Concepts

Module 2 – Infrastructure

Module 3 – Network Operation

Module 4 – Network Security

Module 5 – Network Troubleshooting and Tools

Read More

Module 1 – The Pen Test Engagement

Module 2 – Passive Reconnaissance

Module 3 – Active Reconnaissance

Module 4 – Physical Security

Module 5 – Social Engineering

Module 6 – Vulnerability Scan Analysis

Module 7 – Password Cracking

Module 8 – Penetrating Wired Networks

Module 9 – Penetrating Wireless Networks

Module 10 – Windows Exploits

Module 11 – Linux Exploits

Module 12 – Mobile Devices

Module 13 – Specialized Systems

Module 14 – Scripts

Module 15 – Application Testing

Module 16 – Web App Exploits

Module 17 – Lateral Movement

Module 18 – Persistence

Module 19 – Cover Your Tracks

Module 20 – The Report

Module 21 – Post Engagement Cleanup

Read More

Module 1: Information Security Roles Security Control and Framework Types

Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources

Module 3: Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing

Module 4: Social Engineering, Indicators of Malware Attacks

Module 5: Cryptography

Module 6: Certificates and PKI

Module 7: Authentication

Module 8: Identity and Accounts, Authorization, Personnel Polices

Module 9: Network Design and Hardware (Part 1)

Module 10: Network Hardware (Part 2)

Module 11: Network Protocols

Module 12: Endpoint Security

Module 13: Mobile Devices

Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation

Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualization

Module 16: Privacy and Data Protection

Module 17: Incident Response

Module 18: Forensics

Module 19: Risk Management and Business Impact Analysis

Module 20: Redundancy and Backup Strategies

Module 21: Physical Security

Module 22: Afterword

Read More

Module 1: Threats, Attacks and Vulnerabilities

Module 2: Technologies and Tools

Module 3: Architecture and Design

Module 4: Identity and Access Management

Module 5: Risk Management

Module 6: Cryptography and PKI

Read More

Module 1: Course Overview

Module 2: Kubernetes and Container Fundamentals

Module 3: Configuration

Module 4: Multi Container Pods

Module 5: Observability

Module 6: Pod Design

Module 7: Services and Networking

Module 8: State Persistence

Module 9: CKA Practice Exams

Module 10: Course Closeout

Read More

Module 1: Course Overview

Module 2: Kubernetes and Container Fundamentals

Module 3: Kubernetes Installation

Module 4: Working with Kubernetes Clusters and Nodes

Module 5: API Access and Commands

Module 6: Running Pods and DeploymentsModule 7: Configuring Storage

Module 8: Kubernetes Networking

Module 9: Managing Security

Module 10: Managing Kubernetes In the Enterprise

Module 11: Kubernetes Monitoring and Troubleshooting

Module 12: CKA Practice Exams

Module 13: Course Closeout

Read More

Module 1: Course Overview

Module 2: Basics of Kubernetes

Module 3: Kubernetes Design and Architecture

Module 4: Deployments

Module 5: Course Closeout

Read More

Module 1: Course Overview

Module 2: The Basics

Module 3: Development

Module 4: Infrastructure

Module 5: Key Performance Indicators (KPIs)

Module 6: Course Closeout

Read More

Module 1: Introduction to AWS Basics

Module 2: AWS Web Services and Cloud Platform Services

Module 3: AWS Basic Summary

Module 4: Introduction to AWS Deep Dive

Module 5: AWS Management of Services and Features Deep Dive

Module 6: AWS Deep Dive Summary

Read More

Module 1: Introduction to Cloud Computing

Module 2: Identity and Access Management IAM

Module 3: Elastic Cloud Computing EC2

Module 4: EC2 Storage

Module 5: Elastic Load Balancer and Auto Scaling Group ELB and ESG

Module 6: Amazon S3

Module 7: Database and Analytics

Module 8: Other Services

Module 9: Scaling Your Infrastructure

Module 10: Global Applications

Module 11: Cloud Integration

Module 12: Cloud Monitoring

Module 13: Virtual Private Network

Module 14: Security and Compliance

Module 15: Machine Learning

Module 16: Advanced Identity

Module 17: Are You Well Architected?

Module 18: Congratulations & Exam Preparation

Read More

Module 1: Introduction

Module 2: Information Security Governance

Module 3: Information Security Risk Management

Module 4: InfoSec Prog Development and Management

Module 5: Information Security Incident Management

Module 6: Exam Prep

Read More

Domain 1: Information Security Governance

Domain 2: Risk Management

Domain 3: Information Security Program

Domain 4: Information Security Program Implementation

Domain 5: Information Security Program Management

Domain 6: Incident Management and Response

Read More

Cloud Concepts, Architecture and Design

Legal, Risk and Compliance

Cloud Data Security

Cloud Platform and Infrastructure Security

Cloud Application Security

Cloud Security Operations

Read More

Module 1 – Introduction to Ethical Hacking

Module 2 – Footprinting and Reconnaissance

Module 3 – Network Scanning

Module 4 – Enumeration

Module 5 – Vulnerability Analysis

Module 6 – Malware Threats

Module 7 – Sniffing

Module 8 – Social Engineering

Module 9 – Denial of Service

Module 10 – Session Hijacking

Module 11 – Hacking Webservers

Module 12 – Hacking Web Applications

Module 13 – SQL Injection

Module 14 – Hacking Wireless Networks

Module 15 – System Hacking

Module 16 – Hacking Mobile Platforms

Module 17 – Evading IDS, Firewalls, and Honeypots

Module 18 – Cryptography

Module 19 – Cloud Computing

Module 20 – IoT Hacking

Read More

Lesson 1

Lesson 2

Lesson 3

Lesson 4

Lesson 5

Lesson 6

Lesson 7

Read More

Module 1: Security and Risk Management

Module 2: Asset Security

Module 3: Security Engineering

Module 4: Communication and Network Security

Module 5: Identity and Access Management

Module 6: Security Assessment Testing

Module 7: Security Operations

Module 8: Software Development Security

Read More

Module 1: Security and Risk Management

Module 2: Asset Security

Module 3: Security Architecture and Engineering

Module 4: Communication and Network Security

Module 5: Identity and Access Management (IAM)

