Microsoft
- Module 1 – Introduction To Windows Server 2022
- 1.1 – Windows Server 2022 Overview
- 1.2 – Preparing for Installation
- Module 2 – Installation of Windows Server 2022
- 2.1 – Installation Methods for Windows Server 2022
- 2.2 – Performing A Clean Install
- 2.3 – Post-Installation Configurations
- Module 3 – Server Roles and Features
- 3.1 – Server Roles and Features
- 3.2 – Installing Active Directory
- 3.3 – Verify and Update DNS Settings
- 3.4 – Installing DHCP
- 3.5 – Installing IIS
- 3.6 – Power of Hyper-V on Windows Server 2022
- 3.7 – Other Common Server Roles & Services
- Module 4 – Deployment Tools
- 4.1 – Deployment Techniques
- 4.2 – Deploying Windows Server 2022 Using Windows Deployment Services (WDS)
- 4.3 – Using Microsoft Deployment Toolkit (MDT)
- 4.4 – SCCM Deployment
- Module 5 – Security and Maintenance
- 5.1 – Securing Windows Server 2022
- 5.2 – Managing Updates and Patches
- 5.3 – Monitoring and Performance Tuning
- 5.4 – Backup and Recovery
- 5.5 – Regular Maintenance Tasks
- Module 6 – Integrating Windows Server 2022 with Azure
- 6.1 – Integrating Windows Server 2022 with Azure
- 6.2 – Course Closeout
- Module 1 – Security, Compliance, and Identity
- 1.1 – Course Introduction
- 1.2 – Core Concepts and Strategies
- 1.3 – Identity Concepts
- Module 2 – Microsoft Entra ID Capabilities
- 2.1 – Microsoft Entra ID
- 2.2 – Entra ID Authentication
- 2.3 – Access Management Capabilities
- 2.4 – Entra ID Governance
- 2.5 – Entra ID Protection
- Module 3 – Microsoft Security Solutions
- 3.1 – Exploring Core Infrastructure Services
- 3.2 – Security Management Capabilities
- 3.3 – Microsoft Sentinel
- 3.4 – Microsoft Defender XDR
- Module 4 – Microsoft Compliance Solutions
- 4.1 – Service Trust Portal and Privacy
- 4.2 – Microsoft Purview for Compliance
- 4.3 – Information Protection, Data Lifecycle Management, and Data Governance
- 4.4 – Insider Risk Capabilities
- 4.5 – eDiscovery and Audit
- Module 1 – Installation
- Module 2 – Data Storage
- Module 3 – Data Recovery
- Module 4 – Monitoring
- Module 5 – Security
- Module 6 – Maintenance
- Module 1 – What are Big Data Clusters?
- Module 2 – Big Data Cluster Architecture
- Module 3 – Deployment of Big Data Clusters
- Module 4 – Loading and Querying Data in Big Data Clusters
- Module 5 – Working with Spark in Big Data Clusters
- Module 6 – Machine Learning on Big Data Clusters
- Module 7 – Create and Consume Big Data Cluster Apps
- Module 8 – Maintenance of Big Data Clusters
- Module 1 – Introduction to Business Intelligence and Data Modeling
- Module 2 – Multidimensional Databases
- Module 3 – Cubes and Dimensions
- Module 4 – Measures and Measure Groups
- Module 5 – Introduction to MDX
- Module 6 – Customizing Cube Functionality
- Module 7 – Tabular Data Models
- Module 8 – Data Analysis Expressions (DAX)
- Module 9 – Data Mining
- Module 1 – Query Tools
- Module 2 – Introduction to T-SQL Querying
- Module 3 – Basic SELECT Queries
- Module 4 – Querying Multiple Tables
- Module 5 – Sorting and Filtering Data
- Module 6 – Working with SQL Server Data Types
- Module 7 – Using DML to Modify Data
- Module 8 – Using Built-In Functions
- Module 9 – Grouping and Aggregating Data
- Module 10 – Using Subqueries
- Module 11 – Using Table Expressions
- Module 12 – Using Set Operators
- Module 13 – Using Window Ranking, Offset, and Aggregate Functions
- Module 14 – Pivoting and Grouping Sets
- Module 15 – Implementing Error Handling
- Module 16 – Managing Transactions
- Module 1 – Query Tools
- Module 2 – Introduction to T-SQL Querying
- Module 3 – Basic SELECT Queries
- Module 4 – Querying Multiple Tables
- Module 5 – Sorting and Filtering Data
- Module 6 – Introduction to Business Intelligence and Data Modeling
- Module 7 – Prepare Data
- Module 8 – Clean, Transform, and Load Data
- Module 9 – Design a Data Model
- Module 10 – Create Model Calculations using DAX
- Module 11 – Create Reports
- Module 12 – Create Dashboards
- Module 13 – Create Paginated Reports
- Module 14 – Perform Advanced Analytics
- Module 15 – Create and Manage Workspaces
- Module 16 – Create Power App Visuals
- Module 17 – Analysis Services and Power BI
- Module 1: Introduction
- Module 2: Cloud Fundamentals
- Module 3: Azure’s Architecture
- Module 4: Compute
- Module 5: Networking and CDN
- Module 6: Storage
- Module 7: Azure Solutions
- Module 8: Administration
- Module 9: Pricing and Service Level Agreements
- Module 10: Exam Preparation
- Module 11: Review Questions
- Module 1 – Azure Overview
- 1.0 Introduction to AZ-104
- 1.1 Cloud Computing
- 1.2 Cloud Services Benefits
- 1.3 Cloud Service Types
- 1.4 Azure Core Architectural Components
- 1.4.1 ACTIVITY - Creating Management Groups and Subscriptions
- 1.5 Azure Compute Services
- 1.6 Azure Application Hosting Options
- 1.7 Azure Networking Services
- 1.8 Azure Storage Services
- 1.9 Azure Identity, Access, and Security
- 1.10 Azure Cost Management
- 1.10.1 ACTIVITY - Checking Your Azure Balance
- 1.11 Azure Governance and Compliance Tools
- 1.11.1 ACTIVITY - Assign an Azure Policy
- Module 2 – Azure Tools
- 2.1 Azure Portal
- 2.1.1 ACTIVITY - Exploring the Azure Portal
- 2.2 Azure Monitoring Tools
- 2.3 Azure PowerShell
- 2.3.1 ACTIVITY - Using Azure PowerShell
- 2.4 Azure CLI
- 2.4.1 ACTIVITY - Using the Azure CLI
- 2.5 Azure Cloud Shell
- 2.6 ARM Templates
- 2.6.1 ACTIVITY - Using Templates to Deploy Resources
- 2.7 Azure Resource Manager
- 2.8 Hybrid Tools
- Module 3 – Azure Identities and Governance
- 3.1 Azure AD Overview
- 3.1.1 ACTIVITY - Exploring Azure Active Directory
- 3.1.2 ACTIVITY - Adding a Custom Domain
- 3.2 Subscriptions
- 3.3 Users and Groups
- 3.3.1 ACTIVITY - Adding Azure Active Directory User
- 3.3.2 ACTIVITY - Bulk Inviting New Users
- 3.3.3 ACTIVITY - Creating Azure AD Groups
- 3.4 Authentication
- 3.5 SSPR
- 3.5.1 ACTIVITY - Implementing SSPR
- 3.6 Devices
- 3.7 Azure Roles
- 3.7.1 ACTIVITY - Assigning Azure Roles
- 3.8 Azure AD Roles
- 3.8.1 ACTIVITY - Assigning Azure AD Roles
- 3.9 Conditional Access
- 3.10 Authorization
- 3.10.1 ACTIVITY - Managing Licenses
- 3.11 Azure Policy
- Module 4 – Azure Storage
- 4.1 Storage Accounts
- 4.1.1 ACTIVITY - Creating a Storage Account
- 4.2 Storage Types
- 4.2.1 ACTIVITY - Creating Storage Types
- 4.3 Azure Storage Tools
- 4.3.1 ACTIVITY - Azure Storage Explorer
- 4.4 Azure Files and File Sync
- 4.4.1 ACTIVITY - Deploying an Azure Files Share
- 4.5 Azure Storage Security
- Module 5 – Azure Compute Resources
- 5.1 Virtual Machines
- 5.1.1 ACTIVITY - Create Virtual Machines
- 5.1.2 ACTIVITY - Delete a Virtual Machine
- 5.2 VM Availability
- 5.2.1 ACTIVITY - Increasing VM Availability
- 5.3 VM Extensions
- 5.4 Azure App Service
- 5.5 Azure Container Instances
- 5.6 Kubernetes
- Module 6 – Azure Virtual Networks
- 6.1 Virtual Networks
- 6.1.1 ACTIVITY - Create a VNet
- 6.2 Network Security Groups - Part 1
- 6.2.1 Network Security Groups - Part 2
- 6.3 Azure Firewall
- 6.3.1 ACTIVITY - Deploying a Firewall
- 6.4 Azure DNS - Part 1
- 6.4.1 Azure DNS - Part 2
- 6.4.2 ACTIVITY - Implementing Azure DNS Zone
- 6.5 Virtual Network Peering
- 6.5.1 ACTIVITY - VNet Peering
- 6.6 Azure VPN Gateway
- 6.7 ExpressRoute and Virtual WANs
- 6.8 Azure Load Balancer
- 6.9 Azure Application Gateway
- 6.10 Azure Routes
- Module 7 – Azure Monitoring and Backup
- 7.1 Network Watcher
- 7.2 Azure Monitor
- 7.3 Azure Backup - Part 1
- 7.4 Azure Backup - Part 2
- 7.5 Azure Backup - Part 3
- 7.6 Conclusion to AZ-104
- Module 1: Implement VM Solutions
- Module 2: Develop Azure Platform as a Service
- Module 3: Develop for Azure Storage
- Module 4: Implement Azure Security
- Module 5: Monitor, Troubleshoot and Optimize Azure Solutions
- Module 6: Connect to and Consume Azure and Third Party Services
- Module 1 – Prepare Data
- Module 2 – Clean, Transform, and Load Data
- Module 3 – Design a Data Model
- Module 4 – Create Model Calculations using DAX
- Module 5 – Create Reports
- Module 6 – Create Dashboards
- Module 7 – Create Paginated Reports
- Module 8 – Perform Advanced Analytics
- Module 9 – Create and Manage Workspaces
- Module 10 – Create Power App Visuals
- Module 11 – Analysis Services and Power BI
- Module 1 – Understanding Local Area Networking
- Module 2 – Defining Networks with the OSI Model
- Module 3 – Understanding Wired and Wireless Networks
- Module 4 – Understanding Internet Protocol
- Module 5 – Implementing TCP-IP in the command line
- Module 6 – Working with Networking Services
- Module 7 – Understanding Wide Area Networks
- Module 8 – Defining Network Infrastructure and Security
- Module 9 – Key Takeaways
- Module 10 – Terms to Know
- Module 1 – Introducing Windows Server 2016
- Module 2 – Managing Windows Server 2016
- Module 3 – Managing Storage
- Module 4 – Monitoring and Troubleshooting Servers
- Module 5 – Essential Services
- Module 6 – Understanding File and Print Services
- Module 7 – Windows Network Services and Applications
- Module 8 – Key Takeaways
- Module 9 – Terms to Know
- Module 10 – Hands on Labs
- Module 1: Deploy a Microsoft Azure SQL Database
- Module 2: Plan for SQL Server Installation
- Module 3: Deploy SQL Server Instances
- Module 4: Deploy SQL Server Databases to Azure Virtual Machines
- Module 5: Configure Secure Access to Microsoft Azure SQL Databases
- Module 6: Configure SQL Server Performance Settings
- Module 7: Manage SQL Server Instances
- Module 8: Manage SQL Storage
- Module 9: Perform Database Maintenance
- Module 1: Configure Encryption
- Module 2: Configure Data Access and Permissions
- Module 3: Configure Auditing
- Module 4: Develop a Backup Strategy
- Module 5: Restore Databases
- Module 6: Manage Database Integrity
- Module 7: Monitor Database Activity
- Module 8: Monitor Queries
- Module 9: Manage Indexes
- Module 10: Monitor SQL Server Instances
- Module 11: Implement Log Shipping
- Module 12: Implement Failover Cluster Instances
- Module 13: Implement Always On Availability Groups
- Module 1: Installing and Configuring Domain Controllers
- Module 2: Managing AD DS Objects
- Module 3: Securing Active Directory Domain Services
- Module 4: Working with Complex AD Infrastructures
- Module 5: Implementing Group Policy
- Module 6: Understanding Microsoft Azure AD and Directory Synchronization
- Module 7: Monitoring and Recovering AD DS
- Module 8: Implementing Active Directory Certificate Services
- Module 9: Implementing Active Directory Federation Services
- Module 1: Plan and Implement IPv4 and IPv6 Networks
- Module 2: Installing and Configuring DHCP
- Module 3: Installing and Configuring DNS
- Module 4: Implementing and Managing IP Address Management
- Module 5: Implementing Remote Access
- Module 6: Securing the Network Infrastructure
