Digital Fusion AI

COURSES

The Leading Company For Innovation

Online Training

at

Anytime

From

Anywhere

By you, For you, With you – Access it all at your ease. From Minor to Vital our courses range will never be a disappointment. Scroll to choose from a swarm of courses.

Previous slide
Next slide
Previous slide
Next slide
Previous slide
Next slide
microsoft (1)
  • Module 1: Installation
  • SQL Admin Intro
  • Installation

Module 2: Data Storage

  • Introduction to Data Storage with SQL Server
  • Managing Storage for System Databases
  • Managing Storage for User Databases
  • Moving Database Files

Module 3: Data Recover

  • Intro to Data Recovery
  • Understanding SQL Server Recovery Models
  • Planning a Backup Strategy
  • Backing up Databases and Transaction Logs
  • Using SSMS For Backup
  • Understanding the Restore Process
  • How to Restore a Database
  • Using SSMS For Restore
  • T-SQL Backup and Restore
  • Advanced Restore Scenarios
  • Introduction to Transferring Data
  • Importing and Exporting Table Data
  • Copying or Moving a Database

Module 4: Monitoring

  • Introduction to Monitoring SQL Server
  • Dynamic Management Views and Functions
  • Server Reports
  • System Performance Monitor
  • Tracing SQL Server Workload Activity
  • Extended Events
  • Database Tuning Advisor

Module 5: Security

  • Introduction to SQL Server Security
  • Managing Server-Level Security
  • Managing Database-Level Security
  • Row Level Security (RLS) Using Policies
  • Database Security Tools
  • Contained Database
  • Auditing Data Access in SQL Server
  • Implementing Transparent Data Encryption

Module 6: Maintenance

  • Introduction to Maintenance
  • Ensuring Database Integrity
  • Maintaining Indexes
  • Automating Routine Database Maintenance
  • Automating SQL Server Management
  • Monitoring SQL Server Errors
  • Configuring Database Mai

Module 1 – Query Tools

 

  • 1.1 Course Introduction
  • 1.2 Module 1 Introduction
  • 1.3 Intro to Management Studio
  • 1.4 Intro to command-line query tools

Module 2 – Introduction to T-SQL Querying

  • 2.1 Module 2 Introduction
  • 2.2 Introducing T-SQL
  • 2.3 Understanding Sets
  • 2.4 Understanding the Logical Order of Operations in SELECT statements

Module 3 – Basic SELECT Queries

  • 3.1 Module 3 Introduction
  • 3.2 Writing Simple SELECT Statements
  • 3.3 Eliminate Duplicates with DISTINCT
  • 3.4 Using Column and Table Aliases
  • 3.5 Write Simple CASE Expressions

Module 4 – Querying Multiple Tables

  • 4.1 Module 4 Introduction
  • 4.2 Understanding Joins
  • 4.3 Querying with Inner Joins
  • 4.4 Querying with Outer Joins
  • 4.5 Querying with Cross Joins and Self Joins

Module 5 – Sorting and Filtering Data

  • 5.1 Module 5 Introduction
  • 5.2 Sorting Data
  • 5.3 Filtering Data with Predicates
  • 5.4 Filtering with the TOP and OFFSET-FETCH
  • 5.5 Working with Unknown Values

Module 6 – Working with SQL Server Data Types

  • 6.1 Module 6 Introduction
  • 6.2 Writing Queries that return Date and Time Data
  • 6.3 Writing Queries that use Date and Time Functions
  • 6.4 Writing Queries that return Character Data
  • 6.5 Writing Queries that use Character Functions

Module 7 – Using DML to Modify Data

  • 7.1 Module 7 Introduction
  • 7.2 Inserting Records with DML
  • 7.3 Updating Records Using DML
  • 7.4 Deleting Records Using DML

Module 8 – Using Built-In Functions

  • 8.1 Module 8 Introduction
  • 8.2 Writing Queries with Built-In Functions
  • 8.3 Using Conversion Functions
  • 8.4 Using Logical Functions
  • 8.5 Using Functions to Work with NULL

Module 9 – Grouping and Aggregating Data

  • 9.1 Module 9 Introduction
  • 9.2 Using Aggregate Functions
  • 9.3 Using the GROUP BY Clause
  • 9.4 Filtering Groups with HAVING

Module 10 – Using Subqueries

  • 10.1 Module 10 Introduction
  • 10.2 Writing Self-Contained Subqueries
  • 10.3 Writing Correlated Subqueries
  • 10.4 Using the EXISTS Predicate with Subqueries

Module 11 – Using Table Expressions

  • 11.1 Module 11 Introduction
  • 11.2 Using Views
  • 11.3 Using Inline Table-Valued Functions
  • 11.4 Using Derived Tables
  • 11.5 Using Common Table Expressions

Module 12 – Using Set Operators

  • 12.1 Module 12 Introduction
  • 12.2 Writing Queries with the UNION operator
  • 12.3 Using EXCEPT and INTERSECT
  • 12.4 Using APPLY

Module 13 – Using Window Ranking, Offset, and Aggregate Functions

  • 13.1 Module 13 Introduction
  • 13.2 Creating Windows with OVER
  • 13.3 Exploring Window Functions

Module 14 – Pivoting and Grouping Sets

  • 14.1 Module 14 Introduction
  • 14.2 Writing Queries with PIVOT and UNPIVOT
  • 14.3 Working with Grouping Sets

Module 15 – Implementing Error Handling

  • 15.1 Module Introduction
  • 15.2 Implementing T-SQL error handling
  • 15.3 Implementing structured exception handling

Module 16 – Managing Transactions

  • 16.1 Module 16 Introduction
  • 16.2 Transactions and the Database Engine
  • 16.3 Controlling Transactions
  • 16.4 Course Wrap Up

Module 1 – Introduction to Business Intelligence and Data Modeling

  • 1.1 Course Introduction
  • 1.2 Module 1 Introduction
  • 1.3 Introduction to Business Intelligence
  • 1.4 The Microsoft Business Intelligence Platform
  • 1.5 Exploring a Data Warehouse
  • 1.6 Exploring a Data Model

Module 2 – Multidimensional Databases

  • 2.1 Module 2 Introduction
  • 2.2 Introduction to Multidimensional Analysis
  • 2.3 Overview of Cube Security
  • 2.4 Creating and Configuring a Cube
  • 2.5 Data Sources
  • 2.6 Data Source Views
  • 2.7 Adding a Dimension to a Cube

Module 3 – Cubes and Dimensions

  • 3.1 Module 3 Introduction
  • 3.2 Dimensions
  • 3.3 Attribute Hierarchies and Relationships
  • 3.4 Sorting and Grouping Attributes
  • 3.5 Slowly Changing Dimensions

Module 4 – Measures and Measure Groups

  • 4.1 Module 4 Introduction
  • 4.2 Measures
  • 4.3 Measure Groups and Relationships
  • 4.4 Measure Group Storage

Module 5 – Introduction to MDX

  • 5.1 Module 5 Introduction
  • 5.2 MDX Fundamentals
  • 5.3 Adding Calculations to a Cube
  • 5.4 Querying a cube using MDX

Module 6 – Customizing Cube Functionality

  • 6.1 Module 6 Introduction
  • 6.2 Key Performance Indicators
  • 6.3 Actions
  • 6.4 Perspectives
  • 6.5 Translations

Module 7 – Tabular Data Models

  • 7.1 Module 7 Introduction
  • 7.2 Introduction to Tabular Data Models
  • 7.3 Creating a Tabular Data Model
  • 7.4 Configure Relationships and Attributes
  • 7.5 Configuring Data Model for an Enterprise BI Solution

Module 8 – Data Analysis Expressions (DAX)

  • 8.1 Module 8 Introduction
  • 8.2 DAX Fundamentals
  • 8.3 Calculated Columns
  • 8.4 Relationships
  • 8.5 Measures
  • 8.6 Time Intelligence
  • 8.7 KPI
  • 8.8 Parent – Child Hierarchies

Module 9 – Data Mining

  • 9.1 Module 9 Introduction
  • 9.2 Overview of Data Mining
  • 9.3 Custom Data Mining Solutions
  • 9.4 Validating a Data Mining Model
  • 9.5 Consuming a Data Mining Model
  • 9.6 Course Wrap Up

Module 1: What are Big Data Clusters?

  • 1.1 Introduction
  • 1.2 Linux, PolyBase, and Active Directory
  • 1.3 Scenarios

Module 2: Big Data Cluster Architecture

  • 2.1 Introduction
  • 2.2 Docker
  • 2.3 Kubernetes
  • 2.4 Hadoop and Spark
  • 2.5 Components
  • 2.6 Endpoints

Module 3: Deployment of Big Data Clusters

  • 3.1 Introduction
  • 3.2 Install Prerequisites
  • 3.3 Deploy Kubernetes
  • 3.4 Deploy BDC
  • 3.5 Monitor and Verify Deployment

Module 4: Loading and Querying Data in Big Data Clusters

  • 4.1 Introduction
  • 4.2 HDFS with Curl
  • 4.3 Loading Data with T-SQL
  • 4.4 Virtualizing Data
  • 4.5 Restoring a Database

Module 5: Working with Spark in Big Data Clusters

  • 5.1 Introduction
  • 5.2 What is Spark
  • 5.3 Submitting Spark Jobs
  • 5.4 Running Spark Jobs via Notebooks
  • 5.5 Transforming CSV
  • 5.6 Spark-SQL
  • 5.7 Spark to SQL ETL

Module 6: Machine Learning on Big Data Clusters

  • 6.1 Introduction
  • 6.2 Machine Learning Services
  • 6.3 Using MLeap
  • 6.4 Using Python
  • 6.5 Using R

Module 7: Create and Consume Big Data Cluster Apps

  • 7.1 Introduction
  • 7.2 Deploying, Running, Consuming, and Monitoring an App
  • 7.3 Python Example – Deploy with azdata and Monitoring
  • 7.4 R Example – Deploy with VS Code and Consume with Postman
  • 7.5 MLeap Example – Create a yaml file
  • 7.6 SSIS Example – Implement scheduled execution of a DB backup

Module 8: Maintenance of Big Data Clusters

  • 8.1 Introduction
  • 8.2 Monitoring
  • 8.3 Managing and Automation
  • 8.4 Course Wrap Up

Module 1: Introduction

  • Instructor Introduction
  • Course Overview
  • Expectations

Module 2: Cloud Fundamentals

  • What is the Cloud
  • Basic Terms
  • Types of cloud computing
  • Cloud Service Models

Module 3: Azure’s Architecture

  • Regions and Availability
  • Resource Groups and Management
  • Azure Marketplace
  • Demo- Azure Console Exploration

Module 4: Compute

  • Virtual Machines
  • Containers
  • Demo – Containers
  • Functions
  • Demo – Functions
  • Windows Virtual Desktop and App Services

Module 5: Networking and CDN

  • Virtual Networks
  • Load Balancers
  • Gateways
  • Content Delivery Network
  • Network Security
  • Demo – Connecting two VMs

Module 6: Storage

  • Storage
  • Big Data and Analytics
  • Databases
  • Demo – SQL Database
  • Database Migration

Module 7: Azure Solutions

  • IoT
  • Demo – IoT Hub
  • AI
  • Serverless Computing

Module 8: Administration

  • Security
  • Identity and Access Management
  • Demo – Adding Users and Groups
  • Governance
  • Demo – Resource Locks
  • Privacy and Compliance

Module 9: Pricing and Service Level Agreements

  • Managing Costs
  • Demo – Pricing Calculator
  • Service Level Agreements and Service Lifecycles

Module 10: Exam Preparation

  • Exam Layout
  • Best Practices and Study Tips
  • Overview and Conclusion

Module 11: Review Questions

  • Module 11 pt 1
  • Module 11 pt 2
  • Module 11 pt 3
  • Module 11 pt 4

Module 1 – Azure Overview

  • 1.0 Introduction to AZ-104
  • 1.1 Cloud Computing
  • 1.2 Cloud Services Benefits
  • 1.3 Cloud Service Types
  • 1.4 Azure Core Architectural Components
  • 1.4.1 ACTIVITY-Creating Management Groups and Subscriptions
  • 1.5 Azure Compute Services
  • 1.6 Azure Application Hosting Options
  • 1.7 Azure Networking Services
  • 1.8 Azure Storage Services
  • 1.9 Azure Identity, Access, and Security
  • 1.10 Azure Cost Management
  • 1.10.1 ACTIVITY- Checking Your Azure Balance
  • 1.11 Azure Governance and Compliance Tools
  • 1.11.1 ACTIVITY- Assign an Azure Policy

Module 2 – Azure Tools

  • 2.1 Azure Portal
  • 2.1.1 ACTIVITY- Exploring the Azure Portal
  • 2.2 Azure Monitoring Tools
  • 2.3 Azure PowerShell
  • 2.3.1 ACTIVITY- Using Azure PowerShell
  • 2.4 Azure CLI
  • 2.4.1 ACTIVITY- Using the Azure CLI
  • 2.5 Azure Cloud Shell
  • 2.6 ARM Templates
  • 2.6.1 ACTIVITY- Using Templates to Deploy Resources
  • 2.7 Azure Resource Manager
  • 2.8 Hybrid Tools

Module 3 – Azure Identities and Governance

  • 3.1 Azure AD Overview
  • 3.1.1 ACTIVITY- Exploring Azure Active Directory
  • 3.1.2 ACTIVITY- Adding a Custom Domain
  • 3.2 Subscriptions
  • 3.3 Users and Groups
  • 3.3.1 ACTIVITY- Adding Azure Active Directory User
  • 3.3.2 ACTIVITY- Bulk Inviting New Users
  • 3.3.3 ACTIVITY- Creating Azure AD Groups
  • 3.4 Authentication
  • 3.5 SSPR
  • 3.5.1 ACTIVITY- Implementing SSPR
  • 3.6 Devices
  • 3.7 Azure Roles
  • 3.7.1 ACTIVITY- Assigning Azure Roles
  • 3.8 Azure AD Roles
  • 3.8.1 ACTIVITY- Assigning Azure AD Roles
  • 3.9 Conditional Access
  • 3.10 Authorization
  • 3.10.1 ACTIVITY- Managing Licenses
  • 3.11 Azure Policy

Module 4 – Azure Storage

  • 4.1 Storage Accounts
  • 4.1.1 ACTIVITY- Creating a Storage Account
  • 4.2 Storage Types
  • 4.2.1 ACTIVITY- Creating Storage Types
  • 4.3 Azure Storage Tools
  • 4.3.1 ACTIVITY- Azure Storage Explorer
  • 4.4 Azure Files and File Sync
  • 4.4.1 ACTIVITY- Deploying an Azure Files Share
  • 4.5 Azure Storage Security

Module 5 – Azure Compute Resources

  • 5.1 Virtual Machines
  • 5.1.1 ACTIVITY- Create Virtual Machines
  • 5.1.2 ACTIVITY- Delete a Virtual Machine
  • 5.2 VM Availability
  • 5.2.1 ACTIVITY- Increasing VM Availability
  • 5.3 VM Extensions
  • 5.4 Azure App Service
  • 5.5 Azure Container Instances
  • 5.6 Kubernetes

Module 6 – Azure Virtual Networks

  • 6.1 Virtual Networks
  • 6.1.1 ACTIVITY- Create a VNet
  • 6.2 Network Security Groups-Part 1
  • 6.2.1 Network Security Groups-Part 2
  • 6.3 Azure Firewall
  • 6.3.1 ACTIVITY- Deploying a Firewall
  • 6.4 Azure DNS-Part 1
  • 6.4.1 Azure DNS-Part 2
  • 6.4.2 ACTIVITY- Implementing Azure DNS Zone6
  • 6.5 Virtual Network Peering
  • 6.5.1 ACTIVITY- VNet Peering
  • 6.6 Azure VPN Gateway
  • 6.7 ExpressRoute and Virtual WANs
  • 6.8 Azure Load Balancer
  • 6.9 Azure Application Gateway
  • 6.10 Azure Routes

Module 7 – Azure Monitoring and Backup

  • 7.1 Network Watcher
  • 7.2 Azure Monitor
  • 7.3 Azure Backup-Part 1
  • 7.4 Azure Backup-Part 2
  • 7.5 Azure Backup-Part 3
  • 7.6 Conclusion to AZ-104

Module 1 – Prepare Data

 

  • 1.1 Course Introduction
  • 1.2 Module 1 Introduction
  • 1.3 Introduction to Power BI
  • 1.4 Get data from various data sources
  • 1.5 Preview source data

Module 2 – Clean, Transform, and Load Data

  • 2.1 Module 2 Introduction
  • 2.2 DimEmployee Example
  • 2.3 DimEmployeeSalesTerritory Example
  • 2.4 DimReseller Example
  • 2.5 FactResellersSales Example
  • 2.6 ResellerSalesTargets Example
  • 2.7 Color Formats Example

Module 3 – Design a Data Model

  • 3.1 Module 3 Introduction
  • 3.2 Introduction to Data Modeling
  • 3.3 Model Relationships
  • 3.4 Table Configuration
  • 3.5 Model interface
  • 3.6 Quick Measures
  • 3.7 Many-to-many relationships
  • 3.8 Row-level security

Module 4 – Create Model Calculations using DAX

  • 4.1 Module 4 Introduction
  • 4.2 DAX context
  • 4.3 Calculated Tables
  • 4.4 Calculated Columns
  • 4.5 Managing Date Tables
  • 4.6 Measures
  • 4.7 Filter Manipulation
  • 4.8 Time Intelligence

Module 5 – Create Reports

  • 5.1 Module 5 Introduction
  • 5.2 Basic Report Creation
  • 5.3 Example Page 1
  • 5.4 Example Page 2
  • 5.5 Example Page 3
  • 5.6 Report Publishing
  • 5.7 Enhancing Reports
  • 5.8 Drill-Through Pages
  • 5.9 Conditional Formatting
  • 5.10 Buttons and Bookmarks

Module 6 – Create Dashboards

  • 6.1 Module 6 Introduction
  • 6.2 Dashboard Basics
  • 6.3 Real Time Dashboards
  • 6.4 Enhanced Dashboards

Module 7 – Create Paginated Reports

  • 7.1 Module 7 Introduction
  • 7.2 Introduction to Power BI Report Builder
  • 7.3 Report Layouts
  • 7.4 Report Data
  • 7.5 Report Tables

Module 8 – Perform Advanced AnalyticsModule 9 – Create and Manage Workspaces

  • 9.1 Introduction to Workspaces
  • 9.2 Working with Workspaces and the Portal

Module 10 – Create Power App Visuals

  • 10.1 Module 10 Introduction
  • 10.2 Introduction to Power Apps Visual
  • 10.3 Creating the App
  • 10.4 Basic Power Apps Concepts
  • 10.5 Refreshing the Report

Module 11 – Analysis Services and Power BI

  • 11.1 Module 11 Introduction
  • 11.2 Introduction to Analysis Services
  • 11.3 Connecting with Multidimensional Models
  • 11.4 Premium Workspaces and Analysis Services
  • 11.5 Course Wrap Up

Module 1: Implement VM Solutions

  • Intro
  • Implement VM Solutions Pt 1
  • Implement VM Solutions Pt 2
  • Implement VM Solutions Pt 3
  • Implement VM Solutions Pt 4
  • Implement Batch Jobs Using AZ Batch Services
  • Create Containerized Solutions Pt 1
  • Create Containerized Solutions Pt 2

Module 2: Develop Azure Platform as a Service

  • Develop Azure Platform as a Service (PaaS) Pt 1
  • Develop Azure Platform as a Service (PaaS) Pt 2
  • Develop Azure Platform as a Service (PaaS) Pt 3
  • Develop Azure Platform as a Service (PaaS) Demo Pt 1
  • Develop Azure Platform as a Service (PaaS) Demo Pt 2
  • Create Azure App Service Mobile Apps
  • Create Azure App Service API Apps
  • Implement Azure Functions Pt 1
  • Implement Azure Functions Pt 2

Module 3: Develop for Azure Storage

  • Develop for Azure Storage Pt 1
  • Develop for Azure Storage Pt 2
  • Develop for Azure Storage Pt 3
  • Develop Solutions that use Azure Cosmos DB Pt 1
  • Develop Solutions that use Azure Cosmos DB Pt 2
  • Develop Solutions that use Relational Database Pt 1
  • Develop Solutions that use Relational Database Pt 2
  • Develop Solutions that use Microsoft Blob Storage

Module 4: Implement Azure Security

  • Implement Azure Security Pt 1
  • Implement Azure Security Pt 2
  • Implement Azure Security Pt 3
  • Implementing Access Control Pt 1
  • Implementing Access Control Pt 2
  • Implementing Secure Data Solutions

Module 5: Monitor, Troubleshoot and Optimize Azure Solutions

  • Monitor, Troubleshoot and Optimize Azure Solutions Pt 1
  • Monitor, Troubleshoot and Optimize Azure Solutions Pt 2
  • Develop for Code Scalability
  • Instrument Solutions to Support Monitoring and Logging
  • Integrate Caching and Content Delivery Pt 1
  • Integrate Caching and Content Delivery Pt 2

Module 6: Connect to and Consume Azure and Third Party Services

  • Connect to and Consume Azure and Third Party Services Pt 1
  • Connect to and Consume Azure and Third Party Services Pt 2
  • Working with Azure Search
  • Azure API Management
  • Develop Event Based Solutions Pt 1
  • Develop Event Based Solutions Pt 2
  • Develop Message Based Solutions Pt 1
  • Develop Message Based Solutions Pt 2
  • Outro

Module 1 Understanding Local Area Networking

  • Module 1 Notes
  • 1.0 Intro to Networking Fundamentals
  • 1.1 Exam Overview
  • 1.1 Examining Local Network Devices and Data Transfers 1a
  • 1.1 Examining Local Network Devices and Data Transfers 1b
  • 1.1 Examining Local Network Devices and Data Transfers 1c
  • 1.1 Examining Local Network Devices and Data Transfers 1d
  • 1.1 Examining Local Network Devices and Data Transfers 1e
  • 1.1 Examining Local Network Devices and Data Transfers 1f
  • 1.2 Examining Local Network Devices and Data Transfers Part 2a
  • 1.2 Examining Local Network Devices and Data Transfers Part 2b

Module 2 Defining Networks with the OSI Model

  • Module 2 Notes
  • 2.1 Defining Networks with OSI Model Part 1a
  • 2.2 Defining Networks with OSI Model Part 1b
  • 2.3 Defining Networks with OSI Model Part 1c
  • 2.4 Defining Networks with OSI Model Part 1d
  • 2.5 Defining Networks with OSI Model Part 1e
  • 2.6 Defining Networks with OSI Model Part 1f
  • 2.7 Defining Networks with OSI Model Part 1g
  • 2.8 Defining Networks with OSI Model Part 1h

Module 3 Understanding Wired and Wireless Networks

  • Module 3 Notes
  • 3.1 Understand Wired and Wireless Networks Part1
  • 3.2 Understand Wired and Wireless Networks Part2

Module 4 Understanding Internet Protocol

  • Module 4 Notes
  • 4.1 Understanding Internet Protocol Part1
  • 4.2 Understanding Internet Protocol Part2

Module 5 Implementing TCP-IP in the command line

  • Module 5 Notes
  • 5.1 Implementing TCPIP in the Command Line

Module 6 Working with Networking Services

  • Module 6 Notes
  • 6.1 Working with Networking Services

Module 7 Understanding Wide Area Networks

  • Module 7 Notes
  • 7.1 Understanding Wide Area Network Part1
  • 7.2 Understanding Wide Area Network Part2

Module 8 Defining Network Infrastructure and Security

  • Module 8 Notes
  • 8.1 Defining Network Infrastructure & Network Security Part1
  • 8.2 Defining Network Infrastructure & Network Security Part2

Module 9 Key Takeaways

  • Key Takeaway Notes
  • 1. Key Take Aways of Networking Fundamentals
  • 2. Key Take Aways Mod1
  • 3. Key Take Aways Mod2
  • 4. Key Take Aways Mod3
  • 5. Key Take Aways Mod4
  • 6. Key Take Aways Mod5
  • 7. Key Take Aways Mod6
  • 8. Key Take Aways Mod7

Module 10 Terms to Know

  • Terms to Know Notes
  • 1. Terms to Know Networking Fundamentals
  • 2. Terms to Know Mod1
  • 3. Terms to Know Mod2
  • 4. Terms to Know Mod3
  • 5. Terms to Know Mod4
  • 6. Terms to Know Mod5
  • 7. Terms to Know Mod6
  • 8. Terms to Know Mod7
  • 9. Terms to Know Mod8

Module 1: Configure Encryption

  • Introduction
  • Exam Objectives and Lab Setup
  • Restoring AdventureWorks 2016 Database Lab Part 1
  • Restoring AdventureWorks 2016 Database Lab Part 2
  • Restoring AdventureWorks 2016 Database Lab Part 3
  • Configure Encryption
  • Cell-Level Encryption Part 1
  • Cell-Level Encryption Part 2
  • Cell-Level Encryption Lab Part 1
  • Cell-Level Encryption Lab Part 2
  • Transparent Data Encryption
  • Transparent Data Encryption Lab
  • Always Encrypted
  • Always Encrypted Lab
  • Backup Encryption
  • Backup Encryption Lab
  • Connection Encryption
  • Encryption Troubleshooting

Module 2: Configure Data Access and Permissions

  • Create and Maintain Users
  • Create and Maintain Users Lab Part 1
  • Create and Maintain Users Lab Part 2
  • Configure and Maintain Custom Roles
  • Configure and Maintain Custom Roles Lab
  • Manage Database Object Permissions Part 1
  • Manage Database Object Permissions Part 2
  • Manage Database Object Permissions Lab Part 1
  • Manage Database Object Permissions Lab Part 2
  • Configure User Options for Azure SQL Database
  • Configure Row-Level Security
  • Configure Dynamic Data Masking
  • Configure Dynamic Data Masking Lab

Module 3: Configure Auditing

  • Manage a SQL Server Audit
  • Manage a SQL Server Audit Lab
  • Query the SQL Server Audit Log
  • Manage an Azure SQL Server Audit

Module 4: Develop a Backup Strategy

  • Backup Types Part 1
  • Backup Types Part 2
  • Manage, Backup, and Restore Databases Lab Part 1
  • Manage, Backup, and Restore Databases Lab Part 2
  • Backup Very Large Databases Part 1
  • Backup Very Large Databases Part 2
  • Backup Very Large Databases Part 3
  • Backup Very Large Databases Part 4
  • 4.9 Managing Very Large Databases Lab Part 1
  • 4.10 Managing Very Large Databases Lab Part 2
  • 4.11 Managing Very Large Databases Lab Part 3
  • Configure Alerting for Failed Backups
  • Configure Alerting for Failed Backups Lab Part 1
  • Configure Alerting for Failed Backups Lab Part 2
  • Back up Databases to Azure
  • Manage Transaction Log Backups
  • Configure Database Recovery Models
  • Set Database Recovery Model Lab
  • Configure Backup Automation
  • Configure Backup Automation Lab

Module 5: Restore Databases

  • Perform Piecemeal Restores
  • Restore Databases Lab Part 1
  • Restore Databases Lab Part 2
  • Restore Databases Lab Part 3
  • Perform Page Recovery
  • Perform Point-in-Time Recovery
  • Perform Point-in-Time Recovery Lab
  • Restore File Groups
  • Develop a Plan to Automate and Test Restores

Module 6: Manage Database Integrity

  • Implement Database Consistency Checks
  • Implement Database Consistency Checks Lab
  • Identify Database Corruption
  • Recover From Database Corruption

Module 7: Monitor Database Activity

  • Monitor Current Sessions
  • Monitor Current Sessions Lab
  • Identify Sessions that Cause Blocking Activity
  • Identify Sessions that Consume tempdb Resources
  • Configure the Data Collector

Module 8: Monitor Queries

  • Manage the Query Store
  • Manage the Query Store Lab
  • Configure Extended Events and Trace Events
  • Identify Problematic Execution Plans

Module 9: Manage Indexes

  • Identify and Repair Index Fragmentation
  • Identify and Create Missing Indexes
  • Identify and Drop Underutilized Indexes
  • Manage Existing Columnstore Indexes Part 1
  • Manage Existing Columnstore Indexes Part 2
  • Partitioned Tables

Module 10: Monitor SQL Server Instances

  • Create and Manage Operators
  • Create and Manage SQL Agent Alerts
  • Configure Policy-Based Management
  • Configure Policy-Based Management Lab
  • Identify Available Space on Data Volumes
  • Identify the Cause of- Manage Performance Degradation
  • Identify the Cause of- Manage Performance Degradation Lab Part 1
  • Identify the Cause of- Manage Performance Degradation Lab Part 2

Module 11: Implement Log Shipping

  • Configure and Monitor Log Shipping
  • Configure and Monitor Log Shipping Lab Part 1
  • Configure and Monitor Log Shipping Lab Part 2

Module 12: Implement Failover Cluster Instances

  • Windows Server Failover Cluster
  • Manage Shared Disks
  • Configure Cluster Shared Volumes
  • Configuring WSFC Lab

Module 13: Implement Always On Availability Groups

  • Database Mirroring
  • Create an Availability Group
  • Manage Failover
  • Configure Read-Only Routing
  • Create Distributed Availability Groups
  • Configuring Always On Availability Group Lab Part 1
  • Configuring Always On Availability Group Lab Part 2
  • Conclusion

Module 1: Installing and Configuring Domain Controllers

  • Introduction
  • Overview of Identity Management Concepts Part 1
  • Overview of Identity Management Concepts Part 2
  • Active Directory Domain Services Components Part 1
  • Active Directory Domain Services Components Part 2
  • Active Directory Domain Services Components Part 3
  • Overview of ADDS Domain Services Part 1
  • Overview of ADDS Domain Services Part 2
  • Deploying Domain Controllers Part 1
  • Deploying Domain Controllers Part 2
  • Deploying Domain Controllers Part 3

Module 2: Managing AD DS Objects

  • Overview of Object Management Part 1
  • Overview of Object Management Part 2
  • Managing User Accounts Part 1
  • Managing User Accounts Part 2
  • Managing User Accounts Part 3
  • Managing User Accounts Part 4
  • Managing User Accounts Part 5
  • Managing Groups Part 1
  • Managing Groups Part 2
  • Managing Groups Part 3
  • Managing Computer Accounts Part 1
  • Managing Computer Accounts Part 2
  • Managing Organizational Units Part 1
  • Managing Organizational Units Part 2

Module 3: Securing Active Directory Domain Services

  • Managing Organizational Units Part 1
  • Managing Organizational Units Part 2
  • Implementing Account Security Part 1
  • Implementing Account Security Part 2
  • Auditing AD DS
  • Configuring Managed Service Accounts

Module 4: Working with Complex AD Infrastructures

  • Overview of Advanced AD DS Deployments
  • Deploying a Distributed AD DS Environment Part 1
  • Deploying a Distributed AD DS Environment Part 2
  • Deploying a Distributed AD DS Environment Part 3
  • Overview of AD DS Replication
  • Configuring AD DS Services Part 1
  • Configuring AD DS Services Part 2
  • Configuring AD DS Services Part 3

Module 5: Implementing Group Policy

  • Overview of Group Policy Part 1
  • Overview of Group Policy Part 2
  • Overview of Group Policy Part 3
  • Creating and Configuring GPOs Part 1
  • Creating and Configuring GPOs Part 2
  • Monitoring and Troubleshooting Group Policy
  • Managing Security Options for Computers using Group Policy Part 1
  • Managing Security Options for Computers using Group Policy Part 2
  • Managing User Environments Part 1
  • Managing User Environments Part 2
  • Managing User Environments Part 3

Module 6: Understanding Microsoft Azure AD and Directory Synchronization

  • Planning Directory Synchronization Part 1
  • Planning Directory Synchronization Part 2
  • Implementing Azure AD Connect Part 1
  • Implementing Azure AD Connect Part 2
  • Managing Identities with Directory Synchronization

Module 7: Monitoring and Recovering AD DS

  • Monitoring AD DS Part 1
  • Monitoring AD DS Part 2
  • Monitoring AD DS Part 3
  • Database Management
  • Backup and Recovery in AD DS Part 1
  • Backup and Recovery in AD DS Part 2

Module 8: Implementing Active Directory Certificate Services

  • Overview of Public Key Infrastructure and AD CS Part 1
  • Overview of Public Key Infrastructure and AD CS Part 2
  • Deploying Certificate Authority Hierarchy
  • Administering Certificate Authorities
  • Deploying and Managing Certificates Part 1
  • Deploying and Managing Certificates Part 2
  • Managing Revocation and Distribution
  • Configuring Certificate Recovery

Module 9: Implementing Active Directory Federation Services

  • Overview of AD FS
  • Planning and Deploying AD FS
  • Overview of Web Application Proxy
  • Module 10: Implementing Active Directory Rights Management Services
  • Overview of AD RMS
  • Deploying AD RMS
  • Protecting with AD RMS
  • Conclusi

Module 1 Introducing Windows Server 2016

  • Module 1 Notes
  • 1. Windows Server 2016 Fundamentals Intro
  • 2. Mod 1 Introducing Windows Server 2016
  • 3. Mod 1a Introducing Windows Server 2016

Module 2 Managing Windows Server 2016

  • Module 2 Notes
  • 4. Mod 2 Managing Windows Server 2016
  • 5. Mod 2a Managing Windows Server 2016

Module 3 Managing Storage

  • Module 3 Notes
  • 6. Mod 3 Managing Storage
  • 7. Mod 3a Managing Storage

Module 4 Monitoring and Troubleshooting Servers

  • Module 4 Notes
  • 8. Mod 4 Monitoring and Troubleshooting Servers
  • 9. Mod 4a Monitoring and Troubleshooting Servers

Module 5 Essential Services

  • Module 5 Notes
  • 10. Mod 5 Essential Services
  • 11. Mod 5a Essential Services