Module 6: Security Assessment and Testing

Module 7: Security Operations

Module 8: Software Development Security

Read More

Module 1: Computer Forensics Introduction

Module 2: Forensics Investigation Process

Module 3: Searching and Seizing

Module 4: Digital Evidence

Module 5: First Responder Procedures

Module 6: Forensics Lab

Module 7: Hard Disks and File Systems

Module 8: Windows Forensics

Module 9: Data Acquisition and Duplication

Module 10: Recovering Deleted Files and Partitions

Module 11: Using Access Data FTK

Module 12: Using EnCase

Module 13: Steganography

Module 14: Password Crackers

Module 15: Log Correlation

Module 16: Network Forensics

Module 17: Wireless Attacks

Module 18: Web Attacks

Module 19: Email Crimes

Module 20: Mobile Investigation

Module 21: Investigative Reports

Module 22: Expert Witness

Read More

Module 1: Cyber Security Awareness and Prevention

Module 2: Managing Mobile Device Security

Read More

Module 1: Data Breaches And ID Theft

Module 2: Device Security Basics

Module 3: Avoiding Inadvertent Disclosure

Module 4: Physical And Technical Safeguards

Read More

Module 1: What Is Agile

Module 2: Projects And Projects Management In An Agile World

Module 3: Agile and Scrum

Module 4: Common Scrum Terminology

Module 5: Other Iterative Methods

Module 6: Communication Skills In Agile World

Module 7: Using Agile Outside Software Development

Module 8: Case Studies Of Transitioning to Agile

Module 9: Critique Of Agile

Module 10: Review Of Agile

Read More

Module 1 : Agile Principles and Mindset

Module 2 : Value Driven Delivery

Module 3 : Stakeholder Engagement

Module 4 : Team Performance

Module 5 : Adaptive Planning

Module 6 : Problem Detection and Resolution

Module 7 : Continuous Improvement

Read More

Module 1 : Agile Principles and Mindset

Module 2 : Value Driven Delivery

Module 3 : Stakeholder Engagement

Module 4 : Team Performance

Module 5 : Adaptive Planning

Module 6 : Problem Detection and Resolution

Module 7 : Continuous Improvement

Read More

Module 1: Architecture

Module 2: Governance and Enterprise Risk

Module 3: Legal Issues- Contracts and Electronic

Module 4: Compliance and Audit Management

Module 5: Information Management and Data Security

Module 6: Interoperability and Portability

Module 7: Traditional Security, Business Continuity, and Disaster Recovery

Module 8: Data Center Operations

Module 9: Incident Response

Module 10: Application Security

Module 11: Encryption and Key Management

Module 12: Identity, Entitlement, and Access Management

Module 13: Virtualization

Module 14: Security as a Service

Read More

Module 1: The principles of CC

Module 2: Implementing and Managing CC

Module 3: Using the Cloud

Module 4: Security and Compliance

Module 5: Evaluation of CC

Read More

Module 1: Foundations (Beginner)

Module 2: Terms and Tools (Beginner)

Module 3: Identifiers, Variables, and Data Types (Beginner)

Module 4: Object-Orientated Programming (Intermediate)

Module 5: Predefined Classes (Intermediate)

Module 6: Methods Part 1 (Intermediate)

Module 7: Methods Part 2 (Advanced)

Module 8: Constructors (Advanced)

Module 9: Control of Flow (Advanced)

Module 10: Arrays and Exceptions (Advanced)