Module 1: Installing Windows Server 2016 in Host and Compute Environments Module 2: Configuring Active Directory Networks for Host and Compute Environments Module 3: Implementing Local and Enterprise Storage Solutions Module 4: Implementing Hyper-V Virtualization and Containers Module 5: Implementing High Availability Module 6: Maintaining and Monitoring Windows Server 2016
- Module 1: Prepare for installation requirements
- Module 2: Install Windows
- Module 3: Configure devices and device drivers
- Module 4: Perform post-installation configuration
- Module 5: Implement Windows in an enterprise environment
- Module 6: Configure networking
- Module 7: Configure storage
- Module 8: Configure data access and usage
- Module 9: Implement Apps
- Module 10: Configure remote management
- Module 11: Configure Updates
- Module 12: Monitor Windows
- Module 13: Configure System and Data Recovery
- Module 14: Configure Authorization and Authentication
- Module 15: Configure Advanced Management Tools
- Module 1: Introducing Windows 10
- Module 2: Installing Windows 10
- Module 3: Configuring Devices
- Module 4: Configuring Network Connectivity
- Module 5: Managing Storage, Data, And Printers
- Module 6: Managing Apps
- Module 7: Managing Device Security
- Module 8: Maintaining Windows 10
- Module 9: Troubleshooting And Recovery
- Module 10: Deploying Windows 10 Enterprise Desktops
- Module 11: Managing User Profiles And User State Virtualization
- Module 12: Managing Desktop And Application Settings Using Group Policy
- Module 13: Configuring And Managing Client Hyper-V
- Module 14: Configuring Windows Devices – December, 2017 Update – Part 1
- Module 15: Configuring Windows Devices – December, 2017 Update – Part 2
- Module 1: Introduction
- Module 2: Troubleshooting Start Up Issues
- Module 3: Managing Drivers And Hardware
- Module 4: Troubleshooting Remote Computers
- Module 5: Resolving Problems With Network Connectivity
- Module 6: Troubleshooting Group Policy
- Module 7: Troubleshooting User Settings
- Module 8: Configuring And Troubleshooting Remote Connectivity
- Module 9: Troubleshooting Resource Access In A Domain
- Module 10: Configuring And Troubleshooting Resource Access For Non-Domain Members
- Module 11: Troubleshooting Applications
- Module 12: Maintaining Windows 8.1
- Module 13: Recovering Windows 8.1
- Lesson 1: Getting to Know PCs and the Windows 8 User Interface
- Lesson 2: Using the Modern Apps and Navigation Features
- Lesson 3: Working with Desktop Applications
- Lesson 4: Using Internet Explorer 10
- Lesson 5: Customizing the Windows 8 Environment
- Lesson 6: Using Windows 8 Security Features
- Module 1: Developing a Strategy for Windows® 7 Business Desktops Deployment
- Module 2: Evaluating Application Compatibility in Windows® 7
- Module 3: Assessing Deployment Methods for Windows® 7
- Module 4: Designing Standard Images for Windows® 7
- Module 5: Deploying Windows® 7 with Windows AIK
- Module 6: Using Windows Deployment Services to Deploy Windows® 7
- Module 7: Deploying Windows® 7 Using Lite Touch Installation
- Module 8: Deploying Windows® 7 Using Zero Touch Installation
- Module 9: Migrating User State Using USMT 4.0 and WET
- Module 10: Planning, Configuring, and Managing the Client Environment
- Module 11: Planning and Deploying Applications and Updates to Windows® 7 Clients
- Module 1: Installing, Upgrading, and Migrating to Windows 7
- Module 2: Configuring Disks And Device Drivers
- Module 3: Configuring File Access And Printers
- Module 4: Identifying And Resolving Log on Problems
- Module 5: Configuring Network Connectivity
- Module 6: Troubleshooting Network Issues
- Module 7: Mobile Computing And Remote Access
- Module 8: Securing Windows 7 Desktops
- Module 9: Optimizing And Troubleshooting Performance And Reliability
- Module 10: Maintaining Windows 7 Desktops
- Module 1: Installing, Upgrading and Migrating Windows 7
- Module 2: Deploying Windows 7 in the Enterprise
- Module 3: Enterprise Management in Windows 7
- Module 4: Configuring Hardware and Applications
- Module 5: Configuring Network Connectivity
- Module 6: Configuring Access to Resources
- Module 7: Configuring Mobile Computing
- Module 8: Configuring Security Options
- Module 9: Monitoring And Maintaining Systems
- Module 10: Configuring Backup and Recovery Options
- Module 1: Planning Server Deployment
- Module 2: Automating Server Deployment
- Module 3: Planning for Server Management
- Module 4: Planning the Network Infrastructure
- Module 5: Planning Name Resolution Services
- Module 6: Planning File and Print Services
- Module 7: Planning Active Directory Domain Services
- Module 8: Planning Active Directory Certificate Services
- Module 9: Planning High Availability
- Module 10: Planning Backups For Windows Server
- Module 11: Planning Server Monitoring and Maintenance
- Module 1: Installing and Configuring Windows Services
- Module 2: TCP/IP Protocol Suite
- Module 3: Configuring IPv4 Addressing
- Module 4: Configuring IP Address Assignment Services
- Module 5: Configuring IPv6 Addressing
- Module 6: Configuring Name Resolution Services
- Module 1: Active Directory – An Identity And Access Solution
- Module 2: Introduction To Active Directory Domain Services
- Module 3: Configuring DNS To Support Active Directory Domain Services
- Module 4: Active Directory Object Management
- Module 5: Managing Active Directory Replication Using Sites
- Module 6: Configuration Management Using Group Policy
- Module 7: Desktop Environmental And Security Management
- Module 8: Maintaining Active Directory
- Module 9: Deploy and Manage a Public Key Infrastructure
- Module 10: Supporting Applications with AD LDS
- Module 11: Deploying Active Directory Federated Services
- Module 12: Deploying Active Directory Rights Management Services
- Module 1: Introduction To Creating Efficient Apps For SharePoint
- Module 2: Working With Managed Metadata Solutions
- Module 3: Working With The Search Service
- Module 4: Implementing Enterprise Content Management
- Module 5: Developing Publishing Sites
- Module 6: Interacting With Business Connectivity Services
- Module 1: Overview of SharePoint Development
- Module 2: Working With Objects, List, And Libraries
- Module 3: Working With Features and Solutions
- Module 4: Developing Server Side Code
- Module 5: Managing Authentication And Authorization
- Module 6: Client Side SharePoint Development
- Module 7: Developing And Managing Apps
- Module 8: Using Workflows To Automate Business Processes
- Module 9: Customizing SharePoint Interfaces
- Module 1: Accessing Data
- Module 2: Designing And Implementing WCF Services
- Module 3: Querying And Manipulating Data Using Entity Framework
- Module 4: Creating And Consuming Web API Based Services
- Module 5: Deploying Web Applications And Services
- Module 6: Course Review
- Module 1: Intro To Business Intelligence
- Module 2: Database Essentials
- Module 3: Business Intelligence Development
- Module 4: Business Intelligence Results
- Module 5: Advanced Reporting And Development
- Module 6: SQL Server Integration Services (SSIS)
- Module 7: SQL Server 2014 New Features
- Module 8: Course Review And Exam Prep
- Module 1: Introduction To Business Intelligence And Data Modeling
- Module 2: Implementing Reports The SQL Server Reporting Services
- Module 3: Supporting Self Service Reporting
- Module 4: Managing Report Execution And Delivery
- Module 5: Creating Multidimensional Databases
- Module 6: Working With Cubes And Dimensions
- Module 7: Working With Measures And Measure Groups
- Module 8: Introduction To MDX
- Module 9: Customizing Cube Functionality
- Module 10: Implementing A Tabular Data Model
- Module 11: Introduction To DAX
- Module 12: Implementing An Analysis Services Tabular Data Model
- Module 13: SQL Analysis Services
- Module 14: Creating Data Visualizations With Power View
- Module 15: Supporting Self Service Reporting
- Module 16: Performing Predictive Analysis With Data Mining
- Module 17: Predictive Analytics
- Module 1: Designing A Database Server Infrastructure
- Module 2: Designing A Logical Database Scheme
- Module 3: Designing A Physical Database Implementation
- Module 4: Incorporating Data Files Into the Database
- Module 5: Tuning Database Performance
- Module 6: Designing Database Security
- Module 7: Policy Based Management
- Module 8: Monitoring Server Health
- Module 9: Designing Database Backup Solution
- Module 10: Automating Multi Server Maintenance
- Module 11: Managing SQL Server With Windows Powershell
- Module 12: Replicating Data
- Module 13: Planning High Availability
- Module 14: Review of SQL Statements
- Module 15: Eleven Rules of Database Design
- Module 1: SQL 2012 And The 464 Test
- Module 2: Working With Data Types
- Module 3: Tables
- Module 4: Data Constraints
- Module 5: Planning In Indexing
- Module 6: Table Structures
- Module 7: Improving Performance with Non-Clustered Indexes
- Module 8: Using Indexes And Execution Plans
- Module 9: Working with Views
- Module 10: Designing and Implementing Stored Procedures
- Module 11: Merging Data and Passing Tables
- Module 12: Designing and Implementing User Functions
- Module 13: Creating Highly Concurrent SQL Server Applications
- Module 14: Handling Errors in T-SQL
- Module 15: Triggers
- Module 16: Implementing Managed Code
- Module 17: Storing XML in SQL
- Module 18: Querying XML
- Module 19: Working with the Spatial Data
- Module 20: Working With Full-Text Indexes and Queries
- Lesson 1: Introduction to Data Warehouse
- Lesson 2: Creating Dimensions and Changing Granularity of Dimensions
- Lesson 3: Creating Fact Tables and Column Store Indexes
- Lesson 4: Implementing Data Warehouse in SQL Server 2012
- Lesson 5: Working with Integration Services
- Lesson 6: Managing Control Flow
- Lesson 7: Working with Dynamic Variables
- Lesson 8: Implementing Data Flow
- Lesson 9: Managing Data Flow
- Lesson 10: Managing SSIS Package Execution
- Lesson 11: Debugging and Troubleshooting
- Lesson 12: Deploying Packages
- Lesson 13: Securing Packages and Databases
- Lesson 14: Working with MDS and Windows
- Lesson 1: Identifying the SQL Server Platform
- Lesson 2: Deploying SQL Server
- Lesson 3: Configuring SQL Server
- Lesson 4: Managing Databases in SQL Server 2012
- Lesson 5: Managing SQL Server Security
- Lesson 6: Implementing Advanced Security Settings
- Lesson 7: Applying Encryption and Compression
- Lesson 8: Working with Indexes and Log Files
- Lesson 9: Working with Backup and Restore
- Lesson 10: Implementing High Availability
- Lesson 11: Optimizing Server Performance
- Lesson 12: Troubleshooting Issues and Recovering Databases
- Lesson 13: Performing Advanced Database Management Tasks
- Lesson 1: Getting Started with SQL Server 2012
- Lesson 2: Working with T-SQL
- Lesson 3: Writing SELECT Queries
- Lesson 4: Working with SQL Data Types
- Lesson 5: Sorting and Filtering Data
- Lesson 6: Querying Data from Multiple Tables
- Lesson 7: Modifying Data
- Lesson 8: Working with SQL Server Built-in Functions
- Lesson 9: Programming in T-SQL