Module 6 Understanding File and Print Services

  • Module 6 Notes
  • 12. Mod 6 Understanding File and Print Services

Module 7 Windows Network Services and Applications

  • Module 7 Notes
  • 13. Mod 7 Windows Network Services and Applications-
  • 14. Mod 7a Windows Network Services and Applications-

Mod 8 Key Takeaways

  • Key Takeaway Notes
  • 15. Key takeaways Intro
  • 16. Key takeaways – Module 1 Introducing Windows Server 2016
  • 17. Key takeaways – Module 2 Managing Windows Server 2016
  • 18 Key takeaways – Module 3 Storing Data in Windows Server 2016
  • 19. Key takeaways – Module 4 Monitoring and Troubleshooting Servers
  • 20. Key takeaways – Module 5 Essential Services
  • 21. Key takeaways – Module 6 Understanding File and Print Services
  • 22. Key takeaways – Module 7 Windows Network Services and Applications

Mod 9 Terms to Know

  • Terms to Know Notes
  • 23. Terms to Know Intro
  • 24. Terms to Know – Module 1 Introducing Windows Server 2016
  • 25. Terms to Know – Module 2 Managing Windows Server 2016
  • 26 Terms to Know – Module 3 Storing Data in Windows Server 2016
  • 27. Terms to Know – Module 4 Monitoring and Troubleshooting Servers
  • 28. Terms to Know – Module 5 Essential Services
  • 29. Terms to Know – Module 6 Understanding File and Print Services
  • 30. Terms to Know – Module 7 Windows Network Services and Applications

Mod 10 Hands on Labs

  • Hands on Labs Setup Notes
  • 01 MTA 98-365 Windows Server 2016 Administration Fundamentals Lab setup
  • 02 Step by Step Install VMware Player 15 in Windows 10 1
  • 03 Installing and Configuring DC1 Virtual Machine
  • 04 Installing and Configuring SRV-1 Virtual Machine
  • 05 Installing and Configuring Client 1 Virtual Machine
  • 06 Installing and Configuring the Router Virtual Machine
  • 07 Creating and Configuring SRV-2 Virtual Machine
  • 08 Working with Windows Server 2016 Desktop Experience
  • 09 Managing Organizational Units and Groups in AD DS

Module 1: Installing Windows Server 2016 in Host and Compute Environments

  • Course Introduction
  • Determining Windows Server 2016-Part1
  • Determining Windows Server 2016-Part2
  • Determining Windows Server 2016-Part3
  • Determining Windows Server 2016-Part4
  • Determining Windows Server 2016-Part5
  • Installing Windows 2016-Part1
  • Installing Windows 2016-Part2
  • Installing Windows 2016-Part3
  • Installing Windows 2016-Part4
  • Installing Windows 2016-Part5
  • Managing Windows Installation With Windows PowerShell
  • Creating Managing And Maintaining Windows Images For Deployment-Part1
  • Creating Managing And Maintaining Windows Images For Deployment-Part2
  • Creating Managing And Maintaining Windows Images For Deployment-Part3
  • Creating Managing And Maintaining Windows Images For Deployment-Part4

Module 2: Configuring Active Directory Networks for Host and Compute Environments

  • Overview Of Active Directory Domain Services-Part1
  • Overview Of Active Directory Domain Services-Part2
  • Overview Of Active Directory Domain Services-Part3
  • Overview Of ADDS Domain Controllers-Part1
  • Overview Of ADDS Domain Controllers-Part2
  • Deploying Domain Controllers-Part1
  • Deploying Domain Controllers-Part2
  • Overview Of Group Policy Purpose Components And Processes-Part1
  • Overview Of Group Policy Purpose Components And Processes-Part2
  • Overview Of Group Policy Purpose Components And Processes-Part3
  • Creating And Configuring GPOs-Part1
  • Creating And Configuring GPOs-Part2
  • Security Management Using Group Policy-Part1
  • Security Management Using Group Policy-Part2
  • Security Management Using Group Policy-Part3

Module 3: Implementing Local and Enterprise Storage Solutions

  • Managing Disk And Volumes In Windows Server 2016-Part1
  • Managing Disk And Volumes In Windows Server 2016-Part2
  • Managing Disk And Volumes In Windows Server 2016-Part3
  • Managing Disk And Volumes In Windows Server 2016-Part4
  • Implementing And Managing Storage Spaces-Part1
  • Implementing And Managing Storage Spaces-Part2
  • Implementing And Managing Storage Spaces-Part3
  • Configuring Data Duplication-Part1
  • Configuring Data Duplication-Part2
  • Understanding Various Types Of Storage
  • Comparing SAN Options-Part1
  • Comparing SAN Options-Part2
  • Understanding ISNS DCB And MPIO
  • Configuring File And Folder Sharing In Windows Server-Part1
  • Configuring File And Folder Sharing In Windows Server-Part2
  • Configuring File And Folder Sharing In Windows Server-Part3
  • Configuring Advanced File Services With FSRM-Part1
  • Configuring Advanced File Services With FSRM-Part2
  • Configuring Advanced File Services With FSRM-Part3

Module 4: Implementing Hyper-V Virtualization and Containers

  • Installing Hyper-V Virtualization
  • Configuring Storage And Networking In Hyper-VHosts-Part1
  • Configuring Storage And Networking In Hyper-VHosts-Part2
  • Configuring And Managing Virtual Machines-Part1
  • Configuring And Managing Virtual Machines-Part2
  • Understanding Windows Server And Hyper-VContainers
  • Deploying Windows Server And Hyper-VContainers
  • Using Docker To Install Configure And Manage Containers

Module 5: Implementing High Availability

  • Overview Of High Availability And Disaster Recovery-Part1
  • Overview Of High Availability And Disaster Recovery-Part2
  • Implementing Network Load Balancing-Part1
  • Implementing Network Load Balancing-Part2
  • Planning And Configuring Failover Clustering-Part1
  • Planning And Configuring Failover Clustering-Part2
  • Planning And Configuring Failover Clustering-Part3
  • Managing A Failover Cluster
  • Integrating Failover Clustering And Hyper-V-Part1
  • Integrating Failover Clustering And Hyper-V-Part2
  • Configuring Site Availability

Module 6: Maintaining and Monitoring Windows Server 2016

  • Windows Server Update Services-Part1
  • Windows Server Update Services-Part2
  • Windows PowerShell Desired State Configuration
  • Windows Server 2016 Monitoring Tools-Part1
  • Windows Server 2016 Monitoring Tools-Part2
  • Conclusion

Module 1: Plan and Implement IPv4 and IPv6 Networks

  • Introduction
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 1
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 2
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 3
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 4
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 5
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 6
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 7
  • Configuring IPv4 Hosts Part 1
  • Configuring IPv4 Hosts Part 2
  • Managing and Troubleshooting IPv4 Connectivity Part 1
  • Managing and Troubleshooting IPv4 Connectivity Part 2
  • Managing and Troubleshooting IPv4 Connectivity Part 3
  • Implementing IPV6 for Network Hosts Part 1
  • Implementing IPV6 for Network Hosts Part 2
  • Implementing IPV6 for Network Hosts Part 3
  • Implementing IPv6 Transitioning and Coexistence

Module 2: Installing and Configuring DHCP

  • Overview of DHCP Server Role Part 1
  • Overview of DHCP Server Role Part 2
  • Deploying DHCP Part 1
  • Deploying DHCP Part 2
  • Deploying DHCP Part 3
  • Deploying DHCP Part 4
  • Deploying DHCP Part 5
  • Managing and Troubleshooting DHCP Part 1
  • Managing and Troubleshooting DHCP Part 2
  • Managing and Troubleshooting DHCP Part 3
  • Managing and Troubleshooting DHCP Part 4
  • Managing and Troubleshooting DHCP Part 5

Module 3: Installing and Configuring DNS

  • Implementing DNS Servers Part 1
  • Implementing DNS Servers Part 2
  • Implementing DNS Servers Part 3
  • Creating and Configuring DNS Zones Part 1
  • Creating and Configuring DNS Zones Part 2
  • Creating and Configuring DNS Zones Part 3
  • Creating and Configuring DNS Zones Part 4
  • Understanding Active Directory Integration Part 1
  • Configuring Advanced DNS Settings Part 1
  • Configuring Advanced DNS Settings Part 2
  • Configuring Advanced DNS Settings Part 3
  • Troubleshooting DNS Name Resolution Part 1
  • Troubleshooting DNS Name Resolution Part 2

Module 4: Implementing and Managing IP Address Management

  • Overview of IPAM Part 1
  • Overview of IPAM Part 2
  • IPAM Deployment and Administration Part 1
  • IPAM Deployment and Administration Part 2
  • IPAM Deployment and Administration Part 3
  • Managing IP Address Spaces by Using IPAM

Module 5: Implementing Remote Access

  • Remote Access Overview Part 1
  • Remote Access Overview Part 2
  • Remote Access Overview Part 3
  • Implementing the Web Application Proxy
  • Planning and Implementing Virtual Private Networks Part 1
  • Planning and Implementing Virtual Private Networks Part 2
  • Planning and Implementing Virtual Private Networks Part 3
  • Planning and Implementing Virtual Private Networks Part 4
  • Planning and Implementing Virtual Private Networks Part 5
  • Overview of Direct Access Part 1
  • Overview of Direct Access Part 2
  • Implementing Direct Access Part 1
  • Implementing Direct Access Part 2
  • Implementing Direct Access Part 3

Module 6: Securing the Network Infrastructure

  • Using the Windows Firewall with Advanced Security Part 1
  • Using the Windows Firewall with Advanced Security Part 2
  • Utilizing IP Security Part 1
  • Utilizing IP Security Part 2
  • Conclusion

Module 1: Plan and Implement IPv4 and IPv6 Networks

  • Introduction
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 1
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 2
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 3
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 4
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 5
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 6
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 7
  • Configuring IPv4 Hosts Part 1
  • Configuring IPv4 Hosts Part 2
  • Managing and Troubleshooting IPv4 Connectivity Part 1
  • Managing and Troubleshooting IPv4 Connectivity Part 2
  • Managing and Troubleshooting IPv4 Connectivity Part 3
  • Implementing IPV6 for Network Hosts Part 1
  • Implementing IPV6 for Network Hosts Part 2
  • Implementing IPV6 for Network Hosts Part 3
  • Implementing IPv6 Transitioning and Coexistence

Module 2: Installing and Configuring DHCP

  • Overview of DHCP Server Role Part 1
  • Overview of DHCP Server Role Part 2
  • Deploying DHCP Part 1
  • Deploying DHCP Part 2
  • Deploying DHCP Part 3
  • Deploying DHCP Part 4
  • Deploying DHCP Part 5
  • Managing and Troubleshooting DHCP Part 1
  • Managing and Troubleshooting DHCP Part 2
  • Managing and Troubleshooting DHCP Part 3
  • Managing and Troubleshooting DHCP Part 4
  • Managing and Troubleshooting DHCP Part 5

Module 3: Installing and Configuring DNS

  • Implementing DNS Servers Part 1
  • Implementing DNS Servers Part 2
  • Implementing DNS Servers Part 3
  • Creating and Configuring DNS Zones Part 1
  • Creating and Configuring DNS Zones Part 2
  • Creating and Configuring DNS Zones Part 3
  • Creating and Configuring DNS Zones Part 4
  • Understanding Active Directory Integration Part 1
  • Configuring Advanced DNS Settings Part 1
  • Configuring Advanced DNS Settings Part 2
  • Configuring Advanced DNS Settings Part 3
  • Troubleshooting DNS Name Resolution Part 1
  • Troubleshooting DNS Name Resolution Part 2

Module 4: Implementing and Managing IP Address Management

  • Overview of IPAM Part 1
  • Overview of IPAM Part 2
  • IPAM Deployment and Administration Part 1
  • IPAM Deployment and Administration Part 2
  • IPAM Deployment and Administration Part 3
  • Managing IP Address Spaces by Using IPAM

Module 5: Implementing Remote Access

  • Remote Access Overview Part 1
  • Remote Access Overview Part 2
  • Remote Access Overview Part 3
  • Implementing the Web Application Proxy
  • Planning and Implementing Virtual Private Networks Part 1
  • Planning and Implementing Virtual Private Networks Part 2
  • Planning and Implementing Virtual Private Networks Part 3
  • Planning and Implementing Virtual Private Networks Part 4
  • Planning and Implementing Virtual Private Networks Part 5
  • Overview of Direct Access Part 1
  • Overview of Direct Access Part 2
  • Implementing Direct Access Part 1
  • Implementing Direct Access Part 2
  • Implementing Direct Access Part 3

Module 6: Securing the Network Infrastructure

  • Using the Windows Firewall with Advanced Security Part 1
  • Using the Windows Firewall with Advanced Security Part 2
  • Utilizing IP Security Part 1
  • Utilizing IP Security Part 2
  • Conclusion

Module 1 : Prepare for installation requirements

  • Prep for Installation Windows 10
  • Clean Install or Upgrade Windows 10
  • Editions of Windows 10
  • What Features Do You Want
  • Installation Media
  • Looking at MS Application Compatibility Toolkit (ACT)

Module 2 : Install Windows

  • Installing Windows
  • Clean installation of Windows 10-Demo
  • Upgrade using Installation Media
  • Configure Native Boot and VHD
  • Migrating to Windows 10
  • Chp2 Booting from VHD
  • Creating a VHD-Demo
  • Installing Windows 10 to a VHD-Demo
  • Installing on Bootable USB
  • Using USMT User State Migration Tool-Demo
  • Additional Windows Features
  • Create an MBR-Partitioned VHD-Demo
  • Additional Regional and Language Support
  • Putting Win 10 on a VHD with DISM-Demo

Module 3 : Configure devices and device drivers

  • Configure Devices and Device Drivers
  • Resolve Driver Issues
  • Configuring Driver Settings
  • Manage Driver Packages
  • Download and Import Driver Packages
  • Using DISM
  • Installing o Updating Drivers using Device Manager-Demo
  • Roll Back Drivers-Demo
  • Using Sigverif-Demo
  • More on Device Manager-Demo

Module 4 : Perform post-installation configuration

  • Perform Post Installation Configuration
  • Configure Accessibilty Options
  • Configure Cortana
  • Configure Microsoft Edge
  • Configure Internet Explorer
  • Configure Client Hyper-V
  • Configure Power Settings
  • Customizing the Start Menu-Demo
  • Start Tiles-Demo
  • Desktop Customization-Demo
  • Action Center and Notifications-Demo
  • Hyper V-Demo
  • Power Settings-Demo

Module 5 : Implement Windows in an enterprise environment

  • Implement Windows in an Enterprise Enviornment
  • Implementing Active Directory
  • Implement Volume Activation Using a Key Mgmt Service
  • Query and Configure Activation State using Command line
  • Configure Active Directory Including Group Policies
  • Configure and Optimize User Account Control UAC
  • Using Software Licensing Manager; slmgr.vbs -dli-Demo
  • Taking a look at UAC-Demo

Module 6 : Configure networking

  • Configuring Networking
  • Configuring Name Resolution
  • Connect to a Network
  • Configure Network Locations
  • Configure Windows Firewall
  • Configure Windows Firewall with Advance Security
  • Configure Network Discovery
  • Configuring Wi-Fi Settings
  • Troubleshoot Network Issues
  • Configure VPNs
  • Configure IPsec
  • Configure DirectAccess
  • Configure IP Addresses Manually-Demo
  • DNS Settings-Demo
  • Looking at Network Locations and where to make Chpanges-Demo
  • Windows Firewall – Basic Settings-Demo
  • Windows Firewall – Advanced Settings-Demo
  • Troubleshooting Tools-Demo
  • Create a VPN Connection-Demo

Module 7 : Configure storage

  • Configure Storage
  • Create and Configure VHD
  • Configure Removable Devices
  • Create and Configure Storage Spaces
  • Troubleshoot Storage and Removable Device Issue
  • Steps to create a simple volume-Demo
  • Create VHD with Hyper-V Manager-Demo
  • Create VHD with PowerShell-Demo
  • Bitlocker to Go-Demo

Module 8 : Configure data access and usage

  • Configure Data Access and Usage File-Printer
  • Configure File System Permissions
  • Configure File Share Public Folders and OneDrive
  • Configure OneDrive usage including Files On Demand
  • Troubleshoot Data Access and Usage
  • File Sharing-Demo
  • Printer Sharing-Demo
  • Set Printer Security-Demo
  • File system permissions-Demo
  • Public Folder Sharing-Demo
  • OneDrive-Demo
  • Storage Sense-Demo
  • Disk Quotas-Demo

Module 9 : Implement Apps

  • Implement Apps
  • Configure Startup Options
  • Configure Windows Features
  • Configure Windows Stores
  • Implementing Windows Store Apps
  • Implement Windows Store for Business and Education
  • Provison Packages
  • Create Packages
  • Chpange Default Apps-Demo
  • Application Startup Options-Demo
  • Looking at Windows Features-Demo
  • Windows Store-Demo
  • Windows Imaging and Configuration Designer Tool ICD-Demo

Module 10 : Configure remote management

  • Configuring Remote Management
  • Configure Remote Management Settings
  • Configure Remote Desktop
  • Configure Remote Assistance
  • Modifying Using MMC or PS
  • Configure Remote PowerShell
  • Remote Management Settings-Demo
  • Allow through Windows Firewall-Demo
  • Remote Desktop-Demo
  • Remote Assistance-Demo
  • Remote with MMC-Demo
  • Windows PowerShell Remoting-Demo

Module 11 : Configure Updates

  • Configure Update Windows 10
  • Manage Update History
  • Roll Back Updates
  • Implement Insider Preview CB CBB and LTSB
  • Update Windows Store Apps
  • Windows Update Options-Demo
  • Update History-Demo
  • Rolling Back Updates-Demo
  • Update Windows Store apps-Demo

Module 12 : Monitor Windows

  • Monitor Windows
  • Configure Event Subscriptions
  • Monitor Performance Using Task Manager
  • Monitor System
  • Monitor and Manage Printers
  • Monitor Performance Using Performance Monitor Data Collectors
  • Monitor and Manage Printers
  • Configure Indexing Options
  • Manage Client Security by Using Windows Defender
  • Evaluate System Stability by Using Reliaability Monitor
  • Troubleshoot Performance Issues
  • Manage Security Using Windows Defender Security Center
  • Configure Windows Defender Advanced Threat Detection
  • Event Viewer-Demo
  • Creating Event Subscriptions-Demo
  • Task Manager-Demo
  • Performance Monitor-Demo
  • Resource Monitor-Demo
  • Managing the Printers with Print Management-Demo
  • Indexing-Demo
  • Windows Defender-Demo
  • Reliability Monitor-Demo

Module 13 : Configure System and Data Recovery

  • Configure System and Data Recovery
  • Configure System Restore
  • Configure Restore Points
  • Peform a Refresh or Recycle
  • Restore Previous Versions of Files and Folders
  • Configure File History
  • Recover Files from OneDrive
  • Use Windows Backup and Restore
  • Perform a Backup and Restore with WBAdmin
  • Perform Recovery Operations Windows Recovery
  • Configure a Recovery Drive-Demo
  • Configure System Restore-Demo
  • Configure Restore Points-Demo
  • Performing a Refresh or Recycle-Demo
  • Configure File History-Demo
  • Use Windows Backup & Restore-Demo

Module 14 : Configure Authorization and Authentication

  • Configure Authorization and Authentication
  • Configure Pictures Passwords and Biometrics
  • Configure Workgroups
  • Configure Domain Settings
  • Configue Homegroup Settings
  • Configure Credential Manager
  • Configure Local Accounts
  • Configure Microsoft Accounts
  • Configure Device Registration
  • Configure Windows Hello for Business
  • Configure Device Guard
  • Credential Guard
  • Configure Device Health Attestation
  • Configure UAC Behavior
  • Configure Dynamic Look
  • Picture Passwords-Demo
  • Workgroups-Demo
  • Domains-Demo
  • Credential Manager-Demo
  • Configure Local Accounts-Demo
  • Dynamic Lock-Demo

Module 15 : Configure Advanced Management Tools

  • Configure Advanced Management Tools
  • Configure Device Manager
  • Configure and use the MMC
  • Configure Task Schedule
  • Configure Automation of Mgmt Task Using Windows PowerShell
  • Convert Group Policy Objects to MDM Policies using the MDM
  • Services-Demo
  • Using the MMC-Demo
  • Task Scheduler-Demo
  • Opening PowerShell and the Integrated Scripting Environment-Demo

Module 1: Introducing Windows 10

  • Course Introduction
  • What Makes Windows 10 Different
  • Overview Of Windows 10 Features
  • Navigating And Using Windows 10-Part 1
  • Navigating And Using Windows 10-Part 2

Module 2: Installing Windows 10

  • Preparing For Installation
  • Installation Options
  • Upgrading And Migrating-Part 1
  • Upgrading And Migrating-Part 2

Module 3: Configuring Devices

  • Overview Of Configuration Tools
  • Common Configuration Options
  • Managing User Accounts-Part 1
  • Managing User Accounts-Part 2
  • Using Control Panel
  • Using Windows Administration Tools-Part 1
  • Using Windows Administration Tools-Part 2
  • Using Windows PowerShell-Part 1
  • Using Windows PowerShell-Part 2

Module 4: Configuring Network Connectivity

  • TCP IP Network Connectivity-Part 1
  • TCP IP Network Connectivity-Part 2
  • TCP IP Network Connectivity-Part 3
  • Name Resolution
  • Wireless
  • Remote Access Overview-Part 1
  • Remote Access Overview-Part 2
  • Troubleshooting Connectivity

Module 5: Managing Storage, Data, And Printers

  • Managing Hard Disks-Part 1
  • Managing Hard Disks-Part 2
  • Managing Hard Disks-Part 3
  • Creating And Managing Storage Spaces
  • Overview Of Data Access
  • Configuring And Managing File Access
  • Managing Shared Folder
  • Understanding Work Folder
  • Managing Printers

Module 6: Managing Apps

  • Installing And Configuring Applications
  • Managing Apps From The Windows Store
  • Managing Microsoft Edge Web Browser

Module 7: Managing Device Security

  • Configuring Network Security-Part 1
  • Configuring Network Security-Part 2
  • Configuring Local Security
  • Configuring Data Security-Part 1
  • Configuring Data Security-Part 2
  • Configuring Device Security

Module 8: Maintaining Windows 10

  • Updating Windows 10
  • Monitoring And Optimizing Windows 10-Part 1
  • Monitoring And Optimizing Windows 10-Part 2

Module 9: Troubleshooting And Recovery

  • Managing Devices And Drives
  • Recovery Files
  • Recovering Devices

Module 10: Deploying Windows 10 Enterprise Desktops

  • Overview Of Image Based Deployment
  • Automating Installations
  • Windows Activation

Module 11: Managing User Profiles And User State Virtualization

  • Managing User Profiles-Part 1
  • Managing User Profiles-Part 2
  • User State Virtualization
  • User Profile Migration

Module 12: Managing Desktop And Application Settings Using Group policy

  • Using Group Policy To Manage Windows 10 Devices Part 1
  • Using Group Policy To Manage Windows 10 Devices-Part 2
  • Using Group Policy To Manage Windows 10 Devices-Part 3
  • Using Group Policy To Manage Windows 10 Devices-Part 4
  • Using Group Policy To Manage Applications-Part 1
  • Using Group Policy To Manage Applications-Part 2

Module 13: Configuring And Managing Client Hyper-V

  • Introduction To Client Hyper-V
  • Creating Virtual Machines
  • Managing Virtual Machine Storage And Snapshot
  • Conclusion

Module 14: Configuring Windows Devices – December, 2017 Update – Part1

  • 1. Intro to Windows 10 Update 70-697-1D
  • 2. Mod 1 Win 10 Update
  • 3. Mod 1 Installing Windows 10
  • 4. Mod 1 Examining Windows 10 Act
  • 5. Mod 3 Configuring Devices
  • 6. Mod 3 Examining GPOs Act
  • 7. Mod 3.3 Display Options
  • 8. Mod 3 Examining One Drive Act
  • 9. Mod 4 Configuring Network Connectivity
  • 10. Mod 4 Powershell Networking Commands Act
  • 11. Mod 4.1 Network Mgmt Tools
  • 12. Mod 4.1 Command Prompt Networkiing Tools Act
  • 13. Mod 4.1 Network Mgmt Tools Part2
  • 14. Mod 4.2 DNS
  • 15. Mod 4.2 Name Resolution Act
  • 16. Mod 4.3 Direct Access
  • 17. Mod 5 Managing Storage
  • 18. Mod 5 Server Based Storage
  • 19. Mod 5 Storage Act
  • 20. Mod 5.5 Diskpart
  • 21. Mod 5.6 Powershell Disk Mgmt
  • 22. Mod 5.7 Storage Mgmt
  • 23. Mod 5 Storage Mgmt Act
  • 24. Mod 6 Managing Files and Printers
  • 25. Mod 6 CMD and PS Files System Commands Act
  • 26. Mod 6.2 Permissions Inheritance
  • 27. Mod 6.2 NTFS and Sharing Permissions Act
  • 28. Mod 6.3 Type 4 Printer Drivers
  • 29. Mod 6 Printing Mgmt Act
  • 30. Mod 7 Managing Apps
  • 31. Mod 7 Internet Explorer 11 Act
  • 32. Mod 8 Managing Device Security
  • 33. Mod 8.1 Security Compliance Toolkit
  • 34. Mod 9 Maintaining Windows 10
  • 35. Mod 9 Windows Update Settings Act
  • 36. Mod 10 Startup and Recovery
  • 37. Mod 10 Startup and Recovery settings Act
  • 38. Mod 11 Additional Skills
  • Windows Intro Update 70-697-2C

Module 15: Configuring Windows Devices – December, 2017 Update – Part2

  • 1. Mod 1 Developing Mgmt Win 10
  • 2. Mod 1 Windows Defender Act
  • 3. Mod 1.1 Developing Part2
  • 4. Mod 1 Applocker Act2
  • 5. Mod1.2 Managing a Mobile Workforce
  • 6. Mod 1 Remote Access Act2
  • 7. Mod 1.2 Managing a Mobile Workforce Part2
  • 8. Mod 1.3 Overview
  • 9. Mod 1 Microsoft Azure Act2
  • 10. Mod 2 Managing Win 10 Sign-in
  • 11. Mod 2 Microsoft Account Act2
  • 12. Mod 2.2 Overview of Azure AD
  • 13. Mod 2 Microsoft Azure AD Act2
  • 14. Mod 3 Managing User Profiles and User
  • 15. Mod 4 Managing Desktop and Apps
  • 16. Mod 5 Managing Devices in MS365
  • 17. Mod 5 Office 365 Act2
  • 18. Mod 6 Managing PCs Devices using Intune
  • 19. Mod 6 Intune Act2
  • 20. Mod 6.3 Intune App Mgmt
  • 21. Mod 6.4 Working with WIP
  • 22. Mod 7 Configuring and Using MS Store
  • 23. Mod 7 Microsoft Store for Business Act2
  • 24. Mod 7.2 Deploy Win 10 Auto-pilot
  • 25. Mod 8 Managing Data Access Windows
  • 26. Mod 8.4 Publishing and Using RemoteApp
  • 27. Mod 9 Configuring and Managing Client Hyper-V
  • 28. Mod 10 Additional Skills
  • 29. Outro to Windows 10 Update 70-697

Module 1: Introduction

  • Intro To Exam 70-688
  • Implementing A Methodology For Troubleshooting-Part1
  • Implementing A Methodology For Troubleshooting-Part2
  • Implementing A Methodology For Troubleshooting-Demo

Module 2: Troubleshooting Start Up Issues

  • Troubleshooting Start Up Issues-Part1
  • Troubleshooting Start Up Issues-Part2
  • Troubleshooting Start Up Issues-Part3
  • Troubleshooting Start Up Issues-Part4
  • Troubleshooting Start Up Issues-Demo

Module 3: ​Managing Drivers And Hardware

  • Managing Drivers And Hardware-Part1
  • Managing Drivers And Hardware-Part2
  • Managing Drivers And Hardware-Part3
  • Managing Drivers And Hardware-Demo

Module 4: Troubleshooting Remote Computers

  • Troubleshooting Remote Computers-Part1
  • Troubleshooting Remote Computers-Part2
  • Troubleshooting Remote Computers-Part3

Module 5: Resolving Problems With Network Connectivity

  • Resolving Problems With Network Connectivity-Part1
  • Resolving Problems With Network Connectivity-Part2
  • Resolving Problems With Network Connectivity-Part3
  • Resolving Problems With Network Connectivity-Part4
  • Resolving Problems With Network Connectivity-Part5

Module 6: Troubleshooting Group Policy

  • Troubleshooting Group Policy-Part1
  • Troubleshooting Group Policy-Part2
  • Troubleshooting Group Policy-Part3
  • Troubleshooting Group Policy-Part4

Module 7: Troubleshooting User Settings

  • Troubleshooting User Settings-Part1
  • Troubleshooting User Settings-Part2
  • Troubleshooting User Settings-Part3

Module 8: Configuring And Troubleshooting Remote Connectivity

  • Configuring And Troubleshooting Remote Connectivity-Part1
  • Configuring And Troubleshooting Remote Connectivity-Part2
  • Configuring And Troubleshooting Remote Connectivity-Part3
  • Configuring And Troubleshooting Remote Connectivity Demo-Part1
  • Configuring And Troubleshooting Remote Connectivity Demo-Part2
  • Configuring And Troubleshooting Remote Connectivity Demo-Part3

Module 9: ​Troubleshooting Resource Access In A Domain

  • Troubleshooting Resource Access In A Domain-Part1
  • Troubleshooting Resource Access In A Domain-Part2
  • Troubleshooting Resource Access In A Domain-Part3
  • Troubleshooting Resource Access In A Domain-Demo

Module 10: Configuring And Troubleshooting Resource Access For Non-Domain Members

  • Configuring And Troubleshooting Resource Access For Non-Domain Members-Part1
  • Configuring And Troubleshooting Resource Access For Non-Domain Members-Part2
  • Configuring And Troubleshooting Resource Access For Non-Domain Members-Part3
  • Configuring And Troubleshooting Resource Access For Non-Domain Members-Demo

Module 11: Troubleshooting Applications

  • Troubleshooting Applications-Part1
  • Troubleshooting Applications-Part2
  • Troubleshooting Applications-Part3
  • Troubleshooting Applications-Part4
  • Troubleshooting Applications-Demo

Module 12: Maintaining Windows 8.1

  • Maintaining Windows 8.1-Part1
  • Maintaining Windows 8.1-Part2
  • Maintaining Windows 8.1-Part3
  • Maintaining Windows 8.1-Part4
  • Maintaining Windows 8.1-Demo

Module 13: Recovering Windows 8.1

  • Recovering Windows 8.1
  • Conclusion

Module 1: Technology Review

  • Introduction
  • Active Directory Install And Configure
  • PowerShell Primer
  • Microsoft Exchange Server Install And Configure – Part 1
  • Microsoft Exchange Server Install And Configure – Part 2
  • Review Cloud Computing – Part 1
  • Review Cloud Computing – Part 2
  • Review Virtualization And The Cloud – Part 1
  • Review Virtualization And The Cloud – Part 2
  • Review Virtualization And The Cloud – Part 3

Module 2: Device Management

  • Client Devices
  • Demo Client Device Setup – Part 1
  • Demo Client Device Setup – Part 2
  • Office 365 Client Deployment
  • Office 365 Components
  • Office 365 Deployment Methods
  • Office 365 Cloud Deployment Methods
  • Office 365 Deployment Prerequisites
  • Office 365 Deployment Readiness
  • Office 365 Deployment Network Environment

Module 3: Office 365 Deployment Plan

  • Network Planning
  • Internet Network Usage Planning
  • Network Device Planning
  • Account Management Planning – Part 1
  • Account Management Planning – Part 2
  • Migration And Coexistence Options
  • Single Sign On Architecture
  • Demo Server 2012 Core With Active Directory Role

Module 4: Windows Azure

  • SharePoint 2013 Using Windows Azure – Part 1
  • SharePoint 2013 Using Windows Azure – Part 2
  • SharePoint 2013 Capabilities

Module 5: PowerShell

  • Scripting And PowerShell – Part 1
  • Scripting And PowerShell – Part 2
  • PowerShell Scripting Techniques – Part 1
  • PowerShell Scripting Techniques – Part 2
  • Enterprise Ready Scripts – Part 1
  • Enterprise Ready Scripts – Part 2
  • PowerShell Scripting Syntax – Part 1
  • PowerShell Scripting Syntax – Part 2
  • PowerShell Scripting Active Directory – Part 1
  • PowerShell Scripting Active Directory – Part 2
  • PowerShell Remoting
  • PowerShell Adding Bulk Users In AD

Module 6: SQL Server

  • Introduction To SQL Queries
  • SQL Queries – Part 1
  • SQL Queries – Part 2
  • DML And DDL – Part 1
  • DML And DDL – Part 2
  • DDL
  • SQL Server And PowerShell
  • SQL Server PowerShell And AD
  • Logging Data In SQL Server Using PowerShell

Module 7: Azure Lync and SharePoint

  • Azure Active Directory Fundamentals – Part 1
  • Azure Active Directory Fundamentals – Part 2
  • Deploying Lync Server – Part 1
  • Deploying Lync Server – Part 2
  • Deploying Lync Server – Part 3
  • SharePoint Designer
  • Backup And Restore Share Point
  • Windows PowerShell And SharePoint
  • Identity Service With Active Directory
  • Setup And Deploy Exchange

Module 8: Course Review

  • Review Virtualization
  • Review Cloud
  • Review Automation Using PowerShell
  • Review Desktop Applications
  • Move To Office 365
  • Conclusion