Read More

Module 1: Introduction To Javascript

Module 2: Core Concepts And Syntax

Module 3: Getting A Handle On The DOM

Module 4: Working With Libraries

Read More

Module 1: The ITIL Qualification Scheme

Module 2: Introduction to Service Management

Module 3: ITIL and the Service Lifecycle

Module 4: Service Strategy

Module 5: Service Design

Module 6: Service Transition

Module 7: Service Operation

Module 8: Continual Service Improvement

Module 9: Service Management Technology

Module 10: How it all Fits Together

Module 11: Bonus Material

Read More

Module 1: Service Operation Introduction

Module 2: Service Management As a Practice

Module 3: Service Operation Principles

Module 4: Service Operation Process

Module 5: Common Service Operation Activities

Module 6: Organizing For Service Operation

Module 7: Technology Considerations

Module 8: Service Operation

Read More

Module 1: Introduction To Oracle 12c SQL Fundamentals

Module 2: Retrieving Data

Module 3: SQL Functions

Module 4: Subqueries

Module 5: Data Manipulation Language

Module 6: Data Control Language

Module 7: Data Definition Language

Module 8: Combining Queries

Module 9: Oracle 12C SQL Fundamentals Review

Read More

Module 1: Database Concepts And Tools

Module 2: Memory Structure

Module 3: Tables

Module 4: Indexes

Module 5: Constraints And Triggers

Module 6: Users

Module 7: Internal Structures

Module 8: Starting Up and Shutting Down Database

Module 9: Critical Storage Files

Module 10: Data Manipulation Language

Module 11: Data Concurrency

Module 12: BackUp And Recovery

Module 13: Installation

Module 14: Course Review

Read More

Module 1: Database Admininstration

Module 2: Oracle Architecture

Module 3: Database Schema

Module 4: Recovery Manager

Module 5: Introduction to SQL

Module 6: Filtering and Sorting Data

Module 7: Functions

Module 8: SET Operators and Subqueries

Module 9: Regular Expressions and SQL Loader

Read More

Module 1: What Is Microsoft 365

Module 2: Word Online

Module 3: Excel Online

Module 4: Powerpoint Online

Module 5: Outlook Online

Module 6: One Note Online

Read More

Module 1: Beginner

Module 2: Intermediate

Module 3: Advanced

Read More

Module 1: Beginner

Module 2: Intermediate

Module 3: Advanced

Read More

Word 2016 Basic

Word 2016 Advanced

Read More

Excel 2016 Basic

Excel 2016 Intermediate

Excel 2016 Advanced

Read More

Basic Microsoft PowerPoint 2016

Intermediate Microsoft PowerPoint 2016

Advanced Microsoft PowerPoint 2016

Read More

Outlook 2016 Basic

Outlook 2016 Intermediate

Outlook 2016 Advanced

Read More

Access 2016 Basic

Access 2016 Intermediate

Access 2016 Advanced

Read More

Word 2013 Basic

Word 2013 Intermediate

Word 2013 Advanced

Read More

Excel 2013 Basic

Excel 2013 Intermediate

Excel 2013 Advanced

Read More

Powerpoint 2013 Basic

Powerpoint 2013 Intermediate

Powerpoint 2013 Advanced

Read More

Outlook 2013 Basic

Outlook 2013 Intermediate

Outlook 2013 Advanced

Read More

Access 2013 Introduction

Access 2013 Intermediate

Access 2013 Advanced

Read More

Word 2010 Basic

Word 2010 Intermediate

Word 2010 Advanced

Read More

Excel 2010 Basic

Excel 2010 Intermediate

Excel 2010 Advanced

Read More

Powerpoint 2010 Basic

Powerpoint 2010 Intermediate

Powerpoint 2010 Advanced

Read More

Outlook 2010 Basic

Outlook 2010 Intermediate

Outlook 2010 Advanced

Read More

Access 2010 Basic

Access 2010 Intermediate

Access 2010 Advanced

Read More

Module 1: Preparing for and Taking the Exam

Module 2: Process Domain

Module 3: People Domain

Module 4: Business Environment Domain

Read More

Module 1 : Getting Certified to take the Examination

Module 2 : Techniques for Preparing for and Taking the Examination

Module 3 : Project Management Framework

Module 4 : Project Integration Management

Module 5 : Project Scope Management

Module 6 : Project Schedule Management

Module 7 : Project Cost Management

Module 8 : Project Quality Management

Module 9 : Project Resource Management

Module 10 : Project Communications Management

Module 11 : Project Risk Management

Module 12 : Project Procurement Management

Module 13 : Project Stakeholder Management

Read More

Module 1: Introduction

Module 2: Risk Management Concepts

Module 3: Risk Management Environment

Module 4: Project Definition

Module 5: Risk Management Planning

Module 6: Risk Identification

Module 7: Qualitative Risk Analysis

Module 8: Quantitative Risk Analysis

Module 9: Risk Response Planning

Module 10: Risk Monitoring And Controlling

Read More

Module 1: Risk Management Fundamentals

Module 2: Test Requirements

Module 3: Test Domains

Module 4: Risk Strategy and Planning

Module 5: Stakeholder Engagement

Module 6: Risk Process Facilitation

Module 7: Risk Monitoring and Reporting

Module 8: Specialized Risk Analyses

Module 9: RMP Recap

Module 10: RMP Review Questions

Read More

Module 1 : Getting Certified to take the Examination

Module 2 : Project Management Framework

Module 3 : Project Integration Management

Module 4 : Project Scope Management

Module 5 : Project Schedule Management

Module 6 : Project Cost Management

Module 7 : Project Quality Management

Module 8 : Project Resource Management

Module 9 : Project Communications Management

Module 10 : Project Risk Management

Module 11 : Project Procurement Management

Module 12 : Project Stakeholder Management

Module 13 : Review

Read More

Module 1: Development Methods

Module 2: Agile Manifesto Principles

Module 3: Scrum

Module 4: Why Scrum

Module 5: Scrum-Roles Overview

Module 6: Product Owner

Module 7: Scrum Master

Module 8: Scrum Team

Module 9: Scrum Process

Module 10: Scrum Project Phase

Module 11: Plan and Estimate

Module 12: Implement

Module 13: Review and Retrospect

Module 14: Release

Module 15: Project Vision

Module 16: Scrum Master and Stake Holder(s)

Module 17: Form Scrum Team

Module 18: Develop Epics

Module 19: User Stories

Module 20: Justifications and Sample Change(s)

Module 21: Creating a Prioritized Backlog

Module 22: Conduct Release Planning

Module 23: Sprints

Module 24: Scrum Framework

Module 25: Scrum of Scrums

Module 26: Scrum Demo

Module 27: Review

Read More

Module 1: Development Methods

Module 2: Agile Manifesto Principles

Module 3: Scrum

Module 4: Why Scrum

Module 5: Scrum-Roles Overview

Module 6: Product Owner

Module 7: Scrum Master

Module 8: Scrum Team

Module 9: Scrum Process

Module 10: Scrum Project Phase

Module 11: Plan and Estimate

Module 12: Implement

Module 13: Review and Retrospect

Module 14: Release

Module 15: Project Vision

Module 17: Form Scrum Team

Module 18: Develop Epics

Module 19: User Stories

Module 20: Justifications and Sample Change(s)

Module 21: Creating a Prioritized Backlog

Module 22: Conduct Release Planning

Module 23: Sprints

Module 24: Scrum Framework

Module 25: Scrum of Scrums

Module 26: Scrum Demo

Module 27: Review

Read More

  • Social Media Introduction
  • Creating A Google Account
  • Setting Up Your Twitter Account
  • Getting Your Twitter House In Order
  • Why Facebook For Your Business
  • Using Facebook As A Business
  • Setting Up Your Business Page
  • Setting Your Cover Photo
  • Tying It All Together
  • Tip-Adding Admins In Facebook

Read More

  • Adjusting Your Settings- Part 1
  • Adjusting Your Settings- Part 2
  • Adjusting Your Settings- Part 3
  • Updating Your Page Info- Part 1
  • Updating Your Page Info- Part 2
  • Tips For Getting 25 Likes
  • Using Facebook As Your Business Page
  • What Kind Of Person Would Your Business Be
  • How To Post To Facebook
  • What To Post
  • Sharing Posts
  • Sharing Links
  • Pinning And Highlighting With Posts
  • Tips For Generating Traffic
  • Getting Notifications And Staying In Clients News Feed
  • Comment Moderation
  • The Activity Log- Where Do Hidden Posts Go
  • Scheduling Posts

Read More

  • Intro To Facebook Advertising
  • Setup Advertising Account
  • Types Of Advertising On Facebook
  • Ad Testing
  • Choosing Our Audience-Location
  • Choosing Our Audience-Age And Gender
  • Choosing Our Audience-Precise Interests
  • Choosing Our Audience-Broad Categories
  • Choosing Our Audience-Connections
  • Choosing Our Audience-Advanced Targeting Options
  • Choosing Our Audience-Campaign And Budget
  • Other Types Of Ads-Part 1
  • Other Types Of Ads-Part 2
  • Ad Campaign Manager-Part 1
  • Ad Campaign Manager-Part 2
  • Outside URLs
  • Building Ad Text
  • News Feed Format And Creating Your Audience
  • Campaign Pricing And Schedule
  • Ad Campaign Tracker
  • Facebook Insights-Overview Intro
  • Analyzing Page Posts
  • Engaged Users
  • Talking About This
  • Virality
  • Likes
  • Reach
  • Reach And Frequency
  • Page Visits
  • Talking About This
  • Conclusion