- Lesson 10: Implementing Stored Procedures
- Lesson 11: Working with Subqueries and Table Expressions
- Lesson 12: Working with Set Operators, Conditional Operators, and Window Functions
- Lesson 13: Working with PIVOT, UNPIVOT, and Grouping Sets
- Lesson 14: Managing Error Handling and Transactions
- Lesson 15: Querying SQL Server System
- Lesson 16: Optimizing Query Performance
- Module 1: SSIS Packages
- Module 2: Debugging and Error Handling in SSIS
- Module 3: Deploying and Configuring SSIS Packages
- Module 4: Securing and Executing SSIS Packages; Service Administration
- Module 5: Data Analysis
- Module 6: Extending SSAS Cubes
- Module 7: Extending SSAS Cubes
- Module 8: Securing and Administering SSAS
- Module 9: Working With SSAS Data Mining
- Module 10: Developing SSAS Reports
- Module 11: Extending and Deploying SSRS Reports
- Module 12: Scheduling Deployed Reports and Data Sources
- Module 13: Configuring And Administering the SSRS Server
- Module 1: Installing on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
- Module 2: Getting familiar with SQL on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
- Module 3: Types of Data on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
- Module 4: Databases on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
- Module 5: Looking at Tables on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
- Module 6: Looking at Views
- Module 7: About Constraints
- Module 8: Looking at Stored Procedures
- Module 9: Functions
- Module 10: About Service Broker
- Module 11: Integrity
- Module 12: Permissions in SQL
- Module 13: Accounts
- Module 14: Security
- Module 15: Backups/Restores
- Module 16: Endpoints
- Module 17: Servers working together
- Module 18: Triggers in SQL
- Module 19: Replication between servers
- Module 20: Indexes
- Module 21: Transactions in SQL
- Module 22: Data moves
- Module 23: Data specialties in SQL
- Module 24: Fault Tolerance
- Module 25: SQL Management
- Module 26: SQL Management Monitoring
- Module 27: SQL Management tools
- Module 28: Troubleshooting
- Module 29: Course Review
- Module 30: Common Questions
- Module 31: Real World Scenarios
- Module 1: Manage and Maintain a Server Infrastructure
- Module 2: Plan and Implement a Highly Available Enterprise Infrastructure
- Module 3: Plan and Implement a Server Virtualization Infrastructure
- Module 4: Design and Implement Identity and Access Solutions
- Module 1: Plan and Deploy Infrastructure
- Module 2: Planning and Implementing
- Module 3: Planning and Implementing Server Upgrade and Migration
- Module 4: Planning and Deploying Virtual Machine Manager Resources
- Module 5: Planning and Implementing File and Storage Services
- Module 6: Design and Implement Network Infrastructure Services
- Module 7: Design and Maintain a Dynamic Host Configuration Protocol Solution
- Module 8: Design a Name Resolution Solution Strategy
- Module 9: Design and Manage an IP Address Management Solution
- Module 10: Design and Implement Network Access Services
- Module 11: Design a VPN Solution
- Module 12: Design a DirectAccess Solution
- Module 13: Implement a Scalable Remote Access Solution
- Module 14: Design and Implement a Network Protection Solution
- Module 15: Design and Implement an Active Directory Infrastructure
- Module 16: Design a Forest and Domain Infrastructure
- Module 17: Implement a Forest and Domain Infrastructure
- Module 18: Design a Group Policy Strategy
- Module 19: Design an Active Directory Permission Model
- Module 20: Design and Implement an Active Directory Infrastructure (Physical)
- Module 21: Design an Active Directory Site Topology
- Module 22: Design an Active Directory Site Topology
- Module 23: Design and Implement a Branch Office Infrastructure
- Module 1: Configuring Advanced DNS Services
- Module 2: Advanced DHCP Services
- Module 3: Active Directory Forest Configuration
- Module 4: Active Directory Certificate Services
- Module 5: iSCSI and iSNS
- Module 6: Configuring IPAM
- Module 7: Network Load Balancing
- Module 8: Failover Clusters
- Module 9: Configuring Hyper-V Virtual Machines
- Module 10: Dynamic Access Control
- Module 11: Active Directory Rights Management Services
- Module 12: Active Directory Federation Services
- Module 13: Disaster Recovery
- Module 14: Configuring Additional Services
- Module 1: Managing User and Service Accounts
- Module 2: Administer Group Policy
- Module 3: Managing Network File Services
- Module 4: Domain Name System
- Module 5: Windows Deployment Services
- Module 6: Windows Server Update Services
- Module 7: Remote Access
- Module 8: Monitoring System
- Module 9: Managing Active Directory Services
- Module 1: Installing And Configuring Windows Server 2012 R2
- Module 2: Installing and Configuring an Active Directory Domain Controller
- Module 3: Administering Active Directory Objects
- Module 4: Automating Administration Tasks
- Module 5: Configuring IPv4
- Module 6: Configuring IPv6
- Module 7: Installing and Configuring DHCP
- Module 8: Installing and Configuring DNS
- Module 9: Configuring Storage Spaces and File and Print Services
- Module 10: Configuring Group Policy
- Module 11: Securing Windows Servers
- Module 12: Installing and Configuring Virtual Servers and Clients
- Module 1: Understanding Microsoft Applications
- Module 2: Installing And Configuring The Hyper-V Role
- Module 3: Creating And Managing Virtual Hard Disks, Virtual Machines, And Virtual
- Module 4: Producing And Configuring Virtual Machine Networks
- Module 5: Virtual Machine Movement And Hyper-V Replicas
- Module 6: Implementing Failover Clustering Using Hyper-V
- Module 7: Installing And Configuring Microsoft System Center 2012 R2 Virtual
- Module 8: Managing The Network And Storage Infrastructure In Microsoft System
- Module 9: Creating And Managing Virtual Machines Using Microsoft System Center 2012 R2 Virtual Machine Manager
- Module 10: Configuring And Managing The Microsoft System Center 2012 R2 Virtual Machine Manager Library
- Module 11: Managing Clouds In Microsoft System Center 2012 R2 Virtual Machine
- Module 12: Managing Services In Microsoft System Center 2012 R2 Virtual
- Module 13: Protecting And Monitoring Virtualization Infrastructure
- Module 14: Hyper-V And SCVMM Review
- Module 1: Technology Review
- Module 2: Device Management
- Module 3: Office 365 Deployment Plan
- Module 4: Windows Azure
- Module 5: PowerShell
- Module 6: SQL Server
- Module 7: Azure Lync and SharePoint
- Module 8: Course Review
- Module 1: Introduction To Office 365
- Module 2: Administration In Office 365
- Module 3: Managing Clients
- Module 4: Planning DNS And Exchange Migrations
- Module 5: Planning And Configuring Exchange Online
- Module 6: Configuring SharePoint Online
- Module 7: Configuring Lync Online
- Module 8: Implementing Coexistence Technologies
- Module 1: Overview
- Module 2: Beginning PowerShell
- Module 3: Exchange Control Panel
- Module 4: Create a New Mailbox with PowerShell
- Module 5: Mailbox Statistics with PowerShell
- Module 6: Intermediate PowerShell
- Module 7: Unified Messaging
- Module 8: Installation and Configuration
- Module 9: Exchange Online
- Module 10: Advanced Design
- Module 1: Overview
- Module 2: Exchange Server 2013 Administration
- Module 3: Fundamentals of Exchange Administration
- Module 4: Archive Mailboxes
- Module 5: Properties of User Mailboxes
- Module 6: Distribution Groups
- Module 7: Outlook and Outlook Web Apps
- Module 8: Preparation Prerequisites
- Module 9: Installation of Exchange 2013
- Module 10: Exchange 2013 Design
- Module 11: Labs and Demos
- Module 1: Handling Design And Architecture For Microsoft Lync Server 2013
- Module 2: Designing A Lync Server 2013
- Module 3: Installing Lync
- Module 4: Questions
- Module 5: Deploying And Managing Clients And Devices
- Module 6: Conferencing In Lync Server 2013
- Module 7: Designing And Deploying External Access
- Module 8: Deploying Microsoft Lync Server 2013 Persistent Chat
- Module 9: Archiving And Monitoring
- Module 10: Administering And Maintaining Lync Server 2013
- Module 11: Configuring And Managing High Availability In Lync Server 2013
- Module 12: Understanding Disaster Recovery In Lync Server 2013
- Module 13: Planning a Migration to Lync Server 2013
- Module 1: Understanding Voice Architecture
- Module 2: Configuring Key Enterprise Voice Functionality
- Module 3: Designing Exchange Server 2013 Unified Messaging Integration
- Module 4: Understanding Voice Applications
- Module 5: Configuring and Deploying Emergency Calling
- Module 6: Integrating the PSTN
- Module 7: Understanding Lync Server 2013 and Networking
- Module 8: Understanding Phones and Devices
- Module 9: Configuring And Migrating Lync Online
- Module 10: Monitoring
- Module 11: Understanding Lync Server 2013 Voice Resiliency
- Module 1: Business Continuity
- Module 2: Model, Design, and Test
- Module 3: Upgrade and Migrate
- Module 4: Create and Configure Service Applications
- Module 5: SharePoint Management
- Module 1: Comprehensive Introduction to SharePoint
- Module 2: Installing SharePoint
- Module 3: SharePoint Architecture, Logical & Physical
- Module 4: Web Applications and Site Collections
- Module 5: Configure Service Applications
- Module 6: Permissions
- Module 7: Search
- Module 8: User Profiles
- Module 9: Ongoing Support and Maintenance
- Module 1: Designing For The Cloud
- Module 2: Using System Center Virtual Machine Manager R2
- Module 3: Deploying And Maintaining Fabric Resources
- Module 4: Building The Private Cloud
- Module 5: Monitoring And Optimizing The Private Cloud
- Module 6: Planning And Deploying Service Management
- Module 7: Automating And Standardizing The Private Cloud
- Module 8: Disaster Recovery And High Availability For The Private Cloud
- Module 9: Implementing Self-Service Multi-Tenant Private Clouds
- Module 1: Introducing The Cloud Model
- Module 2: Configuring The Private Cloud Environment
- Module 3: Deploying Services For The Private Cloud
- Module 4: Monitoring Cloud Based Applications
- Module 5: Service Management For The New Cloud
- Module 6: High Availability And Disaster Recovery For The Private Cloud
- Module 7: Optimizing The Private Cloud Infrastructure
- Module 8: Configuring Multi-Tenant Self-Service Using Windows Azure Pack
- Module 9: Configuring And Monitoring The Private Cloud Review
- Module 1: Planning Configuration Manager Infrastructure
- Module 2: Migrating To Configuration Manager 2012
- Module 3: Installations and Site Role Configuration
- Module 4: Cloud Integration
- Module 5: Installing The Client
- Module 6: Client Health
- Module 7: Application Deployment
- Module 8: Software Updates
- Module 9: Operating System Deployment
- Module 10: Inventory and Software Metering
- Module 11: Asset Intelligence
- Module 12: Reporting
- Module 13: Compliance Settings
- Module 14: Endpoint Protection