Module 1: Designing For The Cloud

  • Introduction
  • Designing The Cloud
  • Reason For Using The Cloud
  • Choosing The Right Cloud Model
  • Designing Private Clouds
  • Overview Of Virtualization Components
  • Windows Server 2012 R2 And Hyper-V
  • System Center 2012 R2 – Part 1
  • System Center 2012 R2 – Part 2
  • Deploying Highly Available Hyper-V Hosts

Module 2: Using System Center Virtual Machine Manager R2

  • Overview Of Virtual Machine – Part 1
  • Overview Of Virtual Machine – Part 2
  • Deploying VMM
  • Configuring Role Based Access Control
  • Managing Hosts
  • Configuring Networking – Part 1
  • Configuring Networking – Part 2
  • Configuring Storage

Module 3: Deploying And Maintaining Fabric Resources

  • Extending And Maintaining The Cloud Infrastructure
  • Deploying Hyper-V Host Servers – Part 1
  • Deploying Hyper-V Host Servers – Part 2
  • Providing Patch Management For Fabric Resources – Part 1
  • Providing Patch Management For Fabric Resources – Part 2

Module 4: Building The Private Cloud

  • Creating Building Blocks For The Private Cloud – Part 1
  • Creating Building Blocks For The Private Cloud – Part 2
  • Creating Virtual Machine Templates
  • Creating A Private Cloud
  • Creating And Deploying Applications – Part 1
  • Creating And Deploying Applications – Part 2
  • Creating And Deploying Applications – Part 3
  • Creating And Configuring Services – Part 1
  • Creating And Configuring Services – Part 2
  • Configuring Access To The Private Cloud

Module 5: Monitoring And Optimizing The Private Cloud

  • Overview Of Operations Manager
  • Installing Operations Manager
  • Deploying Monitoring Agents
  • Configuring Access To Operations Manager
  • Creating And Configuring Management Packs
  • Configuring System Center Integration
  • Extending And Optimizing Monitoring – Part 1
  • Extending And Optimizing Monitoring – Part 2

Module 6: Planning And Deploying Service Management

  • Overview Of Service Manager
  • Deploying Service Manager
  • Service Manager Work Items – Part 1
  • Service Manager Work Items – Part 2
  • Service Manager Work Items – Part 3
  • Service Manager Notifications
  • System Center Integration – Part 1
  • System Center Integration – Part 2

Module 7: Automating And Standardizing The Private Cloud

  • Overview Of Orchestrator
  • Deploying Automation Using Orchestrator
  • Configuring Integration Packs
  • Configuring And Managing Runbooks

Module 8: Disaster Recovery And High Availability For The Private Cloud

  • Overview Of Data Protection Manager
  • Planning For Data Protection Manager
  • Deploying Data Protection Manager
  • Configuring Protection For The Private Cloud
  • Configuring Protection For Applications – Part 1
  • Configuring Protection For Applications – Part 2
  • Hyper-V Recovery Manager

Module 9: Implementing Self­Service Multi­Tenant Private Clouds

  • Implementing The Cloud Services Process Pack – Part 1
  • Implementing The Cloud Services Process Pack – Part 2
  • Service Provider Foundation
  • Configuring The Windows Azure Pack
  • Conclusion

Module 1: Introducing The Cloud Model

  • Course And Instructor Introduction
  • Overview Of Cloud Computing
  • Dissecting Hybrid Cloud Environments
  • Requirements For Cloud Implementation
  • Using System Center To Operate The Cloud – Part 1
  • Using System Center To Operate The Cloud – Part 2
  • Using System Center To Operate The Cloud – Part 3
  • Ongoing Cloud Maintenance
  • System Center Component Integration
  • Verifying The Cloud Infrastructure Demo

Module 2: Configuring The Private Cloud Environment

  • Overview Of Virtual Machine Manager
  • Managing Virtual Environments
  • Creating Private Cloud
  • Configuring And Optimizing The Private Cloud

Module 3: Deploying Services For The Private Cloud

  • Understanding Service Templates
  • Configuring Profiles – Part 1
  • Configuring Profiles – Part 2
  • Using Web Deploy Packages
  • Configuring Server App-V
  • Using Data Tier Applications
  • Using App Controller To Deploy Services
  • Deploying Cloud Services Demo

Module 4: Monitoring Cloud Based Applications

  • Overview Of Operations Manager
  • Deploying Monitoring Agents
  • Customizing Monitoring Solutions
  • Monitoring The Network Infrastructure
  • Distributed Application Monitoring
  • Application Performance Monitoring – Part 1
  • Application Performance Monitoring – Part 2
  • Application Performance Monitoring – Part 3
  • Application Performance Monitoring – Part 4
  • Application Performance Monitoring – Part 5

Module 5: Service Management For The New Cloud

  • Configuring Service Manager – Part 1
  • Configuring Service Manager – Part 2
  • Configuring Service Manager – Part 3
  • Configuring Service Manager – Part 4
  • Automating Service Management – Part 1
  • Automating Service Management – Part 2
  • Automating Service Management – Part 3
  • Managing Incidents And Problems

Module 6: High Availability And Disaster Recovery For The Private Cloud

  • High Availability For The Private Cloud – Part 1
  • High Availability For The Private Cloud – Part 2
  • High Availability For The Private Cloud – Part 3
  • High Availability For The Private Cloud – Part 4
  • Protecting Data In The Private Cloud – Part 1
  • Protecting Data In The Private Cloud – Part 2
  • Recovering Data In The Private Cloud – Part 1
  • Recovering Data In The Private Cloud – Part 2

Module 7: Optimizing The Private Cloud Infrastructure

  • Applying Infrastructure Updates
  • Applying Updates To Virtual Machines
  • Extending The Private Cloud Infrastructure
  • Optimizing The Cloud Infrastructure With System Center Advisor
  • Using PRO-Tips To Optimize The Cloud

Module 8: Configuring Multi­Tenant Self­Service Using Windows Azure Pack

  • Understanding Windows Azure Pack
  • Windows Azure Pack Administration
  • Windows Azure Pack Providers

Module 9: Configuring And Monitoring The Private Cloud Review

  • Configuring And Monitoring The Private Cloud Review
  • Conclusion

Module 1: Planning Configuration Manager Infrastructure

  • Intro
  • Planning Configuration Manager Infrastructure – Part 1
  • Planning Configuration Manager Infrastructure – Part 2
  • Planning Configuration Manager Infrastructure – Part 3
  • Planning Configuration Manager Infrastructure – Part 4
  • Planning Configuration Manager Infrastructure – Part 5

Module 2: Migrating To Configuration Manager 2012

  • Migrating To Configuration Manager 2012

Module 3: Installations and Site Role Configuration

  • Installation And Site Role Configuration – Part 1
  • Installation And Site Role Configuration – Part 2
  • Installation And Site Role Configuration – Lab 1
  • Installation And Site Role Configuration – Lab 2

Module 4: Cloud Integration

  • Cloud Integration

Module 5: Installing The Client

  • Installing The Client – Part 1
  • Installing The Client – Part 2
  • Installing The Client – Part 3
  • Installing The Client Lab

Module 6: Client Health

  • Client Health

Module 7: Application Deployment

  • Application Deployment
  • Application Deployment Lab

Module 8: Software Updates

  • Software Updates – Part 1
  • Software Updates – Part 2
  • Software Updates Lab

Module 9: Operating System Deployment

  • Operating System Deployment – Part 1
  • Operating System Deployment – Part 2
  • Operating System Deployment – Part 3

Module 10: Inventory and Software Metering

  • Inventory And Software Metering
  • Inventory And Software Metering Lab

Module 11: Asset Intelligence

  • Asset Intelligence

Module 12: Reporting

  • Reporting
  • Reporting Lab

Module 13: Compliance Settings

  • Compliance Settings

Module 14: Endpoint Protection

  • Endpoint Protection

Module 15: Mobile Device Management

  • Mobile Device Management – Part 1
  • Mobile Device Management – Part 2

Module 16: Role-Based Administration

  • Role Based Administration

Module 17: Disaster Recovery

  • Disaster Recovery

Module 18: Troubleshooting

  • Troubleshooting
  • Outro

Module 1: Getting Started With Windows 10

  • Introduction
  • First Steps
  • Navigating The Desktop
  • Using Cortana To Search

Module 2: Using File Explorer

  • File Explorer
  • Understanding File And Folder Basics
  • Work With Libraries
  • Creating A Home Group

Module 3: Using Windows Applications

  • Opening And Using Applications
  • Installing New Applications From The Windows Store
  • Using Default Applications

Module 4: Browsing the Web With Microsoft Edge

  • Examining The Edge Window
  • Searching The Web With Edge
  • Bookmarking Important Sites
  • Using The Reading List
  • Marking A Page With Web Notes
  • Conclusion

Module 5: Customizing Windows

  • Introduction
  • Customizing The Display
  • Customizing File Explorer
  • Configuring Cortanas Notebook Feature
  • Customizing Privacy Settings
  • Customizing Microsoft Edge

Module 6: Connecting Devices And Devices

  • Connecting Printers
  • Connecting And Using A Flash Drive
  • Connect A Phone

Module 7: Managing User Accounts

  • Create Additional Users
  • Understanding User Profiles
  • Sharing Data Between Profiles

Module 8: Backing Up Important Data

  • Using File History
  • Using Windows Backup
  • Using System Restore

Module 9: Maintaining Windows

  • Windows Updates
  • Working With The Action Center
  • Using Disk Defragmenter
  • Managing Storage And Apps Using Settings
  • Conclusion

Module 10: Protecting Windows

  • Introduction
  • Using Windows Defender
  • Using Windows Firewall
  • Using Bit Locker
  • Windows Hello

Module 11: Monitoring Performance

  • Using Task Manager
  • Using Resource Monitor

Module 12: Working With Control Panel And Settings

  • Control Panel Part 1
  • Control Panel Part 2
  • Settings App
  • Using Device Manager
  • Using Remote Desktop
  • Conclusion

Module 1: Introduction and Deploy Windows

 

  • 1.1 Instructor and Course Introduction
  • 1.2 Exam Overview
  • 1.3 Deploy Windows Intro
  • 1.4 Deploy Windows 10
  • 1.5 Deploy Windows 10 Pt 2
  • 1.6 Preparing Virtual Lab Setup for the Client 1
  • 1.7 Installation of Windows 10 Enterprise
  • 1.8 Troubleshooting Failed Installations with Setup Logs
  • 1.9 Configuring Locales
  • 1.10 Perform Post-Installation Configuration
  • 1.11 Navigating Microsoft Edge
  • 1.12 Modifying Microsoft Edge Settings
  • 1.13 Customizing Your Computer Setting

Module 2: Manage Devices and Data

  • 2.1 Manage devices and data intro
  • 2.2 Manage local users, groups, and devices
  • 2.3 Configure data access and protection
  • 2.4 Adding and accessing local users and groups
  • 2.5 Managing NTFS permissions in Windows 10
  • 2.6 Configure devices by using local policies
  • 2.7 Configuring Audit Policies on Windows 10
  • 2.8 Manage Windows security
  • 2.9 How to change user account settings

Module 3: Configure Connectivity

  • 3.1 Configure connectivity intro
  • 3.2 Configure networking
  • 3.3 Configuring network adapter advanced properties
  • 3.4 Configuring a static TCP/IP address
  • 3.5 Viewing the networking connection details
  • 3.6 Setting up a VPN connection
  • 3.7 Configure remote connectivity
  • 3.8 Configure remote management

Module 4: Maintain Windows

  • 4.1 Maintain Windows intro
  • 4.2 Configure system and data recovery
  • 4.3 Backing up files in Windows 10
  • 4.4 Using the recycle bin
  • 4.5 Manage updates
  • 4.6 Check for updates in Windows 10
  • 4.7 Configuring hardware in Windows 10
  • 4.8 Monitor and manage Windows
  • 4.9 Configuring Windows 20 desktop options
  • 4.10 Installing new features

Lesson 1: Getting to Know PCs and the Windows 8 User Interface

  • Introduction
  • Identify Components of a Personal Computer
  • Sign in to Windows 8
  • Navigate the Desktop

Lesson 2: Using the Modern Apps and Navigation Features

  • Using the Modern Apps and Navigation Features

Lesson 3: Working with Desktop Applications

  • Navigate the Desktop

Lesson 4: Using Internet Explorer 10

  • Navigate Internet Explorer 10

Lesson 5: Customizing the Windows 8 Environment

  • Multitasking With Apps
  • Use the Control Panel and Task Manager-Part1
  • Use the Control Panel and Task Manager-Part2

Lesson 6: Using Windows 8 Security Features

  • Customizing the Windows 8 Environment
  • Security Features
  • Using Other Windows 8 Features-Part1
  • Using Other Windows 8 Features-Part2
  • Using Other Windows 8 Features-Part3
cisco

Module 1: Architecture

  • 1.1 About Your Instructor
  • 1.2 Course Introduction
  • 1.3 Welcome to the Architecture Domain
  • 1.4 Classic 3 and 2 Tier Models
  • 1.5 2 Tier Spine Leaf
  • 1.6 Fabric Capacity Planning
  • 1.7 High Availability
  • 1.8 Designing a WLAN Deployment
  • 1.9 Cloud vs On-Prem
  • 1.10 The Cisco SD-WAN
  • 1.11 Cisco SD-Access
  • 1.12 QoS
  • 1.13 Hardware vs Software Switching

Module 2: Virtualization

  • 2.1 Welcome to the Virtualization Domain
  • 2.2 Device Virtualization Technologies
  • 2.3 Data Path Virtualization
  • 2.4 Network Virtualization Concepts

Module 3: Infrastructure

  • 3.1 Welcome to the Infrastructure Domain
  • 3.2 Trunking – VTP – EtherChannel
  • 3.3 RSTP and MST
  • 3.4 EIGRP vs OSPF
  • 3.4 OSPF
  • 3.5 eBGP
  • 3.6 eBGP Part 2
  • 3.7 WLANs
  • 3.8 NTP NAT PAT
  • 3.9 HSRP VRRP GLBP
  • 3.10 Multicast

Module 4: Network Assurance

  • 4.1 Welcome to the Network Assurance Module
  • 4.2 Diagnose Network Issues
  • 4.3 NetFlow
  • 4.4 SPAN
  • 4.5 IP SLA
  • 4.6 DNA Center

Module 5: Security

  • 5.1 Welcome to the Security Module
  • 5.2 Device Access Control
  • 5.3 ACLs and CoPP
  • 5.4 Wireless Security
  • 5.5 Components in Security Design

Module 6: Automation

  • 6.1 Welcome to the Automation Module
  • 6.2 Python
  • 6.3 JSON
  • 6.4 YANG
  • 6.5 NETCONF-RESTCONF
  • 6.6 APIs
  • 6.7 EEM
  • 6.8 Orchestration Tools

Module 1: Networking Fundamentals

  • Introduction
  • Introduction To TCPIP Networking- Part 1
  • Introduction To TCPIP Networking- Part 2
  • Introduction To TCPIP Networking- Part 3
  • Introduction To TCPIP Networking- Part 4
  • Ethernet LAN Fundamentals- Part 1
  • Ethernet LAN Fundamentals- Part 2
  • Ethernet LAN Fundamentals- Part 3
  • Wide Area Networks- Part 1
  • Wide Area Networks- Part 2
  • IPv4 Addressing And Routing Fundamentals- Part 1
  • IPv4 Addressing And Routing Fundamentals- Part 2
  • IPv4 Addressing And Routing Fundamentals- Part 3
  • TCPIP Transport And Applications- Part 1
  • TCPIP Transport And Applications- Part 2

Module 2: Basic Ethernet LAN Implementation

  • Command Line Essentials- Part 1
  • Command Line Essentials- Part 2
  • Command Line Essentials- Part 3
  • Ethernet LAN Switching
  • Managing Ethernet Switches- Part 1
  • Managing Ethernet Switches- Part 2
  • Configuring Switch Interfaces

Module 3: Designing Ethernet LANS

  • Understanding LAN Design Options- Part 1
  • Understanding LAN Design Options- Part 2
  • Understanding LAN Design Options- Part 3
  • Implementing And Configuring Ethernet VLANS- Part 1
  • Implementing And Configuring Ethernet VLANS- Part 2

Module 4: Understanding IPv4

  • IPv4 Subnetting- Part 1
  • IPv4 Subnetting- Part 2
  • IPv4 Subnetting- Part 3
  • IPv4 Subnetting- Part 4
  • Analyzing Classful IPv4 Networks- Part 1
  • Analyzing Classful IPv4 Networks- Part 2
  • Analyzing Classful IPv4 Networks- Part 3
  • Analyzing Subnet Masks- Part 1
  • Analyzing Subnet Masks- Part 2
  • Analyzing Existing Subnets

Module 5: Working With Cisco Routers

  • Implementing IPv4- Part 1
  • Implementing IPv4- Part 2
  • Configuring IPv4 Address And Static Routes- Part 1
  • Configuring IPv4 Address And Static Routes- Part 2
  • Configuring IPv4 Address And Static Routes- Part 3
  • Using Dynamic Routing Protocols- Part 1
  • Using Dynamic Routing Protocols- Part 2
  • Configuring IPv4 Hosts- Part 1
  • Configuring IPv4 Hosts- Part 2

Module 6: IPv4 Design And Troubleshooting

  • Designing IP Subnets- Part 1
  • Designing IP Subnets- Part 2
  • Using VLAN- Part 1
  • Using VLAN- Part 2
  • Troubleshooting IPv4

Module 7: IPv4 Services

  • Access Control Lists- Part 1
  • Access Control Lists- Part 2
  • Access Control Lists- Part 3
  • Access Control Lists- Part 4
  • Network Address Translation- Part 1
  • Network Address Translation- Part 2

Module 8: Implementing IPv6

  • IPv6 Fundamentals- Part 1
  • IPv6 Fundamentals- Part 2
  • IPv6 Fundamentals- Part 3
  • IPv6 Fundamentals- Part 4
  • IPv6 Addressing And Subnetting- Part 1
  • IPv6 Addressing And Subnetting- Part 2
  • Implementing IPv6- Part 1
  • Implementing IPv6- Part 2
  • Implementing IPv6- Part 3
  • Implementing IPv6- Part 4
  • Course Conclusion

Module 1: Wireless Basics

  • Course And Instructor Introduction
  • Wireless Basics Part 1
  • Wireless Basics Part 2
  • Wireless Basics Part 3
  • Wireless Basics Part 4
  • Wireless Basics Part 5
  • Wireless Basics Part 6

Module 2: Wireless Standards

  • Wireless Standards Part 1
  • Wireless Standards Part 2
  • Wireless Standards Part 3
  • Wireless Standards Part 4
  • Wireless Standards Part 5

Module 3: Wireless Signals

  • Wireless Signals Part 1
  • Wireless Signals Part 2

Module 4: Antennas

  • Antennas Part 1
  • Antennas Part 2
  • Antennas Part 3

Module 5: Topologies

  • Topologies Part 1
  • Topologies Part 2

Module 6: Frame Types

  • Frame Types Part 1
  • Frame Types Part 2
  • Frame Types Part 3

Module 7: Planning Coverage

  • Planning Coverage Part 1
  • Planning Coverage Part 2
  • Planning Coverage Part 3

Module 8: Architectures

  • Architectures Part 1
  • Architectures Part 2
  • Architectures Part 3

Module 9: Stand Alone And Cloud Deployments

  • Stand Alone And Cloud Deployments Part 1
  • Stand Alone And Cloud Deployments Part 2

Module 10: Controller Based Deployment

  • Controller Based Deployment Part 1
  • Controller Based Deployment Part 2
  • Controller Based Deployment Part 3

Module 11: Controller Discovery

  • Controller Discovery Part 1
  • Controller Discovery Part 2
  • Controller Discovery Part 3

Module 12: Roaming

  • Roaming Part 1
  • Roaming Part 2

Module 13: Radio Resource Management

  • Radio Resource Management Part 1
  • Radio Resource Management Part 2
  • Radio Resource Management Part 3

Module 14: Wireless Security

  • Wireless Security Part 1
  • Wireless Security Part 2
  • Wireless Security Part 3

Module 15: WLAN Configuration

  • WLAN Configuration

Module 16: Guest Networks

  • Guest Networks

Module 17: Client Connectivity

  • Client Connectivity Part 1
  • Client Connectivity Part 2

Module 18: Managing Wireless

  • Managing Wireless Part 1
  • Managing Wireless Part 2

Module 19: Interference

  • Interference Part 1
  • Interference Part 2

Module 20: Troubleshooting

  • Troubleshooting Part 1
  • Troubleshooting Part 2
  • Course Conclusion

Module 1: Exploring the Functions of Networking

  • Course Introduction
  • Instructor Introduction
  • Exploring the Functions of Networking Pt 1
  • Exploring the Functions of Networking Pt 2

Module 2: Introducing the Host-To-Host Communications Model

  • Introducing the Host-To-Host Communications Model Pt 1
  • Introducing the Host-To-Host Communications Model Pt 2

Module 3: Introducing LANs

  • Introducing LANs
  • Get Started with CLI Demo Pt 1
  • Get Started with CLI Pt Demo 2
  • Adding Descriptions to Interfaces Demo
  • Configure Gateway on a Switch Demo
  • Visualize Interfaces and Statistics Demo
  • Show Version Command Demo
  • CDP Demo

Module 4: Exploring the TCP/IP Link Layer

  • Exploring the TCP-IP Link Layer Pt 1
  • Exploring the TCP-IP Link Layer Pt 2

Module 5: Subnetting

  • Subnetting Pt 1
  • Subnetting Pt 2
  • Subnetting Pt 3
  • Subnetting Pt 4
  • Subnetting Pt 5
  • Subnetting Pt 6

Module 6: Explaining the TCP/IP Transport Layer and Application Layer

  • Explaining the TCP-IP Transport Layer and Application Layer Pt 1
  • Explaining the TCP-IP Transport Layer and Application Layer Pt 2
  • Explaining the TCP-IP Transport Layer and Application Layer Pt 3

Module 7: Exploring the Functions of Routing

  • Exploring the Functions of Routing Pt 1
  • Exploring the Functions of Routing Pt 2
  • Exploring the Functions of Routing Pt 3
  • Configuring RIP Demo
  • EIGRP Demo Pt 1
  • EIGRP Demo Pt 2

Module 8: Exploring the Packet Delivery Process

  • Exploring the Packet Delivery Process

Module 9: Troubleshooting a Simple Network

  • Troubleshooting a Simple Network

Module 10: Introducing Basic IPv6

  • Introducing Basic IPv6 Pt 1
  • Introducing Basic IPv6 Pt 2
  • Introducing Basic IPv6 Pt 3
  • Introducing Basic IPv6 Pt 4
  • Introducing Basic IPv6 Pt 5
  • Introducing Basic IPv6 Pt 6
  • Introducing Basic IPv6 Pt 7
  • Introducing Basic IPv6 Pt 8
  • IPV6 Basic Configuration and SLAAC Demo Pt 1
  • IPV6 Basic Configuration and SLAAC Demo Pt 2
  • IPV6 Routing Demo Pt 1
  • IPV6 Routing Demo Pt 2
  • IPV6 Static Routes Demo

Module 11: Configuring Static Routing

  • Configuring Static Routing
  • Static Routes Demo

Module 12: Implementing VLANs and Trunks

  • Implementing VLANs and Trunks Pt 1
  • Implementing VLANs and Trunks Pt 2
  • Implementing VLANs and Trunks Pt 3
  • Implementing VLANs and Trunks Pt 4
  • Spanning-tree Protocol Demo Pt 1
  • Spanning-tree Protocol Demo Pt 2
  • Spanning-tree Protocol Demo Pt 3

Module 13: Routing Between VLANs

  • Routing Between VLANs
  • Inter VLAN Routing Demo

Module 14: Introducing OSPF

  • Introducing OSPF Pt 1
  • Introducing OSPF Pt 2
  • Introducing OSPF Pt 3
  • Introducing OSPF Pt 4
  • OSPF Single Area Demo Pt 1
  • OSPF Single Area Demo Pt 2
  • OSPF Multiple Area Demo Pt 1
  • OSPF Multiple Area Demo Pt 2

Module 15: Building Redundant Switched Topologies

  • Building Redundant Switched Topologies Pt 1
  • Building Redundant Switched Topologies Pt 2

Module 16: Improving Redundant Switched Topologies with EtherChannel

  • Improving Redundant Switched Topologies with Ether Channel Pt 1
  • Improving Redundant Switched Topologies with Ether Channel Pt 2
  • Configuring Ether Channel Demo

Module 17: Exploring Layer 3 Redundancy

  • Exploring Layer 3 Redundancy

Module 18: Introducing WAN Technologies

  • Introducing WAN Technologies Pt 1
  • Introducing WAN Technologies Pt 2
  • Introducing WAN Technologies Pt 3
  • Introducing WAN Technologies Pt 4
  • Introducing WAN Technologies Pt 5
  • Introducing WAN Technologies Pt 6

Module 19: Explaining Basics of ACL

  • Explaining Basics of ACL Pt 1
  • Explaining Basics of ACL Pt 2
  • Explaining Basics of ACL Pt 3

Module 20: Enabling Internet Connectivity

  • Enabling Internet Connectivity
  • DHCP Demo
  • Static NAT Demo
  • PAT Using Specific IP Demo
  • PAT Using IP of Interface Demo

Module 21: Introducing QoS

  • Introducing QoS Pt 1
  • Introducing QoS Pt 2
  • Introducing QoS Pt 3
  • Introducing QoS Pt 4
  • Introducing QoS Pt 5

Module 22: Introducing Architectures and Virtualization

  • Introducing Architectures and Virtualization Pt 1
  • Introducing Architectures and Virtualization Pt 2
  • Introducing Architectures and Virtualization Pt 3
  • Introducing Architectures and Virtualization Pt 4

Module 23: Introducing System Monitoring

  • Introducing System Monitoring Pt 1
  • Introducing System Monitoring Pt 2
  • Introducing System Monitoring Pt 3

Module 24: Managing Cisco Devices

  • Managing Cisco Devices Pt 1
  • Managing Cisco Devices Pt 2
  • NTP Demo
  • Syslog Demo

Module 25: Examining the Security Threat Landscape

  • Examining the Security Threat Landscape Pt 1
  • Examining the Security Threat Landscape Pt 2

Module 26: Implementing Threat Defense Technologies

  • Implementing Threat Defense Technologies Pt 1
  • Implementing Threat Defense Technologies Pt 2
  • Implementing Threat Defense Technologies Pt 3
  • Implementing Threat Defense Technologies Pt 4
  • Implementing Threat Defense Technologies Pt 5
  • Authentication Protocols Demo Pt 1
  • Authentication Protocols Demo Pt 2
  • Device Hardening Demo Pt 1
  • Device Hardening Demo Pt 2
  • Device Hardening Demo Pt 3
  • Port Security Demo

Module 27: Exam Preparation

  • Exam Prep Tips

Module 28: Practice Demos

  • Get Started with CLI Demo Pt 1
  • Get Started with CLI Pt Demo 2
  • Adding Descriptions to Interfaces Demo
  • Configure Gateway on a Switch Demo
  • Visualize Interfaces and Statistics Demo
  • Show Version Command Demo
  • CDP Demo
  • Static Routes Demo
  • DHCP Demo
  • Static NAT Demo
  • PAT Using Specific IP Demo
  • PAT Using IP of Interface Demo
  • Configuring RIP Demo
  • Configuring Ether Channel Demo
  • Inter VLAN Routing Demo
  • Spanning-tree Protocol Demo Pt 1
  • Spanning-tree Protocol Demo Pt 2
  • Spanning-tree Protocol Demo Pt 3
  • EIGRP Demo Pt 1
  • EIGRP Demo Pt 2
  • Authentication Protocols Demo Pt 1
  • Authentication Protocols Demo Pt 2
  • NTP Demo
  • Syslog Demo
  • Device Hardening Demo Pt 1
  • Device Hardening Demo Pt 2
  • Device Hardening Demo Pt 3
  • Port Security Demo
  • OSPF Single Area Demo Pt 1
  • OSPF Single Area Demo Pt 2
  • OSPF Multiple Area Demo Pt 1
  • OSPF Multiple Area Demo Pt 2
  • IPV6 Basic Configuration and SLAAC Demo Pt 1
  • IPV6 Basic Configuration and SLAAC Demo Pt 2
  • IPV6 Routing Demo Pt 1
  • IPV6 Routing Demo Pt 2
  • IPV6 Static Routes Demo

Module 1: Configuring Ethernet LANs

  • Introduction
  • Ethernet LAN Fundamentals- Part 1
  • Ethernet LAN Fundamentals- Part 2
  • Implementing Virtual LANs- Part 1
  • Implementing Virtual LANs- Part 2
  • Using VLAN Trunking- Part 1
  • Using VLAN Trunking- Part 2
  • Understanding Spanning Tree Protocol- Part 1
  • Understanding Spanning Tree Protocol- Part 2
  • Understanding Spanning Tree Protocol- Part 3
  • Spanning Tree Implementation- Part 1
  • Spanning Tree Implementation- Part 2
  • Spanning Tree Implementation- Part 3
  • Security Management- Part 1
  • Security Management- Part 2
  • Security Management- Part 3
  • Security Management- Part 4

Module 2: Configuring IPv4 Routing Protocols

  • Understanding OSPF- Part 1
  • Understanding OSPF- Part 2
  • Understanding OSPF- Part 3
  • Implementing OSPF- Part 1
  • Implementing OSPF- Part 2
  • Implementing OSPF- Part 3
  • Implementing OSPF- Part 4
  • Understanding EIGRP- Part 1
  • Understanding EIGRP- Part 2
  • Understanding EIGRP- Part 3
  • Implementing EIGRP- Part 1
  • Implementing EIGRP- Part 2
  • Troubleshooting IPv4- Part 1
  • Troubleshooting IPv4- Part 2
  • Troubleshooting IPv4- Part 3

Module 3: Wide Area Networks

  • Implementing Point-To-Point WANs- Part 1
  • Implementing Point-To-Point WANs- Part 2
  • Implementing Point-To-Point WANs- Part 3
  • Private WANs With Ethernet And MPLS- Part 1
  • Private WANs With Ethernet And MPLS- Part 2
  • Private WANs With Ethernet And MPLS- Part 3
  • Private WANs With Internet VPNs- Part 1
  • Private WANs With Internet VPNs- Part 2
  • Private WANs With Internet VPNs- Part 3

Module 4: IPv4 Services

  • Basic Access Control Lists- Part 1
  • Basic Access Control Lists- Part 2
  • Advanced Access Control Lists- Part 1
  • Advanced Access Control Lists- Part 2
  • Quality Of Service- Part 1
  • Quality Of Service- Part 2

Module 5: IPv4 Routing And Troubleshooting

  • IPv4 Routing In The LAN- Part 1
  • IPv4 Routing In The LAN- Part 2
  • Implementing HSRP- Part 1
  • Implementing HSRP- Part 2
  • Troubleshooting IPv4 Routing- Part 1
  • Troubleshooting IPv4 Routing- Part 2

Module 6: IPv6 Routing

  • IPv6 Implementation And Routing Basics- Part 1
  • IPv6 Implementation And Routing Basics- Part 2
  • IPv6 Implementation And Routing Basics- Part 3
  • IPv6 Implementation And Routing Basics- Part 4
  • Implementing OSPF For IPv6- Part 1
  • Implementing OSPF For IPv6- Part 2
  • Implementing EIGRP For IPv6- Part 1
  • Implementing EIGRP For IPv6- Part 2
  • IPv6 Access Control Lists- Part 1
  • IPv6 Access Control Lists- Part 2

Module 7: Cloud Based Networking

  • Overview Of Cloud Computing- Part 1
  • Overview Of Cloud Computing- Part 2
  • Conclusion

Module 1: Network Review

  • Course Introduction
  • Network Review Part 1
  • Network Review Part 2
  • Network Review Part 3
  • Network Review Part 4

Module 2: Terminology And Fundamentals

  • Terminology And Fundamentals Part 1
  • Terminology And Fundamentals Part 2
  • Terminology And Fundamentals Part 3
  • Terminology And Fundamentals Part 4
  • Terminology And Fundamentals Part 5
  • Terminology And Fundamentals Part 6
  • Terminology And Fundamentals Part 7

Module 3: PKI And Cryptography

  • Pki And Cryptography Part 1
  • Pki And Cryptography Part 2

Module 4: AAA

  • AAA Part 1
  • AAA Part 2
  • AAA Part 3

Module 5: Bring Your Own Device

  • Bring Your Own Device Part 1
  • Bring Your Own Device Part 2
  • Bring Your Own Device Part 3

Module 6: Secure Access

  • Secure Access Part 1
  • Secure Access Part 2
  • Secure Access Part 3
  • Secure Access Demo

Module 7: VPNs

  • VPN Concepts Part 1
  • VPN Concepts Part 2
  • Remote Access VPNs Part 1
  • Remote Access VPNs Part 2
  • Site To Site VPNs

Module 8: Secure Routing And Switching

  • Secure Routing And Switching Part 1
  • Secure Routing And Switching Part 2
  • Secure Routing And Switching Demo 1
  • Secure Routing And Switching Demo 2
  • Layer2 Attacks Part 1
  • Layer2 Attacks Part 2
  • Layer2 Attacks Part 3
  • Mitigation Part 1
  • Mitigation Part 2

Module 9: Firewalls

  • Firewall Technologies Part 1
  • Firewall Technologies Part 2
  • Implementing Nat Part 1
  • Implementing Nat Part 2
  • Zone Based Firewall
  • Firewall Features On The ASA Part 1
  • Firewall Features On The ASA Part 2
  • Firewall Features On The ASA Part 3

Module 10: Intrusion Protection System (IPS)

  • Intrusion Protection System Part 1
  • Intrusion Protection System Part 2

Module 11: Content And Endpoint Security

  • Content And Endpoint Security Part 1
  • Content And Endpoint Security Part 2
  • Course Conclusion