Read More

  • Introduction To LinkedIn
  • Overview Of The Interface And Settings
  • Open Link Settings
  • LinkedIn Groups
  • Adding And Removing Applications
  • Basic Account Settings
  • Updating Your Public Profile
  • LinkedIn Connections Groups And Pages
  • LinkedIn Channels And Today
  • Advertising on LinkedIn

Read More

  • Determine Your Goals
  • Create Your Persona Or Voice
  • Decide On Your Platforms
  • Establishing A Social Media Manager
  • Coordinate With Customer Service
  • Create A Predetermined Crisis Management Plan
  • Stick To The Script
  • Building Relationships With The Media
  • Find Your Evangelist
  • Stay Informed Part 1
  • Stay Informed Part 2
  • Bitly
  • Woobox Part 1
  • Woobox Part 2
  • HootSuite Part 1
  • HootSuite Part 2
  • Storify
  • Social Media Rules And Tips
  • Social Media Conclusion
  • Tweetdeck-Boolean Search

Read More

  • Introduction To Google Plus
  • Overview Of The Interface
  • Setting Up A Google Plus Page
  • Linking Your Other Social Networks
  • Linking Your Website To Your Google Plus Page
  • Review Of Your Google Plus Dashboard
  • Notification Settings For Google Plus
  • Photo Settings In Google Plus
  • Google Plus And YouTube
  • YouTube Advanced Settings
  • Interface For Uploaded Videos
  • Sharing Videos Across Your Social Network
  • Updating Your About Section
  • Quick Recap Of Everything Covered So Far

Read More

  • Overview Of Pinterest
  • How Does Pinterest Relate To Your Business
  • Industry Specific Sites
  • The Uses of Pinterest
  • Conclusion Of Pinterest

Read More

  • Introduction to Reddit
  • The Rules of Reddit

Read More

  • Module 1.0 IntroductionModule 2.0 Adjusting Your Facebook SettingsModule 3.0 Posting on FacebookModule 7.0 TwitterModule 8.0 PinterestModule 9.0 RedditModule 11.0 LinkedInModule 12.0 Google+ and YoutubeModule 14.0 Additional ToolsModule 4.0 Facebook AdvertisingModule 5.0 Facebook InsightsModule 6.0 Facebook AnalyticsModule 10.0 TumblrModule 13.0 Best Practices

Read More

  • Module 1 Online Lead GenerationModule 2 Facebook, LinkedIn, and YouTube 101Module 3 List Building & Email MarketingModule 4 Creating Social Media Content and Marketing Materials with Canva and other AppsModule 5 Sales FunnelsModule 6 Apps & Tools Review

Read More

  • Module 1: Social Media Marketing
  • Module 2: Social Media Marketing
  • Module 3: Social Media Marketing

Read More

    • Tumblr Introduction
    • Setting Up A Tumblr
    • Dashboard
    • Posting To Tumblr
    • Testing Your Post
    • URL Post
    • Chat Post
    • Audio On Tumblr
    • Video On Tumblr
    • Tumblr Conclusion

Read More

    • Limiting the Number Of Actions
    • Setting Your Twitter Preferences
    • Finish Setting Up Your Profile
    • Twitter Widgets
    • Who To Follow
    • Connect
    • Bringing Followers From Facebook
    • Intro To Hashtags
    • Examples Of Hashtags
    • Monitoring What’s Going On
    • Using Twitter For Social Listening
    • Hashtags Across Social Media
  • Read More