- Module 15: Mobile Device Management
- Module 16: Role-Based Administration
- Module 17: Disaster Recovery
- Module 18: Troubleshooting
- Module 1: Getting Started With Windows 10
- Module 2: Using File Explorer
- Module 3: Using Windows Applications
- Module 4: Browsing the Web With Microsoft Edge
- Module 5: Customizing Windows
- Module 6: Connecting Devices And Devices
- Module 7: Managing User Accounts
- Module 8: Backing Up Important Data
- Module 9: Maintaining Windows
- Module 10: Protecting Windows
- Module 11: Monitoring Performance
- Module 12: Working With Control Panel And Settings
- Module 1: Introduction and Deploy Windows
- Module 2: Manage Devices and Data
- Module 3: Configure Connectivity
- Module 4: Maintain Windows
- Module 1: Introduction and Deploy Windows
- Module 2: Manage Devices and Data
- Module 3: Configure Connectivity
- Module 4: Maintain Windows
- Lesson 1: Getting to Know PCs and the Windows 8 User Interface
- Lesson 2: Using the Modern Apps and Navigation Features
- Lesson 3: Working with Desktop Applications
- Lesson 4: Using Internet Explorer 10
- Lesson 5: Customizing the Windows 8 Environment
- Lesson 6: Using Windows 8 Security Features
- Module 1: Foundations of Microsoft Licensing
- 1.1 Why Licensing Matters
- 1.2 Key Licensing Terminology Explained
- Module 2: Microsoft Licensing Programs and Models
- 2.1 Volume Licensing Overview
- 2.2 Enterprise Agreement (EA) Model
- 2.3 Cloud Solution Provider (CSP) Program
- Module 3: Office vs. Microsoft 365 – Choosing the Right Plan
- 3.1 Comparing Office Perpetual and Microsoft 365
- 3.2 Microsoft 365 Plans Demystified
- Module 4: Licensing Optimization and Strategy
- 4.1 Common Pitfalls and How to Avoid Them
- 4.2 Rightsizing Your Licensing Portfolio
- 4.3 Tools and Resources for Licensing Management
- Module 5: Compliance and Audit Readiness
- 5.1 Staying Compliant
- 5.2 Policies and Internal Governance
- 5.3 Microsoft Licensing Course Closeout, Next Steps and Recommendations
Adobe
- Getting Started
- Getting to Know Adobe Audition
- The Interface
- Waveform Editing
- Effects
- Audio Restoration
- Mastering
- Sound Design
- Creating and Recording Files
- Multitrack Sessions
- Multitrack Session Editing
- Additional Features and Summary
- Introduction to After Effects
- Intermediate Effects and Techniques in After Effects
- More Advanced Effects and Techniques in After Effects
- Getting Started
- Getting to Know the Workflow
- Creating a Basic Animation Using Effects and Presets
- Animating Text
- Working With Shape Layers
- Animating a Multimedia Presentation
- Animating Photoshop Layers
- Working With Masks
- Distorting Objects with the Puppet Tools
- Using the Roto Brush Tool
- Performing Color Correction
- Creating Motion Graphics Templates
- Module 1
- Module 1
- Module 2
- Tools and Effects in Illustrator
- Creating Projects in Illustrator
- Module 1
- Module 1
- Module 1
- Module 2
- Module 1
- Module 2
- Module 3
- Module 4
- Module 5
- Module 6
- Module 7
- Module 8
- Module 9
- Module 10
- Module 11
- What is Animation and the Basics
- Intermediate Animation Techniques
- Welcome
- Why use Lightroom
- Lightroom library and organization
- Edit your photo – global adjustments
- Edit your photo – local adjustments
- Saving and exporting
- Lightroom CC overview
- Outro
- Tools and Effects in Photoshop
- Creating Projects in Photoshop
- Module 1
- Introduction to Premiere and Getting Started on an Editing Project
- More Editing Techniques and Completing a Project
- Module 1
- Module 2
- Module 1
- Module 2
- Module 1
- Module 1
- Module 2
Module 1: Intro Module 2: Camera Anatomy Module 3: Scene Camera Modes Module 4: Achieve Exposure Module 5: Filetypes Module 6: Sensor Module 7: Resolution Module 8: White Balance Module 9: Color Theory Module 10: Depth of Field Module 11: Focusing Module 12: Lighting Module 13: Metering Module 14: Composition
- Introduction
- Getting Started
- Drawing
- Colors and Gradients
- Intermediate Illustration
- Typography
- Live Trace, Paint Brush and Blob Brush
- Exporting
- Getting Started
- Layers and More
- Editing, Techniques and More
- Getting Started
- Motion, Sound, and More
- Google Analytics 4 – Course Overview
- About Google Analytics 4
- Course Intro Welcome
- Instructor Intro
- Fundamentals of Google Analytics
- What is a Digital Product
- Google Market Platform
- Google Analytics Overview
- Google Analytics 4 Overview
- Whiteboard Discussion - How Does GA Work
- Comparing GA3 to GA4
- Whiteboard Compare Data Models
- Demo - GA Console Walkthrough
- Admin Panel
- Demo Admin Panel
- Tag Manager
- Demo Tag Manager
- Segment Review
- Segment Review Questions
- Advanced Topics with Google Analytics
- Upgrading and Running Parallel
- Whiteboard Discussion – Parallel
- Demo Console Parallel
- Hands-on Demo – Install GA4 on a Live Site
- Understand Reporting Options, Lifecycle Collections
- Hands-on Demo – Exploring reports
- Hands-on Demo – Set up GA4 Custom Events
- Hands-on Demo – Conversions, Audiences, DebugView
- Hands-on Demo – Advertising
- Hands-on Demo – Explorations: Insights
- Hands-on Demo – Lifecycle and Users
- Google BigQuery Connections
- Demo – BigQuery Data Integrations
- Google Ads
- Demo – Google Ads
- Google Signals
- Demo – Google Signals
- Certification Options
- Segment Summary
- Review Questions
- Resources
- Course Closeout
- Introduction to Google Analytics
- Fundamentals of Google Analytics
- Basics of Google Analytics
- Reports in Google Analytics
- Behavioral Reports
- Audience
- Conversions
- Course Overview
- DevOps Basics
- App Engine PaaS
- Kubernetes Engine Overview
- DevOps Developer Tools
- Microservices
- Management of your DevOps Services
- Resources and Closeout
- Google Cloud Digital Leader Course Overview
- About Google Cloud Digital Leader
- Course and Instructor Intro
- Course PreReqs
- GCP Certification Overview
- GCP Digital Leader Exam Objectives
- General Cloud Knowledge
- General Cloud Knowledge
- Domain Objectives
- Intro to Cloud Computing
- Essential Characteristics of Cloud Computing
- Service Models
- Deployment Models
- Multitenancy
- Resiliency
- Replication
- Automation and Orchestration
- Chargeback
- Vendor Lock-in
- Cloud Standards
- OpEx, CapEx
- TCO-ROI
- Business Enablers
- Section Summary
- Review Questions
- General Google Cloud Knowledge
- General GCP Knowledge
- Domain Objectives
- GCP Overview
- Cloud Infrastructure
- Cloud Hierarchy
- Project Demo
- Whiteboard Hierarchy and Projects
- Service Options
- Demo – Services Overview
- Pricing Calculator
- Demo – Pricing Calculator
- Billing Models and Discounts
- Demo Billing
- Compliance Resources
- Demo – Compliance Reports Manager
- Support Options
- Service Level Agreement (SLA)
- Google Cloud Framework and Maturity Model
- Demo – Maturity Assessment
- Access to GCP
- Demo – GCP Access
- Section Summary
- Review Questions
- Google Cloud Products and Services
- Google Cloud Products and Services
- Domain Objectives
- Core Services
- Compute Engine, Google Cloud VMware Engine, and Bare Metal
- Compute Storage and Disk Options
- App Engine, Cloud Functions, and Cloud Run
- Google Kubernetes Engine
- Demo Compute Services
- Container Registry
- Cost and Performance Tradeoffs of Scale To Zero
- Database Options – Cloud SQL, Cloud Spanner, Cloud Bigtable, BigQuery
- Demo – Database Offerings
- Vision API, AI Platform, TPUs
- Pre Trained Models
- Data Pipeline Offerings
- Data Ingestion Options
- Software Development Life Cycle (SDLC)
- Visibility and Alerting Offerings
- Data Migration Options
- Compute VM Migration
- Whiteboard – Migrations
- Application Modernization
- Software-Defined WAN (SD-WAN)
- Connectivity Options
- Whiteboard – Connectivity
- IAM and Security
- Whiteboard Cloud Architecture
- Section Summary
- Review Questions
- Google Cloud Digital Leader Course Closeout
- Course Review
- Resources
- Exam Overview
- Key Elements of The FinOps Framework
- Introduction to FinOps
- Overview of the FinOps Framework
- The FinOps Lifecycle Phases
- The FinOps Principles
- Collaboration and Accountability in FinOps
- FinOps Persona and Allied Personas
- FinOps Domains Overview
- FinOps Domain: Cloud Usage & Cost
- Understand Cloud Usage & Cost Introduction
- Data Ingestion
- Cost Allocation
- Reporting & Analytics
- Anomaly Management
- FinOps Domain: Quantify Business Value
- Introduction to Quantify Business Value
- Planning & Estimating
- Forecasting
- Budgeting
- Benchmarking
- FinOps Domain: Optimize Cloud Usage & Cost
- Optimizing Cloud Usage and Costs Introduction
- Architecting for the Cloud
- Rate Optimization
- Workload Optimization
- Cloud Sustainability
- Licensing and SaaS
- Manage the FinOps Practice
- Manage the FinOps Practice Overview
- FinOps Practice Operations
- Cloud Policy & Governance
- FinOps Assessment
- FinOps Tools & Services
- FinOps Education and Enablement
- Invoicing and Chargeback
- Onboarding Workloads
- Intersecting Disciplines
- FinOps FOCUS
- Introduction to FinOps FOCUS
- Implementing FinOps FOCUS for AWS, Google Cloud, and Micro
- FinOps Certifications and Course Closeout
- Exploring the FinOps Certifications
- Course Closeout and Next Steps
- Introduction to Change Management in IT
- Change Management Course Introduction
- Defining Change Management
- Types of Change
- Strategies for Managing Resistance to Change
- Understanding Resistance to Change
- Proactive Strategies for Overcoming Resistance
- Building Resilience in IT Teams
- Developing Communication Plans for Change Initiatives
- Role of Communication in Successful Change Management
- Crafting Clear and Consistent Messages
- Utilizing Various Communication Channels
- Tools and Technologies for Supporting Change in IT Teams
- Digital Tools for Change Management
- Automation and Workflow Management
- Key Metrics for Tracking Change Management Success
- Case Studies of Effective Change Management in IT
- Case Study 1: Changing to Agile
- Case Study 2: Cloud Migration
- Course Closeout
- Introduction to SDLC
- Definition and Purpose of SDLC
- Overview of the SDLC Process
- Phases of the SDLC
- Requirement Gathering and Analysis
- Planning Phase
- Design Phase
- Development Phase
- Testing Phase
- Deployment Phase
- Maintenance Phase
- SDLC Methodologies
- Waterfall Methodology
- Agile Methodology
- Lean Methodology
- DevOps Methodology
- DevOps vs. Agile
- Which Methodology To Use
- Role of QA in SDLC
- Importance of QA in the Software Development Process
- QA Methodologies and Tools
- Best Practices for Effective SDLC Management
- Project Management and Communications
- Risk Management in the SDLC
- Continuous Improvement and Feedback Loops
- Course Closeout
- Introduction to CSS3
- Understanding The CSS Box Model
- Working With Page Layouts
- Using Colors And Backgrounds
- Web Typography
- Links, Lists, And Tables
- Dynamic CSS3 Properties
- What Is HTML?