Module 1: Pre-Course Chapter 1

  • Course Introduction
  • Civnd Intro Part 1
  • Civnd Intro Part 2
  • The Big Picture

Module 2: Pre-Course Chapter 2

  • All About Video Part 1
  • All About Video Part 2
  • All About Video Part 3
  • All About Video Part 4

Module 3: Cisco Video And Content Delivery

  • Cisco Video And Content Delivery Part 1
  • Cisco Video And Content Delivery Part 2
  • Cisco Video And Content Delivery Part 3

Module 4: Cisco Video Surveillance

  • Cisco Video Surveillance Part 1
  • Cisco Video Surveillance Part 2

Module 5: Cisco Collaboration

  • Cisco Collaboration Part 1
  • Cisco Collaboration Part 2
  • Cisco Collaboration Part 3

Module 6: Central Collaboration Endpoint Control

  • Central Collaboration Endpoint Control

Module 7: Unified IP Phones, Desk Endpoints And Cisco Jabber

  • Unified IP Phones Desk Endpoints And Cisco Jabber

Module 8: Configuring Unified IP Phones And Cisco Jabber

  • Configuring Unified IP Phones And Cisco Jabber Part 1
  • Configuring Unified IP Phones And Cisco Jabber Part 2

Module 9: Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber

  • Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber Part 1
  • Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber Part 2
  • Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber Part 3

Module 10: Cisco Telepresence Endpoints Installation And Characteristics

  • Cisco Telepresence Endpoints Installation And Characteristics Part 1
  • Cisco Telepresence Endpoints Installation And Characteristics Part 2
  • Cisco Telepresence Endpoints Installation And Characteristics Part 3
  • Cisco Telepresence Endpoints Installation And Characteristics Part 4

Module 11: Configuring Cisco Telepresence CTS And Cisco DX650 Endpoints

  • Configuring Cisco Telepresence CTs And Cisco D X650 Endpoints Part 1
  • Configuring Cisco Telepresence CTs And Cisco D X650 Endpoints Part 2

Module 12: Configuring Cisco Telepresence TC Endpoints

  • Configuring Cisco Telepresence TC Endpoints Part 1
  • Configuring Cisco Telepresence TC Endpoints Part 2
  • Configuring Cisco Telepresence TC Endpoints Part 3
  • Configuring Cisco Telepresence TC Endpoints Part 4
  • Configuring Cisco Telepresence TC Endpoints Part 5
  • Configuring Cisco Telepresence TC Endpoints Part 6

Module 13: Operating And Troubleshooting Cisco Telepresence Endpoints

  • Operating And Troubleshooting Cisco Telepresence Endpoints Part 1
  • Operating And Troubleshooting Cisco Telepresence Endpoints Part 2
  • Operating And Troubleshooting Cisco Telepresence Endpoints Part 3
  • Operating And Troubleshooting Cisco Telepresence Endpoints Part 4
  • Operating And Troubleshooting Cisco Telepresence Endpoints Part 5

Module 14: Cisco Multipoint Conferencing Solutions

  • Cisco Multipoint Conferencing Solutions Part 1
  • Cisco Multipoint Conferencing Solutions Part 2
  • Cisco Multipoint Conferencing Solutions Part 3

Module 15: Configuring And Monitoring Cisco Multipoint

  • Configuring And Monitoring Cisco Multipoint Part 1
  • Configuring And Monitoring Cisco Multipoint Part 2

Module 16: Cisco DMP Characteristics And Installation

  • Cisco DMP Characteristics And Installation Part 1
  • Cisco DMP Characteristics And Installation Part 2

Module 17: Configuring Cisco DMPs

  • Configuring Cisco DMP’s

Module 18: Managing Cisco Edge 340 DMPs

  • Managing Cisco Edge340 DMPs
  • Course Conclusion

Module 19: Labs

  • Basic Switch Port Configuration
  • Dashboard Options Part 1
  • Dashboard Options Part 2
  • Preparations For Endpoints Part 1
  • Preparations For Endpoints Part 2
  • Preparations For Endpoints Part 3
  • Preparations For Endpoints Part 4
  • Basic Troubleshooting
  • Setup TC Endpoint Part 1
  • Setup TC Endpoint Part 2
  • Setup TC Endpoint Part 3
  • Setup TC Endpoint Part 4

Module 1: Introducing Cisco Collaboration Architecture

  • Course Introduction
  • Introducing Cisco Collaboration Architecture Part 1
  • Introducing Cisco Collaboration Architecture Part 2
  • Small To Mid-Size Business Part 1
  • Small To Mid-Size Business Part 2
  • Small To Mid-Size Business Part 3
  • Cisco Unified Communications Manager Part 1
  • Cisco Unified Communications Manager Part 2
  • Cisco Unified Communications Manager Part 3
  • Cisco Unified Connection
  • Lab Introduction

Module 2: Telephony And Call Routing

  • Telephony 101 Part 1
  • Telephony 101 Part 2
  • Telephony 101 Part 3
  • Telephony 101 Part 4
  • Telephony 101 Part 5
  • Telephony 101 Part 6
  • Call Routing 101 Part 1
  • Call Routing 101 Part 2
  • VoIP Call Routing 101
  • Call Routing With DNS
  • Deployment Scenarios Part 1
  • Deployment Scenarios Part 2
  • Deployment Scenarios Part 3
  • Gateway Call Routing Basics Part 1
  • Gateway Call Routing Basics Part 2
  • Gateway Call Routing Basics Part 3
  • Gateway Call Routing Basics Part 4
  • Configuring The Gateway Lab Part 1
  • Configuring The Gateway Lab Part 2

Module 3: Preparing The Network And Phone Behavior

  • Preparing The Network For Voices Part 1
  • Preparing The Network For Voices Part 2
  • IP Phone Behavior
  • Configuring The LAN Lab
  • Standing Up The Platform Lab
  • Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 1
  • Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 2
  • Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 3
  • Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 4
  • Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 5
  • Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 6
  • Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 7
  • Using OVA Templates To Deploy Prime Collaboration Provisioning Lab Part 1
  • Using OVA Templates To Deploy Prime Collaboration Provisioning Lab Part 2

Module 4: CUCM Administration Interfaces

  • CUCM Administration Interfaces Part 1
  • CUCM Administration Interfaces Part 2
  • CUCM Stand Up
  • CUCM Stand Up Lab
  • End User Interfaces
  • End User Configuration Lab
  • AD Integration Lab
  • End Point Implementation Part 1
  • End Point Implementation Part 2
  • IMP Integration Lab
  • CUC Integration Lab Part 1
  • CUC Integration Lab Part 2
  • IP Communicator Lab
  • Profiles And Templates Lab
  • CUCME Phone Configuration
  • Configuring CUCME Lab Part 1
  • Configuring CUCME Lab Part 2
  • CUCM End-User Portal Lab
  • Configuring CUCM Phones From Scratch
  • Configuring Cisco SX20 Codec Part 1
  • Configuring Cisco SX20 Codec Part 2

Module 5: Call Configuration

  • Advanced Call Coverage Part 1
  • Advanced Call Coverage Part 2
  • Advanced Call Coverage Part 3
  • Call Coverage Lab Part 1
  • Call Coverage Lab Part 2
  • Call Coverage Lab Part 3
  • Call Coverage Lab Part 4
  • Call Coverage Lab Part 5
  • Calling Constrictions And COS Part 1
  • Calling Constrictions And COS Part 2
  • Implementing Class Of Control Lab Part 1
  • Implementing Class Of Control Lab Part 2
  • Connecting To The PSTN Part 1
  • Configuring Voice Gateway Features Lab Part 1
  • Configuring Voice Gateway Features Lab Part 2
  • Configuring Voice Gateway Features Lab Part 3
  • Connecting To The PSTN Part 2
  • PSTN Calling And Digit Manipulation Lab Part 1
  • PSTN Calling And Digit Manipulation Lab Part 2
  • PSTN Dial Plan Configuration Lab Part 1
  • PSTN Dial Plan Configuration Lab Part 2
  • Course Conclusion

Module 1: Plan And Design

 

  • Course And Instructor Introduction
  • Planning For Complex Network-Part1
  • Planning For Complex Network-Part2
  • Intro To Cisco Enterprise Architecture And CAM-Part1
  • Intro To Cisco Enterprise Architecture And CAM-Part2
  • Review Networking Topology-Part1
  • Review Networking Topology-Part2
  • Review OSI Model
  • Review SLA
  • Network Discovery
  • NTP Explained-Part1
  • NTP Explained-Part2
  • Network Security-Part1
  • Network Security-Part2

Module 2: Switch Configuration

  • VLAN And Trunking-Part1
  • VLAN And Trunking-Part2
  • VTP Intro And Config
  • Ether Channel Configuration And Load Balancing
  • More Ether Channel Configuration-Part1
  • More Ether Channel Configuration-Part2
  • Port Security
  • Root Guard
  • Configuring MST

Module 3: IP Configuration

  • DHCP Intro And Config-Part1
  • DHCP Intro And Config-Part2
  • IPV6 Intro And Config-Part1
  • IPV6 Intro And Config-Part2
  • Configure DHCP
  • Configure DHCPV6
  • Configure IPSLA
  • NTP Configuration
  • Network Monitoring Using IPSLA-Part1
  • Network Monitoring Using IPSLA-Part2
  • Network Monitoring Using IPSLA-Part3

Module 4: STP And RTP

  • Config Routing Between VLANs With A Router
  • Improves STP Config-Part1
  • Improve STP Config-Part2
  • Improve STP Config-Part3
  • Improve STP Config-Part4
  • Implement RSTP
  • Intro And Config MST

Module 5: Routing

  • Config Routing Between VLANs With A Router
  • Routing On A Multi Layer Switch
  • Routing With An External Router
  • Further Routing On Multilayer Switch

Module 6: HSRP, VRRP, GLBP

  • Configure And Tune HSRP
  • Configure HSRP With Load Balancing
  • HSRP For IPv6
  • Configure VRRP
  • Configure VRRP With Load Balancing
  • Implement GLBP
  • Configure GLBP

Module 7: Course Review

  • Designing Complex Networks
  • Review Demo CAM
  • Review Demo VLANs And Trunking
  • Review Demo VTP Configure
  • Review Demo Ether Channel And Load Balancing
  • Review Demo RSTP
  • Review Demo Routing Between VLANs With A Router
  • Course Outro

Module 1: Introduction to Cisco Troubleshooting

  • Introduction
  • Troubleshooting And Maintenance
  • IOS Troubleshooting Commands
  • Remote Data Gathering
  • Introduction To Graphical Troubleshooting Tools And Review

Module 2: Troubleshooting Switches

  • Troubleshoot Catalyst Switches
  • Troubleshoot TCAM

Module 3: Troubleshooting VLANS and Trunking

  • Troubleshooting VLANs And Trunking-Part1
  • Troubleshooting VLANs And Trunking-Part2
  • Troubleshooting VLANs And Trunking-Part3
  • Trouble Ticket 1 VLANS

Module 4: Troubleshooting Spanning Tree Protocol, EtherChannel

  • Spanning Tree Protocol
  • STP Port Configuration
  • Ether Channel
  • Trouble Ticket 2-Trunking

Module 5: Troubleshooting Inter­VLAN Routing and Layer 3 EtherChannel

  • Troubleshooting Inter-VLAN Routing
  • Troubleshooting Layer 3 Ether Channel

Module 6: Troubleshooting Switch Security Features

  • Troubleshoot Switch Security-Part1
  • Troubleshoot Switch Security-Part2
  • Trouble Ticket 3-Switch Security-Part1
  • Trouble Ticket 3-Switch Security-Part2

Module 7: Troubleshooting First­Hop Redundancy Protocols

  • HSRP
  • VRRP
  • Questions
  • Trouble Ticket 4

Module 8: Troubleshooting IPv4 and IPv4 Addressing

  • IPv4 Addressing DHCPNAT-Part1
  • IPv4 Addressing DHCPNAT-Part2
  • Trouble Ticket 5
  • Trouble Ticket 6

Module 9: IPv6 Addressing and Addressing Technologies

  • IPv6 Addressing Options

Module 10: Troubleshooting IPv4 and IPv6 ACLs and Prefix Lists

  • IPv4 ACLs
  • Prefixlists IPv6 ACLs
  • Trouble Ticket Access Control List1
  • Trouble Ticket Access Control List2

Module 11: Troubleshooting GRE and Basic Routing Tunnels

  • IPv4 Routing-Part1
  • IPv4 Routing-Part2
  • IPv6 Routing
  • GRE Tunnels

Module 12: Troubleshooting RIPv2 and RIPng

  • RIPv2
  • RIPng

Module 13: Troubleshooting EIGRP

  • EIGRP
  • EIGRP For IPv6
  • Trouble Ticket 1
  • Trouble Ticket 2

Module 14: OSPF and OSPFv3

  • OSPF-Part1
  • OSPF-Part2
  • OSPFv3
  • Trouble Ticket 1
  • Trouble Ticket 2
  • Trouble Ticket 3

Module 15: Troubleshooting Route Maps and Policy Based Routing

  • Route Maps And Policy Based Routing

Module 16: Troubleshooting Redistribution

  • Verifying Redistribution Configuration
  • Troubleshooting Redistribution With Route Maps

Module 17: Troubleshooting BGP

  • BGP Overview
  • BGP Configuration-Part1
  • BGP Configuration-Part2
  • Trouble Ticket 1
  • Trouble Ticket 2

Module 18: Troubleshooting Management Protocols and Tools

  • Troubleshooting Management Protocols And Tools
  • SPAN And RSPAN

Module 19: Troubleshooting Management Access

  • Management Access Troubleshooting
  • Conclusion

Module 1: Plan And Design

  • Introduction
  • Review Routing Fundamentals
  • Review Route Selection
  • Review Switching Versus Routing
  • Review IP Subnetting
  • Review How To Subnet
  • Review IP Address Classes

Module 2: EIGRP Enhanced Interior Gateway Routing Protocol

  • Plan And Design-Part1
  • Plan And Design-Part2
  • EIGRP Config
  • Configuring RIPng
  • Building EIGRP Topology Table
  • EIGRP Stub Routing
  • EIGRP Summarization
  • EIGRP Load Balancing
  • Discovering Main EIGRP Configuration
  • Implementing EIGRP Through Name Config
  • Configure EIGRP Authentication
  • Configure Authentication For EIGRP Routes

Module 3: IPv6

  • Introduction To IPv6-Part1
  • Introduction To IPv6-Part2
  • IPv6 Addressing
  • Basic IPv6 Configuration
  • EIGRP For IPv6
  • Configure And Optimize EIRGP For IPv6

Module 4: OSPF

  • lntroduction To OSPF-Part1
  • lntroduction To OSPF-Part2
  • lntroduction To OSPF-Part3
  • Configure OSPF
  • Building The Link State Database
  • OSPF Path Selection
  • OSPF Route Summarization
  • OSPF Stub Areas
  • Implement OSPF
  • Optimize OSPF
  • OSPF Authentication Configuration
  • Configure OSPFV3
  • Basic Redistribution

Module 5: Border Gateway Protocol BGP

  • Introduction To BGP
  • BGP Specifics
  • Basic BGP
  • BGP Path Selection
  • Configure BGP Authentication
  • Configure BGP

Module 6: Course Review

  • Configure Basic EIGRP
  • Basic OSPF Configuration
  • Summary Of-EIGRP-OSPF-IPv6-BGP
  • Conclusion

Module 1: Methodologies Used To Design A Network

  • Introduction
  • Developing Business Trends
  • P P D I O O- Part 1
  • P P D I O O- Part 2
  • 3 Layer Campus Design
  • Modular Network Design
  • Cisco Eight Step Design Methodology
  • Cisco I I N

Module 2: Network Structure And Modularity

  • Network Design Fundamentals
  • Design Methods And Methodologies- Part 1
  • Design Methods And Methodologies- Part 2
  • Enterprise Campus Design- Part 1
  • Enterprise Campus Design- Part 2

Module 3: Basic Enterprise Campus Networks

  • Campus Design Considerations- Part 1
  • Campus Design Considerations- Part 2
  • Cisco S O N A

Module 4: Enterprise Edge And Remote Network Modules

  • WAN Technologies And VPN- Part 1
  • WAN Technologies And VPN- Part 2
  • WAN Technologies- Part 1
  • WAN Technologies- Part 2
  • VPN Technologies- Part 1
  • VPN Technologies- Part 2
  • VPN Technologies- Part 3

Module 5: IP Addressing And Routing Protocols

  • Routing Protocol Operation And Design- Part 1
  • Routing Protocol Operation And Design- Part 2
  • Routing Protocol Operation And Design- Part 3
  • Routing Protocol Operation And Design- Part 4
  • EIGRP – Part 1
  • EIGRP – Part 2

Module 6: Enterprise Switching I

  • Enterprise Switching
  • Inter VLAN Routing
  • Multilayer Switch
  • Enterprise Switch Features And Design
  • VSS
  • Best Practices

Module 7: Enterprise Switching II

  • Switch Macros And Smart Ports
  • Private VLANs
  • Etherchannel

Module 8: Subnetting

  • IP v4
  • Subnetting- Part 1
  • Subnetting- Part 2
  • Subnetting- Part 3
  • Subnetting- Part 4
  • IP v6

Module 9: Designing Advanced Services

  • Designing Advanced Services
  • GLBP
  • Access Points
  • Radio Frequencies
  • Wireless Signals
  • Wireless LAN To VLAN Mapping
  • Conclusion

Module 1: Introduction

  • Intro Part 1
  • Intro Part 2
  • Intro Part 3
  • Intro Part 4
  • Intro Part 5
  • Intro Part 6
  • Intro Part 7

Module 2: Telephony

  • Telephony Part 1
  • Telephony Part 2
  • Telephony Part 3
  • Telephony Part 4

Module 3: Basic Call Routing

  • Basic Call Routing Part 1
  • Basic Call Routing Part 2
  • Basic Call Routing Part 3

Module 4: VOIP Call Routing

  • VOIP Call Routing Part 1
  • VOIP Call Routing Part2
  • VOIP Call Routing Part 3
  • VOIP Call Routing Part 4
  • VOIP Call Routing Part 5

Module 5: CUCME Call Routing Basics

  • CUCME Call Routing Basics Part 1
  • CUCME Call Routing Basics Part 2
  • CUCME Call Routing Basics Part 3
  • CUCME Call Routing Basics Part 4
  • CUCME Call Routing Basics Part 5
  • CUCME Call Routing Basics Part 6
  • CUCME Call Routing Basics Part 7
  • CUCME Call Routing Basics Part 8
  • CUCME Call Routing Basics Part 9
  • CUCME Call Routing Basics Part 10
  • CUCME Call Routing Basics Part 11

Module 6: Preparing Network For Voice

  • Preparing Network For Voice Part 1
  • Preparing Network For Voice Part 2
  • Preparing Network For Voice Part 3
  • Preparing Network For Voice Part 4
  • Preparing Network For Voice Part 5
  • Preparing Network For Voice Part 6

Module 7: IP Phone Behavior

  • IP Phone Behavior

Module 8: CUCME Administration Basics

  • CUCME Administration Basics Part 1
  • CUCME Administration Basics Part 2
  • CUCME Administration Basics Part 3
  • CUCME Administration Basics Part 4

Module 9: CUCME StandUp

  • CUCME Stand Up Part 1
  • CUCME Stand Up Part 2
  • CUCME Stand Up Part 3
  • CUCME Stand Up Part 4
  • CUCME Stand Up Part 5

Module 10: CUCME StandUp Part 2

  • CUCME Stand Up2 Part 1
  • CUCME Stand Up2 Part 2

Module 11: CUCME StandUp CUCME

  • CUCME Stand Up CUCME Part 1
  • CUCME Stand Up CUCME Part 2
  • CUCME Stand Up CUCME Part 3

Module 12: End Users and End User Interfaces

  • End Users And End User Interfaces Part 1
  • End Users And End User Interfaces Part 2
  • End Users And End User Interfaces Part 3

Module 13: Endpoint Implementation

  • Endpoint Implementation Part 1
  • Endpoint Implementation Part 2
  • Endpoint Implementation Part 3
  • Endpoint Implementation Part 4

Module 14: Call Coverage

  • Call Coverage Part 1
  • Call Coverage Part 2
  • Call Coverage Part 3
  • Call Coverage Part 4
  • Call Coverage Part 5
  • Call Coverage Part 6
  • Call Coverage Part 7
  • Call Coverage Part 8
  • Call Coverage Part 9

Module 15: Calling Restrictions and Routing

  • Calling Restrictions And Routing Part 1
  • Calling Restrictions And Routing Part 2
  • Calling Restrictions And Routing Part 3
  • Calling Restrictions And Routing Part 4
  • Calling Restrictions And Routing Part 5
  • Calling Restrictions And Routing Part 6

Module 16: CUCME Advance Call Coverage

  • CUCME Advance Call Coverage Part 1
  • CUCME Advance Call Coverage Part 2

Module 17: Implementing Unity Connection

  • Implementing Unity Connection Part 1
  • Implementing Unity Connection Part 2
  • Implementing Unity Connection Part 3
  • Implementing Unity Connection Part 4
  • Implementing Unity Connection Part 5
  • Implementing Unity Connection Part 6
  • Implementing Unity Connection Part 7
  • Implementing Unity Connection Part 8
  • Outro
 
vmware

Chapter 1: Course Introduction and Methodology

Chapter 2: Virtualization Overview

Chapter 3: Planning and Installing ESXi

Chapter 4: Using tools to Administer a VMware Environment

Chapter 5: vCenter and Licensing

Chapter 6: Configuring Networking

Chapter 7: Configuring Storage

Chapter 8: VM Creation, Configuration, and Snapshots

Chapter 9: Security and Permissions

Chapter 10: Host and VM Monitoring

Chapter 11: Advanced ESXi and vCenter Server Management

Chapter 12: Patching and Upgrading ESXi

Chapter 13: Disaster Recovery and Backup

Module 1: VM And VMWARE

  • Introduction
  • VMWARE Foundations-Part 1
  • VMWARE Foundations-Part 2
  • VMWARE Company Overview
  • Server Virtualization
  • Thin Clients
  • Storage 101
  • Three Basic Forms Of Storage
  • Redundant Array

Module 2: Working With ESX And ESXI

  • VMWARE ESX And ESXI
  • Installing ESXI
  • Installing ESXI-Lab 1
  • Installing ESXI-Lab 2
  • Vsphere Client-Lab 1
  • Joining Active Directory Domain For Single Sign On-Part 1
  • Joining Active Directory Domain For Single Sign On-Part 2
  • Virtual Networking
  • Nic Notes
  • Virtual Network Basics-Lab
  • NFS
  • NFS-Lab

Module 3: Configuring Virtual Machines

  • Virtual Machines
  • Host Operating System
  • Working With VM Files
  • Virtual Machines-Lab 1
  • Virtual Machines-Lab 2
  • Working With New VM’s
  • Virtual Machines-Lab 3
  • Virtual Machines-Lab 4

Module 4: Vcenter Server

  • Say Hello To Vcenter
  • Vcenter Architecture
  • Vcenter Architecture-Lab 1
  • Vcenter Architecture-Lab 2
  • Managing Host With Vcenter-Lab
  • Working With Virtual Hardware-Part 1
  • Working With Virtual Hardware-Part 2
  • Adding Virtual Disk And Disk Expansion-Lab 1
  • Adding Virtual Disk And Disk Expansion-Lab 2
  • Configuring Vcenter SSO-Lab 1

Module 5: VM Storage Option

  • Shared And Local Storage
  • NAS
  • DC Designs
  • Configuring Shared Storage-Lab
  • Creating VMFS Datastores On Our SANS-Lab 1
  • Creating VMFS Datastores On Our SANS-Lab 2

Module 6: Managing A Virtual World

  • Alarms
  • Creating And Configuring Alarms-Lab 1
  • Creating And Configuring Alarms-Lab 2
  • Resource Pools
  • Creating Resource Pools-Lab 1
  • Creating Resource Pools-Lab 2
  • VMWARE Converter
  • Configuring VMWARE Converter-Lab 1
  • Configuring VMWARE Converter-Lab 2
  • Configuring VMWARE Converter-Lab 3

Module 7: Migrations, High Availability And VM Utilities

  • Migrating Virtual Machines
  • DRS And HA-Lab
  • Host Profiles
  • VM Utilities And Performance
compatia

Module 1 – CompTIA CySA+ CS0-003 Basics
1.1 Course Introduction
1.2 Instructor Introduction
1.3 What is CySA
1.4 Exam Objectives
1.5 Cybersecurity Pathway
1.6 DoD Baseline Certfication
Module 2 – CompTIA CySA+ CS0-003 Domain 1 – Security Operations
2.1 Domain 1 – Security Operations Overview
2.2 System and Network Architecture Concepts in Security Operations
2.3 Log Files
2.4 Operating Systems
2.5 Infrastructure Concepts
2.6 Network Architecture
2.7 Software Defined Networking
2.8 Whiteboard Discussion – Network Architectures
2.9 Identity and Access Management IAM Basics
2.10 Demonstration – IAM
2.11 Encryption
2.12 Sensitive Data
2.13 1.2 Analyze Indicators of Potentially Malicious Activity
2.14 Network Attack
2.15 Host Attacks
2.16 Application Related Attacks
2.17 Social Attacks
2.18 Tools or Techniques to Determine Malicious Activity Overview
2.19 Tools and Toolsets For Identifying Malicious Activity
2.20 Common Techniques
2.21 Programming Concerns
2.22 Threat-Intelligence and Threat-Hunting Concepts Overview
2.23 Threat Actors
2.24 Tactics, Techniques and Procedures
2.25 Confidence Levels IOC
2.26 Collection Sources
2.27 Threat Intelligence
2.28 Cyber Response Teams
2.29 Security Operations
2.30 Standardized Processes and Operations
2.31 Security Operations Tools and Toolsets
2.32 Module 2 Review
Module 3 – CompTIA CySA+ CS0-003 Domain 2 – Vulnerability Management
3.1 Domain 2 – Vulnerability Management Overview
3.2 Vulnerability Discovery and Scanning
3.3 Asset Discovery and Scanning
3.4 Industry Frameworks
3.5 Mitigating Attacks
3.6 CVSS and CVE
3.7 Common Vulnerability Scoring System (CVSS) interpretation
3.8 CVE Databases
3.9 Cross Site Scripting (XSS)
3.10 Vulnerability Response, Handling, and Management
3.11 Control Types (Defense in Depth, Zero Trust)
3.12 Patching and Configurations
3.13 Attack Surface Management
3.14 Risk Management Principles
3.15 Threat Modeling
3.16 Threat Models
3.17 Secure Coding and Development (SDLC)
3.18 Module 3 Review
Module 4 – CompTIA CySA+ CS0-003 Domain 3 – Incident Response and
Management
4.1 Domain 3 – Incident Response and Management Overview
4.2 Attack Methodology Frameworks
4.3 Cyber Kill Chain
4.4 Frameworks to Know
4.5 Incident Response and Post Reponse
4.6 Detection and Analysis
4.7 Post Incident Activities
4.8 Containment, Eradication and Recovery
4.9 Module 4 Review
Module 5 – CompTIA CySA+ CS0-003 Domain 4 – Reporting and Communication
5.1 Domain 4 – Reporting and Communication Overview
5.2 Reporting Vulnerabilities Overview
5.2.1 Vulnerability Reporting
5.3 Compliance Reports
5.4 Inhibitors to Remediation
5.5 Metrics and KPI’s
5.6 Incident Response Reporting and Communications Overview
5.7 Incident Declaration
5.8 Communication with Stakeholders
5.9 Root Cause Analysis
5.10 Lessons Learned and Incident Closure
5.11 Module 5 Review
Module 6 – CompTIA CySA+ CS0-003 – Course Closeout
6.1 Course Closeout Overview
6.2 Practice Questions
6.3 Exam Process
6.4 Continuing Education
6.5 Course Closeout

Module 1 – CompTIA Cloud+ CV0-003 Course Overview

  • 1.0 Course Trailer
  • 1.1 Course Overview
  • 1.2 What is the Cloud + Exam
  • 1.3 Cloud + Domain Obectives Overview
  • 1.4 CompTIA Certification Pathways
  • 1.5 DoD and ISO Requirements

Module 2 – General Cloud Knowledge

  • 2.1 Domain Overview
  • 2.2 Compare and Contrast Cloud Models
  • 2.3 Cloud Computing Defined
  • 2.4 Deployment Models
  • 2.5 Service Models
  • 2.6 Cloud Characteristics
  • 2.7 Cloud Roles
  • 2.8 Evaluate Cloud Providers and Services
  • 2.9 Regions and Zones
  • 2.10 Shared Responsibility Model
  • 2.11 Demonstration – AWS Shared Security Model
  • 2.12 Comparing Cloud to Virtualization
  • 2.13 Comparing Cloud to On Premises
  • 2.14 What is a Virtual Machine
  • 2.15 Demonstration – Deploy a Cloud VM (AWS EC2)
  • 2.16 What is an API
  • 2.17 Capacity Planning Factors
  • 2.18 Licensing, Factors, Requirements and Planning
  • 2.19 Capacity Planning
  • 2.20 Demonstration – AWS Trusted Advisor
  • 2.21 HA and Scaling
  • 2.22 High Availability and Disaster Recovery
  • 2.23 Virtual, System and Communication Protection
  • 2.24 Hypervisor Affinity
  • 2.25 Analyze the solution design
  • 2.26 Business Requirements
  • 2.27 Business Enablers
  • 2.28 Demonstration -AWS Well Architected Tool
  • 2.29 Testing Techniques
  • 2.30 Testing Success Factors
  • 2.31 Module Review Questions
  • 2.32 Module Summary Review

Module 3 – Cloud Security

  • 3.1 Domain Overview
  • 3.2 Configure Identity and Access Management
  • 3.3 Identification and Authorization Management (IAM)
  • 3.4 SDLC
  • 3.5 Directory Services
  • 3.6 Security and Access Controls
  • 3.7 Federation
  • 3.8 SSO and MFA
  • 3.9 Certificates and Key Management
  • 3.10 Secure a Network in a Cloud Environment
  • 3.11 Networking Devices and Segmentation
  • 3.12 Firewalls and Proxies
  • 3.13 NAT and PAT
  • 3.14 Secure Network Configurations (Tunnelling and Encryption)
  • 3.15 Demo Hardening and Configuration Changes
  • 3.16 OS Application Controls and Security Credentials
  • 3.17 Policies and Permissions
  • 3.18 Host and Network Protections (HIDSIPS)
  • 3.19 Virtualization Security
  • 3.20 Monitoring
  • 3.21 Data Security and Compliance Controls in Cloud Environments
  • 3.22 Structured, Unstructured and Semi Structured Data
  • 3.23 Data Classification and Labeling
  • 3.24 Data Loss Prevention
  • 3.25 Demonstration – Google Cloud DLP
  • 3.26 Chain of Custody and Non-Repudiation
  • 3.27 Discussion – CASB
  • 3.28 Module Summary Review
  • 3.29 Module Review Questions

Module 4 – Cloud Deployment

  • 4.1 Domain Overview
  • 4.2 Integrate Components into Cloud Solutions
  • 4.3 Subscription Services
  • 4.4 Demonstration – Provision VM
  • 4.5 Cloud Infrastructure Components
  • 4.6 Whiteboard – Design a Resilent AWS Cloud Architecture
  • 4.7 Containers
  • 4.8 Microservices
  • 4.9 Demonstration – Deploy Containers
  • 4.10 Scaling
  • 4.11 Provision Storage
  • 4.12 Cloud Storage Protocols
  • 4.13 Storage Features
  • 4.14 Storage Cost Considerations
  • 4.15 Storage Performance
  • 4.16 RAID and Tiering
  • 4.17 Demonstration – AWS S3
  • 4.18 Deploy Cloud Networking Solutions
  • 4.19 Connecting to The Cloud
  • 4.20 Network Protocols
  • 4.21 VPNS, VPC and Connectivity
  • 4.22 Whiteboard – AWS VPC Connectivity
  • 4.23 Demonstration – AWS VPC
  • 4.24 Software Defined Networking (SDN)
  • 4.25 Compute Sizing
  • 4.26 Virtualization Considerations
  • 4.27 Resource Rightsizing (CPU, Memory, etc)
  • 4.28 Module Summary Review
  • 4.29 Module Review Questions

Module 5 – Operations and Support

  • 5.1 Domain Overview
  • 5.2 Logging Monitoring and Alerting
  • 5.3 Logging, Storage and Analysis of Data Events
  • 5.4 Monitoring Cloud Resources
  • 5.5 Service Level Agreements
  • 5.6 Demonstration – SLAs in AWS
  • 5.7 Maintain Efficient Operations of a Cloud Environment
  • 5.8 Lifecycle Management
  • 5.9 Change and Asset Management
  • 5.10 SOP, Patching and Upgrades
  • 5.11 Orchestration and Automation
  • 5.12 Orchestration or Automation
  • 5.13 DevOps, IaC and CICD Pipelines
  • 5.14 Playbooks and Templates
  • 5.15 Backup and Restore Operations
  • 5.16 Backup Types, Objects, Targets
  • 5.17 Restore and Recovery
  • 5.18 Module Summary Review
  • 5.19 Module Review Questions

Module 6 – Troubleshooting

  • 6.1 Domain Overview
  • 6.2 Troubleshooting Methodology Intro
  • 6.3 Troubleshooting Methodology
  • 6.4 Troubleshoot Security Issues
  • 6.5 Cloud Attacks
  • 6.6 Security Groups and NACLS
  • 6.7 Troubleshoot Deployment Issues
  • 6.8 Discussion Site Connectivity Issues
  • 6.9 Discussion – Capacity Issues
  • 6.10 Connectivity Issues
  • 6.11 Connectivity Troubleshooting Tools
  • 6.12 Demonstration – GCP AWS Azure Latency Test
  • 6.13 Module Summary Review
  • 6.14 Module Review Questions