Chapter 1: Course Introduction and Methodology

Chapter 2: Virtualization Overview

Chapter 3: Planning and Installing ESXi

Chapter 4: Using tools to Administer a VMware Environment

Chapter 5: vCenter and Licensing

Chapter 6: Configuring Networking

Chapter 7: Configuring Storage

Chapter 8: VM Creation, Configuration, and Snapshots

Chapter 9: Security and Permissions

Chapter 10: Host and VM Monitoring

Chapter 11: Advanced ESXi and vCenter Server Management

Chapter 12: Patching and Upgrading ESXi

Chapter 13: Disaster Recovery and Backup

Read More

Module 1: VM And VMWARE

Module 2: Working With ESX And ESXI

Module 3: Configuring Virtual Machines

Module 4: Vcenter Server

Module 5: VM Storage Option

Module 6: Managing A Virtual World

Module 7: Migrations, High Availability And VM Utilities

Read More

Module 1 – Mobile Devices

Module 2 – Networking

Module 3 – Hardware

Module 4 – Virtualization and Cloud Computing

Module 5 – Hardware and Network Troubleshooting

Read More

Module 1 – Operating Systems

Module 2 – Security

Module 3 – Software Troubleshooting

Module 4 – Operational Procedures

Read More

Module 1 – Risk Management

Module 2 – Enterprise Security Architecture

Module 3 – Enterprise Security Operations

Module 4 – Technical Integration of Enterprise Security

Module 5 – Research, Development and Collaboration

Read More

Domain 1 – Characteristics of Cloud Services from a Business Perspect

Domain 2 – Cloud Computing and Business Value

Domain 3 – Technical Perspectives/Cloud Types

Domain 4 – Steps to Successful Adoption of Cloud

Domain 5 – Impact and Changes of Cloud Computing on IT Service Management

Domain 6 – Risks and Consequences of Cloud Computing

Read More

Module 1

Module 2

Module 3

Module 4

Module 5

Module 6

Module 7

Read More

Module 1: Threat Management

Module 2: Vulnerability Management

Module 3: Cyber Incident Response

Module 4: Security Architecture and Tool Sets

Read More

Module 1: Threat and Vulnerability Management

Module 2: Software and Systems Security

Module 3: Security Operations and Monitoring

Module 4: Incident Response

Module 5: Compliance and Assessment

Module 6: Afterword

Read More

Module 1 – IT Concepts and Terminology

Module 2 – Infrastructure

Module 3 – Applications and Software

Module 4 – Software Development

Module 5 – Database Fundamentals

Module 6 – Security

Read More

Module 1: Intro & Performing Basic Linux Tasks

Module 2: Managing Users and Groups

Module 3: Managing Permissions and Ownership

Module 4: Managing Storage

Module 5: Managing Files and Directories

Module 6: Managing Kernel Modules

Module 7: Managing the Linux Boot Process

Module 8: Managing System Components

Module 9: Managing Devices

Module 10: Managing Networking

Module 11: Managing Packages and Software

Module 12: Securing Linux Systems

Module 13: Working with Bash Scripts

Module 14: Automating Tasks

Module 15: Installing Linux

Read More

Module 1: Instructions

Module 2: Managing Software

Module 3: Configuring Hardware

Module 4: Managing Files

Module 5: Booting Files

Module 6: X

Module 7: Admin

Module 8: Basic Networking

Module 9: Scripts

Module 10: Security

Read More

Module 1: Over-The-Air Technologies

Module 2: Network Infrastructure

Module 3: Mobile Device Manager

Module 4: Security

Module 5: Troubleshooting

Read More

Module 1 – Networking Concepts

Module 2 – Infrastructure

Module 3 – Network Operation

Module 4 – Network Security

Module 5 – Network Troubleshooting and Tools

Read More

Module 1 – The Pen Test Engagement

Module 2 – Passive Reconnaissance

Module 3 – Active Reconnaissance

Module 4 – Physical Security

Module 5 – Social Engineering

Module 6 – Vulnerability Scan Analysis

Module 7 – Password Cracking

Module 8 – Penetrating Wired Networks

Module 9 – Penetrating Wireless Networks

Module 10 – Windows Exploits

Module 11 – Linux Exploits

Module 12 – Mobile Devices

Module 13 – Specialized Systems

Module 14 – Scripts

Module 15 – Application Testing

Module 16 – Web App Exploits

Module 17 – Lateral Movement

Module 18 – Persistence

Module 19 – Cover Your Tracks

Module 20 – The Report

Module 21 – Post Engagement Cleanup

Read More

Module 1: Information Security Roles Security Control and Framework Types

Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources

Module 3: Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing

Module 4: Social Engineering, Indicators of Malware Attacks

Module 5: Cryptography

Module 6: Certificates and PKI

Module 7: Authentication

Module 8: Identity and Accounts, Authorization, Personnel Polices

Module 9: Network Design and Hardware (Part 1)

Module 10: Network Hardware (Part 2)

Module 11: Network Protocols

Module 12: Endpoint Security

Module 13: Mobile Devices

Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation

Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualization

Module 16: Privacy and Data Protection

Module 17: Incident Response

Module 18: Forensics

Module 19: Risk Management and Business Impact Analysis

Module 20: Redundancy and Backup Strategies

Module 21: Physical Security

Module 22: Afterword

Read More

Module 1: Threats, Attacks and Vulnerabilities

Module 2: Technologies and Tools

Module 3: Architecture and Design

Module 4: Identity and Access Management

Module 5: Risk Management

Module 6: Cryptography and PKI

Read More

Module 1: Introduction to AWS Basics

Module 2: AWS Web Services and Cloud Platform Services

Module 3: AWS Basic Summary

Module 4: Introduction to AWS Deep Dive

Module 5: AWS Management of Services and Features Deep Dive

Module 6: AWS Deep Dive Summary

Read More

Module 1: Introduction to Cloud Computing

Module 2: Identity and Access Management IAM

Module 3: Elastic Cloud Computing EC2

Module 4: EC2 Storage

Module 5: Elastic Load Balancer and Auto Scaling Group ELB and ESG

Module 6: Amazon S3

Module 7: Database and Analytics

Module 8: Other Services

Module 9: Scaling Your Infrastructure

Module 10: Global Applications

Module 11: Cloud Integration

Module 12: Cloud Monitoring

Module 13: Virtual Private Network

Module 14: Security and Compliance

Module 15: Machine Learning

Module 16: Advanced Identity

Module 17: Are You Well Architected?

Module 18: Congratulations & Exam Preparation

Read More

Module 1: Introduction

Module 2: Information Security Governance

Module 3: Information Security Risk Management

Module 4: InfoSec Prog Development and Management

Module 5: Information Security Incident Management

Module 6: Exam Prep

Read More

Domain 1: Information Security Governance

Domain 2: Risk Management

Domain 3: Information Security Program

Domain 4: Information Security Program Implementation

Domain 5: Information Security Program Management

Domain 6: Incident Management and Response

Read More

Cloud Concepts, Architecture and Design

Legal, Risk and Compliance

Cloud Data Security

Cloud Platform and Infrastructure Security

Cloud Application Security

Cloud Security Operations

Read More

Module 1 – Introduction to Ethical Hacking

Module 2 – Footprinting and Reconnaissance

Module 3 – Network Scanning

Module 4 – Enumeration

Module 5 – Vulnerability Analysis

Module 6 – Malware Threats

Module 7 – Sniffing

Module 8 – Social Engineering

Module 9 – Denial of Service

Module 10 – Session Hijacking

Module 11 – Hacking Webservers

Module 12 – Hacking Web Applications

Module 13 – SQL Injection

Module 14 – Hacking Wireless Networks

Module 15 – System Hacking

Module 16 – Hacking Mobile Platforms

Module 17 – Evading IDS, Firewalls, and Honeypots

Module 18 – Cryptography

Module 19 – Cloud Computing

Module 20 – IoT Hacking

Read More

Lesson 1

Lesson 2

Lesson 3

Lesson 4

Lesson 5

Lesson 6

Lesson 7

Read More

Module 1: Security and Risk Management

Module 2: Asset Security

Module 3: Security Engineering

Module 4: Communication and Network Security

Module 5: Identity and Access Management

Module 6: Security Assessment Testing

Module 7: Security Operations

Module 8: Software Development Security

Read More

Module 1: Security and Risk Management

Module 2: Asset Security

Module 3: Security Architecture and Engineering

Module 4: Communication and Network Security

Module 5: Identity and Access Management (IAM)