- The Structure And Components
- Formatting The Page
- Structuring Content
- Adding Links, Images And Other Media
- Styling Web Pages
- Creating Your Own Website
- Introduction to CSS3
- Understanding The CSS Box Model
- Working With Page Layouts
- Using Colors And Backgrounds
- Web Typography
- Links, Lists, And Tables
- Dynamic CSS3 Properties
- What Is HTML?
- The Structure And Components
- Formatting The Page
- Structuring Content
- Adding Links, Images And Other Media
- Styling Web Pages
- Creating Your Own Website
- Getting Started with Python
- Working with Primitive Data Types
- Working with Multiple Assignments Statements
- Convert Types in Python
- Creating Lists
- Modifying Lists
- Sorting and Reversing Lists
- Slicing Lists
- Working With Operators
- Determining Operator Precedence
- Working with IF Statements
- Working With For Loops
- Working With While Loops
- Nesting For Loops
- Reading Files
- More on Files
- Merging Emails
- Reading Console Inputs and Formatting Outputs
- Reading Command Line Argument
- Defining Functions
- Using Default Argument
- Using Keyword and Positional Arguments
- Handling Exceptions
- Using Math and Random Modules
- Displaying Daytime Working Directory and File Metadata
- Module 1
- Module 2
- Module 3
- Module 4
- Module 5
- Module 6
- Introduction to Web Development
- C-Sharp
- HTML and CSS Comprehensive Review
- Intro to SQL Server
- JavaScript A Comprehensive Introduction
- Object Based JavaScript
- Model View and Controller
- A Comprehensive Introduction to jQuery
- Course Review
- Module 1
- Module 2
- Module 3
- Module 4
- Module 5
- Module 6
- Module 7
- Module 8
Six Sigma
- Organization – Wide Planning and Deployment
- Leadership
- Organizational Process Measures and Management
- Team Management
- Define Phase – Overview of the Define Phase and the Voice of the Customer
- Define Phase – Business Case and Project Charter
- Define Phase – Analytical Tools
- Measure Phase – Process Analysis and Documentation
- Measure Phase – Data Collection
- Measure Phase – Measurement Systems
- Measure Phase – Basic Statistics
- Measure Phase – Probability
- Measure Phase – Process Capability
- Analyze Phase – Measuring and Modeling Relationships
- Analyze Phase – Hypothesis Testing
- Analyze Phase – FEMA and Additional Analysis Methods
- Improve Phase – Design of Experiments (DOE)
- Improve Phase – Lean Method
- Improve Phase – Implementation
- Control Phase – Statistical Process Control (SPC)
- Control Phase – Other Controls
- Control Phase – Maintain Controls and Sustain Improvements
- DFSS
- Exam Review – Prep and Key Concepts
- Six Sigma And The Organization
- Define Phase – Project Identification
- Define Phase – Voice Of The Customer
- Define Phase – Project Management Basics on Six Sigma Green Belt
- Define Phase – Management And Planning Tools
- Define Phase – Business Results For Projects
- Define Phase – Team Dynamics And Summary Review Questions
- Measure Phase – Process Analysis And Documentation
- Measure Phase – Probability And Statistics
- Measure Phase – Statistical Distributions
- Measure Phase – Collecting And Summarizing Data
- Measure Phase – Measurement System Analysis (MSA)
- Measure Phase – Process And Performance Capability And Summary Review
- Analyze Phase – Exploratory Data Analysis And Hypothesis Testing
- Analyze Phase – Process Drivers
- Improve Phase – Design Of Experiment (DOE)
- Improve Phase – Root Cause Analysis
- Improve Phase – Lean Tools
- Control Phase – Statistical Process Control
- Control Phase – Lean Tools For Process Control
- Review Exam – Prep And Key Concepts
Unix
- Introduction to Apache Kafka
- Course Introduction
- Instructor Introduction
- Overview of Apache Kafka and Common Use Cases
- Overview and Common Use Cases
- What is Kafka
- Kafka History
- Kafka Use Cases
- Kafka APIs
- Kafka Pub Sub Patterns
- Whiteboard Discussion – Use Case
- Kafka Core Concepts
- Kafka Core Concepts
- The Importance of Event Data Streams
- Kafka Messaging, Topics, Partitions and Segments
- Whiteboard – Kafka Components
- Whiteboard – Brokers and Clusters
- Kafka Streams and Patterns
- Whiteboard – Zookeeper and KRaft
- Demonstration – Kafka Connect
- Whiteboard – Architecture Deep Dive
- Whiteboard – Kafka Design Patterns
- Installing and Deploying Kafka
- Installing and Deploying Kafka
- Demonstration – Kafka Resources and Licensing
- Demonstration – Kafka Installation Options, Considerations and Requirements
- Demonstration – Deployment and Environment
- Demonstration – Starting Kafka
- Demonstration – Terminating Kafka Environment
- Whiteboard – Connections and Processing Events
- Additional Resources
- Course Review
- Virtual Box
- Basic Commands
- Special Characters
- File Editing
- File System Structure
- Finding Files
- Shell Special Characters
- Regular Expressions
- Process Management
- Job Scheduling
- Customizing Your Account
- Unix Printing
- Networking
- X Windows
- Back Up And Compression
- Text Utility
- Shell Scripting
- System Administration Basics
CITRIX
- Introduction To Application Virtualization
- XenApp Server Setup
- Plan For High Availability
- Scripting Primer
- Using VMware vSphere
- Virtualization Using Microsoft Hyper-V
- Course Review
- Introduction To Virtualization
- Introduction To Desktop Virtualization
- XenDesktop 7.6 Requirements and Implementations
- Plan and Design XenDesktop Infrastructure
- Data And Network Redundancy
- Automating Using PowerShell
- Virtualizing Using Hyper-V
- Build Test And Deploy VM To Xen Desktop
- Internet Information Services
- Course Review
- Intro To XenServer And Virtualization
- Comprehensive Introduction To Linux
- Hosts, Storage, And Networking
- Comprehensive Introduction To PowerShell
- XenServer Components And Features
- Problem Resolution
- Review
Accounting Marketing
- The IT Leader as Coach
- Why Coaching Matters in IT
- Adopting a Coaching Mindset
- Structuring Development Conversations
- Running High-Impact 1:1s
- Identifying Growth Areas and Skill Gaps
- Supporting Learning and Growth
- Creating Individual Development Plans (IDPs)
- Encouraging Ownership and Self-Development
- Building a Culture of Growth
- Mentoring and Peer Development
- Recognizing and Celebrating Growth
- Growth-Focused Leadership & Closeout
- Becoming a Growth-Focused Leader & Closeout
- Understanding Emotional Intelligence
- What Is Emotional Intelligence?
- Why EQ Is Critical in IT Environments?