Module 7 – Course Closeout

  • 7.1 Exam Preparation
  • 7.2 Course Closeout

Module 1 – Mobile Devices

  • Module 1 Workbook
  • 0.1 Intro to A+ Core1 Instructor
  • 1.0 CompTIA A+ Course Intro
  • 1.1 Mobile Devices Part 1
  • 1.1 Mobile Devices Part 2
  • 1.1 Mobile Devices Part 3
  • 1.2 Installing Components in Laptop
  • 1.3 Laptop Features Part 1
  • 1.3 Laptop Features Part 2
  • 1.4 Compare and Contrast Types of Mobile Devices
  • 1.5 Accessories and Ports of Other Mobile Devices Part 1
  • 1.5 Accessories and Ports of Other Mobile Devices Part 2
  • 1.6 Configure Basic Device Network Connectivity and Application Support Part 1
  • 1.6 Configure Basic Device Network Connectivity and Application Support Part 2
  • 1.7 Use Methods to Perform Mobile Device Synchronization
  • 1.8 Laptop Disassemble and Assemble

Module 2 – Networking

  • Module 2 Workbook
  • 2.1 Networking Part 1
  • 2.1 Networking Part 2
  • 2.2 Compare and Contrast Common Networking Hardware Devices Part 1
  • 2.2 Compare and Contrast Common Networking Hardware Devices Part 2
  • 2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 1
  • 2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 2
  • 2.3 Setting Up a Wireless Router
  • 2.4 Compare and Contrast Wireless Networking Protocols
  • 2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 1
  • 2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 2
  • 2.6 Explain Common Network Configuration Concepts Part 1
  • 2.6 Explain Common Network Configuration Concepts Part 2
  • 2.7 Compare and Contrast Internet Connection Types Network Types and Features
  • 2.8 Given a Scenario Using Appropriate Networking Tools

Module 3 – Hardware

  • Module 3 Workbook
  • 3.1 Hardware Part 1
  • 3.1 Hardware Part 2
  • 3.1 Hardware Part 3
  • 3.2 Identify Common Connector Types
  • 3.3 Scenario Install RAM Types
  • 3.4 Scenario Select Install and Configure Storage Devices
  • 3.4 Scenario Select Install and Configure Storage Devices Part 2
  • 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 1
  • 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 2
  • 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 3
  • 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 4
  • 3.5 Install Disassemble and Assemble a Desktop
  • 3.6 Purposes for Peripherals and Types
  • 3.7 Summarize Power Supplies
  • 3.8 Scenario Select and Configure Appropriate Components for Customers PCs
  • 3.9 Scenario Installand Configure Common Devices
  • 3.10 Scenario Configure SOHO Multifunction Devices Printers and Settings
  • 3.11 Scenario Install and Maintain Various Print Technologies Part 1
  • 3.11 Scenario Install and Maintain Various Print Technologies Part 2
  • 3.11 Scenario Install and Maintain Various Print Technologies Part 3

Module 4 – Virtualization and Cloud Computing

  • Module 4 Workbook
  • 4.1 Virtualization Part 1
  • 4.1 Virtualization Part 2
  • 4.2 Scenario Setup and Configure Client-side Virtualization

Module 5 – Hardware and Network Troubleshooting

  • Module 5 Workbook
  • 5.1 Hardware and Networking Troubleshooting
  • 5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 1
  • 5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 2
  • 5.3 Troubleshoot Hard Drives and RAID Arrays
  • 5.4 Troubleshoot Video and Display Issues
  • 5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 1
  • 5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 2
  • 5.6 Troubleshoot Printers
  • 5.7 Troubleshoot Common Wired and Wireless Network Problems

Module 1 – Operating Systems

  • 0.1 Intro to A+ Core2 Instructor
  • 1.0 Intro to A+ Core2
  • 1.1 Operating Systems Part1
  • 1.1 Operating Systems Part2
  • 1.2 Compare and Contrast features of Microsoft Windows Versions
  • 1.3 Summarize General OS Installation Considerations Upgrade Methods
  • 1.3 Summarize General OS Installation Considerations Upgrade Methods Part2
  • 1.3 Summarize General OS Installation Considerations Upgrade Methods Part3
  • 1.3 Summarize General OS Installation Considerations Upgrade Methods Demo
  • 1.4 Scenario use appropriate Microsoft Command Line Tools Part1
  • 1.4 Scenario use appropriate Microsoft Command Line Tools Part2
  • 1.4 Scenario use appropriate Microsoft Command Line Tools Demo
  • 1.5 Microsoft Operating System and Tools Part1
  • 1.5 Microsoft Operating System and Tools Part1 Demo
  • 1.5 Microsoft Operating System and Tools Part2
  • 1.5 Microsoft Operating System and Tools Part2 Demo
  • 1.5 Microsoft Operating System and Tools Part3
  • 1.5 Microsoft Operating System and Tools Part3 Demo
  • 1.5 Microsoft Operating System and Tools Part4
  • 1.5 Microsoft Operating System and Tools Part4 Demo
  • 1.6 Microsoft Windows Control Panel Utilities
  • 1.6 Microsoft Windows Control Panel Utilities Demo
  • 1.7 Summarize Application Installation and Configuration Concepts
  • 1.8 Configure Windows Networking on a Client Desktop
  • 1.8 Configure Windows Networking on a Client Desktop Demo
  • 1.9 Features and Tools of MAC OS and Linux Client Desktop

Module 2 – Security

  • 2.1 Security – Physical Security Measures
  • 2.2 Explain Logical Security Concepts
  • 2.2 Explain Logical Security Concepts Part2
  • 2.3 Compare, Contrast Wireless Security Protocols & Authentication Methods
  • 2.4 Detect, Remove, and Prevent Malware using Appropriate Tools
  • 2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part1
  • 2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part2
  • 2.6 Compare Contrast the different Microsoft Windows Security Settings
  • 2.6 Compare Contrast the different Microsoft Windows Security Settings- Demo
  • 2.7 Implement Security Best Practices to Secure a Workstation
  • 2.7 Implement Security Best Practices to Secure a Workstation Part2
  • 2.8 Implement Methods for Securing Mobile Devices
  • 2.9 Implement Appropriate Data Destruction & Disposal Methods
  • 2.10 Configure Security on SOHO Wireless and Wired Networks
  • 2.10 Configure Security on SOHO Wireless and Wired Networks Demo

Module 3 – Software Troubleshooting

  • 3.1 Software Troubleshooting Part1
  • 3.1 Software Troubleshooting Part2
  • 3.1 Software Troubleshooting Demo
  • 3.2 Troubleshoot and Resolve PC Security Issues
  • 3.2 Troubleshoot and Resolve PC Security Issues Part2
  • 3.2 Troubleshoot and Resolve PC Security Issues Demo
  • 3.3 Best Practice Procedures for Malware Removal
  • 3.4 Troubleshoot Mobile OS and Application
  • 3.5 Troubleshoot Mobile OS and Application Security Issue

Module 4 – Operational Procedures

  • 4.1 Operational Procedures
  • 4.2 Implement Basic Change Management Best Practices
  • 4.3 Implement Basic Disaster Prevention and Recovery Methods
  • 4.4 Explain Common Safety Procedures
  • 4.5 Explain Environmental Impacts and Appropriate Controls
  • 4.6 Explain Processes for Addressing Prohibited Content-Activity & Privacy Licensing Policy Concepts
  • 4.7 Using Proper Communication Techniques and Professionalism
  • 4.8 Identify the Basic of Scripting
  • 4.8 Identify the Basic of Scripting Demo
  • 4.9 Use Remote Access Technologies

Domain 1 – Characteristics of Cloud Services from a Business Perspect

  • Overview
  • History
  • The Three Delivery Model Architecture
  • SaaS
  • Justification For Cloud
  • Confidentiality And Availability
  • Concepts From NIST
  • On Demand Self-Service
  • Broad Network Access
  • Resource Pooling
  • Measured Service
  • Service Models
  • Terms Of Service
  • Recommendations

Domain 2 – Cloud Computing and Business Value

  • Reasons For Cloud-Agility-Part1
  • Reasons For Cloud-Agility-Part2
  • New Business Opportunities

Domain 3 – Technical Perspectives/Cloud Types

  • Technical Perspectives Cloud Types
  • Sources
  • Security Risk
  • Technical Risk And Solutions

Domain 4 – Steps to Successful Adoption of Cloud

  • Steps To Adopting Cloud-Part1
  • Steps To Adopting Cloud-Part2
  • Steps To Adopting Cloud-Part3

Domain 5 – Impact and Changes of Cloud Computing on IT Service Management

  • Information Security Management System-Part1
  • Information Security Management System-Part2

Domain 6 – Risks and Consequences of Cloud Computing

  • Information Management And Security-Part1
  • Information Management And Security-Part2
  • The Data Security LifeCycle
  • Governance
  • Data Loss Prevention-Part1
  • Data Loss Prevention-Part2
  • Protecting Data
  • Risk Management-Part1
  • Risk Management-Part2
  • Risk Management-Part3
  • Risk Management-Part4
  • Risk Management-Part5
  • Recommendations-Part1
  • Recommendations-Part2
  • IT Governance
  • Audit
  • Recommendations For Audit-Part1
  • Recommendations For Audit-Part2

Module 1: Intro & Performing Basic Linux Tasks

  • Instructor Introduction
  • Course Introduction
  • Identify The Linux Design Philosophy
  • Enter Shell Commands
  • Shell Commands Activity
  • Get Help with Linux

Module 2: Managing Users and Groups

  • Assume Superuser and Groups
  • Create, Modify, and Delete Users
  • Create, Modify, and Delete Groups
  • Query Users and Groups
  • Configure Account Profiles

Module 3: Managing Permissions and Ownership

  • Modify File and Directory Permissions
  • Modify File and Directory Ownership
  • Configure Special Permissions and Attributes
  • Troubleshoot Permissions Issues

Module 4: Managing Storage

  • Create Partitions
  • Manage Logical Volumes
  • Mount File Systems
  • Manage File Systems
  • Navigate the Linux Directory Structure
  • Troubleshoot Storage Issues

Module 5: Managing Files and Directories

  • Create and Edit Text Files
  • Search for Files
  • Perform Operations on Files and Directories
  • Process Text Files
  • Manipulate File Output

Module 6: Managing Kernel Modules

  • Explore the Linux Kernel
  • Install and Configure Kernel Modules
  • Monitor Kernel Modules

Module 7: Managing the Linux Boot Process

  • Configure Linux Boot Components
  • Configure GRUB

Module 8: Managing System Components

  • Configure Localization Options
  • Configure GUIs
  • Manage Services
  • Troubleshoot Process Issues
  • Troubleshoot CPU and Memory Issues

Module 9: Managing Devices

  • Identify the Types of Linux
  • Configure Devices
  • Monitor Devices
  • Troubleshoot Hardware Issues

Module 10: Managing Networking

  • Identify TCP/IP Fundamentals
  • Identify Linux Server Roles
  • Connect to a Network
  • Configure DHCP and DNS Client Services
  • Configure Cloud and Virtualization Technologies
  • Troubleshoot Networking Issues

Module 11: Managing Packages and Software

  • Identify Package Managers
  • Manage RPM Packages with YUM
  • Manage Debian Packages with APT
  • Configure Repositories
  • Acquire Software
  • Build Software from Source Code
  • Troubleshoot Software Dependency Issues

Module 12: Securing Linux SystemsModule 13: Working with Bash Scripts

  • Customize the Bash Shell Environment
  • Identify Scripting and Programming Fundamentals
  • Write and Execute a Simple Bash Script
  • Incorporate Control Statements in Bash Scripts

Module 14: Automating Tasks

  • Schedule Jobs
  • Implement Version Control Using Git
  • Identify Orchestration Concepts

Module 15: Installing Linux

  • Prepare for Linux Installation
  • Perform the Installation

Module 1 – Networking Concepts

  • Module 1 Workbook
  • Intro Network Plus N10 007
  • Basic Networking
  • Activity Basic Networking
  • OSI Model
  • Exploring the OSI Model- Act
  • Protocol and Ports
  • Activity Examining Protocols and Ports
  • Connection-oriented vs. connectionless
  • Activity Comparing TCP and UDP
  • Internet Protocol (IP)
  • Activity Examining the Lower Layer Protocols
  • Layer 7 Remote Control Protocols
  • Layer 7 File Transfer Protocols
  • Layer 7 Messaging Protocols
  • Activity Examining Messaging Protocols
  • Layer 7 Web Traffic Protocols
  • Layer 7 Streaming Media Protocols
  • Layer 7 Infrastructure Management Protocols
  • Switching
  • Activity Creating Collision and Broadcast Domains
  • Interface Properties and Segmentation
  • Activity Creating a Basic Network Segment
  • Switching prt 2
  • Activity Switching
  • Switching Loop Management
  • Activity Managing Switching Loops
  • VLANs
  • Activity Creating VLANs
  • routing
  • Activity Examining ARP
  • IP Addressing Basics
  • Activity Configuring IP
  • Routers
  • Activity Setting Up a Router
  • Routing Basics
  • Activity Adding Static Routes
  • VLAN Routing
  • Activity Routing Between VLANs
  • NAT/PAT
  • Activity Configuring NAT/PAT
  • Routing Protocols
  • Activity Configuring a Routing Protocol
  • Firewalls
  • Activity Configuring Firewalls
  • Advanced Switching and Routing Concepts
  • Activity Exploring IPv6
  • Performance Concepts
  • IP Addressing
  • Subnetting
  • Activity Learning to Subnet
  • Address Assignments
  • Network Types and Topologies
  • Wireless Topologies
  • Network Types
  • Technologies that Facilitate the Internet Of Things (IoT)
  • Wireless Technologies
  • 802.11 Standards
  • Wi-Fi Frequencies
  • Wi-Fi Antenna Concepts
  • Bluetooth
  • Cellular
  • Activity Using an RF Spectrum Analyzer
  • cloud concepts
  • Activity Exploring Cloud Services
  • Network Services
  • Activity Setting up DNS
  • DHCP Service
  • Activity Setting Up DHCP
  • NTP

Module 2 – Infrastructure

  • Module 2 Workbook
  • Module 2 – Infrastructure
  • Activity Testing a Fiber Optic Cable
  • Plenum vs. PVC
  • Activity Crimping on an RJ-45 Connector
  • Transceivers
  • Activity Terminating Cable to a 110 Block
  • Copper Cable Standards
  • Activity Creating a Crossover Cable
  • Ethernet Deployment Standards
  • Network Device Placement and Installation
  • Repeater
  • Router
  • Modem
  • Activity Setting up a WAP
  • Firewall
  • Media Converter
  • Advanced Network Devices
  • Wireless Controller
  • Proxy Server
  • Activity Configuring Proxy Settings
  • VPN Concentrator
  • Virtual Networking Components
  • Network Storage Types
  • WAN Technologies
  • Transmission Mediums
  • Activity Configuring WAN Links
  • Termination

Module 3 – Network Operation

  • Module 3 Workbook
  • Network Operations Documentation
  • Standard Operation Procedures
  • Logical vs Physical Diagrams
  • Rack Diagrams
  • Change Management
  • Wiring and Ports Locations
  • IDF-MDF Documentation
  • Labeling
  • Using Documentation Act
  • Continuity and Disaster
  • MTTR Mean Time Repair
  • Recovery
  • Backing Up Your Data Act
  • Event Management
  • Metrics
  • Scanning Monitoring Patching
  • Testing the Network Act
  • HTTPS-Management
  • Out-of-Band Management
  • RDP
  • Remote Access Methods
  • Remote File Access
  • Making Remote Connections Act
  • SSH
  • VNC
  • Policies and Best Practices
  • Creating Policies and Procedures Act

Module 4 – Network Security

  • Module 4 Workbook
  • Physical Security Devices
  • Examining Security Devices Act
  • Authentication and Access
  • Access Controls Methods Act
  • Multifactor Authentication
  • Basic Wireless Network Security
  • Demonstrating the Need for Wireless Act
  • Common Network Attacks
  • Conducting a Phishing Campaign Act
  • Network Device Hardening
  • Supporting Secure Authentication Encryption Act
  • Updating Firmware
  • Explain Common Mitigation Techniques
  • Implementing a Honey Pot Act

Module 5 – Network Troubleshooting and Tools

  • Module 5 Workbook
  • Network Troubleshoot
  • Using the Appropriate Tools
  • Hardware Tools Analyzers
  • Troubleshooting With Hardware Tools Act
  • Software Tools
  • Troubleshooting with Software Tools Act
  • Software Tools Command Line
  • Troubleshooting with Command Line Tools Act
  • Troubleshoot Common Wired Connectivity
  • Troubleshooting Signal Problems
  • Physical Issues
  • Transceiver Issues
  • Troubleshooting Transceiver Problems
  • Traffic Flow Issues
  • Troubleshoot Common Wireless Connectivity
  • Latency and Jitter
  • Incorrect WAP Types
  • Troubleshooting WAP Issues
  • Troubleshooting Common Network
  • DHCP Issues
  • Firewall ACL Issues
  • Advanced Network Issues
  • Unresponsive Services
  • Case Study Troubleshooting
  • Outro N10 007

Module 1 – The Pen Test Engagement

 

  • Module 1 Notes
  • 1.0 PenTest Plus Introduction
  • 1.1 PenTest Plus Topics
  • 1.2 PenTest Engagement
  • 1.3 Threat Modeling
  • 1.4 Technical Constraints
  • 1.5 PenTest Engagement Review
  • 1.6 Examining PenTest Engagement Documents Act

Module 2 – Passive Reconnaissance

  • Module 2 Notes
  • 2.1 Passive Reconnaissance part1
  • 2.2 WHOIS Act
  • 2.3 Passive Reconnaissance part2
  • 2.4 Google Hacking Act
  • 2.5 Passive Reconnaissance part3
  • 2.6 DNS Querying Act
  • 2.7 Passive Reconnaissance part4
  • 2.8 Email Server Querying Act
  • 2.9 SSL-TLS Cerfificates
  • 2.10 Shodan Act
  • 2.11 The Havester
  • 2.12 TheHarvester Act
  • 2.13 Recon-ng
  • 2.14 Recon-g Act
  • 2.14 Recon-ng-Part-2-API-key Act
  • 2.15 Maltego
  • 2.16 Have I been Pwned
  • 2.17 Punked and Owned Pwned Act
  • 2.18 Fingerprinting Organization with Collected Archives
  • 2.19 FOCA Act
  • 2.20 Findings Analysis Weaponization
  • 2.21 Chp 2 Review

Module 3 – Active Reconnaissance

  • Module 3 Notes
  • 3.1 Active Reconnaissannce
  • 3.2 Discovery Scans Act
  • 3.3 Nmap
  • 3.4 Nmap Scans Types Act
  • 3.5 Nmap Options
  • 3.6 Nmap Options Act
  • 3.7 Stealth Scans
  • 3.8 Nmap Stealth Scans Act
  • 3.9 Full Scans
  • 3.10 Full Scans Act
  • 3.11 Packet Crafting
  • 3.12 Packet Crafting Act
  • 3.13 Network Mapping
  • 3.14 Metasploit
  • 3.15 Scanning with Metasploit Act
  • 3.16 Enumeration
  • 3.17 Banner Grabbing Act
  • 3.18 Windows Host Enumeration
  • 3.19 Winddows Host Enumeration Act
  • 3.20 Linux Host Enumeration
  • 3.21 Linux Host Enumeration Act
  • 3.22 Service Enumeration
  • 3.23 Service Enumeration Act
  • 3.24 Network Shares
  • 3.25 SMB Share Enumeration Act
  • 3.26 NFS Network Share Enumeration
  • 3.27 NFS Share Enumeration Act
  • 3.28 Null Sessions
  • 3.29 Null Sessions Act
  • 3.30 Website Enumeration
  • 3.31 Website Enumeration Act
  • 3.32 Vulnerability Scans
  • 3.33 Compliance Scans Act
  • 3.34 Credentialed Non-credentialed Scans
  • 3.35 Using Credentials in Scans Act
  • 3.36 Server Service Vulnerability Scan
  • 3.37 Vulnerability Scanning Act
  • 3.38 Web Server Database Vulnerability Scan
  • 3.39 SQL Vulnerability Scanning Act
  • 3.40 Vulnerability Scan Part 2 OpenVAS Act
  • 3.41 Web App Vulnerability Scan
  • 3.42 Web App Vulnerability Scanning Act
  • 3.43 Network Device Vulnerability Scan
  • 3.44 Network Device Vuln Scanning Act
  • 3.45 Nmap Scripts
  • 3.46 Using Nmap Scripts for Vuln Scanning Act
  • 3.47 Packet Crafting for Vulnerbility Scans
  • 3.48 Firewall Vulnerability Scans
  • 3.49 Wireless Access Point Vunerability
  • 3.50 Wireless AP Scans Act
  • 3.51 WAP Vulnerability Scans
  • 3.52 Container Security issues
  • 3.53 How to Update Metasploit Pro Expired Trial License

Module 4 – Physical Security

  • Module 4 Notes
  • 4.1 Physical Security
  • 4.2 Badge Cloning Act
  • 4.3 Physical Security Review

Module 5 – Social Engineering

  • Module 5 Notes
  • 5.1 Social Engineering
  • 5.2 Using Baited USB Stick Act
  • 5.3 Using Social Enginnering to Assist Attacks
  • 5.4 Phishing Act
  • 5.5 Social Engineering Review

Module 6 – Vulnerability Scan Analysis

  • Module 6 Notes
  • 6.1 Vulnerbility Scan Analysis
  • 6.2 Validating Vulnerability Scan Results Act
  • 6.3 Vulnerbility Scan Analysis Review

Module 7 – Password Cracking

  • Module 7 Notes
  • 7.1 Password Cracking
  • 7.2 Brute Force Attack Against Network Service Act
  • 7.3 Network Authentication Interception Attack
  • 7.4 Intercepting Network Authentication Act
  • 7.5 Pass the Hash Attacks
  • 7.6 Pass the Hash Act
  • 7.7 Password Cracking Review

Module 8 – Penetrating Wired Networks

  • Module 8 Notes
  • 8.1 Penetrating Wired Network
  • 8.2 Sniffing Act
  • 8.3 Eavesdropping
  • 8.4 Eavesdropping Act
  • 8.5 ARP Poisoning
  • 8.6 ARP Poisoning Act
  • 8.7 Man In The Middle
  • 8.8 MITM Act
  • 8.9 TCP Session HiJacking
  • 8.10 Server Message Blocks SMB Exploits
  • 8.11 SMB Attack Act
  • 8.12 Web Server Attacks
  • 8.13 FTP Attacks
  • 8.14 Telnet Server Attacks
  • 8.15 SSH Server Attacks
  • 8.16 Simple Network Mgmt Protocol SNMP
  • 8.17 Simple Mail Transfer Protocol SMTP
  • 8.18 Domain Name System DNS Cache Poisoning
  • 8.19 Denail of Service Attack DoS-DDoS
  • 8.20 DoS Attack Act
  • 8.21 VLAN Hopping Review

Module 9 – Penetrating Wireless Networks

  • Module 9 Notes
  • 9.1 Penetrating Wireless Networks
  • 9.2 Jamming Act
  • 9.3 Wireless Sniffing
  • 9.4 Replay Attacks
  • 9.5 WEP Cracking Act
  • 9.6 WPA-WPA2 Cracking
  • 9.7 WAP Cracking Act
  • 9.8 Evil Twin Attacks
  • 9.9 Evil Twin Attack Act
  • 9.10 WiFi Protected Setup
  • 9.11 Bluetooth Attacks
  • 9.12 Penetrating Wireless Networks

Module 10 – Windows Exploits

  • Module 10 Notes
  • 10.1 Windows Exploits
  • 10.2 Dumping Stored Passwords Act
  • 10.3 Dictionary Attacks
  • 10.4 Dictionary Attack Against Windows Act
  • 10.5 Rainbow Table Attacks
  • 10.6 Credential Brute Force Attacks
  • 10.7 Keylogging Attack Act
  • 10.8 Windows Kernel
  • 10.9 Kernel Attack Act
  • 10.10 Windows Components
  • 10.11 Memory Vulnerabilities
  • 10.12 Buffer Overflow Attack Act
  • 10.13 Privilegde Escalation in Windows
  • 10.14 Windows Accounts
  • 10.15 Net and WMIC Commands
  • 10.16 Sandboxes

Module 11 – Linux Exploits

  • Module 11 Notes
  • 11.1 Linux Exploits
  • 11.2 Exploiting Common Linux Features Act
  • 11.3 Password Cracking in Linux
  • 11.4 Cracking Linux Passwords Act
  • 11.5 Vulnerability Linux
  • 11.6 Priviledge Escalation Linux
  • 11.7 Linux Accounts
  • 11.8 Linux Exploits Review

Module 12 – Mobile Devices

  • Module 12 Notes
  • 12.1 Mobile Devices
  • 12.2 Hacking Android Act
  • 12.3 Apple Exploits
  • 12.4 Moblie Devices Review

Module 13 – Specialized Systems

  • Module 13 Notes
  • 13.1 Specialized Systems
  • 13.2 Specialized Systems Review

Module 14 – Scripts

  • Module 14 Notes
  • 14.1 Scripts
  • 14.2 Powershell
  • 14.3 Python
  • 14.4 Ruby
  • 14.5 Common Scripting Elements
  • 14.6 Scripts Review
  • 14.7 Better Ping Sweep
  • 14.8 Simple Port Scanner2
  • 14.9 Multitarget Port Scanner
  • 14.10 Port Scanner with Nmap
  • 14.11 Scripts Review

Module 15 – Application Testing

  • Module 15 Notes
  • 15.1 Application Testing
  • 15.2 Reverse Engineering

Module 16 – Web App Exploits

  • Module 16 Notes
  • 16.1 Webb App Exploits
  • 16.2 Injection Attacks
  • 16.3 HTML Injection
  • 16.4 SQL Hacking – SQLmap Act
  • 16.5 Cross-Site Attacks
  • 16.6 Cross-Site Request Forgery
  • 16.7 Other Web-based Attacks
  • 16.8 File Inclusion Attacks
  • 16.9 Web Shells
  • 16.10 Web Shells Review

Module 17 – Lateral Movement

  • Module 17 Notes
  • 17.1 Lateral Movement
  • 17.2 Lateral Movement with Remote Mgmt Services
  • 17.3 Process Migration Act
  • 17.4 Passing Control Act
  • 17.5 Pivoting
  • 17.6 Tools the Enable Pivoting
  • 17.7 Lateral Movement Review

Module 18 – Persistence

  • Module 18 Notes
  • 18.1 Persistence
  • 18.2 Breeding RATS Act
  • 18.3 Bind and Reverse Shells
  • 18.4 Bind Shells Act
  • 18.5 Reverse Shells
  • 18.6 Reverse Shells Act
  • 18.7 Netcat
  • 18.8 Netcat Act
  • 18.9 Scheduled Tasks
  • 18.10 Scheduled Tasks Act
  • 18.11 Services and Domains
  • 18.12 Persistence Review

Module 19 – Cover Your Tracks

  • Module 19 Notes
  • 19.1 Cover Your Tracks
  • 19.2 Cover Your Tracks – Timestomp Files Act
  • 19.3 Cover Your Tracks – Frame the Administrator Act
  • 19.4 Cover Your Tracks – Clear the Event Log Act
  • 19.5 Cover Your Tracks Review

Module 20 – The Report

  • Module 20 Notes
  • 20.1 The Report
  • 20.2 The Report Review

Module 21 – Post Engagement Cleanup

  • Module 21 Notes
  • 21.1 Post Engagement Cleanup_1
  • 21.3 Post Engagement Cleanup Review
  • 21.4 PenTest Plus Conclusion

Module 1: Information Security Roles Security Control and Framework Types

  • Introduction and Overview
  • Compare and Contrast Information Security Roles
  • Compare and Contrast Security Control and Framework Types
  • Module Summary

Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources

  • Explain Threat Actor Types and Attack Vectors
  • Explain Threat Intelligence Sources
  • Module Summary

Module 3: Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing

  • Assess Organizational Security with Network Reconnaissance Tools
  • Packet Capture and Replay Demo
  • Explain Security Concerns with General Vulnerability Types
  • Summarize Vulnerability Scanning Techniques
  • Explain Penetration Testing Concepts
  • Module Summary

Module 4: Social Engineering, Indicators of Malware Attacks

  • Compare and Contrast Social Engineering Techniques
  • Analyze Indicators of Malware-based Attacks
  • Fork Bomb Malware Demo
  • Module Summary

Module 5: Cryptography

  • Compare and Contrast Cryptographic Ciphers
  • Summarize Cryptographic Modes of Operation
  • Summarize Cryptographic Use Cases and Weaknesses
  • Summarize Other Cryptographic Technologies
  • Module Summary

Module 6: Certificates and PKI

  • Implement Certificates and Certificate Authorities
  • Implement PKI Management
  • Implementing a PKI Demo
  • Module Summary

Module 7: Authentication

  • Summarize Authentication Design Concepts
  • Implement Knowledge-based Authentication
  • Password Cracker Demo
  • Implement Authentication Technologies
  • Summarize Biometrics Authentication Concepts
  • Module Summary

Module 8: Identity and Accounts, Authorization, Personnel Polices

  • Implement Identity and Account Types
  • Implement Account Policies
  • Account Types and Polices Demo
  • Implement Authorization Solutions
  • Explain the Importance of Personnel Policies
  • Module Summary

Module 9: Network Design and Hardware (Part 1)

  • Implement Secure Network Designs
  • Implement Secure Switching and Routing
  • Various Types of Network Attacks Demo
  • Implement Secure Wireless Infrastructure
  • Implement Load Balancers
  • Module Summary

Module 10: Network Hardware (Part 2)

  • Implement Firewalls and Proxy Servers
  • Implement Network Security Monitoring
  • Summarize the Use of SIEM
  • Module Summary

Module 11: Network Protocols

  • Implement Secure Network Operations Protocols
  • Implement Secure Application Protocols
  • Implement Secure Remote Access Protocols
  • Module Summary

Module 12: Endpoint Security

  • Implement Secure Firmware
  • Implement Endpoint Security
  • Endpoint Protection Demo
  • Explain Embedded System Security Implications
  • Module Summary

Module 13: Mobile Devices

  • Implement Mobile Device Management
  • Implement Secure Mobile Device Connections
  • Module Summary

Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation

  • Analyze Indicators of Application Attack
  • Analyze Indicators of Web Application Attacks
  • Summarize Secure Coding Practices
  • Implement Secure Script Environments
  • Summarize Deployment and Automation Concepts
  • Module Summary

Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualization

  • Summarize Secure Cloud and Virtualization Services
  • Apply Cloud Security Solutions
  • Summarize Infrastructure as Code Concepts
  • Module Summary

Module 16: Privacy and Data Protection

  • Explain Privacy and Data Sensitivity Concepts
  • Explain Privacy and Data Protection Controls
  • Module Summary

Module 17: Incident Response

  • Summarize Incident Response Procedures
  • Utilize Appropriate Data Sources for Incident Response
  • Apply Mitigation Controls
  • Module Summary

Module 18: Forensics

  • Explain Key Aspects of Digital Forensics Documentation
  • Explain Key Aspects of Digital Forensics Evidence Acquisition
  • Module Summary

Module 19: Risk Management and Business Impact Analysis

  • Explain Risk Management Processes and Concepts
  • Explain Business Impact Analysis Concepts
  • Module Summary

Module 20: Redundancy and Backup Strategies

  • Implement Redundancy Strategies
  • Implement Backup Strategies
  • Implement Cybersecurity Resiliency Strategies
  • Module Summary

Module 21: Physical Security

  • Explain the Importance of Physical Site Controls
  • Explain the Importance of Physical Host Security Controls
  • Module Summary

Module 22: Afterword

  • Conclusion and General Exam Tips

Module 1: Threats, Attacks and Vulnerabilities

  • Module 1 Workbook
  • Introduction
  • Types Of Malware-Part 1
  • Types Of Malware-Part 2
  • Types Of Attacks-Part 1
  • Types Of Attacks-Part 2
  • Types Of Attacks-Part 3
  • Types Of Attacks-Part 4
  • Types Of Attacks-Part 5
  • Threat Actors-Part 1
  • Threat Actors-Part 2
  • Penetration Testing And Vulnerability Scanning-Part 1
  • Penetration Testing And Vulnerability Scanning-Part 2
  • Impact Of Vulnerabilities-Part 1
  • Impact Of Vulnerabilities-Part 2

Module 2: Technologies and Tools

  • Module 2 Workbook
  • Networking Hardware And Software-Part 1
  • Networking Hardware And Software-Part 2
  • Networking Hardware And Software-Part 3
  • Networking Hardware And Software-Part 4
  • Networking Hardware And Software-Part 5
  • Networking Hardware And Software-Part 6
  • Security Assessment-Part 1
  • Security Assessment-Part 2
  • Troubleshooting Issues-Part 1
  • Troubleshooting Issues-Part 2
  • Securing Mobile Devices-Part 1
  • Securing Mobile Devices-Part 2
  • Securing Mobile Devices-Part 3
  • Securing Mobile Devices-Part 4
  • Secure Protocols-Part 1
  • Secure Protocols-Part 2

Module 3: Architecture and Design

  • Module 3 Workbook
  • Secure Network Architecture-Part 1
  • Secure Network Architecture-Part 2
  • Secure System Designs-Part 1
  • Secure System Designs-Part 2
  • Secure Staging Deployment Concepts
  • Embedded Systems-Part 1
  • Embedded Systems-Part 2
  • Application Development And Deployment-Part 1
  • Application Development And Deployment-Part 2
  • Application Development And Deployment-Part 3
  • Physical Security Controls-Part 1
  • Physical Security Controls-Part 2
  • Physical Security Controls-Part 3
  • Cloud Virtualization-Part 1
  • Cloud Virtualization-Part 2