Module 6: Security Assessment and Testing

Module 7: Security Operations

Module 8: Software Development Security

Read More

Module 1: Computer Forensics Introduction

Module 2: Forensics Investigation Process

Module 3: Searching and Seizing

Module 4: Digital Evidence

Module 5: First Responder Procedures

Module 6: Forensics Lab

Module 7: Hard Disks and File Systems

Module 8: Windows Forensics

Module 9: Data Acquisition and Duplication

Module 10: Recovering Deleted Files and Partitions

Module 11: Using Access Data FTK

Module 12: Using EnCase

Module 13: Steganography

Module 14: Password Crackers

Module 15: Log Correlation

Module 16: Network Forensics

Module 17: Wireless Attacks

Module 18: Web Attacks

Module 19: Email Crimes

Module 20: Mobile Investigation

Module 21: Investigative Reports

Module 22: Expert Witness

Read More

Module 1: Cyber Security Awareness and Prevention

Module 2: Managing Mobile Device Security

Read More

Module 1: Data Breaches And ID Theft

Module 2: Device Security Basics

Module 3: Avoiding Inadvertent Disclosure

Module 4: Physical And Technical Safeguards

Read More

Module 1: What Is Agile

Module 2: Projects And Projects Management In An Agile World

Module 3: Agile and Scrum

Module 4: Common Scrum Terminology

Module 5: Other Iterative Methods

Module 6: Communication Skills In Agile World

Module 7: Using Agile Outside Software Development

Module 8: Case Studies Of Transitioning to Agile

Module 9: Critique Of Agile

Module 10: Review Of Agile

Read More

Module 1 : Agile Principles and Mindset

Module 2 : Value Driven Delivery

Module 3 : Stakeholder Engagement

Module 4 : Team Performance

Module 5 : Adaptive Planning

Module 6 : Problem Detection and Resolution

Module 7 : Continuous Improvement

Read More

Module 1 : Agile Principles and Mindset

Module 2 : Value Driven Delivery

Module 3 : Stakeholder Engagement

Module 4 : Team Performance

Module 5 : Adaptive Planning

Module 6 : Problem Detection and Resolution

Module 7 : Continuous Improvement

Read More

Module 1: Getting Started

Module 2: Getting to Know Adobe Audition

Module 3: The Interface

Module 4: Waveform Editing

Module 5: Effects

Module 6: Audio Restoration

Module 7: Mastering

Module 8: Sound Design

Module 9: Creating and Recording Files

Module 10: Multitrack Sessions

Module 11: Multitrack Session Editing

Module 12: Additional Features and Summary

Read More

Module 1: Introduction to After Effects

Module 2: Intermediate Effects and Techniques in After Effects

Module 3: More Advanced Effects and Techniques in After Effects

Read More

Module 1: Getting Started

Module 2: Getting to Know the Workflow

Module 3: Creating a Basic Animation Using Effects and Presets

Module 4: Animating Text

Module 5: Working With Shape Layers

Module 6: Animating a Multimedia Presentation

Module 7: Animating Photoshop Layers

Module 8: Working With Masks

Module 9: Distorting Objects with the Puppet Tools

Module 10: Using the Roto Brush Tool

Module 11: Performing Color Correction

Module 12: Creating Motion Graphics Templates

Read More

Module 1

Module 2

Read More

Module 1: Tools and Effects in Illustrator

Module 2: Creating Projects in Illustrator

Read More

Module 1

Module 2

Read More

Module 1

Module 2

Module 3

Module 4

Module 5

Module 6

Module 7

Module 8

Module 9

Module 10

Module 11

Read More

Module 1: What is Animation and the Basics

Module 2: Intermediate Animation Techniques

Read More

Module 1: Welcome

Module 2: Why use Lightroom

Module 3: Lightroom library and organization

Module 4: Edit your photo – global adjustments

Module 5: Edit your photo – local adjustments

Module 6: Saving and exporting

Module 7: Lightroom CC overview

Module 8: Outro

Read More

Module 1: Tools and Effects in Photoshop

Module 2: Creating Projects in Photoshop

Read More

Module 1: Introduction to Premiere and Getting Started on an Editing Project

Module 2: More Editing Techniques and Completing a Project

Read More

Module 1

Module 2

Read More

Module 1

Module 2

Read More

Module 1

Module 2

Read More

Module 1: Intro

Module 2: Camera Anatomy

Module 3: Scene Camera Modes

Module 4: Achieve Exposure

Module 5: Filetypes

Module 6: Sensor

Module 7: Resolution

Module 8: White Balance

Module 9: Color Theory

Module 10: Depth of Field

Module 11: Focusing

Module 12: Lighting

Module 13: Metering

Module 14: Composition

Read More

Module 1: Introduction

Module 2: Getting Started

Module 3: Drawing

Module 4: Colors and Gradients

Module 5: Intermediate Illustration

Module 6: Typography

Module 7: Live Trace, Paint Brush and Blob Brush

Module 8: Exporting

Read More

Module 1: Getting Started

Module 2: Layers and More

Module 3: Editing, Techniques and More

Read More

Module 1: Getting Started

Module 2: Motion, Sound, and More

Read More

Module 1: Architecture

Module 2: Governance and Enterprise Risk

Module 3: Legal Issues- Contracts and Electronic

Module 4: Compliance and Audit Management

Module 5: Information Management and Data Security

Module 6: Interoperability and Portability

Module 7: Traditional Security, Business Continuity, and Disaster Recovery

Module 8: Data Center Operations

Module 9: Incident Response

Module 10: Application Security

Module 11: Encryption and Key Management

Module 12: Identity, Entitlement, and Access Management

Module 13: Virtualization

Module 14: Security as a Service

Read More

Module 1: The principles of CC

Module 2: Implementing and Managing CC

Module 3: Using the Cloud

Module 4: Security and Compliance

Module 5: Evaluation of CC

Read More

Module 1: Foundations (Beginner)

Module 2: Terms and Tools (Beginner)

Module 3: Identifiers, Variables, and Data Types (Beginner)

Module 4: Object-Orientated Programming (Intermediate)

Module 5: Predefined Classes (Intermediate)

Module 6: Methods Part 1 (Intermediate)

Module 7: Methods Part 2 (Advanced)

Module 8: Constructors (Advanced)

Module 9: Control of Flow (Advanced)

Module 10: Arrays and Exceptions (Advanced)