- Building Self-Awareness and Self-Regulation
- Developing Self-Awareness
- Practicing Self-Regulation
- Leading with Empathy and Social Skills
- Understanding and Using Empathy
- Improving Interpersonal Effectiveness
- Applying EQ in Real-World IT Scenarios
- Managing Conflict with EQ
- Leading Under Pressure
- Advancing EQ for Long-Term Leadership Growth
- Emotional Intelligence in Remote & Hybrid Teams
- Creating a Culture of EQ on Your Team
- EQ and Career Advancement
- Your EQ Growth Plan and Closeout
- The Nature of Leadership in IT
- What Makes Leadership in IT Unique
- Leadership vs. Management in IT
- The Transition From Peer to Manager
- Making The Shift
- New Responsibilities and Mindsets
- Avoiding Early Leadership Mistakes
- Common Mistakes New IT Leaders Make
- Setting a Strong Foundation
- Core Leadership Skills for Technical Teams
- Communicating as a Technical Leader
- Decision-Making in Complex Environments
- Coaching and Developing Technical Talent
- Leading with Influence and Organizational Awareness
- Navigating Organizational Politics and Culture
- Leading Through Change and Uncertainty
- Building Cross-Functional Relationships
- Course Wrap-Up and Practical Advice for IT Leaders
- IT Compliance Introduction
- Introduction to the IT Role in Compliance
- Overview of Regulations
- General Data Protection Regulation (GDPR)
- Overview of GDPR
- Ensuring and Implementing GDPR Compliance
- Penalties and Repercussions for GDPR Non-Compliance
- GDPR Extra References
- Health Insurance Portability and Accountability Act (HIPAA)
- Overview of HIPAA
- Ensuring and Implementing HIPAA Compliance
- Penalties and Repercussions for HIPAA Non-Compliance
- HIPAA Extra Resources
- Federal Information Security Management Act (FISMA)
- Overview of FISMA
- Ensuring and Implementing FISMA Compliance
- Penalties and Repercussions for FISMA Non-Compliance
- FISMA Extra Resources
- Sarbanes-Oxley Act (SOX)
- Introduction to SOX
- Ensuring and Implementing SOX Compliance
- Penalties and Repercussions for SOX Non-Compliance
- SOX Extra References
- Payment Card Industry Data Security Standard (PCI DSS)
- Overview of PCI DSS
- Ensuring and Implementing PCI DSS Compliance
- Penalties and Repercussions for PCI DSS Non-Compliance
- PCI DSS Extra References
- Cybersecurity Maturity Model Certification (CMMC)
- Introduction to CMMC and Its Purpose
- Ensuring and Implementing CMMC Compliance
- Repercussions for CMMC Non-Compliance
- CMMC Extra References
- California Consumer Privacy Act (CCPA)
- Overview of CCPA
- Ensuring and Implementing CCPA Compliance
- Penalties and Repercussions for CCPA Non-Compliance
- CCPA Extra References
- ISO/IEC 27001 Compliance
- Overview of ISO/IEC 27001
- Ensuring and Implementing ISO/IEC 27001 Compliance
- Repercussions for ISO/IEC 27001 Non-Compliance
- ISO/IEC 27001 Extra References
- Children’s Online Privacy Protection Act (COPPA)
- Overview of COPPA
- Ensuring and Implementing COPPA Compliance
- Penalties and Repercussions for COPPA Non-Compliance
- COPPA Extra References
- NIST Cybersecurity Framework (CSF)
- Overview of NIST CSF
- Ensuring and Implementing NIST CSF Compliance
- Repercussions for NIST CSF Non-Compliance
- NIST CSF Extra References
- Gramm-Leach-Bliley Act (GLBA)
- Overview of GLBA
- Ensuring and Implementing GLBA Compliance
- Penalties and Repercussions for GLBA Non-Compliance
- GLBA Extra References
- ISO 22301 Business Continuity Management
- Overview of ISO 22301
- Ensuring and Implementing ISO 22301 Compliance
- Repercussions for ISO 22301 Non-Compliance
- BCM Extra References
- Cloud Security Alliance (CSA) CCM
- Overview of CSA CCM
- Ensuring and Implementing CSA CCM Compliance
- Repercussions for CSA CCM Non-Compliance
- CSA Extra References
- Family Educational Rights and Privacy Act (FERPA)
- Overview of FERPA
- Ensuring and Implementing FERPA Compliance
- Penalties and Repercussions for FERPA Non-Compliance
- FERPA Extra References
- Digital Millennium Copyright Act (DMCA)
- Overview of DMCA
- Ensuring and Implementing DMCA Compliance
- Penalties and Repercussions for DMCA Non-Compliance
- DMCA Extra References
- IT Compliance Course Closeout
- Crafting the Perfect Resume and Portfolio
- Finding IT Job Opportunities
- Preparing for IT Job Interviews
- Mastering Different Types of IT Interviews
- Conquering Technical Questions
- The Power of Soft Skills in IT Careers
- Wrapping Up the Interview Process
- Introduction
- Business Entities
- Beginning Your Business
- Financial Basics Part 1
- Financial Basics Part 2
- Employees Payroll
- Getting Your Business Out There
- SEO
- Other Topics
- Closing
- Setup and Maintenance
- List Management
- Sales (Money-In)
- Purchased (Money-Out)
- Accounting
- Reports
- Customizations and Time Savers
- Extra
- Creating and Setting Up Your Point of Sale Company File
- Installing your System
- Navigating and Customizing the Home Page
- Company Preferences
- Financial - Setting up QuickBooks Connection
- Setting up Sales Tax
- Workstation Preferences
- Additional Features
- Employees and Security
- Customers
- Rewards Program
- Vendors
- Setting Up Your Inventory
- Item Styles, Assemblies, and Group
- Working with Inventory
- Sales
- Working with Price Levels and Discounts
- Collecting Sales Tax
- Adding Shipping Information (Pro/MS)
- Tracking Sales Commissions
- Taking Payment and Giving Change
- Recording Tips
- Handling Tricky Sales Returns
- Working with Sales Orders, Work Orders, and Layaways
- Purchasing Merchandise
- Receiving from a PO
- Managing Inventory
- Reporting
- QuickBooks Financial
- Multi-Store
- Protect your data
- Adding Third Party Applications
- Intro and Setup
- Tools
- Preferences
- Security & Users
- Estimates
- Sales Orders
- Receiving Money
- Bounced Checks
- Specific Tracking
- Receiving and Depositing
- Credit Cards and Bank Accounts
- Payroll
- Transactions
- Accounts and Reports
- Integrating with Word
- Data Types
- Conclusion
- Sage 50 2013
- Sage 50 Basics
- Inventory
- Employee
- Banking
- Maintenance
- File Handling
- Manager
- Jobs
- Budgets
- Charts of Accounts
- Accounts Management
- Customer Setup
- Jobs Setup
- Vendor Setup
- Inventory Setup
- Employee Setup
- Security Setup
- ACTI Link
- Task Overview
- Forms, Reports, and Recap
- Intro to SalesForce Automation
- Working With The SalesForce System
- SalesForce Solution
- SalesForce Admin
- Migrating To SalesForce
- Course Conclusion
- The Phone
- The Screen
- The Keyboard
- Contacts
- Phone Calls
- Messaging
- Internet
- Music
- Android Specifics
- Photos & Video
- Conclusion
- iPhone Basics
- The Screen
- The Keyboard
- Basic Calls and Settings
- Contacts
- Phone Calls
- Messaging
- Web
- Siri
- Music
- Photos and Video
- Maps
- Conclusion
Health, Home & Work
- Aerobic Bootcamp
- Baking Cupcakes
- Chess
- Cooking
- Cooking with Children
- DIY Home Improvement Basics
- Harassment in the Workplace
- HIPAA, Fraud, and Abuse
- Holiday Baking
- How to Become a Personal Trainer
- How to Handle Stress in the Workplace
- ICD 10 & 11 Medical Coding and Billing
- Jewelry
- Juicing and Blending
- Managing Different Personality Types
- Marketing Tools and Tips for Success
- Massage Therapy
- Mastering Bartending in a Week or Less
- Mastering Beer Brewing
- Mastering Makeup Application Techniques at Home
- Medical Coding and Billing ICD 10
- Medical Coding and Billing ICD-9
- OSHA Training
- Photography Basics
- Special Effects (fx) Makeup Level 1
- Special Effects (fx) Makeup Level 2
- Starting Your Own YouTube Channel 101
- The Key to Nutrition and Wellness
- Ultimate Resume Building
- Wedding Makeup and Hair
- Weight Loss
- Wine Making
- Wine Pairing and Tasting
- Yoga
ChatGPT
- Responsible Automated Intelligence Ethics
- Course Welcome
- Instructor Introduction
- Introduction to AI Ethics
- Introduction to AI Ethics
- Understanding AI Ethics
- Ethical Frameworks and Principles in AI
- Ethical Challenges
- Whiteboard – Key Principles of Responsible AI
- Responsible AI Development
- Responsible AI Development – Introduction
- Responsible AI Development – Continued
- Bias and Fairness in AI
- Transparency in AI
- Demonstration – Microsoft Responsible AI
- Accountability and Governance in AI
- Privacy and Security with AI
- Privacy and Security in AI
- Data Collection and Usage
- Risks and Mitigation Strategies
- Ethical Data Management in AI
- Demonstration – Examples of Privacy EUL
- Social and Ethical Impacts of AI
- Social and Ethical Impacts of AI
- Automation and Job Displacement
- AI and Social Good
- Demonstration – ChatGPT
- Demonstration – Bard
- Policy Development
- Policy Development
- Ethical AI Leadership Culture
- Ethical AI Policy Elements
- Ethical AI in a Changing Landscape
- Course Review
- Course Closeout
- AI in Talent Management
- Course Introduction
- Instructor Introduction
- Introduction to AI in Talent Management
- Introduction to AI in Talent Management
- Understanding AI in Talent Management
- Leveraging AI for Candidate Sourcing
- Ethical Considerations of AI in Hiring
- AI-Powered Sourcing and Screening
- AI-Powered Sourcing and Screening
- AI-driven Candidate Search Engines
- Demonstration RecruiterGPT
- Automated Resume Screening and Skills Assessment
- Whiteboard – Workflow – How Resume Screening Works
- Chatbots and Conversational AI in Recruitment
- AI-Enhanced Interviewing and Selection
- AI-Enhanced Interviewing and Selection
- Video Interviews and Behavioral Analytics
- Predictive Analytics and Hiring Decisions
- Explainable AI and Building Trust in Hiring
- AI-Powered Upskilling and Development
- AI-powered Upskilling and Development
- Identifying Skills Gaps and Upskilling Needs
- Personalized Learning and AI-powered Learning Platforms
- Microlearning and Adaptive Learning with AI
- Implementing AI in Your Talent Acquisition Strategy
- Implementing AI in Your Talent Acquisition Strategy
- Evaluating AI Solutions for Your Organization
- Integrating AI with Existing Talent Acquisition Processes
- Change Management and Building a Culture of AI in Recruitment
- The Future of AI in Talent Management