Module 4: Identity and Access Management

  • Module 4 Workbook
  • Identity And Access Management-Part1
  • Identity And Access Management-Part2
  • Identity And Access Services-Part1
  • Identity And Access Services-Part2
  • Management Controls-Part1
  • Management Controls-Part2
  • Account Management Practices-Part1
  • Account Management Practices-Part2
  • Account Management Practices-Part3

Module 5: Risk Management

  • Module 5 Workbook
  • Organizational Security-Part1
  • Organizational Security-Part2
  • Business Impact Analysis Concepts-Part1
  • Business Impact Analysis Concepts-Part2
  • Risk Management-Part1
  • Risk Management-Part2
  • Incident Response Procedures-Part1
  • Incident Response Procedures-Part2
  • Forensics-Part1
  • Forensics-Part2
  • Disaster Recovery-Part1
  • Disaster Recovery-Part2
  • Types Of Control-Part1
  • Types Of Control-Part2
  • Data Security And Privacy Practices-Part1
  • Data Security And Privacy Practices-Part2

Module 6: Cryptography and PKI

  • Module 6 Workbook
  • Cryptographic Basics-Part1
  • Cryptographic Basics-Part2
  • Cryptographic Basics-Part3
  • Cryptographic Algorithms-Part1
  • Cryptographic Algorithms-Part2
  • Wireless Security-Part1
  • Wireless Security-Part2
  • Implementing PKI-Part1
  • Implementing PKI-Part2
  • Implementing PKI-Part3
  • Conclusion

Cyber Security

Module 1: Introduction

  • Instructor Introduction
  • Course Introduction
  • Exam Overview

Module 2: Information Security Governance

  • Module Overview
  • InfoSec Strategic Context Part 1
  • InfoSec Strategic Context Part 2
  • GRC Strategy and Assurance
  • Roles and Responsibilities
  • GMA Tasks Knowledge and Metrics
  • IS Strategy Overview
  • Strategy Implemenation
  • Strategy Development Support
  • Architecture and Controls
  • Considerations and Action Plan
  • InfoSec Prog Objectives and Wrap-Up

Module 3: Information Security Risk Management

  • Module Overview
  • Risk Identification Task and Knowledge
  • Risk Management Strategy
  • Additional Considerations
  • Risk Analysis and Treatment Tasks & Knowledge
  • Leveraging Frameworks
  • Assessment Tools and Analysis
  • Risk Scenario Development
  • Additional Risk Factors
  • Asset Classification and Risk Management
  • Risk Monitoring and Communication
  • Information Risk Management Summary

Module 4: InfoSec Prog Development and Management

  • Module Overview
  • Alignment and Resource Management – Task and Knowledge
  • Key Relationships
  • Standards Awareness and Training – Tasks and Knowledge
  • Awareness and Training
  • Building Security into Process and Practices – Tasks and Knowledge
  • Additional Technology Infrastructure Concerns
  • Security monitoring and reporting Overview Tasks and Knowledge
  • Metrics and Monitoring
  • Summary

Module 5: Information Security Incident Management

  • Module Overview
  • Planning and Integration Overview Task and Knowledge
  • Incident Response Concepts and Process
  • Forensics and Recovery
  • Readiness and Assessment – Overview Tasks and Knowledge
  • Identification and Response Overview Tasks and Knowledge
  • Incident Processes

Module 6: Exam Prep

  • Case Study – Security On a Shoestring Budget
  • Case Study – APT In Action
  • Summary
  • Exam Prep

Cloud Concepts, Architecture and Design

  • Course Intro
  • Cloud Concepts, Architecture and Design – Part 1
  • Cloud Concepts, Architecture and Design – Part 2
  • Cloud Concepts, Architecture and Design – Part 3
  • Cloud Concepts, Architecture and Design – Part 4
  • Cloud Concepts, Architecture and Design – Part 5
  • Cloud Concepts, Architecture and Design – Part 6
  • Cloud Concepts, Architecture and Design – Part 7
  • Cloud Concepts, Architecture and Design – Part 8
  • Cloud Concepts, Architecture and Design – Part 9

Legal, Risk and Compliance

  • Legal, Risk and Compliance Part 1
  • Legal, Risk and Compliance Part 2
  • Legal, Risk and Compliance Part 3
  • Legal, Risk and Compliance Part 4
  • Legal, Risk and Compliance Part 5
  • Legal, Risk and Compliance Part 6
  • Legal, Risk and Compliance Part 7

Cloud Data Security

  • Cloud Data Security – Part 1
  • Cloud Data Security – Part 2
  • Cloud Data Security – Part 3
  • Cloud Data Security – Part 4
  • Cloud Data Security – Part 5
  • Cloud Data Security – Part 6
  • Cloud Data Security – Part 7

Cloud Platform and Infrastructure Security

  • Cloud Platform and Infrastructure Security – Part 1
  • Cloud Platform and Infrastructure Security – Part 2
  • Cloud Platform and Infrastructure Security – Part 3
  • Cloud Platform and Infrastructure Security – Part 4
  • Cloud Platform and Infrastructure Security – Part 5
  • Cloud Platform and Infrastructure Security – Part 6
  • Cloud Platform and Infrastructure Security – Part 7
  • Cloud Platform and Infrastructure Security – Part 8

Cloud Application Security

  • Cloud Application Security – Part 1
  • Cloud Application Security – Part 2
  • Cloud Application Security – Part 3
  • Cloud Application Security – Part 4
  • Cloud Application Security – Part 5
  • Cloud Application Security – Part 6
  • Cloud Application Security – Part 7
  • Cloud Application Security – Part 8
  • Cloud Application Security – Part 9

Cloud Security Operations

  • Cloud Security Operations – Part 1
  • Cloud Security Operations – Part 2
  • Cloud Security Operations – Part 3
  • Cloud Security Operations – Part 4
  • Cloud Security Operations – Part 5
  • Cloud Security Operations – Part 6
  • Cloud Security Operations – Part 7
  • Cloud Security Operations – Part 8
  • Cloud Security Operations – Part 9
  • Cloud Security Operations – Part 10
  • Cloud Security Operations – Part 11
  • Course Outro

Module 1 – Introduction To Ethical Hacking

  • 1.0 Introduction to CEH v12
  • 1.1 Elements of Security
  • 1.2 Cyber Kill Chain
  • 1.3 MITRE ATT&CK Framework
  • 1.3.1 Activity – Researching the MITRE ATTACK Framework
  • 1.4 Hacking
  • 1.5 Ethical Hacking
  • 1.6 Information Assurance
  • 1.7 Risk Management
  • 1.8 Incident Management
  • 1.9 Information Security Laws and Standards
  • 1.10 Introduction to Ethical Hacking Review

Module 2: Footprinting and Reconnaissance

  • 2.1 Footprinting Concepts
  • 2.2 OSINT Tools
  • 2.2.1 Activity – Conduct OSINT with OSR Framework
  • 2.2.2 Activity – OSINT with theHarvester
  • 2.2.3 Activity – Add API Keys to theHarvester
  • 2.2.4 Activity – Extract Document Metadata with FOCA
  • 2.2.5 Activity – Extract Document Metadata with FOCA
  • 2.3 Advanced Google Search
  • 2.3.1 Activity – Google Hacking
  • 2.4 Whois Footprinting
  • 2.4.1 Activity – Conducting Whois Research
  • 2.5 DNS Footprinting
  • 2.5.1 Activity – Query DNS with NSLOOKUP
  • 2.6 Website Footprinting
  • 2.6.1 Activity – Fingerprint a Webserver with ID Serve
  • 2.6.2 Activity – Extract Data from Websites
  • 2.6.3 Activity – Mirror a Website with HTTrack
  • 2.7 Email Footprinting
  • 2.7.1 Activity – Trace a Suspicious Email
  • 2.8 Network Footprinting
  • 2.9 Social Network Footprinting
  • 2.10 Footprinting and Reconnaissance Countermeasures
  • 2.11 Footprinting and Reconnaissance Review

Module 3: Scanning Networks

  • 3.1 Scanning Concepts
  • 3.2 Discovery Scans
  • 3.2.1 Activity – ICMP ECHO and ARP Pings
  • 3.2.2 Activity – Host Discovery with Angry IP Scanner
  • 3.3 Port Scans
  • 3.3.1 Activity – Port Scan with Angry IP Scanner
  • 3.4 Other Scan Types
  • 3.5 Scanning Tools
  • 3.5.1 Activity – Hping3 Packet Crafting
  • 3.5.2 Activity – Fingerprinting with Zenmap
  • 3.6 NMAP
  • 3.6.1 Activity – Nmap Basic Scans
  • 3.6.2 Activity – Host Discovery with Nmap
  • 3.6.3 – Activity – Nmap Version Detection
  • 3.6.4 Activity – Nmap Idle (Zombie) Scan
  • 3.6.5 Activity – Nmap FTP Bounce Scan
  • 3.6.6 – Activity – NMAP Scripts
  • 3.7 Firewall and IDS Evasion
  • 3.7.1 Activity – Nmap Advanced Scans
  • 3.8 Proxies
  • 3.9 Scanning Countermeasures
  • 3.10 Scanning Networks Review

Module 4: Enumeration

  • 4.1 Enumeration Overview
  • 4.2 SMB_NetBIOS_Enumeration
  • 4.2.1 Activity – Enumerate NetBIOS Information with Hyena
  • 4.3 File Transfer Enumeration
  • 4.4 WMI Enumeration
  • 4.4.1 – Activity – Enumerating WMI with Hyena
  • 4.5 SNMP Enumeration
  • 4.5.1 Activity – Enumerate WMI, SNMP and Other Information Using SoftPerfect
  • 4.6 LDAP Enumeration
  • 4.7 DNS Enumeration
  • 4.8 SMTP Enumeration
  • 4.8.1 Activity – Enumerate Email Users with SMTP
  • 4.9 Remote Connection Enumeration
  • 4.10 Website Enumeration
  • 4.10.1 Activity – Enumerate a Website with DirBuster
  • 4.11 Other Enumeration Types
  • 4.12 Enumeration Countermeasures and Review

Module 5: Vulnerability Analysis

  • 5.1 Vulnerability Scanning
  • 5.1.1 Vulnerability Scanning with OpenVAS
  • 5.2 Vulnerability Assessment
  • 5.3 Vulnerability Analysis Review

Module 6: System Hacking

  • 6.1 System Hacking Concepts
  • 6.2 Common OS Exploits
  • 6.3 Buffer Overflows
  • 6.3.1 Activity – Performing a Buffer Overflow
  • 6.4 System Hacking Tools and Frameworks
  • 6.4.1 Activity – Hack a Linux Target from Start to Finish
  • 6.5 Metasploit
  • 6.5.1 Activity – Get Started with Metasploit
  • 6.6 Meterpreter
  • 6.7 Keylogging and Spyware
  • 6.7.1 Activity – Keylogging with Meterpreter
  • 6.8 Netcat
  • 6.8.1 Activity – Using Netcat
  • 6.9 Hacking Windows
  • 6.9.1 Activity – Hacking Windows with Eternal Blue
  • 6.10 Hacking Linux
  • 6.11 Password Attacks
  • 6.11.1 Activity – Pass the Hash
  • 6.11.2 Activity – Password Spraying
  • 6.12 Password Cracking Tools
  • 6.13 Windows Password Cracking
  • 6.13.1 Activity – Cracking Windows Passwords
  • 6.13.2 Activity – Cracking Password Hashes with Hashcat
  • 6.14 Linux Password Cracking
  • 6.15 Other Methods for Obtaining Passwords
  • 6.16 Network Service Attacks
  • 6.16.1 Activity – Brute Forcing a Network Service with Medusa
  • 6.17 Post Exploitation
  • 6.18 Pivoting
  • 6.18.1 Activity – Pivoting Setup
  • 6.19 Maintaining Access
  • 6.19.1 Activity – Persistence
  • 6.20 Hiding Data
  • 6.20.1 Activity – Hiding Data Using Least Significant Bit Steganography
  • 6.21 Covering Tracks
  • 6.21.1 Activity – Clearing Tracks in Windows
  • 6.21.2 Activity – View and Clear Audit Policies with Auditpol
  • 6.22 System Hacking Countermeasures
  • 6.23 System Hacking Review

Module 7: Malware Threats

  • 7.1 Malware Overview
  • 7.2 Viruses
  • 7.3 Trojans
  • 7.3.1 Activity – Deploying a RAT
  • 7.4 Rootkits
  • 7.5 Other Malware
  • 7.6 Advanced Persistent Threat
  • 7.7 Malware Makers
  • 7.7.1 Activity – Creating a Malware Dropper and Handler
  • 7.8 Malware Detection
  • 7.9 Malware Analysis
  • 7.9.1 Activity – Performing a Static Code Review
  • 7.9.2 Activity – Analyzing the SolarWinds Orion Hack
  • 7.10 Malware Countermeasures
  • 7.11 Malware Threats Review

Module 8: Sniffing

  • 8.1 Network Sniffing
  • 8.2 Sniffing Tools
  • 8.2.1 Activity- Sniffing HTTP with Wireshark
  • 8.2.2 Activity – Capturing Files from SMB
  • 8.3 ARP and MAC Attacks
  • 8.3.1 Activity – Performing an MITM Attack with Ettercap
  • 8.4 Name Resolution Attacks
  • 8.4.1 Activity – Spoofing Responses with Responder
  • 8.5 Other Layer 2 Attacks
  • 8.6 Sniffing Countermeasures
  • 8.7 Sniffing Review

Module 9: Social Engineering

  • 9.1 Social Engineering Concepts
  • 9.2 Social Engineering Techniques
  • 9.2.1 Activity – Deploying a Baited USB Stick
  • 9.2.2 Activity – Using an O.MG Lightning Cable
  • 9.3 Social Engineering Tools
  • 9.3.1 Activity – Phishing for Credentials
  • 9.4 Social Media, Identity Theft, Insider Threats
  • 9.5 Social Engineering Countermeasures
  • 9.6 Social Engineering Review

Module 10: Denial-of-Service

  • 10.1 DoS-DDoS Concepts
  • 10.2 Volumetric Attacks
  • 10.3 Fragmentation Attacks
  • 10.4 State Exhaustion Attacks
  • 10.5 Application Layer Attacks
  • 10.5.1 Activity – Performing a LOIC Attack
  • 10.5.2 Activity – Performing a HOIC Attack
  • 10.5.3 Activity – Conducting a Slowloris Attack
  • 10.6 Other Attacks
  • 10.7 DoS Tools
  • 10.8 DoS Countermeasures
  • 10.9 DoS Review

Module 11: Session Hijacking

  • 11.1 Session Hijacking
  • 11.2 Compromising a Session Token
  • 11.3 XSS
  • 11.4 CSRF
  • 11.5 Other Web Hijacking Attacks
  • 11.6 Network-Level Session Hijacking
  • 11.6.1 Activity – Hijack a Telnet Session
  • 11.7 Session Hijacking Tools
  • 11.8 Session Hijacking Countermeasures
  • 11.9 Session Hijacking Review

Module 12: Evading IDS, Firewalls, and Honeypots

  • 12.1 Types of IDS
  • 12.2 Snort
  • 12.3 System Logs
  • 12.4 IDS Considerations
  • 12.5 IDS Evasion
  • 12.5.1 Activity – Fly Below IDS Radar
  • 12.6 Firewalls
  • 12.7 Packet Filtering Rules
  • 12.8 Firewall Deployments
  • 12.9 Split DNS
  • 12.10 Firewall Product Types
  • 12.11 Firewall Evasion
  • 12.11.1 Activity – Use Social Engineering to Bypass a Windows Firewall
  • 12.11.2 Activity – Busting the DOM for WAF Evasion
  • 12.12 Honeypots
  • 12.13 Honeypot Detection and Evasion
  • 12.13.1 Activity – Test and Analyze a Honey Pot
  • 12.14 Evading IDS, Firewalls, and Honeypots Review

Module 13: Hacking Web Servers

  • 13.1 Web Server Operations
  • 13.2 Hacking Web Servers
  • 13.3 Common Web Server Attacks
  • 13.3.1 Activity – Defacing a Website
  • 13.4 Web Server Attack Tools
  • 13.5 Hacking Web Servers Countermeasures
  • 13.6 Hacking Web Servers Review

Module 14: Hacking Web Applications

  • 14.1 Web Application Concepts
  • 14.2 Attacking Web Apps
  • 14.3 A01 Broken Access Control
  • 14.4 A02 Cryptographic Failures
  • 14.5 A03 Injection
  • 14.5.1 Activity – Command Injection
  • 14.6 A04 Insecure Design
  • 14.7 A05 Security Misconfiguration
  • 14.8 A06 Vulnerable and Outdated Components
  • 14.9 A07 Identification and Authentication Failures
  • 14.10 A08 Software and Data integrity Failures
  • 14.11 A09 Security Logging and Monitoring Failures
  • 14.12 A10 Server-Side Request Forgery
  • 14.13 XSS Attacks
  • 14.13.1 Activity – XSS Walkthrough
  • 14.13.2 Activity – Inject a Malicious iFrame with XXS
  • 14.14 CSRF
  • 14.15 Parameter Tampering
  • 14.15.1 Activity – Parameter Tampering with Burp
  • 14.16 Clickjacking
  • 14.17 SQL Injection
  • 14.18 Insecure Deserialization Attacks
  • 14.19 IDOR
  • 14.19.1 Activity – Hacking with IDOR
  • 14.20 Directory Traversal
  • 14.21 Session Management Attacks
  • 14.22 Response Splitting
  • 14.23 Overflow Attacks
  • 14.24 XXE Attacks
  • 14.25 Web App DoS
  • 14.26 Soap Attacks
  • 14.27 AJAX Attacks
  • 14.28 Web API Hacking
  • 14.29 Webhooks and Web Shells
  • 14.30 Web App Hacking Tools
  • 14.31 Hacking Web Applications Countermeasures
  • 14.32 Hacking Web Applications Review

Module 15: SQL Injection

  • 15.1 SQL Injection Overview
  • 15.2 Basic SQL Injection
  • 15.3 Finding Vulnerable Websites
  • 15.4 Error-based SQL Injection
  • 15.5 Union SQL Injection
  • 15.5.1 Activity – Testing SQLi on a Live Website – Part 1
  • 15.5.2 Activity – Testing SQLi on a Live Website – Part 2
  • 15.6 Blind SQL Injection
  • 15.7 SQL Injection Tools
  • 15.7.1 Activity – SQL Injection Using SQLmap
  • 15.8 Evading Detection
  • 15.9 Analyzing SQL Injection
  • 15.10 SQL Injection Countermeasures
  • 15.11 SQL Injection Review

Module 16: Hacking Wireless Networks

  • 16.1 Wireless Concepts
  • 16.2 Wireless Security Standards
  • 16.3 WI-FI Discovery Tools
  • 16.4 Common Wi-Fi Attacks
  • 16.5 Wi-Fi Password Cracking
  • 16.6 WEP Cracking
  • 16.6.1 Activity – Cracking WEP
  • 16.7 WPA,WPA2,WPA3 Cracking
  • 16.7.1 Activity – WPA KRACK Attack
  • 16.8 WPS Cracking
  • 16.9 Bluetooth Hacking
  • 16.10 Other Wireless Hacking
  • 16.10.1 Activity – Cloning an RFID badge
  • 16.10.2 Activity – Hacking with a Flipper Zero
  • 16.11 Wireless Security Tools
  • 16.12 Wireless Hacking Countermeasures
  • 16.13 Hacking Wireless Networks Review

Module 17: Hacking Mobile Platforms

  • 17.1 Mobile Device Overview
  • 17.2 Mobile Device Attacks
  • 17.3 Android Vulnerabilities
  • 17.4 Rooting Android
  • 17.5 Android Exploits
  • 17.5.1 Activity – Hacking Android
  • 17.5.2 Activity – Using a Mobile Device in a DDoS Campaign
  • 17.6 Android-based Hacking Tools
  • 17.7 Reverse Engineering an Android App
  • 17.8 Securing Android
  • 17.9 iOS Overview
  • 17.10 Jailbreaking iOS
  • 17.11 iOS Exploits
  • 17.12 iOS-based Hacking Tools
  • 17.13 Reverse Engineering an iOS App
  • 17.14 Securing iOS
  • 17.15 Mobile Device Management
  • 17.16 Hacking Mobile Platforms Countermeasures
  • 17.17 Hacking Mobile Platforms Review

Module 18: IoT AND OT Hacking

  • 18.1 IoT Overview
  • 18.2 IoT Infrastructure
  • 18.3 IoT Vulnerabilities and Threats
  • 18.3.1 Activity – Searching for Vulnerable IoT Devices
  • 18.4 IoT Hacking Methodology and Tools
  • 18.5 IoT Hacking Countermeasures
  • 18.6 OT Concepts
  • 18.7 IT-OT Convergence
  • 18.8 OT Components
  • 18.9 OT Vulnerabilities
  • 18.10 OT Attack Methodology and Tools
  • 18.11 OT Hacking Countermeasures
  • 18.12 IoT and OT Hacking Review

Module 19: Cloud Computing

  • 19.1 Cloud Computing Concepts
  • 19.2 Cloud Types
  • 19.3 Cloud Benefits and Considerations
  • 19.4 Cloud Risks and Vulnerabilities
  • 19.5 Cloud Threats and Countermeasures
  • 19.5.1 Activity – Hacking S3 Buckets
  • 19.6 Cloud Security Tools And Best Practices
  • 19.7 Cloud Computing Review

Module 20: Cryptography

  • 20.1 Cryptography Concepts
  • 20.2 Symmetric Encryption
  • 20.2.1 Activity – Symmetric Encryption
  • 20.3 Asymmetric Encryption
  • 20.3.1 Activity – Asymmetric Encryption
  • 20.4 Public Key Exchange20.5 PKI
  • 20.5.1 Activity – Generating and Using an Asymmetric Key Pair
  • 20.6 Digital Signatures
  • 20.7 Hashing
  • 20.7.1 Activity – Calculating Hashes
  • 20.8 Common Cryptography Use Cases
  • 20.9 Cryptography Tools
  • 20.10 Cryptography Attacks
  • 20.11 Cryptography Review
  • 20.12 Course Conclusion

Module 1 – Introduction to Ethical Hacking

  • Introduction
  • Introduction to Hacking
  • Information Security Threats and Attack Vectors
  • Hacking Concepts
  • Ethical Hacking Concepts and Scope
  • Information Security Controls Part 1
  • Information Security Controls Part 2
  • Information Security Laws and Standards

Module 2 – Footprinting and Reconnaissance

  • Footprinting and Reconnaissance
  • Footprinting Methodology
  • Google Hacking
  • FootPrinting Through Social Networking
  • Website Foot Printing
  • Email Foot Printing
  • Competitive Intelligence Gathering
  • WhoIs Foot Printing
  • DNS Logical and Geographical Foot Printing
  • Network Footprinting
  • Foot Printing
  • Foot Printing Tools
  • Foot Printing Penetration Testing
  • Conduct Recon with Ping Act
  • Query DNS with NSLookUp Act
  • Discover Website Subdomain with Sublist3r Act
  • Obtain OSINT Information About a Person wit Pipl Act
  • Gather Contact and Host Information with theHarvester Act
  • Automate OSINT Research with Recon-ng Act
  • Get Started with Metasploit Act
  • Conduct Open Source Intelligence with OSR Framework Act
  • Obtain Whois Information with Smart Whois Act
  • Extract Links, URLs, and Emails from Websites with Web Data Extractor Act
  • Create an Offline Copy of a Website with HTTrack Act
  • Trace an Email with eMail Tracker Pro Act

Module 3 – Network Scanning

  • Network Scanning
  • Discovery Scans
  • Port Scans
  • Nmap
  • Nmap Stealth Scans
  • Nmap Options
  • H-ping and Other Scanners
  • SSDP Scanning
  • Scanning Beyond IDS and Firewall
  • Banner Grabbing
  • Scanning Pen Testing
  • Checking for Live Systems with Angry IP Scanner Act
  • Network Scanning with MegaPing Act
  • Advanced Scanning with nmap Act
  • Packet Crafting with Hping3 Act
  • Packet Crafting with Colasoft Packet Builder Act

Module 4 – Enumeration

  • Enumeration
  • Enumeration Technicques Tools
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP and DNS Enumeration
  • Enumeration Countermeasures
  • Enumeration Penetration Testing
  • Enumerate NetBIOS Information with SuperScan Act
  • Enumerate NetBIOS Information with NetBIOS Enumerator Act
  • Enumerate NetBIOS and LDAP Information with Hyena Act
  • Enumerate SNMP WMI and Other Information Using SoftPerfect Network Scanner Act

Module 5 – Vulnerability Analysis

  • Vulnerability Analysis
  • Vulnerability Assessment Solutions
  • Vulnerability Scoring Systems
  • Vulnerability Assessment Tools and Reports
  • Perform a Vulnerability Scan and Analysis with Nessus Act

Module 6 – Malware Threats

  • Malware Threats
  • Trojan Concepts
  • Trojan Types
  • Trojan Tools
  • Virus and Worm Concepts
  • Virus Types
  • Malware Analysis
  • Malware Reverse Engineering
  • Malware Detection
  • Malware Countermeasures
  • Malware Penetration Testing
  • Infect a Victim with a Remote Access Trojan Act

Module 7 – Sniffing

  • Sniffing Concepts
  • DHCP Attacks
  • MAC Attacks
  • ARP Poisoning
  • DNS Poisoning
  • Sniffing Tools
  • Sniffing Countermeasures
  • Sniff a Clear Text HTTP Session with Wireshark Act
  • Intercept and Crack a Network Login Act

Module 8 – Social Engineering

  • Social Engineering
  • Human Based Social Engineering
  • Computer Based Social Engineering
  • Additional Types of Social Enginnering
  • Social Engineering Countermeasures
  • Social Engineering Penetration Testing
  • Fool a User with a Baited USB Stick Act
  • Harvest Credentials with Spear Phishing Act

Module 9 – Denial of Service

  • Denial of Service
  • Common Dos-DDoS Attack Types
  • Additional DoS Attack Types
  • BotNets
  • DoS Countermeasures
  • Additional DoS Countermeasures
  • DoS Penetration Testing
  • Perform a DoS Attack With the Low Orbit ION Cannon Act
  • Step Up the DoS Attack With the High Orbit ION Cannon Act
  • Perform a Slowloris DoS Attack Act

Module 10 – Session Hijacking

  • Session Hijacking
  • Browser Session Hijacking
  • Way to Compromise a Session Token
  • Client Side Attacks
  • Hijacking at the Network Level
  • Session Hijacking Tools
  • Session Hijacking Countermeasures
  • Session Hijacking Testing
  • Perform a MITM Attack with Ettercap Act

Module 11 – Hacking Webservers

  • Hacking Web Servers
  • Webserver Attacks
  • Methodology of Webserver Attacks
  • Webserver Attack and Defense Tools
  • Webserver General Defense
  • Webserver Specific Attack Countermeasures
  • Webserver Patch Management
  • Webserver Pen Testing
  • Footprint a Web Server with IDServe Act
  • Conduct a Simple Web Server Vulnerability Scan with Uniscan Act
  • Conduct a Comprehensive Web Server Vulnerability Scan with Uniscan Act
  • Brute Force a Web Server with Medusa Act

Module 12 – Hacking Web Applications

  • Hacking Web Applications
  • Web App Vulnerabilities and Exploits
  • Web Application Threats
  • Injection Attacks
  • Hidden Fields and Clickjacking
  • Cross Site Attacks
  • Additional Web App Attacks
  • Web Hacking Methodology
  • Web App Hacking Countermeasures
  • Web App Security Tools
  • Web Application Penetration Testing
  • Conduct a Simple Command Injection Attack Act
  • Inject a Malicious Link with Cross Site Scripting Act
  • Conduct a Cross Site Request Forgery Attack

Module 13 – SQL Injection

  • SQL Injection
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • SQL Injection Countermeasures
  • SQL Injection Penetration Testing
  • SQL Injection Act

Module 14 – Hacking Wireless Networks

  • Hacking Wireless Networks
  • Wireless Discovery and Mapping
  • WiFi Sniffers
  • WiFi Attacks
  • WiFi Cracking
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Wireless Hacking Countermeasures
  • Wireless Security Tools
  • Wireless Penetration Testing
  • Crack a WEP Key with Aircrack-ng Act
  • Crack a WPA Key with Aircrack-ng Act

Module 15 – System Hacking

  • System Hacking Methodology
  • Windows System Vulnerabilities and Exploits
  • Linux System Vulnerablities and Exploits
  • Password Cracking Methods
  • Network Service Password Cracking
  • Windows Password Cracking
  • Linux Password Cracking
  • Password Cracking Tools
  • Other Methods of Obtaining Passwords
  • Keylogging
  • Spyware
  • RootKits
  • Hiding Files
  • Steganography
  • Privilege Escalation
  • Creating and Maintaining Remote Access
  • Hiding Evidence
  • System Hacking Penetration Testing
  • Spoof Name Resolution and Capture Credentials with Responder Act
  • Dump and Crack Password Hashes with pwdump7 and Ophcrack Act
  • Crack Passwords with L0pht7 Act
  • Exploit Client Side Vulnerabilities Act
  • Track User Activity with Spyware Act
  • View and Clear Audit Policies with Auditpol Act
  • Hide Data Using Whitespace Steganography Act
  • Hide Data Using Least Significant Bit Steganography Act
  • Cover Your Tracks Act

Module 16 – Hacking Mobile Platforms

  • Hacking Mobile Platforms
  • Hacking Android OS
  • Rooting Android
  • Securing Android
  • Hacking iOS
  • Jailbreaking iOS
  • Securing iOS
  • Hacking Windows Phone OS
  • Hacking Blackberry
  • Mobile Device Management
  • Mobile Security Guidelines and Tools
  • Mobile Penetration Testing
  • Prepare Your Wireless Email Environment Act
  • Pwn a Mobile Device with Metasploit Act
  • Use a Mobile Device in a DDoS Campaign Act
  • Return Your VMs to Original Configuration Act
  • Uninstall Main Activity Malware from Android Act

Module 17 – Evading IDS, Firewalls, and Honeypots

  • Evading IDS Firewalls and Honeypots
  • Firewalls
  • Honeypots
  • IDS Firewalls and Honeypots Tools
  • Evasion
  • Evasion Countermeasures
  • IDS Firewall Honeypot Penetration Testing
  • Fly Below IDS Radar Act
  • Test and Analyze a Honey Pot Act
  • Bypass Windows Firewall Act

Module 18 – Cryptography

  • Cryptography
  • Encryption Algorithms
  • Cryptography Tools
  • Public key Infrastructure
  • Email Encryption
  • Disk Encryption
  • Cryptography Attacks
  • Crytography Penetration Testing
  • Examine Hashing Algorithms Act
  • Protect Data with Symmetric Encryption Act
  • Protect Data with Asymmetric Encryption Act

Module 19 – Cloud Computing

  • Cloud Computing
  • Virtualization
  • Cloud Computing Threats
  • Countermeasures to Cloud Computing Threats
  • Cloud Computing Attacks
  • Cloud Security
  • Cloud Security Best Practices
  • Cloud Penetration Testing

Module 20 – IoT Hacking

  • IoT Hacking
  • IoT Vulnerabilities and Attacks
  • IoT Hacking Methodology and Tools
  • IoT Hacking Countermeasures
  • IoT Penetration Testing
  • Search the Internet for Vulnerable IoT Devices Act
  • Conclusion

Lesson 1

 

  • Introduction
  • Audit Process
  • Auditing Standards
  • Auditing Guidelines
  • Cobit Model
  • Audit Management
  • Internal Control Classifications
  • Planning
  • Program
  • Evidence
  • Audit Control Evaluation
  • CSA Control Self-Assessment

Lesson 2

  • IT Governance
  • Governance & Security Policies
  • Outsourcing & Governance
  • Outsourcing & Globalization
  • Organizational Compliance
  • IT Strategy
  • IT Performance

Lesson 3

  • System & Infrastructure
  • Requirements
  • Project Management Tools – Part 1
  • Project Management Tools – Part 2
  • Applications
  • Agile Development
  • Monitoring & Controlling
  • Acquisition Process
  • Testing Process
  • Information Systems Maintenance Practices
  • Data Conversion Tools

Lesson 4

  • Media Disposal Process
  • Post Implementation Review
  • Periodic Review
  • System Maintenance

Lesson 5

  • IT Service Delivery and Support
  • How to Evalutate Service Level Management Practices
  • Operations Management
  • Databases
  • Structured Query Language (SQL)
  • Monitoring Performance
  • Source Code and Perfomance Monitoring
  • Patch Management
  • Incident Management
  • Hardware Component Types
  • Network Component Types

Lesson 6

  • IS Auditor Technical Overview
  • Security Design
  • Monitoring Systems
  • Types of Attacks
  • Cryptography
  • Encryption
  • Asymmetric Encryption
  • Digital Certificate
  • Different Kinds of Attacks
  • Access Controls
  • Identification and Authenication
  • Physical Access Exposure
  • Environmental Security
  • Network Security Devices and Network Components
  • Network Address Translation
  • Virtual Private Networks (VPNs)
  • Voice System Risks
  • Intrusion Detection
  • Firewalls
  • Firewall Implementation
  • Network Access Protection
  • HoneyPot
  • Risks to Portable and Wireless Devices
  • Bluetooth
  • OSI Networking
  • Managing Data

Lesson 7

  • Business Continuity and Disaster Recovery
  • Fault Tolerance
  • Business Continuity and Disaster Recovery Regulations