Read More

Module 1: Introduction To Javascript

Module 2: Core Concepts And Syntax

Module 3: Getting A Handle On The DOM

Module 4: Working With Libraries

Read More

Module 1: Introduction To Oracle 12c SQL Fundamentals

Module 2: Retrieving Data

Module 3: SQL Functions

Module 4: Subqueries

Module 5: Data Manipulation Language

Module 6: Data Control Language

Module 7: Data Definition Language

Module 8: Combining Queries

Module 9: Oracle 12C SQL Fundamentals Review

Read More

Module 1: Database Concepts And Tools

Module 2: Memory Structure

Module 3: Tables

Module 4: Indexes

Module 5: Constraints And Triggers

Module 6: Users

Module 7: Internal Structures

Module 8: Starting Up and Shutting Down Database

Module 9: Critical Storage Files

Module 10: Data Manipulation Language

Module 11: Data Concurrency

Module 12: BackUp And Recovery

Module 13: Installation

Module 14: Course Review

Read More

Module 1: Database Admininstration

Module 2: Oracle Architecture

Module 3: Database Schema

Module 4: Recovery Manager

Module 5: Introduction to SQL

Module 6: Filtering and Sorting Data

Module 7: Functions

Module 8: SET Operators and Subqueries

Module 9: Regular Expressions and SQL Loader

Read More

Module 1: Preparing for and Taking the Exam

Module 2: Process Domain

Module 3: People Domain

Module 4: Business Environment Domain

Read More

Module 1 : Getting Certified to take the Examination

Module 2 : Techniques for Preparing for and Taking the Examination

Module 3 : Project Management Framework

Module 4 : Project Integration Management

Module 5 : Project Scope Management

Module 6 : Project Schedule Management

Module 7 : Project Cost Management

Module 8 : Project Quality Management

Module 9 : Project Resource Management

Module 10 : Project Communications Management

Module 11 : Project Risk Management

Module 12 : Project Procurement Management

Module 13 : Project Stakeholder Management

Read More

Module 1: Introduction

Module 2: Risk Management Concepts

Module 3: Risk Management Environment

Module 4: Project Definition

Module 5: Risk Management Planning

Module 6: Risk Identification

Module 7: Qualitative Risk Analysis

Module 8: Quantitative Risk Analysis

Module 9: Risk Response Planning

Module 10: Risk Monitoring And Controlling

Read More

Module 1: Risk Management Fundamentals

Module 2: Test Requirements

Module 3: Test Domains

Module 4: Risk Strategy and Planning

Module 5: Stakeholder Engagement

Module 6: Risk Process Facilitation

Module 7: Risk Monitoring and Reporting

Module 8: Specialized Risk Analyses

Module 9: RMP Recap

Module 10: RMP Review Questions

Read More

Module 1 : Getting Certified to take the Examination

Module 2 : Project Management Framework

Module 3 : Project Integration Management

Module 4 : Project Scope Management

Module 5 : Project Schedule Management

Module 6 : Project Cost Management

Module 7 : Project Quality Management

Module 8 : Project Resource Management

Module 9 : Project Communications Management

Module 10 : Project Risk Management

Module 11 : Project Procurement Management

Module 12 : Project Stakeholder Management

Module 13 : Review

Read More

Module 1: Organization­ – Wide Planning and Deployment

Module 2: Leadership

Module 3: Organizational Process Measures and Management

Module 4: Team Management

Module 5: Define Phase­ – Overview of the Define Phase and the Voice of the Customer

Module 6: Define Phase – Business Case and Project Charter

Module 7: Define Phase­ – Analytical Tools

Module 8: Measure Phase­ – Process Analysis and Documentation

Module 9: Measure Phase­ – Data Collection

Module 10: Measure Phase – ­Measurement Systems

Module 11: Measure Phase­ – Basic Statistics

Module 12: Measure Phase­ – Probability

Module 13: Measure Phase­ – Process Capability

Module 14: Analyze Phase – Measuring and Modeling Relationships

Module 15: Analyze Phase­ – Hypothesis Testing

Module 16: Analyze Phase­ – FEMA and Additional Analysis Methods

Module 17: Improve Phase­ – Design of Experiments (DOE)

Module 18: Improve Phase­ – Lean Method

Module 19: Improve Phase -­ Implementation

Module 20: Control Phase­ – Statistical Process Control (SPC)

Module 21: Control Phase­ – Other Controls

Module 22: Control Phase­ – Maintain Controls and Sustain Improvements

Module 23: DFSS

Module 24: Exam Review­ – Prep and Key Concepts

Read More

Module 1: Six Sigma And The Organization

Module 2: Define Phase ­Project Identification

Module 3: Define Phase­Voice Of The Customer

Module 4: Define Phase­ Project Management Basics on Six Sigma Green Belt

Module 5: Define Phase­Management And Planning Tools

Module 6: Define Phase­Business Results For Projects

Module 7: Define Phase­Team Dynamics And Define Phase Summary Review Questions

Module 8: Measure Phase­Process Analysis And Documentation

Module 9: Measure Phase­Probability And Statistics

Module 10: Measure Phase­Statistical Distributions

Module 11: Measure Phase­Collecting And Summarizing Data

Module 12: Measure Phase­Measurements System Analysis (MSA)

Module 13: Measure Phase­Process And Performance Capability And Measure Phase Summary And Review

Module 14: Analyze Phase­Exploratory Data Analysis And Hypothesis Testing

Module 15: Analyze Phase ­ Process Drivers

Module 16: Improve Phase­Design Of Experiment (DOE)

Module 17: Improve Phase­Root Cause Analysis

Module 18: Improve Phase­Lean Tools

Module 19: Control Phase­ Statistical Process Control

Module 20: Control Phase­Lean Tools For Process Control

Module 21: Review Exam­Prep And Key Concepts

Read More

Module 1: Development Methods

Module 2: Agile Manifesto Principles

Module 3: Scrum

Module 4: Why Scrum

Module 5: Scrum-Roles Overview

Module 6: Product Owner

Module 7: Scrum Master

Module 8: Scrum Team

Module 9: Scrum Process

Module 10: Scrum Project Phase

Module 11: Plan and Estimate

Module 12: Implement

Module 13: Review and Retrospect

Module 14: Release

Module 15: Project Vision

Module 16: Scrum Master and Stake Holder(s)

Module 17: Form Scrum Team

Module 18: Develop Epics

Module 19: User Stories

Module 20: Justifications and Sample Change(s)

Module 21: Creating a Prioritized Backlog

Module 22: Conduct Release Planning

Module 23: Sprints

Module 24: Scrum Framework

Module 25: Scrum of Scrums

Module 26: Scrum Demo

Module 27: Review

Read More

Module 1: Development Methods

Module 2: Agile Manifesto Principles

Module 3: Scrum

Module 4: Why Scrum

Module 5: Scrum-Roles Overview

Module 6: Product Owner

Module 7: Scrum Master

Module 8: Scrum Team

Module 9: Scrum Process

Module 10: Scrum Project Phase

Module 11: Plan and Estimate

Module 12: Implement

Module 13: Review and Retrospect

Module 14: Release

Module 15: Project Vision

Module 17: Form Scrum Team

Module 18: Develop Epics

Module 19: User Stories

Module 20: Justifications and Sample Change(s)