- The Future of AI in Talent Acquisition
- Emerging Trends and Innovations in AI-powered Talent Acquisition
- Building a Sustainable Talent Pipeline with AI
- The Enduring Role of Humans in Talent Management
- Course Summary
- Course Closeout
- Introduction to Generative AI
- What Is Generative AI
- History and Evolution
- Where is Generative AI Being Used
- Ethical Considerations
- Understanding the Foundations
- Generative AI – Recap
- Exploring Large Language Models (LLMs)
- Accessing and Using LLMs
- Prompt Engineering
- Embeddings and Fine-Tuning
- Generative AI Tools
- Explore ChatGPT – Features & Capabilities
- Text Generation with ChatGPT
- Image and Art Generation with AI
- Fine-Tuning LLMs for Specific Needs
- How to Fine-Tune a Large Language Model (LLM)
- Generative AI in Context
- Generative AI Applications in Software Development
- Applications of Generative AI in Retail
- Applications of Generative AI in Marketing
- The Future of Generative AI
- Trends and Innovations
- Careers in Generative AI – Opportunities and Pathways
- Popular Generative AI Tools
- Course Closing – The Future is AI-Powered
- Introduction to AI and Data Privacy
- How AI Technologies Handle and Protect Data
- Understanding the Risks of AI and Data Privacy
- Regulations & Best Practices for Ethical AI Data Privacy
- Responsible Automated Intelligence Ethics
- Course Welcome
- Instructor Introduction
- Introduction to AI Ethics
- Introduction to AI Ethics
- Understanding AI Ethics
- Ethical Frameworks and Principles in AI
- Ethical Challenges
- Whiteboard – Key Principles of Responsible AI
- Responsible AI Development
- Responsible AI Development – Introduction
- Responsible AI Development – Continued
- Bias and Fairness in AI
- Transparency in AI
- Demonstration – Microsoft Responsible AI
- Accountability and Governance in AI
- Privacy and Security with AI
- Privacy and Security in AI
- Data Collection and Usage
- Risks and Mitigation Strategies
- Ethical Data Management in AI
- Demonstration – Examples of Privacy EUL
- Social and Ethical Impacts of AI
- Social and Ethical Impacts of AI
- Automation and Job Displacement
- AI and Social Good
- Demonstration – ChatGPT
- Demonstration – Bard
- Policy Development
- Policy Development
- Ethical AI Leadership Culture
- Ethical AI Policy Elements
- Ethical AI in a Changing Landscape
- Course Review
- Course Closeout
- ChatGPT Fundamentals
- Course Welcome
- Instructor Introduction
- Download Course Resources
- ChatGPT Fundamentals
- What is ChatGPT
- Use Cases for ChatGPT
- Role of ChatGPT
- Future of ChatGPT
- ChatGPT Statistics, Facts & Trends
- Limitations
- What is a Chatbot
- Understanding AI-ML
- Demonstration – Tools to Use with ChatGPT
- Business Benefits
- Whiteboard – How it all works
- Demonstration – How to Get Started with ChatGPT
- Demonstration – Example Prompts
- Discussion – ChatGPT Performance Issues
- Module Summary
- ChatGPT Prompt Demonstrations
- ChatGPT Prompt Demonstrations
- What is a Prompt
- Best Practices For Writing Prompts
- Prompt Demonstration – Asking Questions
- Prompt Demonstration – Top Ten Lists
- Prompt Demonstration – Long Form Docs
- Prompt Demonstration – Complex Form and Code
- Prompt Demonstration – Feedback
- Prompt Demonstration – Content Modification
- Prompt Demonstration – Instruction Generation
- Prompt Demonstration – Information Extraction
- Prompt Demonstration – Writing Computer Code
- Prompt Demonstration – Solving Math Problems
- Prompt Demonstration – Create YT Video Outline
- Prompt Demonstration – Write a Blog Article
- Prompt Demonstration – SEO Keywords
- Comparing Google Bard vs ChatGPT
- Module Summary
- Course Closeout
- Getting Started With AI
- Introduction To AI
- Understanding The Types of AI
- Programming Languages, Tools and Platforms For AI Solutions
- AI and Programming Languages
- AI, Machine Learning and Deep Learning
- AI Models
- AI Services in the Cloud
- Data Science Fundamentals for AI
- Introduction to Data Science
- Data Preparation Techniques
- Exploratory Data Analysis (EDA)
- AI In the Modern Workplace
- AI In The Workplace
- Data Analysis and Business Intelligence AI Tools
- Automation and Workflow Management Tools
- Natural Language Processing (NLP) Tools
- Virtual Assistants and Chatbots
- Ethical AI and Future Trends
- Understanding Bias, Fairness, Privacy, and Security
- Impact of AI on Jobs and Society
- Emerging Trends in AI
- AI Governance and Regulation
- Monumental Leaps Forward With AI
- AI for Social Good
- AI in Creative Industries
- AI in Cybersecurity
- AI in Smart Cities and Infrastructure
- AI Project Lifecycle Management
- AI Project Lifecycle Management
- Development and Implementation
- Maintenance, Evaluation, and Scaling
- AI Fundamentals Course Closeout
- Course Closeout
- AI and the Workforce Transformation
- The Future of Work with AI Intro
- The Evolution of Work
- AI’s Impact on Job Roles
- Emerging Job Roles in the Age of AI
- Skills for the AI-Driven Economy
- The Importance of Adaptability and Lifelong Learning
- Technical Skills and AI Literacy
- Critical Soft Skills in the AI Era
- The Role of Data in AI-Driven Decision Making
- Preparing for AI-Driven Changes in the Workplace
- Organizational Strategies for AI Integration
- Workforce Reskilling and Upskilling
- The Role of Leadership in AI Transition
- Ethical Considerations and Workforce Well-being
- Case Studies and Course Wrap-Up
- Practical AI Case Studies
- Developing a Personal or Organizational AI Readiness
- In Closing, Embrace, Not Fear AI
OWASP
Open Web Application Security Project
- What Is OSWASP
- Introduction to OSWASP Top 10
- Top 10 Web Application Security Risks
- Overview of Risks We Will Explore
- Injection
- Broken Authentication
- Sensitive Data Exposure
- XML External Entities (XXE)
- Broken Access Control
- Security Misconfiguration
- Cross-Site Scripting XSS
- Insecure Deserialization
- Using Vulnerable Components
- Insufficient Logging and Monitoring
- Course Conclusion
CISCO
- Module 1 – CCNA 200-301 v1.1 Network Fundamentals
- 1.1 – Intro to Networking
- 1.2 – OSI Model
- 1.3 – TCP-IP
- 1.4 – Network Components
- 1.5 – Network Topology
- 1.6 – Copper Cable Types
- 1.7 – Fiber Optic Cable Types
- Module 2 – CCNA 200-301 v1.1 Network Device Management
- 2.1 – Connecting to a Cisco Device
- 2.1.1 – ACTIVITY – Intro to Packet Tracer
- 2.2 – Basic Cisco Commands
- 2.2.1 – ACTIVITY – Navigating the CLI
- 2.3 – Configuring for Connectivity
- 2.3.1 – ACTIVITY – Configuring a Router Interface
- 2.3.2 – ACTIVITY – Making a Remote Telnet Connection
- 2.3.3 – ACT – Making a Remote SSH Connection
- 2.4 – Neighbor Discovery
- 2.4.1 – ACT – Discovering Neighbors
- 2.5 – Basic Troubleshooting
- 2.6 – Review
- Module 3 – CCNA 200-301 v1.1 Switching
- 3.1 – Ethernet Basics
- 3.2 – Switching Overview
- 3.2.1 – ACTIVITY – Setting Up a Simple Switched Network
- 3.3 – Spanning-Tree Protocol
- 3.4 – Rapid PVST+
- 3.5 – VLANs
- 3.6 – VLAN Trunking Protocol
- 3.6.1 – ACTIVITY – Creating Trunk Links
- 3.7 – VLAN Trunking Protocol (VTP)
- 3.8 – VLAN Routing
- 3.8.1 – ACTIVITY – Configuring the VLAN 1 Interface on a Switch
- 3.8.2 – ACTIVITY – Routing Between VLANs
- 3.9 – Switchport Configuration
- 3.9.1 – ACTIVITY – Configuring Voice and Data VLANs
- 3.10 – EtherChannel
- 3.10.1 – ACTIVITY – Bundling Links into an EtherChannel
- 3.11 – Review
- Module 4 – CCNA 200-301 v1.1 Internet Protocol (IP)
- 4.1 – IPv4 Basics
- 4.2 – IP Packet and Interface Types
- 4.3 – Binary Numbering System
- 4.4 – Classful and Classless Addressing
- 4.5 – IPv4 Subnetting
- 4.5.1 – ACTIVITY – Moving the Subnet Mask
- 4.6 – Subnetting in Other Octets
- 4.6.1 – ACTIVITY – Subnetting
- 4.6.2 – ACTIVITY – Subnetting by Host Requirements
- 4.6.3 – ACTIVITY – Grouping Hosts into Subnets
- 4.7 – Supernetting
- 4.7.1 – ACTIVITY – Supernetting
- 4.8 – IPv6
- 4.9 – Review
- Module 5 – CCNA 200-301 v1.1 Routing
- 5.1 – Introducing the Route
- 5.2 – Routing Basics
- 5.3 – Packet Delivery on the Same Network
- 5.4 – IP Routing Across a Single Router
- 5.4.1 – ACTIVITY – Configuring Basic Routing
- 5.5 – IP Routing Across Multiple Routers
- 5.5.1 – ACTIVITY – Configuring IPv4 Static Routes
- 5.5.2 – ACTIVITY – Adding Special Static Routes
- 5.6 – Routing Protocols Overview
- 5.7 – Route Selection
- 5.8 – Open Shortest Path First (OSPF)
- 5.8.1 – ACTIVITY – Deploying Single Area OSPF
- 5.9 – First Hop Redundancy Protocol (FHRP)
- 5.10 – Network Address Translation (NAT)
- 5.10.1 – ACTIVITY – Implementing Static NAT
- 5.10.2 – ACTIVITY – Using a NAT Pool
- 5.10.3 – ACTIVITY – Configuring PAT
- 5.11 – Review
- Module 6 – CCNA 200-301 v1.1 IP Services
- 6.1 – Remote Control
- 6.2 – File Transfer
- 6.3 – Monitoring
- 6.4 – Infrastructure
- 6.4.1 – ACTIVITY – Implementing a DHCP Relay
- 6.5 – Quality of Service
- 6.6 – Review
- Module 7 – CCNA 200-301 v1.1 Wireless
- 7.1 – Wi-Fi Principles
- 7.2 – Cisco Wireless Architectures
- 7.3 – WLC Configuration
- 7.3.1 – ACT – Configuring a WLAN
- 7.4 – Review
- Module 8 – CCNA 200-301 v1.1 Security Fundamentals
- 8.1 – Intro to Security
- 8.2 – Local Device Access Control
- 8.3 – Protecting Privileged EXEC Mode
- 8.4 – Password Management
- 8.5 – Local User
- 8.6 – Password Recovery
- 8.6.1 – ACTIVITY – Password Recovery
- 8.7 – Remote Access
- 8.8 – Access Control List (ACL)
- 8.8.1 – ACTIVITY – Deploying a Standard ACL
- 8.8.2 – ACTIVITY – Deploying an Extended ACL
- 8.9 – DHCP Snooping
- 8.10 – Dynamic ARP Inspection (DAI)
- 8.11 – Layer 2 Port Security
- 8.11.1 – ACTIVITY – Securing Layer 2 Ports
- 8.12 – Authentication, Authorization and Accounting (AAA)
- 8.13 – Wireless Security
- 8.14 – Review
- Module 9 – CCNA 200-301 v1.1 Automation and Programmability
- 9.1 – Network Automation Overview
- 9.2 – Software Defined Networks
- 9.3 – JSON
- 9.4 – REST APIs
- 9.5 – Management Mechanisms
- 9.6 – AI in Network Operations
- 9.7 – Review
- Module 1 – Exploring the Functions of Networking
- Module 2 – Introducing the Host-To-Host Communications Model
- Module 3 – Introducing LANs
- Module 4 – Exploring the TCP/IP Link Layer