Module 1: Security and Risk Management

  • Introduction
  • CIA Triad Security Governance – Part 1
  • CIA Triad Security Governance – Part 2
  • Compliance Legal And Regulatory Issues – Part 1
  • Compliance Legal And Regulatory Issues – Part 2
  • Understanding Professional Ethics – Part 1
  • Understanding Professional Ethics – Part 2
  • Risk Management – Part 1
  • Risk Management – Part 2
  • Threat Modeling Acquisition Strategy And Practice Security Awareness And Training – Part 1
  • Threat Modeling Acquisition Strategy And Practice Security Awareness And Training – Part 2

Module 2: Asset Security

  • Asset Security – Part 1
  • Asset Security – Part 2

Module 3: Security Engineering

  • Engineering And Management Of Security – Part 1
  • Engineering And Management Of Security – Part 2
  • Engineering And Management Of Security – Part 3
  • Engineering And Management Of Security – Part 4
  • Engineering And Management Of Security – Part 5
  • Engineering And Management Of Security – Part 6

Module 4: Communication and Network Security

  • Apply Secure Design Principles To Networks – Part 1
  • Apply Secure Design Principles To Networks – Part 2
  • Apply Secure Design Principles To Networks – Part 3
  • Apply Secure Design Principles To Networks – Part 4
  • Apply Secure Design Principles To Networks – Part 5
  • Apply Secure Design Principles To Networks – Part 6
  • Securing Network Components – Part 1
  • Securing Network Components – Part 2
  • Design And Establish Secure Communication Channels – Part 1
  • Design And Establish Secure Communication Channels – Part 2
  • Design And Establish Secure Communication Channels – Part 3

Module 5: Identity and Access Management

  • Controlling Access And Managing Identity – Part 1
  • Controlling Access And Managing Identity – Part 2
  • Controlling Access And Managing Identity – Part 3
  • Controlling Access And Managing Identity – Part 4

Module 6: Security Assessment Testing

  • Designing Performing And Analyzing Security Testing

Module 7: Security Operations

  • Foundational Concepts And Investigations – Part 1
  • Foundational Concepts And Investigations – Part 2
  • Incident Management And Preventative Measures – Part 1
  • Incident Management And Preventative Measures – Part 2
  • Disaster Recovery Process – Part 1
  • Disaster Recovery Process – Part 2

Module 8: Software Development Security

  • Understanding Applying And Enforcing Software Security – Part 1
  • Understanding Applying And Enforcing Software Security – Part 2
  • Conclusion

Module 1: Security and Risk Management

 

  • Module 1 Notes
  • Intro
  • Security and Risk Management pt.1
  • Security and Risk Management pt.2
  • Security and Risk Management pt.3
  • Security and Risk Management Summary
  • Security and Risk Management Test Prep pt.1
  • Security and Risk Management Test Prep pt.2
  • Security and Risk Management Test Prep pt.3
  • Security and Risk Management Test Prep pt.4

Module 2: Asset Security

  • Module 2 Notes
  • Asset Secutity pt.1
  • Asset Security pt.2
  • Asset Security Summary
  • Asset Security Test Prep

Module 3: Security Architecture and Engineering

  • Module 3 Notes
  • Security Architecture and Engineering pt.1
  • Security Architecture and Engineering pt.2
  • Security Architecture and Engineering pt.3
  • Security Architecture and Engineering Summary
  • Security Architecture and Engineering Test Prep pt.1
  • Security Architecture and Engineering Test Prep pt.2
  • Security Architecture and Engineering Test Prep pt.3

Module 4: Communication and Network Security

  • Module 4 Notes
  • Communication and Network Security pt.1
  • Communication and Network Security pt.2
  • Communication and Network Security Summary
  • Communication and Network Security Test Prep

Module 5: Identity and Access Management (IAM)

  • Module 5 Notes
  • Identity and Access Management (IAM)
  • Identity and Access Management (IAM) Summary
  • Identity and Access Management (IAM) Test Prep pt.1
  • Identity and Access Management (IAM) Test Prep pt.2
  • Identity and Access Management (IAM) Test Prep pt.3
  • Identity and Access Management (IAM) Test Prep pt.4

Module 6: Security Assessment and Testing

  • Module 6 Notes
  • Security Assessment and Testing
  • Security Assessment and Testing Summary
  • Security Assessment and Testing Test Prep

Module 7: Security Operations

  • Module 7 Notes
  • Security Operations pt.1
  • Security Operations pt.2
  • Security Operations pt.3
  • Security Operations pt.4
  • Security Operations Summary
  • Security Operations Test Prep

Module 8: Software Development Security

  • Module 8 Notes
  • Software Development Security pt.1
  • Software Development Security pt.2
  • Software Development Security pt.3
  • Software Development Security pt.4
  • Software Development Security pt.5
  • Software Development Security Summary
  • Software Development Security Test Prep
  • Outro

Module 1: Computer Forensics Introduction

  • Intro To Course-Part1
  • Intro To Course-Part2
  • Intro To Course-Part3
  • Intro To Course-Part4
  • Intro To Course-Part5
  • Intro To Forensics-Part1
  • Intro To Forensics-Part2
  • Intro To Forensics-Part3
  • Intro To Forensics-Part4
  • Intro To Forensics-Part5
  • Intro To Forensics-Part6
  • Intro To Forensics-Part7
  • Intro To Forensics-Part8

Module 2: Forensics Investigation Process

  • Forensics Investigation Process-Part1
  • Forensics Investigation Process-Part2
  • Forensics Investigation Process-Part3
  • Forensics Investigation Process-Part4
  • Forensics Investigation Process-Part5
  • Forensics Investigation Process-Part6
  • Forensics Investigation Process-Part7
  • Forensics Investigation Process-Part8
  • Forensics Investigation Process-Part9
  • Forensics Investigation Process-Part10

Module 3: Searching and Seizing

  • Searching And Seizing-Part1
  • Searching And Seizing-Part2
  • Searching And Seizing-Part3
  • Searching And Seizing-Part4
  • Searching And Seizing-Part5

Module 4: Digital Evidence

  • Digital Evidence-Part1
  • Digital Evidence-Part2
  • Digital Evidence-Part3
  • Digital Evidence-Part4
  • Digital Evidence-Part5
  • Digital Evidence-Part6
  • Digital Evidence-Part7

Module 5: First Responder Procedures

  • First Responder Procedures-Part1
  • First Responder Procedures-Part2
  • First Responder Procedures-Part3
  • First Responder Procedures-Part4
  • First Responder Procedures-Part5
  • First Responder Procedures-Part6
  • First Responder Procedures-Part7
  • First Responder Procedures-Part8

Module 6: Forensics Lab

  • Forensic Lab-Part1
  • Forensic Lab-Part2
  • Forensic Lab-Part3
  • Forensic Lab-Part4
  • Forensic Lab-Part5

Module 7: Hard Disks and File Systems

  • Hard Disks And File Systems-Part1
  • Hard Disks And File Systems-Part2
  • Hard Disks And File Systems-Part3
  • Hard Disks And File Systems-Part4
  • Hard Disks And File Systems-Part5
  • Hard Disks And File Systems-Part6
  • Hard Disks And File Systems-Part7
  • Hard Disks And File Systems-Part8
  • Hard Disks And File Systems-Part9
  • Hard Disks And File Systems-Part10

Module 8: Windows Forensics

  • Windows Forensics-Part1
  • Windows Forensics-Part2
  • Windows Forensics-Part3
  • Windows Forensics-Part4
  • Windows Forensics-Part5
  • Windows Forensics-Part6
  • Windows Forensics-Part7
  • Windows Forensics-Part8
  • Windows Forensics-Part9
  • Windows Forensics-Part10

Module 9: Data Acquisition and Duplication

  • Data Acquisition And Duplication-Part1
  • Data Acquisition And Duplication-Part2
  • Data Acquisition And Duplication-Part3
  • Data Acquisition And Duplication-Part4
  • Data Acquisition And Duplication-Part5
  • Data Acquisition And Duplication-Part6
  • Data Acquisition And Duplication-Part7

Module 10: Recovering Deleted Files and Partitions

  • Recovering Deleted Files And Partitions-Part1
  • Recovering Deleted Files And Partitions-Part2

Module 11: Using Access Data FTK

  • Using Access Data FTK And Special Steps-Part1
  • Using Access Data FTK And Special Steps-Part2
  • Using Access Data FTK And Special Steps-Part3
  • Using Access Data FTK And Special Steps-Part4
  • Using Access Data FTK And Special Steps-Part5
  • Using Access Data FTK And Special Steps-Part6
  • Using Access Data FTK And Special Steps-Part7
  • Using Access Data FTK And Special Steps-Part8

Module 12: Using EnCase

  • EnCase-Part1
  • EnCase-Part2
  • EnCase-Part3

Module 13: Steganography

  • Stenography-Part1
  • Stenography-Part2
  • Stenography-Part3
  • Stenography-Part4

Module 14: Password Crackers

  • Passwords-Part1
  • Passwords-Part2
  • Passwords-Part3
  • Passwords-Part4

Module 15: Log Correlation

  • Log Correlation-Part1
  • Log Correlation-Part2
  • Log Correlation-Part3
  • Log Correlation-Part4
  • Log Correlation-Part5
  • Log Correlation-Part6

Module 16: Network Forensics

  • Network Forensics-Part1
  • Network Forensics-Part2
  • Network Forensics-Part3
  • Network Forensics-Part4

Module 17: Wireless Attacks

  • Wireless Attacks-Part1
  • Wireless Attacks-Part2
  • Wireless Attacks-Part3

Module 18: Web Attacks

  • Web Attacks-Part1
  • Web Attacks-Part2
  • Web Attacks-Part3
  • Web Attacks-Part4
  • Web Attacks-Part5
  • Web Attacks-Part6
  • Web Attacks-Part7
  • Web Attacks-Part8

Module 19: Email Crimes

  • Email Crimes-Part1
  • Email Crimes-Part2
  • Email Crimes-Part3
  • Email Crimes-Part4

Module 20: Mobile Investigation

  • Mobile Investigation-Part1
  • Mobile Investigation-Part2
  • Mobile Investigation-Part3
  • Mobile Investigation-Part4
  • Mobile Investigation-Part5

Module 21: Investigative Reports

  • Investigation Reports-Part1
  • Investigation Reports-Part2
  • Investigation Reports-Part3
  • Investigation Reports-Part4

Module 22: Expert Witness

  • Expert Witness-Part1
  • Expert Witness-Part2
  • Expert Witness-Part3

odule 1: Cyber Security Awareness and Prevention

  • Course Introduction
  • Where We Are Today
  • Areas Of Protection
  • The Connection – Part 1
  • The Connection – Part 2
  • Network Protection
  • Browsing Blunders – Part 1
  • Browsing Blunders – Part 2
  • Settings – Part 1
  • Settings – Part 2
  • Settings – Part 3
  • Settings – Part 4
  • Cookies
  • Browsing Tips And Tricks
  • Email Can’t Hurt You Right – Part 1
  • Email Can’t Hurt You Right – Part 2
  • Viruses – Part 1
  • Viruses – Part 2
  • Viruses – Part 3

Module 2: Managing Mobile Device Security

  • Managing Mobile Device Security-Part1
  • Managing Mobile Device Security-Part2
  • Secure Access
  • Secure Access iPhone Demo
  • Secure Access Android Demo
  • Protect The Digital
  • Protect The Digital Android Demo
  • Protect The Digital iPhone Demo
  • Manage App Access
  • Manage App Access iPhone Demo
  • Manage App Access Android Demo
  • Stay Up To Date
  • Stay Up To Date Android Demo
  • Stay Up To Date iPhone Demo
  • Use Other Tools To Help
  • Prepare For The Worst
  • Prepare For The Worst-Android Demo
  • Prepare For The Worst-iPhone Demo
  • Best Practices
  • Course Conclusion

odule 1: Data Breaches And ID Theft

 

  • Course Introduction
  • Treat And Cost

Module 2: Device Security Basics

  • It’s All About YOU Part1
  • It’s All About YOU Part2

Module 3: Avoiding Inadvertent Disclosure

  • No More Oops Part1
  • No More Oops Part2

Module 4: Physical And Technical Safeguards

  • The DO Of Security Part1
  • The DO Of Security Part2
  • Course Conclusion

agile

Module 1: What Is Agile

  • Course And Instructor Introduction
  • What Is Agile – Part1
  • What Is Agile Part2 – Agile Manifesto Principles 1-6
  • What Is Agile Part3 – Agile Manifesto Principles 7-12
  • What Is Agile Part4 – Agile Manifesto Values
  • What Is Agile Part5 – Why Agile?
  • What Is Agile – Part6 – Misconceptions about Agile
  • What Is Agile Part7 – Agile Lifecycle
  • What Is Agile Part8 – Key Definitions
  • What Is Agile – Part9

Module 2: Projects And Projects Management In An Agile World

  • Projects And Project Management In An Agile World Part 1 – Historical Information
  • Projects And Project Management In An Agile World Part 2 – Organizational Projects
  • Projects And Project Management In An Agile World Part 3 – Traditional Projects
  • Projects And Project Management In An Agile World Part 4 – Roles
  • Projects And Project Management In An Agile World Part 5 – Roles 2

Module 3: Agile and Scrum

  • Agile And Scrum Part1 – In Depth
  • Agile And Scrum Part2 – Major Activities
  • Agile And Scrum Part3 – 3 Questions
  • Agile And Scrum Part4 – Sprints

Module 4: Common Scrum Terminology

  • Common Scrum Terminology-Part1
  • Common Scrum Terminology-Part2

Module 5: Other Iterative Methods

  • Other Iterative Methods

Module 6: Communication Skills In Agile World

  • Communication Skills In Agile World Part1 – Model
  • Communication Skills In Agile World Part2 – Verbal vs. Nonverbal
  • Communication Skills In Agile World Part3 – Learned Patterns
  • Communication Skills In Agile World Part4 – Key Skills
  • Communication Skills In Agile World Part5 – Key Skills
  • Communication Skills In Agile World Part6 – Conflict Resolution
  • Communication Skills In Agile World Part7 – Tuckman’s 5 Stages

Module 7: Using Agile Outside Software Development

  • Using Agile Outside Software Development-Part1
  • Using Agile Outside Software Development-Part2

Module 8: Case Studies Of Transitioning to Agile

  • Case Studies Of Transitioning To Agile-Part1
  • Case Studies Of Transitioning To Agile Part2 – Procurement
  • Case Studies Of Transitioning To Agile Part3 – In an Agile World
  • Case Studies Of Transitioning To Agile Part4 – Measurements

Module 9: Critique Of Agile

  • Critique Of Agile-Part1
  • Critique Of Agile-Part2

Module 10: Review Of Agile

  • Review Of Agile-Part1
  • Review Of Agile-Part2
  • Review Of Agile-Part3
  • Course Conclusion

Module 1 : Agile Principles and Mindset

  • Agile Introduction Scrum
  • Agile Core Principles Scrum
  • Lean Product Development Scrum
  • Agile Leadership Tasks Scrum
  • Agile Communications Scrum

Module 2 : Value Driven Delivery

  • Value Driven Delivery Scrum
  • Value Driven Delivery Scrum Part2

Module 3 : Stakeholder Engagement

  • Stakeholder Engagement Scrum
  • Facilitation Tools Scrum

Module 4 : Team Performance

  • Team Performance Scrum
  • Digital Tools for Distibuted Teams Scrum

Module 5 : Adaptive Planning

  • Adaptive Planning Scrum
  • Adaptive Planning Scrum Part2

Module 6 : Problem Detection and Resolution

  • Problem Detection and Resolution Scrum

Module 7 : Continuous Improvement

  • Continuous Improvement Scrum

Module 1 : Agile Principles and Mindset

  • Agile Introduction XP
  • Agile Core Principles XP
  • Lean Product Development XP
  • Agile Leadership Tasks XP
  • Agile Communications XP

Module 2 : Value Driven Delivery

  • Value Driven Delivery XP
  • Value Driven Delivery XP Part2

Module 3 : Stakeholder Engagement

  • Stakeholder Engagement XP
  • Facilitation Tools XP

Module 4 : Team Performance

  • Team Performance XP
  • Digital Tools for Distibuted Teams XP

Module 5 : Adaptive Planning

  • Adaptive Planning XP
  • Adaptive Planning Part2 XP

Module 6 : Problem Detection and Resolution

  • Problem Detection and Resolution XP

Module 7 : Continuous Improvement

  • Continuous Improvement XP
6

Module 1 – ChatGPT Fundamentals

  • 1.1 Course Welcome
  • 1.2 Instructor Introduction
  • 1.3 Download Course Resources
  • 1.4 ChatGPT Fundamentals
  • 1.5 What is ChatGPT
  • 1.6 Use Cases for ChatGPT
  • 1.7 Role of ChatGPT
  • 1.8 Future of ChatGPT
  • 1.9 ChatGPT Statistics, Facts & Trends
  • 1.10 Limitations
  • 1.11 What is a Chatbot
  • 1.12 Understanding AI-ML
  • 1.13 Demonstration – Tools to Use with ChatGPT
  • 1.14 Business Benefits
  • 1.15 Whiteboard – How it all works
  • 1.16 Demonstration – How to Get Started with ChatGPT
  • 1.17 Demonstration – Example Prompts
  • 1.18 Discussion – ChatGPT Performance Issues
  • 1.19 Module Summary

Module 2 – ChatGPT Prompt Demonstrations

  • 2.1 ChatGPT Prompt Demonstrations
  • 2.2 What is a Prompt
  • 2.3 Best Practices For Writing Prompts
  • 2.4 Prompt Demonstration – Asking Questions
  • 2.5 Prompt Demonstration – Top Ten Lists
  • 2.6 Prompt Demonstration – Long Form Docs
  • 2.7 Prompt Demonstration – Complex Form and Code
  • 2.8 Prompt Demonstration – Feedback
  • 2.9 Prompt Demonstration – Content Modification
  • 2.10 Prompt Demonstration – Instruction Generation
  • 2.11 Prompt Demonstration – Information Extraction
  • 2.12 Prompt Demonstration – Writing Computer Code
  • 2.13 Prompt Demonstration – Solving Math Problems
  • 2.14 Prompt Demonstration – Create YT Video Outline
  • 2.15 Prompt Demonstration – Write a Blog Article
  • 2.16 Prompt Demonstration – SEO Keywords
  • 2.17 Comparing Google Bard vs ChatGPT
  • 2.18 Module Summary
  • 2.19 Course Closeout

Module 1

Module 1

 

  • Instructor Intro
  • Course Intro
  • Course pt.1
  • Course pt.2
  • Course pt.3
  • Course pt.4
  • Instructor Intro
  • Course Intro
  • Course pt.1
  • Course pt.2
  • Course pt.3
  • Course pt.4

Module 1

 

  • Instructor Intro
  • Course Intro
  • Getting Images Ready for the Web
  • Setting Up Your Workspace
  • Creating a New Site

Module 2

  • Using Spark Post pt.1
  • Using Spark Post pt.2
  • Linking Your Web Pages
  • Adding Colors and Style
  • Creating a Page Visually in Photoshop
  • Importing Into Dreamweaver
  • Export Site to Web

Module 1 – Introduction to Adobe Illustrator 2022

  • 1.1 Instructor Bio
  • 1.2 Course Introduction

Module 2 – Getting Started with Adobe Illustrator 2022

  • 2.1 What are Vectors
  • 2.2 Creating a New Document
  • 2.3 Navigating the Interface

Module 3 – Drawing

  • 3.1 Drawing and Manipulating Primitive Shapes
  • 3.2 Drawing Custom Shapes
  • 3.3 Importing Images
  • 3.4 Understanding Layers and Sublayers
  • 3.5 Additional Drawing and Manipulation Tools

Module 4 – Colors and Gradients

  • 4.1 Color Theory
  • 4.2 In-depth dive into Color Palette4.3 Creating Color Swatches
  • 4.3.2 Gradient Mesh

Module 5 – Intermediate Illustration

  • 5.1 Appearance Palette
  • 5.2 Pathfinder Palette
  • 5.3.1 Recreating an Existing Logo
  • 5.3.2 Creating an icon from a Sketch
  • 5.3.3 Creating a vector illustration from a sketch
  • 5.3.4 Blending Modes

Module 6 – Typography

  • 6.1 Introduction to Typography
  • 6.2 Type Tools in Illustrator
  • 6.3 Envelope Warp and Mesh
  • 6.4 Breaking Text into Outlines
  • 6.5 Caligramme Demo

Module 7 – Live Trace, Paintbrush and Blob Brush

  • 7.1 Live Trace
  • 7.2 Paint Brush

Module 8 – Advanced Illustration

  • 8.1 Illustrating a face from a photo
  • 8.2 Illustrating the body
  • 8.3 Hair and emulating texture
  • 8.4 Adding a background
  • 8.5 Shadows and highlights

Module 9 – Exporting

  • 9.1 Differences Between File Formats
  • Conclusion

Module 1

  • Instructor Intro
  • Course Intro
  • Navigating the Interface
  • Activating and Deactivating Fonts
  • Font Packs
  • Type Kit Web Fonts
  • Course Conclusion

Module 1

  • 1.1 Introduction
  • 1.2 What is Flash Animate
  • 1.3 Creating A New Document in Flash and Exploring the Interface
  • 1.4 Drawing in Flash Part 1
  • 1.5 Drawing in Flash Part 2
  • 1.6 Frame by Frame Animating in Flash Part 1
  • 1.7 Frame by Frame Animating in Flash Part 2
  • 1.8 Saving, Rendering, and Exporting
  • 1.9 Animating with Symbols Part 1
  • 1.10 Animating with Symbols Part 2
  • 1.11 Animating with Symbols Part 3
  • 1.12 Different Types of Tweening Part 1
  • 1.13 Different Types of Tweening Part 2
  • 1.14 Nesting Symbols
  • 1.15 Importing Graphics Part 1
  • 1.16 Importing Graphics Part 2
  • 1.17 Masking Part 1
  • 1.18 Masking Part 2
  • 1.19 Camera and Parallax Scrolling Part 1
  • 1.20 Camera and Parallax Scrolling Part 2
  • 1.21 Camera and Parallax Scrolling Part 3
  • 1.22 Rotoscoping Part 1
  • 1.23 Rotoscoping Part 2
  • 1.24 Rotoscoping Part 3
  • 1.25 Rotoscoping Part 4
  • 1.26 Rotoscoping Part 5
  • 1.27 Rotoscoping Part 6
  • 1.28 Rotoscoping Part 7
  • 1.29 Creating a Puppet Part 1
  • 1.30 Creating a Puppet Part 2
  • 1.31 Creating a Puppet Part 3
  • 1.32 Creating a Puppet Part 4
  • 1.33 Creating a Puppet Part 5
  • 1.34 Creating a Puppet Part 6
  • 1.35 Animating a Puppet Part 1
  • 1.36 Animating a Puppet Part 2
  • 1.37 Animating a Puppet Part 3
  • 1.38 Animating a Puppet Part 4
  • 1.39 Cycles
  • 1.40 Interchangeable Parts
  • 1.41 Interactivity
  • 1.42 Text Part 1
  • 1.43 Text Part 2
  • 1.44 Animating with Code
  • 1.45 Dialog Part 1
  • 1.46 Dialog Part 2
  • 1.47 Dialog Part 3
  • 1.48 Dialog Part 4
  • 1.49 Controlling the Timeline Part 1
  • 1.50 Controlling the Timeline Part 1
  • 1.51 Putting Together an Interactive eCard Part 1
  • 1.52 Putting Together an Interactive eCard Part 2
  • 1.53 Putting Together an Interactive eCard Part 3
  • 1.54 Putting Together an Interactive eCard Part 4
  • 1.55 Putting Together an Interactive eCard Part 5
  • 1.56 Bone Tool
  • 1.57 Conclusion

Module 1

 

  • 1.1 Introduction
  • 1.2 What is InDesign
  • 1.3 Creating a New Document
  • 1.4 Importing Images – Part1
  • 1.5 Importing Images – Part2
  • 1.6 Vector vs. Pixels
  • 1.7 Exploring the InDesign Work Area
  • 1.8 Master Pages

Module 2

  • 2.1 Typography – Part1
  • 2.2 Typography – Part2
  • 2.3 Creating Tables
  • 2.4 Packaging
  • 2.5 Principle of Design
  • 2.6 Knowing Your Output
  • 2.7 Advanced Techniques in InDesign
  • 2.8 Using InDesign for Ineractivity
  • 2.9 Scripts
  • 2.10 Exporting
  • 2.11 Conclusion

Module 1: What is Animation and the Basics

 

  • 1.1 Introduction
  • 1.2 What is Animation – Part1
  • 1.3 What is Animation – Part2
  • 1.4 Bouncy Ball Demo – Part1
  • 1.5 Bouncy Ball Demo – Part2
  • 1.6 Bouncy Ball Demo – Part3
  • 1.7 Pendulum Demo – Part1
  • 1.8 Pendulum Demo – Part2
  • 1.9 Platform Pendulum Demo – Part1
  • 1.10 Platform Pendulum Demo – Part2
  • 1.11 Principles of Animation – Part1
  • 1.12 Principles of Animation – Part2
  • 1.13 Bouncy Ball in Perspective Demo – Part1
  • 1.14 Bouncy Ball in Perspective Demo – Part2
  • 1.15 Flag Wave Demo – Part1

Module 2: Intermediate Animation Techniques

  • 2.1 Weight Demo – Part1
  • 2.2 Weight Demo – Part2
  • 2.3 Weight Demo- Part3
  • 2.4 Breaking a Character Down Into Basic Shapes – Part1
  • 2.5 Breaking a Character Down Into Basic Shapes – Part2
  • 2.6 Breaking a Character Down Into Basic Shapes – Part3
  • 2.7 Boil Demo – Part1
  • 2.8 Boil Demo – Part2
  • 2.9 A Take Demo – Part1
  • 2.10 A Take Demo – Part2
  • 2.11 Staggering Demo – Part1
  • 2.12 Staggering Demo – Part2
  • 2.13 Staggering Demo – Part3
  • 2.15 Head Turn Demo – Part1
  • 2.16 Head Turn Demo – Part2
  • 2.17 Head Turn Demo – Part3
  • 2.18 Head Turn Demo – Part4
  • 2.19 Walk Cycles Demo – Part1
  • 2.20 Walk Cycles Demo – Part2
  • 2.21 Walk Cycles Demo – Part3
  • 2.22 Run Cycles Demo
  • 2.23 Dialogue Demo – Part1
  • 2.24 Dialogue Demo – Part2
  • 2.25 Dialogue Demo – Part3
  • 2.26 Dialogue Demo – Part4
  • 2.27 Conclusion

Module 1: Welcome

  • Welcome
  • Welcome 2

Module 2: Why use Lightroom

  • Why use Lightroom

Module 3: Lightroom library and organization

  • Lightroom library and organization
  • Lightroom library and organization 2
  • Lightroom library and organization 3
  • Lightroom library and organization 4

Module 4: Edit your photo – global adjustments

  • Edit your photo – global adjustments
  • Edit your photo – global adjustments 2
  • Edit your photo – global adjustments 3
  • Edit your photo – global adjustments 4
  • Edit your photo – global adjustments 5
  • Edit your photo – global adjustments 6
  • Edit your photo – global adjustments 7
  • Edit your photo – global adjustments 8
  • Edit your photo – global adjustments 9
  • Edit your photo – global adjustments 10
  • Edit your photo – global adjustments 11

Module 5: Edit your photo – local adjustments

  • Edit your photo – local adjustments
  • Edit your photo – local adjustments 2
  • Edit your photo – local adjustments 3
  • Edit your photo – local adjustments 4
  • Edit your photo – local adjustments 5
  • Edit your photo – local adjustments 6

Module 6: Saving and exporting

  • Saving and exporting

Module 7: Lightroom CC overview

  • Lightroom CC overview

Module 8: Outro

  • Outro

Module 1: Tools and Effects in Photoshop

 

  • 1.1 Introduction
  • 1.2 Exploring the Tools and Work Area – Part1
  • 1.3 Exploring the Tools and Work Area – Part2
  • 1.4 Exploring the Tools and Work Area – Part3
  • 1.5 Exploring the Tools and Work Area – Part4
  • 1.6 Layers in Photoshop – Part1
  • 1.7 Layers in Photoshop – Part2
  • 1.8 Layers in Photoshop – Part3
  • 1.9 Crop and Transform
  • 1.10 Working with Text – Part1
  • 1.11 Working with Text – Part2
  • 1.12 Filters in Photoshop
  • 1.13 Layer Styles
  • 1.14 Adjustment Layers – Part1
  • 1.15 Adjustment Layers – Part2

Module 2: Creating Projects in Photoshop

  • 2.1 Photo Retouching Methods – Part1
  • 2.2 Photo Retouching Methods – Part2
  • 2.3 Creating a Poster Design – Part1
  • 2.4 Creating a Poster Design – Part2
  • 2.5 Creating a Poster Design – Part3
  • 2.6 Creating a Poster Design – Part4
  • 2.7 Coloring Digital Art – Part1
  • 2.8 Coloring Digital Art – Part2
  • 2.9 Coloring Digital Art – Part2
  • 2.10 Colorizing a Black and White Photo – Part1
  • 2.11 Colorizing a Black and White Photo – Part2
  • 2.12 Creating a Website Design – Part1
  • 2.13 Creating a Website Design – Part2
  • 2.14 Creating a Website Design – Part3
  • 2.15 Exporting in Photoshop
  • 2.16 Conclusion

Module 1

  • Instructor Intro
  • Course Intro
  • Course pt.1
  • Course pt.2
  • Course pt.3
  • Course pt.4

Module 1

 

  • Instructor Intro
  • Course Intro
  • Web Based vs Mobile Device
  • How to Access Spark
  • Branding in Spark

Module 2

  • Using Spark Post
  • Uploading Content from Post for Exporting
  • Using Spark Video
  • Exporting Finished Videos
  • Using Spark Page
  • Putting Spark Pages on the Web

Module 1

  • Instructor Info
  • Course Info
  • Interface and Features
  • Images
  • Videos and Licensing
  • Templaes and Premium
  • Contributing Content
  • Best Practices when Contributing
3

Module 1: Getting Started

 

1.1 Instructor Introduction

1.2 Course Introduction

Module 2: Getting to Know Adobe Audition

  • 2.1 Setting Up Your Workspace and Using Shortcuts

Module 3: The Interface

  • 3.1 Setting Up and Adjusting Your Workspace
  • 3.2 Navigating the Media Browser
  • 3.3 Create a Short Cut to Media and Basic Dive into the Editor Panel

Module 4: Waveform Editing

  • 4.1 Opening Audio and Video Files
  • 4.2 Making a Basic Adjustment in the HUD
  • 4.3 Skipping and Deleting Unwanted Portions of Audio
  • 4.4 Quickly Insert Silence into an Audio Track
  • 4.5 Using the Zero Crossing Tool to Remove Pops in Audio
  • 4.6 Cut, Copy and Paste Phrases and Use Multiple Clipboards
  • 4.7 Merge Sections of Audio with Mix Paste
  • 4.8 Create a Loop
  • 4.9 Add an Audio Fade

Module 5: Effects

  • 5.1 Working With Effects
  • 5.2 Gain Staging
  • 5.3 Applying the Effect
  • 5.4 Amplitude and Compression
  • 5.5 Delay and Echo Effects
  • 5.6 Filter and EQ Effects
  • 5.7 Modulation Effects
  • 5.8 Reverb Effects
  • 5.9 Special Effects
  • 5.10 Stereo Imagery Effects
  • 5.11 Time and Pitch Effects
  • 5.12 Audio Plugin Manager and Effects Menu vs Effects Rack
  • 5.13 Invert, Reverse, Silence and Generate Effects
  • 5.14 Match Loudness and Additional Effects
  • 5.15 Create Effect Presets and Favorites

Module 6: Audio Restoration

  • 6.1 Hiss Reduction
  • 6.2 Crackle, Pop and Click Reduction
  • 6.3 Broadband Noise Reduction
  • 6.4 Hum Reduction
  • 6.5 Removing Artifacts Manually
  • 6.6 Automated Sound Removal

Module 7: Mastering

  • 7.1 Parametric Equalizer and Equalization
  • 7.2 Multi Band Compressor and Dynamic Processing
  • 7.3 Reverb and Ambience
  • 7.4 Stereo Imaging
  • 7.5 Diagnostic Tools and Metering

Module 8: Sound Design

  • 8.1 Generate Noise and Tones
  • 8.2 Generate Speech Based on Text
  • 8.3 Use a Sound File to Create Various Sound Effects Pt 1
  • 8.4 Use a Sound File to Create Various Sound Effects Pt 2
  • 8.5 Extracting Frequency Bands with the Frequency Band Splitter

Module 9: Creating and Recording Files

  • 9.1 Create a Project and Record Into the Waveform Editor
  • 9.2 Recording Into the MultiTrack Editor
  • 9.3 Check Remaining Free Space for Recording on Hard Drive
  • 9.4 Dragging Files Into Audition Directly From a Computer
  • 9.5 Import Tracks from a CD

Module 10: Multitrack Sessions

  • 10.1 Create a Multitrack session and Template
  • 10.2 Multitrack and Waveform Editor Integration
  • 10.3 Change Track Colors and Tracks Panel
  • 10.4 Track Controls and Creating Busses
  • 10.5 Channel Mapping in the Multitrack Editor
  • 10.6 Multitrack Editor Effects Rack

Module 11: Multitrack Session Editing

  • 11.1 Create a Session, Add Clips and Adjust Timing
  • 11.2 Mix Down Session Into a New Audio Track
  • 11.3 Adjusting the Timing of a Clip to Match a Specific Range of Time
  • 11.4 Clip Editing Techniques and Effects