Module 21: Creating a Prioritized Backlog

Module 22: Conduct Release Planning

Module 23: Sprints

Module 24: Scrum Framework

Module 25: Scrum of Scrums

Module 26: Scrum Demo

Module 27: Review

Read More

  • Introduction
  • Business Entities
  • Beginning Your Business
  • Financial Basics Part 1
  • Financial Basics Part 2
  • Employees Payroll
  • Getting Your Business Out There
  • SEO
  • Other Topics
  • Closing

Read More

Module 1: Setup and Maintenance

Module 2: List Management

Module 3: Sales (Money-In)

Module 4: Purchased (Money-Out)

Module 5: Accounting

Module 6: Reports

Module 7: Customizations and Time Savers

Module 8: Extra

Read More

Module 1: Creating and Setting Up Your Point of Sale Company File

Module 2: Installing your System

Module 3: Navigating and Customizing the Home Page

Module 4: Company Preferences

Module 5: Financial- Setting up QuickBooks Connection

Module 6: Setting up Sales Tax

Module 7: Workstation Preferences

Module 8: Additional Features

Module 9: Employees and Security

Module 10: Customers

Module 11: Rewards Program

Module 12: Vendors

Module 13: Setting Up Your Inventory

Module 14: Item Styles, Assemblies, and Group

Module 15: Working with Inventory

Module 16: Sales

Module 17: Working with Price Levels and Discounts

Module 18: Collecting Sales Tax

Module 19: Adding Shipping Information (Pro/MS)

Module 20: Tracking Sales Commissions

Module 21: Taking Payment and Giving Change

Module 22: Recording Tips

Module 23: Handling Tricky Sales Returns

Module 24: Working with Sales Orders, Work Orders, and Layaways

Module 25: Purchasing Merchandise

Module 26: Receiving from a PO

Module 27: Managing Inventory

Module 28: Reporting

Module 29: QuickBooks Financial

Module 30: Multi-Store

Module 31: Protect your data

Module 32: Adding Third Party Applications

Module 1: Intro and Setup

Module 2: Tools

Module 3: Preferences

Module 4: Security & Users

Module 5: Estimates

Module 6: Sales Orders

Module 7: Receiving Money

Module 8: Bounced Checks

Module 9: Specific Tracking

Module 10: Receiving and Depositing

Module 11: Credit Cards and Bank Accounts

Module 12: Payroll

Module 13: Transactions

Module 14: Accounts and Reports

Module 15: Integrating with Word

Module 16: Data Types

Module 17: Conclusion

Read More

Module 1: Sage 50 2013

Module 2: Sage 50 Basics

Module 3: Inventory

Module 4: Employee

Module 5: Banking

Module 6: Maintenance

Module 7: File Handling

Module 8: Manager

Module 9: Jobs

Module 10: Budgets

Module 11: Charts of Accounts

Module 12: Accounts Management

Module 13: Customer Setup

Module 14: Jobs Setup

Module 15: Vendor Setup

Module 16: Inventory Setup

Module 17: Employee Setup

Module 18: Security Setup

Module 19: ACTI Link

Module 20: Task Overview

Module 21: Forms, Reports, and Recap

Read More

Module 1: Intro to SalesForce Automation

Module 2: Working With The SalesForce System

Module 3: SalesForce Solution

Module 4: SalesForce Admin

Module 5: Migrating To SalesForce

Module 6: Course Conclusion

Read More

Module 1: The Phone

Module 2: The Screen

Module 3: The Keyboard

Module 4: Contacts

Module 5: Phone Calls

Module 6: Messaging

Module 7: Internet

Module 8: Email

Module 9: Music

Module 10: Android Specifics

Module 11: Photos & Video

Module 12: Conclusion

Read More

Module 1: iPhone Basics

Module 2: The Screen

Module 3: The Keyboard

Module 4: Basic Calls and Settings

Module 5: Contacts

Module 6: Phone Calls

Module 7: Messaging

Module 8: Web

Module 9: Email

Module 10: Siri

Module 11: Music

Module 12: Photos and Video

Module 13: Maps

Module 14: Conclusion

Read More

Coming Soon

    • Certified Blockchain Developer – Hyperledger (CBDH)
    • Certified Blockchain Solutions Architect (CBSA)
    • Enterprise Blockchain Bootcamp for Solutions Engineers
    • Module 1: Introduction and Deploy Windows
      • 1.1 Instructor and Course Introduction
      • 1.2 Exam Overview
      • 1.3 Deploy Windows Intro
      • 1.4 Deploy Windows 10
      • 1.5 Deploy Windows 10 Pt 2
      • 1.6 Preparing Virtual Lab Setup for the Client 1
      • 1.7 Installation of Windows 10 Enterprise
      • 1.8 Troubleshooting Failed Installations with Setup Logs
      • 1.9 Configuring Locales
      • 1.10 Perform Post-Installation Configuration
      • 1.11 Navigating Microsoft Edge
      • 1.12 Modifying Microsoft Edge Settings
      • 1.13 Customizing Your Computer Setting

      Module 2: Manage Devices and Data

      • 2.1 Manage devices and data intro
      • 2.2 Manage local users, groups, and devices
      • 2.3 Configure data access and protection
      • 2.4 Adding and accessing local users and groups
      • 2.5 Managing NTFS permissions in Windows 10
      • 2.6 Configure devices by using local policies
      • 2.7 Configuring Audit Policies on Windows 10
      • 2.8 Manage Windows security
      • 2.9 How to change user account settings

      Module 3: Configure Connectivity

      • 3.1 Configure connectivity intro
      • 3.2 Configure networking
      • 3.3 Configuring network adapter advanced properties
      • 3.4 Configuring a static TCP/IP address
      • 3.5 Viewing the networking connection details
      • 3.6 Setting up a VPN connection
      • 3.7 Configure remote connectivity
      • 3.8 Configure remote management

      Module 4: Maintain Windows

      • 4.1 Maintain Windows intro
      • 4.2 Configure system and data recovery
      • 4.3 Backing up files in Windows 10
      • 4.4 Using the recycle bin
      • 4.5 Manage updates
      • 4.6 Check for updates in Windows 10
      • 4.7 Configuring hardware in Windows 10
      • 4.8 Monitor and manage Windows
      • 4.9 Configuring Windows 20 desktop options
      • 4.10 Installing new features