Module 12: Additional Features and Summary

  • 12.1 Advanced Features to Consider and Conclusion

Module 1: Introduction to After Effects

  • 1.1 Introduction
  • 1.2 What is After Effects?
  • 1.3 Creating a New Project in After Effects
  • 1.4 Creating and Animating Primitive Shapes Demo – Part1
  • 1.5 Creating and Animating Primitive Shapes Demo -Part2
  • 1.6 Simply Bouncing Ball Demo -Part1
  • 1.7 Simply Bouncy Ball Demo – Part2
  • 1.8 Complex Bouncy Ball Demo – Part1
  • 1.9 Complex Bouncing Ball Demo – Part2
  • 1.10 Exporting from After Effects
  • 1.11 Curves Editor Demo
  • 1.12 Importing Footage – Part1
  • 1.13 Importing Footage – Part2
  • 1.14 Parenting – Part1
  • 1.15 Parenting – Part2

Module 2: Intermediate Effects and Techniques in After Effects

  • 2.1 3D Layers and Cameras Demo – Part1
  • 2.2 3D Layers and Cameras Demo – Part2
  • 2.3 Animating Text Demo – Part1
  • 2.4 Animating Text Demo – Part2
  • 2.5 Animating Text Demo – Part3
  • 2.6 Animating Text Demo – Part4
  • 2.7 Importing and Syncing Audio
  • 2.8 Particles Demo – Part1
  • 2.9 Particles Demo – Part2
  • 2.10 Lights Demo
  • 2.11 Common Effects in After Effects

Module 3: More Advanced Effects and Techniques in After Effects

  • 3.1 Puppet Building Demo – Part1
  • 3.2 Puppet Building Demo – Part2
  • 3.3 Puppet Building Demo – Part3

Module 1: Getting Started

  • 1.1 Course Introduction
  • 1.2 Keyboard Shortcuts
  • 1.3 Keyboard Tips
  • 1.4 Things to Do Before Starting

Module 2: Getting to Know the Workflow

  • 2.1 General Interface and Starting a Project
  • 2.2 Basic Title Animation Using Keyframes
  • 2.3 Keyframe Interpolation and Keyframe Assistan
  • 2.4 Renaming a Composition
  • 2.5 Soloing a Layer for Individual Edits
  • 2.6 Interface Continued: Tool bar, Timeline panel, Preferences, Workspaces
  • 2.7 Render and Export

Module 3: Creating a Basic Animation Using Effects and Presets

  • 3.1 Importing Files from Bridge and Creating a New Composition
  • 3.2 Horizontal Type Tool and Guides
  • 3.3 Controls, Effects and Presets for Titles and Logos

Module 4: Animating Text

  • 4.1 Create and Stylize a Text Layer With the Characters and Paragraph Panels
  • 4.2 Preview and Apply Text Animation Presets and Use Keyframes
  • 4.3 Animate Layers Using Parenting
  • 4.4 Editing and Animating Imported Photoshop Text
  • 4.5 Install Fonts Using Adobe Fonts

Module 5: Working With Shape Layers

  • 5.1 Create and Customize a Shape with Shape Tool
  • 5.2 Self Animating Shape with a Wiggle Path (green marker)
  • 5.3 Create and Customize a Shape with Pen Tool
  • 5.4 Snap Layers
  • 5.5 Animating Shape Layers with Path Operations
  • 5.6 Creating Nulls from Paths

Module 6: Animating a Multimedia Presentation

  • 6.1 Animate Multiple Layers Using Parenting
  • 6.2 Precomposing Layers
  • 6.3 Keyframing a Motion Path
  • 6.4 Animating a Character to Create Movement
  • 6.5 Animating Precomposed Layers with Effects

Module 7: Animating Photoshop Layers

  • 7.1 Animating Change in Light
  • 7.2 Animating Birds Flying with a Track Mat
  • 7.3 Animating Shadows and Using Corner Pin
  • 7.4 Adding a Lens Flare Effect
  • 7.5 Render Composition and Retime
  • 7.6 Use the Graph Editor to Remap Time

Module 8: Working With Masks

  • 8.1 Setup a Basic Mask
  • 8.2 Refine and Apply Mask
  • 8.3 Creating a Reflection with a Mask and Blending Modes
  • 8.4 Create a Vignette

Module 9: Distorting Objects with the Puppet Tools

  • 9.1 Puppet Position Pen Tool
  • 9.2 Starch Pins
  • 9.3 Manually Animate with Puppet Tool
  • 9.4 Automate Animation Using Puppet Sketch Tool

Module 10: Using the Roto Brush Tool

  • 10.1 Extract Foreground Object from Background and Create a Mat
  • 10.2 Touch Up a Mat with the Refine Edge Tool
  • 10.3 Edit or Replace the Separated Background

Module 11: Performing Color Correction

  • 11.1 Set up Composition and Use Levels to Start Balancing the Color
  • 11.2 Basic Color Grading with Lumetri Color Effects
  • 11.3 Use Basic Masking, Tracking and Keying to Replace the Background
  • 11.4 Use an Adjustment Layer to Create a Global Color Effect
  • 11.5 Gaussian Blur Effect

Module 12: Creating Motion Graphics Templates

  • 12.1 Add New Font with Adobe Fonts and Create a Title with Basic Effects
  • 12.2 Using Adjustment Layers to Apply a Specific Effect
  • 12.3 Use Essential Graphics Panel to Build Custom Controls and Share as a Template
  • 12.4 Create Checkboxes to Toggle Visibility of a Background Image
  • 12.5 Protect Portions of a Project from Time Stretching and Export Template
GOOGLE

Module 1 – Google Analytics 4 – Course Overview

 

  • 1.0 About Google Analytics 4
  • 1.1 Course Intro Welcome
  • 1.2 Instructor Intro

Module 2 – Fundamentals of Google Analytics

  • 2.1 What is a Digital Product
  • 2.2 Google Market Platform
  • 2.3 Google Analytics Overview
  • 2.4 Google Analytics 4 Overview
  • 2.5 Whiteboad Discussion-How Does GA Work
  • 2.6 Comparing GA3 to GA4
  • 2.7 Whiteboard Compare Data Models
  • 2.8 Demo- GA Console Walkthru
  • 2.9 Admin Panel
  • 2.10 Demo Admin Panel
  • 2.11 Tag Manager
  • 2.12 Demo Tag Manager
  • 2.13 Segment Review
  • 2.14 Segment Review Questions

Module 3 – Advanced Topics with Google Analytics

  • 3.1 Upgrading and Running Parallel
  • 3.2 Whiteboard Discussion – Parallel
  • 3.3 Demo Console Parallel
  • 3.4 Hands on Demo – Install GA4 on a Live Site
  • 3.5 Understand Reporting Options, Lifecycle Collections
  • 3.6 Hands on Demo – Exploring reports
  • 3.7 Hands on Demo – Set up GA4 Custom Eventsmp4
  • 3.8 Hands on Demo – Conversions, Audiences, DebugView
  • 3.9 Hands on Demo – Advertising
  • 3.10 Hands on Demo – Explorations:Insights
  • 3.11 Hands on Demo – Lifecycle and Users
  • 3.12 Google Big Query Connections
  • 3.13 Demo – BigQuery Data Integrations
  • 3.14 Google Ads
  • 3.15 Demo – Google Ads
  • 3.16 Google Signals
  • 3.17 Demo – Google Signals
  • 3.18 Certification Options
  • 3.19 Segment Summary
  • 3.20 Review Questions
  • 3.21 Resources
  • 3.22 Course Closeout

Module 1: Introduction to Google Analytics

  • Intro Definitions-Part 1
  • Intro Definitions-Part 2
  • How Google Analytics Works

Module 2: Fundamentals of Google Analytics

  • Build Analytics Infrastructure
  • Setting Up Conversion Data
  • Setting Up E-Commerce And Goal Tracking
  • Cross Domain Tracking
  • Input New Users
  • Examine Data Points

Module 3: Basics of Google Anayltics

  • Basic Features
  • Dashboard
  • Shortcuts
  • Adding A Dashboard
  • Sharing Reports
  • Alerts
  • Realtime Analytics
  • Standard Reports
  • Views

Module 4: Reports in Google Analytics

  • Acquisitions Intro
  • All Traffic Acquisitions
  • Acquisitions Overview
  • Acquisitions Channels
  • All Referrals
  • Campaign
  • Keywords
  • Social
  • Webmaster Tools

Module 5: Behavioral Reports

  • Behavioral Reports Intro
  • Dimensions
  • Content Drilldown
  • Landing Pages
  • Exit Pages
  • Event Flow Report
  • Working With Events
  • Site Search Report-Part 1
  • Site Search Report-Part 2
  • Site Search Report-Part 3
  • Site Search Report-Part 4
  • Behavior Flow Report
  • Site Speed
  • Using Site Speed Search
  • Page Timings
  • Speed Suggestions
  • User Timing Adsense
  • Experiments
  • Inpage Analytics

Module 6: Audience

  • Audience Reports
  • Location Report
  • Language
  • Behavior
  • Frequency Recency
  • Engagement Report
  • Technology Reports
  • Mobile Reporting
  • Demographic Report
  • Interests
  • Visitor Flow Chart

Module 7: Conversions

  • Intro To Module 7
  • Funnel Visualization
  • Goal Flow Report
  • Reverse Goal Path
  • Goal URLs
  • E-commerce Reports
  • Product Performance Reports
  • Transactions Report
  • Time To Purchase Report
  • Multi-Channels Funnels Report
  • Assisted Conversion Report
  • Top Conversion Paths Report
  • Time Log And Path Length Report
  • Attribution Report And Model Comparison Tool
  • Conclusion

Module 1: Course Overview

 

  • 1.1 Course Overview
  • Course Overview
  • 1.2 Course PreReqs
  • Course PreReqs

Module 2: DevOps Basics

  • DevOps Fundamentals
  • What is DevOps
  • What are Pipelines
  • Continuous Integration and Delivery
  • Continuous Deployment
  • Whiteboard Build Services
  • Demo – DevOps Services on GCP

Module 3: App Engine PaaS

  • App Engine
  • App Engine Basics
  • App Engine Demo
  • App Engine Security Scanner Demo
  • App Engine or Kubenetes Engine

Module 4: Kubenetes Engine Overview

  • Kubenetes Engine
  • Kubernetes Basics
  • What is Kubenetes Engine
  • Demo – Kubenetes Engine Clusters Demo
  • Kubenetes Engine Application Demo
  • Kubenetes Engine Whiteboard

Module 5: DevOps Developer Tools

  • DevOps Services & Tools
  • Demo – Cloud SDK
  • Demo – Cloud Shell
  • Demo – Cloud Build
  • Demo – Container Registry
  • Demo – Cloud Source Repositories
  • Demo – Private Catalog
  • Demo – Artifact Registry

Module 6: Microservices

  • Microservices
  • Demo – Cloud Watch
  • Cloud Functions-Cloud Run
  • Demo – Cloud Functions
  • Demo – Cloud Run

Module 7: Management of your DevOps Services

  • Management and Monitoring
  • Cloud Operations
  • Demo – Cloud Operations
  • Service Accounts
  • Cloud Endpoints and Apigee
  • Demo – Workflows and Cloud Tasks
  • Demo – Recommendation Engine
  • Infrastructure as Code (IaaC)
  • Deployment Manager
  • Demo – Deployment Manager
  • Demo – Cloud Marketplace

Module 8: Resources and Closeout

  • Resources and Closeout
  • Course Summary
  • DevOps Roles and Salary Demand
  • Additional Resources
  • Google Cloud Platform Certification
  • Course Closeout

Module 1 – Google Cloud Digital Leader Course Overview
1.0 About Google Cloud Digital Leader
1.1 Course and Instructor Intro
1.2 Course PreReqs
1.3 GCP Certification Overview
1.4 GCP Digital Leader Exam Objectives
Module 2 – General Cloud Knowledge
2.0 General Cloud Knowledge
2.1 Domain Objectives
2.2 Intro to Cloud Computing
2.3 Essential Characteristics of Cloud Computing
2.4 Service Models
2.5 Deployment Models
2.6 Multitenancy
2.7 Resilency
2.8 Replication
2.9 Automation and Orchestration
2.10 Chargeback
2.11 Vendor Lockin
2.12 Cloud Standards
2.13 OpEx, CapEx
2.14 TCO-ROI
2.15 Business Enablers
2.16 Section Summary
2.17 Review Questions
Module 3 – General Google Cloud Knowledge
3.0 General GCP Knowledge
3.1 Domain Objectives
3.2 GCP Overview
3.3 Cloud Infrastructure
3.4 Cloud Hierarchy
3.5 Project Demo
3.6 Whiteboard Hierarchy and Projects
3.7 Service Options
3.8 Demo – Services Overview
3.9 Pricing Calculator
3.10 Demo – Pricing Calculator
3.11 Billing models and Discounts
3.12 Demo Billing
3.13 Compliance Resources
3.14 Demo – Compliance Reports Manager
3.15 Support Options
3.16 Service Level Agreement (SLA)
3.17 Google Cloud Framework and Maturity Model
3.18 Demo – Maturity Assessment
3.19 Access to GCP
3.20 Demo – GCP ACCESS
3.21 Section Summary
3.22 Review Questions
Module 4 – Google Cloud Products and Services
4.0 Google Cloud Products and Services
4.1 Domain Objectives
4.2 Core Services
4.3 Google Compute Engine, Google Cloud VMware Engine, and Bare Metal
4.4 Compute Storage and Disk Options
4.5 App Engine, Google Cloud Functions, and Cloud Run
4.6 Google Kubernetes Engine
4.7 Demo Compute Services
4.8 Container registry
4.9 Cost and Performance Tradeoffs of Scale To Zero
4.10 Database Options – Cloud SQL, Cloud Spanner, Cloud Bigtable, BigQuery
4.11 Demo – Database Offerings
4.12 Vision API, AI Platform, TPUs
4.13 Pre Trained Models
4.14 Data Pipeline Offerings
4.15 Data Ingestion Options
4.16 Software Development Life Cycle (SDLC)
4.17 Visibility and Alerting Offerings
4.18 Identify Data Migration Options
4.19 Compute VM Migration
4.20 Whiteboard – Migrations
4.21 Application Modernization
4.22 Define Software-Defined WAN (SD-WAN)
4.23 Connectivity Options
4.24 Whiteboard – Connectivity
4.25 IAM and Security
4.26 Whiteboard Cloud Architecture
4.27 Section Summary
4.28 Review Questions
Module 5 – Google Cloud Digital Leader Course Closeout
5.0 Google Cloud Digital Leader Course Closeout
5.1 Course Review
5.2 Resources
5.3 Exam Overview

Java

Module 1: Foundations (Beginner)

  • Introduction
  • History Of Computer Programming
  • Categories Of Programming Languages
  • Condensed History Of Java
  • Software Life Cycle

Module 2: Terms and Tools (Beginner)

  • Programming General Terms
  • Downloading And Installing Java
  • Programmer Editors And Integrated Development Environments Part 1
  • Programmer Editors And Integrated Development Environments Part 2
  • Installing Eclipse

Module 3: Identifiers, Variables, and Data Types (Beginner)

  • Understanding Identifiers
  • Unicode And Java Syntax
  • Variables Constants And Literals
  • Field Member And Variable Components
  • Primitive Data Types Part 1
  • Primitive Data Types Part 2
  • Primitive Data Types Part 3
  • Operators Part 1
  • Operators Part 2
  • Escape Characters
  • Type Conversions And Type Casting
  • Java Reserved Words
  • Commenting
  • Abstract Data Types

Module 4: Object-Orientated Programming (Intermediate)

  • Object Oriented Programming
  • What Is An Object?
  • Eclipse Lab

Module 5: Predefined Classes (Intermediate)

  • String Class Part 1
  • String Class Part 2
  • String Class Part 3
  • Date Class
  • Simple Date Format Class
  • Scanner Class Part 1
  • Scanner Class Part 2
  • Decimal Format Class Part 1
  • Decimal Format Class Part 2
  • JFrame Class
  • Container Class Part 1
  • Container Class Part 2

Module 6: Methods Part 1 (Intermediate)

  • Methods
  • Naming Methods
  • Implementation Method Hiding
  • Method Variables And Literals
  • Invoking A Method

Module 7: Methods Part 2 (Advanced)

  • Methods And Multiple Arguments
  • Methods Lab
  • Method Overloading

Module 8: Constructors (Advanced)

  • Creating Objects
  • Constructor Declarations
  • Overloading And Default Constructors

Module 9: Control of Flow (Advanced)

  • While Loop
  • While Statement
  • For Loop

Module 10: Arrays and Exceptions (Advanced)

  • Array Structures
  • Constants And Array Sizes Part 1
  • Constants And Array Sizes Part 2
  • Exceptions And The Try Catch Block
  • Conclusion

Module 1: Introduction To Javascript

 

  • Introduction
  • Java Script From The Dawn Of The Web Part 1
  • Java Script From The Dawn Of The Web Part 2
  • Getting The Right Tools
  • Creating Your First JavaScript Program Part 1
  • Creating Your First JavaScript Program Part 2

Module 2: Core Concepts And Syntax

  • The Structure And Content Part 1
  • The Structure And Content Part 2
  • Naming And Casing Best Practices
  • Understanding Variables Part 1
  • Understanding Variables Part 2
  • Understanding Variables Part 3
  • Working With Operators Part 1
  • Working With Operators Part 2
  • Working With Loops Part 1
  • Working With Loops Part 2
  • Creating Functions Part 1
  • Creating Functions Part 2
  • Understanding Types And Objects Part 1
  • Understanding Types And Objects Part 2
  • Understanding Types And Objects Part 3
  • Understanding Types And Objects Part 4
  • Understanding Types And Objects Part 5

Module 3: Getting A Handle On The DOM

  • Introduction To The HTML Document Object Model
  • Accessing DOM Elements
  • Changing DOM Elements
  • Creating DOM Elements
  • Responding To Events Part 1
  • Responding To Events Part 2

Module 4: Working With Libraries

  • Introduction To Libraries
  • Installing And Using jQuery Part 1
  • Installing And Using jQuery Part 2
  • Modifying Web Pages Using jQuery Part 1
  • Modifying Web Pages Using jQuery Part 2
  • Conclusion
  • Social Media Introduction
  • Creating A Google Account
  • Setting Up Your Twitter Account
  • Getting Your Twitter House In Order
  • Why Facebook For Your Business
  • Using Facebook As A Business
  • Setting Up Your Business Page
  • Setting Your Cover Photo
  • Tying It All Together
  • Tip-Adding Admins In Facebook
  • Adjusting Your Settings- Part 1
  • Adjusting Your Settings- Part 2
  • Adjusting Your Settings- Part 3
  • Updating Your Page Info- Part 1
  • Updating Your Page Info- Part 2
  • Tips For Getting 25 Likes
  • Using Facebook As Your Business Page
  • What Kind Of Person Would Your Business Be
  • How To Post To Facebook
  • What To Post
  • Sharing Posts
  • Sharing Links
  • Pinning And Highlighting With Posts
  • Tips For Generating Traffic
  • Getting Notifications And Staying In Clients News Feed
  • Comment Moderation
  • The Activity Log- Where Do Hidden Posts Go
  • Scheduling Posts
  • Introduction To LinkedIn
  • Overview Of The Interface And Settings
  • Open Link Settings
  • LinkedIn Groups
  • Adding And Removing Applications
  • Basic Account Settings
  • Updating Your Public Profile
  • LinkedIn Connections Groups And Pages
  • LinkedIn Channels And Today
  • Advertising on LinkedIn
  • Introduction To Google Plus
  • Overview Of The Interface
  • Setting Up A Google Plus Page
  • Linking Your Other Social Networks
  • Linking Your Website To Your Google Plus Page
  • Review Of Your Google Plus Dashboard
  • Notification Settings For Google Plus
  • Photo Settings In Google Plus
  • Google Plus And YouTube
  • YouTube Advanced Settings
  • Interface For Uploaded Videos
  • Sharing Videos Across Your Social Network
  • Updating Your About Section
  • Quick Recap Of Everything Covered So Far
  • Overview Of Pinterest
  • How Does Pinterest Relate To Your Business
  • Industry Specific Sites
  • The Uses of Pinterest
  • Conclusion Of Pinterest
  • Introduction to Reddit
  • The Rules of Reddit
  • Module 1.0 Introduction
    • Social Media Introduction
    • Creating A Google Account
    • Setting Up Your Twitter Account
    • Getting Your Twitter House In Order
    • Why Facebook For Your Business
    • Using Facebook As A Business
    • Setting Up Your Business Page
    • Setting Your Cover Photo
    • Tying It All Together
    • Tip-Adding Admins In Facebook

    Module 2.0 Adjusting Your Facebook Settings

    • Adjusting Your Settings-Part1
    • Adjusting Your Settings-Part2
    • Adjusting Your Settings-Part3
    • Updating Your Page Info-Part1
    • Updating Your Page Info-Part2
    • Tips For Getting 25 Likes
    • Using Facebook As Your Business Page

    Module 3.0 Posting on Facebook

    • What Kind Of Person Would Your Business Be
    • How To Post To Facebook
    • What To Post
    • Sharing Posts
    • Sharing Links
    • Pinning And Highlighting With Posts
    • Tips For GeneratingTraffic
    • Getting Notifications And Staying In Clients News Feed
    • Comment Moderation
    • The Activity Log-Where Do Hidden Posts Go
    • Scheduling Posts

    Module 7.0 Twitter

    • Limiting the Number Of Actions
    • Setting Your Twitter Preferences
    • Finish Setting Up Your Profile
    • Twitter Widgets
    • Who To Follow
    • Connect
    • Bringing Followers From Facebook
    • Intro To Hashtags
    • Examples Of Hashtags
    • Monitoring Whats Going On
    • Using Twitter For Social Listening
    • Social Media Tips
    • Hashtags Across Social Media

    Module 8.0 Pinterest

    • Overview Of Pinterest
    • How Does Pinterest Relate To Your Business
    • Industry Specific Sites
    • The Uses of Pinterest
    • Conclusion Of Pinterest

    Module 9.0 Reddit

    • Introduction To Reddit
    • The Rules Of Reddit

    Module 11.0 LinkedIn

    • Introduction To LinkedIn
    • Overview Of The Interface And Settings
    • Open Link Settings
    • LinkedIn Groups
    • Adding And Removing Applications
    • Basic Account Settings
    • Updating Your Public Profile
    • LinkedIn Connections Groups And Pages
    • LinkedIn Channels And Today
    • Advertising On LinkedIn

    Module 12.0 Google+ and Youtube

    • Introduction To Google Plus
    • Overview Of The Interface
    • Setting Up A Google Plus Page
    • Linking Your Other Social Networks
    • Linking Your Website To Your Google Plus Page
    • Review Of Your Google Plus Dashboard
    • Notification Settings For Google Plus
    • Photo Settings In Google Plus
    • Google Plus And YouTube
    • YouTube Advanced Settings
    • Interface For Uploaded Video
    • Sharing Videos Across Your Social Network
    • Updating Your About Section
    • Quick Recap Of Everything Covered So Far

    Module 14.0 Additional Tools

    • Bitly
    • Woobox-Part1
    • Woobox-Part2
    • Hoot Suite-Part1
    • Hoot Suite-Part2
    • Storify
    • Social Media Rules And Tips
    • Tweet deck-Boolean Search
    • Social Media Conclusion

    Module 4.0 Facebook Advertising

    • Intro To Facebook Advertising
    • Setup Advertising Account
    • Types Of Advertising On Facebook
    • Ad Testing
    • Choosing Our Audience-Location
    • Choosing Our Audience-Age And Gender
    • Choosing Our Audience-Precise Interests
    • Choosing Our Audience-Broad Categories
    • Choosing Our Audience-Connections
    • Choosing Our Audience-Advanced Targeting Options
    • Choosing Our Audience-Campaign And Budget
    • Other Types Of Ads-Part1
    • Other Types Of Ads-Part2
    • Ad Campaign Manager-Part1
    • Ad Campaign Manager-Part2
    • Outside URLs
    • Building Ad Text
    • News Feed Format And Creating Your Audience
    • Campaign Pricing And Schedule
    • Ad Campaign Tracker

    Module 5.0 Facebook Insights

    • Facebook Insights-Overview Intro
    • Analyzing Page Posts
    • Engaged Users
    • Talking About This
    • Virality
    • Likes
    • Reach
    • Reach And Frequency
    • Page Visits
    • Talking About This
    • Conclusion

    Module 6.0 Facebook Analytics

    • 0 New Facebook Analytics Overview
    • 1 Page Likes
    • 2 Post Reach
    • 3 Page Visits
    • 4 Posts
    • 5 People
    • New Facebook Analytics Overview
    • Page Likes
    • Post Reach
    • Page Visits
    • Posts
    • People

    Module 10.0 Tumblr

    • Tumblr Introduction
    • Setting Up A Tumblr
    • Dashboard
    • Posting To Tumblr
    • Testing Your Post
    • URL Post
    • Chat Post
    • Audio On Tumblr
    • Video On Tumblr
    • Tumblr Conclusion

    Module 13.0 Best Practices

    • Determine Your Goals
    • Create Your Persona Or Voice
    • Decide On Your Platforms
    • Establishing A Social Media Manager
    • Coordinate With Customer Service
    • Create A Predetermined Crisis Management Plan
    • Stick To The Script
    • Building Relationships With The Media
    • Find Your Evangelist
    • Stay Informed-Part1
    • Stay Informed-Part2
  • Tumblr Introduction
  • Setting Up A Tumblr
  • Dashboard
  • Posting To Tumblr
  • Testing Your Post
  • URL Post
  • Chat Post
  • Audio On Tumblr
  • Video On Tumblr
  • Tumblr Conclusion
  • Limiting the Number Of Actions
  • Setting Your Twitter Preferences
  • Finish Setting Up Your Profile
  • Twitter Widgets
  • Who To Follow
  • Connect
  • Bringing Followers From Facebook
  • Intro To Hashtags
  • Examples Of Hashtags
  • Monitoring What’s Going On
  • Using Twitter For Social Listening
  • Hashtags Across Social Media

Accounting Marketing

  • Introduction
  • Business Entities
  • Beginning Your Business
  • Financial Basics Part 1
  • Financial Basics Part 2
  • Employees Payroll
  • Getting Your Business Out There
  • SEO
  • Other Topics
  • Closing
  • Module 1: Setup and Maintenance
    • Course Introduction
    • Knowing Which Account is Right for You
    • Getting Started
    • User Setup
    • Access Rights
    • User Setup Completion
    • Adding Employees to Payroll
    • Inviting Your Accountant
    • Dashboard and 3 Ways to Navigate QBO
    • Commonly Used Forms
    • Module 1 Summary

    Module 2: List Management

    • Defining Lists
    • Importing Lists
    • Employees vs 1099
    • Adding and Removing Entries
    • Updating Entries
    • Editing and Managing List Elements Demo
    • Merging Items (entries)
    • Form Requirements
    • Summary

    Module 3: Sales (Money-In)

    • Product and Service Setup
    • Customer Setup Demo
    • Invoicing Workflows
    • Recording Sales
    • Customer Statements
    • Tracking Audit History Demo
    • Sales Reciept Workflow
    • Undeposited Funds Account
    • Accounts Receivable Impact
    • Impact of Connecting Your Bank Account to QBO
    • Billable Expense Invoicing
    • Recording a Customer Credit
    • Delayed Charges
    • Estimates
    • Summary

    Module 4: Purchased (Money-Out)

    • Product and Service Setup on Purchase Forms
    • Vendor Setup
    • Purchase Order Transactions
    • Entering and Paying Bills
    • Recording Checks
    • Recording Credit and Debit Card Transactions
    • Recording EFTs, Online Payments, and Wire Transfers
    • Recording Vendor Credits
    • Voiding vs Deleting Checks
    • Vendor Page and Report Insights
    • Summary

    Module 5: Accounting

    • Basic financial statements (Balance sheet, income statement, and statement of cash flows)
    • Financial Statements Expanded
    • Cash and Accrual Accounting Differences
    • Difference Between Cash and Accrual Reporting
    • Setting a Closing Date
    • Balancing Your Books aka Reconciling Demo
    • Journal Entries
    • Audit Log Insights
    • Project Profitability Demo
    • Summary

    Module 6: Reports

    • Customized Reports
    • Commonly Used Reports Demo
    • Setup Automatic Report Emails
    • Collapse and Expand Report Function
    • Exporting and Importing Reports
    • Summary

    Module 7: Customizations and Time Savers

    • Tracking Income and Expenses for Multiple Locations
    • Organizing your Chart of Accounts
    • Custom Fields on Invoices
    • Recurring Transactions
    • Customizing a Sales Form
    • Keyboard Shortcuts
    • QBO Mobile App Preview
    • Connecting Third Party Apps to QBO
    • Summary

    Module 8: Extra

    • Common Mistakes QBO Users Make
    • Final Note on Bookkeeping Best Practices
    • Why QBO is Awesome
    • Course Outro
    • Defining Terms and Sample Quiz Questions

Module 1: Sage 50 2013

  • Course Overview-Part1
  • Course Overview-Part2
  • Course Overview-Part3
  • Course Overview-Part4
  • New Features-Part1
  • New Features-Part2
  • New Features-Part3
  • Quick Tab Menu Overview
  • Business Status-Part1
  • Business Status-Part2
  • Customer And Sales
  • Vendors And Purchases
  • Inventory And Services
  • Employees And Services
  • Banking
  • System-Part 1
  • System-Part2
  • Quick Tab Menu Review
  • Sage 50 Menu Overview-Part1
  • Sage 50 Menu Overview-Part 2
  • Sage 50 Menu Overview-Part3
  • Sage 50 Menu Overview-Part 4
  • Sage 50 Menu Overview-Part5
  • Sage 50 Menu Overview-Part6
  • Sage 50 Menu Overview-Part7

Module 2: Sage 50 Basics

  • Sage 50 Available Products
  • Accounts Payable Features
  • Vendors And Purchases-Part 1
  • Vendors And Purchases-Part 2
  • Vendors And Purchases-Part 3
  • Vendors And Purchases-Part 4
  • Vendors And Purchases-Part 5
  • Vendors And Purchases-Part 6
  • Accounts Payable Review
  • Accounts Receivable Review
  • Customer And Sales Menu
  • Customers
  • Jobs
  • Sales Taxes
  • Quotes And Proposals
  • Sales Orders
  • Invoices
  • Finance Charges Basics
  • Receive Money
  • Bank Accounts
  • Printing Statements
  • Credits And Returns
  • Accounts Receivable Report
  • Basics Review

Module 3: Inventory

  • Inventory And Services Overview
  • Inventory Items-Part 1
  • Inventory Items-Part 2
  • Company Services
  • Assemblies and Prices
  • Purchase Orders
  • Receiving Inventory Shipping And Tracking
  • Inventory Count And Adjustments
  • Inventory Reports
  • Inventory Review

Module 4: Employee

  • Employees And Payroll Overview
  • Employees And Users-Part 1
  • Employees And Users-Part 2
  • 1099’s
  • Payroll Setup
  • Time And Expense Tickets
  • Direct Deposit And Printing Payroll Checks
  • Forms And Void Checks
  • Employees Module Review

Module 5: Banking

  • Banking Features Overview
  • Write Checks
  • Account Register
  • Analysis Tools-Part 1
  • Analysis Tools-Part 2
  • Chart Of Accounts
  • Receive Money And Bank Deposits-Part 1
  • Receive Money And Bank Deposits-Part 2
  • Enter Bills Pay Bills And Electronic Bill Pay
  • Reconcile Accounts
  • General Journal Entries
  • Void Checks And Reports
  • Banking Module Review

Module 6: Maintenance

  • Automatic Backup
  • BackUp Data-Part 1
  • BackUp Data-Part 2
  • Automatic Backup
  • Restore Data
  • Data Maintenance
  • System Checks
  • Company Maintenance
  • Data Integrity
  • Maintenance Review

Module 7: File Handling

  • Attaching Documents
  • Attaching And Managing Documents
  • File Handling Review

Module 8: Manager

  • Analysis Managers
  • Cash Flow Manager-Part 1
  • Cash Flow Manager-Part 2
  • Cash Flow Manager-Part 3
  • Collection Manager
  • Payment Manager
  • Financial Manager
  • Manager Review

Module 9: Jobs

  • MaintainingJobs
  • CreatingJobs-Part 1
  • Creating Jobs-Part 2
  • Managing Jobs
  • Jobs Review

Module 10: Budgets

  • Maintain Budgets
  • Creating And Managing Budgets-Part 1
  • Creating And Managing Budgets-Part 2
  • Budgets Module Review

Module 11: Charts of Accounts

  • Module 1: iPhone Basics
    • Iphone Intro
    • Iphone The Basics

    Module 2: The Screen

    • 2.1 The Screen Pt. 1
    • 2.2 The Screen Pt. 2
    • 2.3 The Screen Pt. 3
    • 2.4 The Screen Pt. 4

    Module 3: The Keyboard

    • Basic Keyboard
    • Advanced Keyboard

    Module 4: Basic Calls and Settings

    • Making A Call
    • Settings-Part 1
    • Settings-Part 2

    Module 5: Contacts

    • Contacts-Part 2
    • Contacts-Part 2

    Module 6: Phone Calls

    • Phone Calls-Part 1
    • Phone Calls-Part 2
    • Phone Calls-Part 3
    • Advanced Phone Calls

    Module 7: Messaging

    • Texting-Part 1
    • Texting-Part 2
    • Advanced Texting-Part 1
    • Advanced Texting-Part 2
    • Message Settings

    Module 8: Web

    • Web-Part 1
    • Web-Part 2
    • Web-Part 3

    Module 9: Email

    • Email-Part 1
    • Email-Part 2
    • Multiple Email Accounts
    • Email Settings

    Module 10: Siri

    • SIRI

    Module 11: Music

    • Music-Part 1
    • Music-Part 2

    Module 12: Photos and Video

    • Camera Functions
    • Photography Settings
    • Edit Photos
    • Share Photos
    • Video Functions

    Module 13: Maps

    • Apple Maps

    Module 14: Conclusion

    • Application Management
    • Misc-Part 1
    • Misc-Part 2
    • Conclusion
Scroll to Top