- Module 5 – Subnetting
- Module 6 – Explaining the TCP/IP Transport Layer and Application Layer
- Module 7 – Exploring the Functions of Routing
- Module 8 – Exploring the Packet Delivery Process
- Module 9 – Troubleshooting a Simple Network
- Module 10 – Introducing Basic IPv6
- Module 11 – Configuring Static Routing
- Module 12 – Implementing VLANs and Trunks
- Module 13 – Routing Between VLANs
- Module 14 – Introducing OSPF
- Module 15 – Building Redundant Switched Topologies
- Module 16 – Improving Redundant Switched Topologies with Ether Channel
- Module 17 – Exploring Layer 3 Redundancy
- Module 18 – Introducing WAN Technologies
- Module 19 – Explaining Basics of ACL
- Module 20 – Enabling Internet Connectivity
- Module 21 – Introducing QoS
- Module 22 – Introducing Architectures and Virtualization
- Module 23 – Introducing System Monitoring
- Module 24 – Managing Cisco Devices
- Module 25 – Examining the Security Threat Landscape
- Module 26 – Implementing Threat Defense Technologies
- Module 27 – Exam Preparation
- Module 28 – Practice Demos
- Module 1 – Architecture
- Module 2 – Virtualization
- Module 3 – Infrastructure
- Module 4 – Network Assurance
- Module 5 – Security
- Module 6 – Automation
- Module 1 – Networking Fundamentals
- Module 2 – Basic Ethernet LAN Implementation
- Module 3 – Designing Ethernet LANS
- Module 4 – Understanding IPv4
- Module 5 – Working With Cisco Routers
- Module 6 – IPv4 Design And Troubleshooting
- Module 7 – IPv4 Services
- Module 8 – Implementing IPv6
- Module 1 – Configuring Ethernet LANs
- Module 2 – Configuring IPv4 Routing Protocols
- Module 3 – Wide Area Networks
- Module 4 – IPv4 Services
- Module 5 – IPv4 Routing And Troubleshooting
- Module 6 – IPv6 Routing
- Module 7 – Cloud Based Networking
- Module 1 – Wireless Basics
- Module 2 – Wireless Standards
- Module 3 – Wireless Signals
- Module 4 – Antennas
- Module 5 – Topologies
- Module 6 – Frame Types
- Module 7 – Planning Coverage
- Module 8 – Architectures
- Module 9 – Stand Alone And Cloud Deployments
- Module 10 – Controller Based Deployment
- Module 11 – Controller Discovery
- Module 12 – Roaming
- Module 13 – Radio Resource Management
- Module 14 – Wireless Security
- Module 15 – WLAN Configuration
- Module 16 – Guest Networks
- Module 17 – Client Connectivity
- Module 18 – Managing Wireless
- Module 19 – Interference
- Module 20 – Troubleshooting
- Module 1 – Wireless Basics
- Module 2 – Wireless Standards
- Module 3 – Wireless Signals
- Module 4 – Antennas
- Module 5 – Topologies
- Module 6 – Frame Types
- Module 7 – Planning Coverage
- Module 8 – Architectures
- Module 9 – Stand Alone And Cloud Deployments
- Module 10 – Controller Based Deployment
- Module 11 – Controller Discovery
- Module 12 – Roaming
- Module 13 – Radio Resource Management
- Module 14 – Wireless Security
- Module 15 – WLAN Configuration
- Module 16 – Guest Networks
- Module 17 – Client Connectivity
- Module 18 – Managing Wireless
- Module 19 – Interference
- Module 20 – Troubleshooting
- Module 1 – Introducing Cisco Collaboration Architecture
- Module 2 – Telephony And Call Routing
- Module 3 – Preparing The Network And Phone Behavior
- Module 4 – CUCM Administration Interfaces
- Module 5 – Call Configuration
Module 1: Pre-Course Chapter 1 Module 2: Pre-Course Chapter 2 Module 3: Cisco Video And Content Delivery Module 4: Cisco Video Surveillance Module 5: Cisco Collaboration Module 6: Central Collaboration Endpoint Control Module 7: Unified IP Phones, Desk Endpoints And Cisco Jabber Module 8: Configuring Unified IP Phones And Cisco Jabber Module 9: Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber Module 10: Cisco Telepresence Endpoints Installation And Characteristics Module 11: Configuring Cisco Telepresence CTS And Cisco DX650 Endpoint Module 12: Configuring Cisco Telepresence TC Endpoints Module 13: Operating And Troubleshooting Cisco Telepresence Endpoints Module 14: Cisco Multipoint Conferencing Solutions Module 15: Configuring And Monitoring Cisco Multipoint Module 16: Cisco DMP Characteristics And Installation Module 17: Configuring Cisco DMPs Module 18: Managing Cisco Edge 340 DMPs Module 19: Labs
Module 1: Network Review Module 2: Terminology And Fundamentals Module 3: PKI And Cryptography Module 4: AAA Module 5: Bring Your Own Device Module 6: Secure Access Module 7: VPNs Module 8: Secure Routing And Switching Module 9: Firewalls Module 10: Intrusion Protection System (IPS) Module 11: Content And Endpoint Security
- Module 1 – Plan And Design
- Module 2 – EIGRP Enhanced Interior Gateway Routing Protocol
- Module 3 – IPv6
- Module 4 – OSPF
- Module 5 – Border Gateway Protocol BGP
- Module 6 – Course Review
- Module 1 – Plan And Design
- Module 2 – Switch Configuration
- Module 3 – IP Configuration
- Module 4 – STP And RTP
- Module 5 – Routing
- Module 6 – HSRP, VRRP, GLBP
- Module 7 – Course Review
- Module 1 – Introduction to Cisco Troubleshooting
- Module 2 – Troubleshooting Switches
- Module 3 – Troubleshooting VLANS and Trunking
- Module 4 – Troubleshooting Spanning Tree Protocol, EtherChannel
- Module 5 – Troubleshooting InterVLAN Routing and Layer 3 EtherChannel
- Module 6 – Troubleshooting Switch Security Features
- Module 7 – Troubleshooting FirstHop Redundancy Protocols
- Module 8 – Troubleshooting IPv4 and IPv4 Addressing
- Module 9 – IPv6 Addressing and Addressing Technologies
- Module 10 – Troubleshooting IPv4 and IPv6 ACLs and Prefix Lists
- Module 11 – Troubleshooting GRE and Basic Routing Tunnels
- Module 12 – Troubleshooting RIPv2 and RIPng
- Module 13 – Troubleshooting EIGRP
- Module 14 – OSPF and OSPFv3
- Module 15 – Troubleshooting Route Maps and Policy Based Routing
- Module 16 – Troubleshooting Redistribution
- Module 17 – Troubleshooting BGP
- Module 18 – Troubleshooting Management Protocols and Tools
- Module 19 – Troubleshooting Management Access
- Module 1 – Introduction to Cisco Troubleshooting
- Module 2 – Troubleshooting Switches
- Module 3 – Troubleshooting VLANS and Trunking
- Module 4 – Troubleshooting Spanning Tree Protocol, EtherChannel
- Module 5 – Troubleshooting InterVLAN Routing and Layer 3 EtherChannel
- Module 6 – Troubleshooting Switch Security Features
- Module 7 – Troubleshooting FirstHop Redundancy Protocols
- Module 8 – Troubleshooting IPv4 and IPv4 Addressing
- Module 9 – IPv6 Addressing and Addressing Technologies
- Module 10 – Troubleshooting IPv4 and IPv6 ACLs and Prefix Lists
- Module 11 – Troubleshooting GRE and Basic Routing Tunnels
- Module 12 – Troubleshooting RIPv2 and RIPng
- Module 13 – Troubleshooting EIGRP
- Module 14 – OSPF and OSPFv3
- Module 15 – Troubleshooting Route Maps and Policy Based Routing
- Module 16 – Troubleshooting Redistribution
- Module 17 – Troubleshooting BGP
- Module 18 – Troubleshooting Management Protocols and Tools
- Module 19 – Troubleshooting Management Access
- Module 1 – Methodologies Used To Design A Network
- Module 2 – Network Structure And Modularity
- Module 3 – Basic Enterprise Campus Networks
- Module 4 – Enterprise Edge And Remote Network Modules
- Module 5 – IP Addressing And Routing Protocols
- Module 6 – Enterprise Switching I
- Module 7 – Enterprise Switching II
- Module 8 – Subnetting
- Module 9 – Designing Advanced Services
VM Ware
- Chapter 1: Course Introduction and Methodology
- Chapter 2: Virtualization Overview
- Chapter 3: Planning and Installing ESXi
- Chapter 4: Using Tools to Administer a VMware Environment
- Chapter 5: vCenter and Licensing
- Chapter 6: Configuring Networking
- Chapter 7: Configuring Storage
- Chapter 8: VM Creation, Configuration, and Snapshots
- Chapter 9: Security and Permissions
- Chapter 10: Host and VM Monitoring
- Chapter 11: Advanced ESXi and vCenter Server Management
- Chapter 12: Patching and Upgrading ESXi
- Chapter 13: Disaster Recovery and Backup
- Module 1: VM and VMware
- Module 2: Working with ESX and ESXi
- Module 3: Configuring Virtual Machines
- Module 4: vCenter Server
- Module 5: VM Storage Options
- Module 6: Managing a Virtual World
- Module 7: Migrations, High Availability, and VM Utilities
Blockchain
- Module 1: Certified Blockchain Developer Hyperledger Overview
- Module 2: Hyperledger Framework
- Module 3: Hyperledger Fabric Blockchain
- Module 4: Access Controls and Secure Chaincode
- Module 5: Plan and Prepare Apps for Deployment
- Module 6: Hyperledger Fabric Explorer
- Module 7: Chaincode and Development
- Module 8: Course Wrap Up
- Module 1: Certified Blockchain Developer Hyperledger Overview
- Module 2: Hyperledger Framework
- Module 3: Hyperledger Fabric Blockchain
- Module 4: Access Controls and Secure Chaincode
- Module 5: Plan and Prepare Apps for Deployment
- Module 6: Hyperledger Fabric Explorer
- Module 7: Chaincode and Development
- Module 8: Course Wrap Up
- Module 1: Course Overview
- Module 2: Pre-Sales Activities
- Module 3: Blockchain Fundamentals
- Module 4: Enterprise Blockchains
- Module 5: Use Cases
- Module 6: Course Closeout
CompTIA
- Module 1 – Mobile Devices
- 1.0 CompTIA A+ Course Intro
- 1.1 Mobile Device Hardware and Components
- 1.2 Mobile Device Connections and Accessories
- 1.3 Mobile Device Operating Systems
- 1.4 Troubleshooting Mobile Devices
- 1.5 Mobile Device, OS and Application Issues
- 1.6 Mobile Device, OS and Application Security
- 1.7 Identifying Connection Settings in Android
- 1.8 Identifying Connection Settings in iOS
- Module 2 – Networking
- 2.1 Network Architecture
- 2.2 Ports and Protocols
- 2.3 Wireless Networking
- 2.4 Network Hosts and Services
- 2.5 DNS and DHCP
- 2.5.1 Demo – Working with DNS and DHCP
- 2.6 VPNs and VLANs
- 2.7 Network Devices
- 2.8 Basic SOHO Configuration
- 2.9 Internet Connections and Network Types
- 2.10 Networking Tools
- 2.11 Networking in Windows
- 2.11.1 Demo – Configuring Networking in Windows
- 2.12 Networking Commands
- 2.12.1 Demo – Working with Networking Commands
- 2.13 Troubleshooting Network Issues
- Module 3 – Hardware
- 3.1 Display Components and Attributes
- 3.2 Basic Cables and Connections
- 3.3 Network Cables and Connections
- 3.4 Storage Devices and Connections
- 3.5 Introduction to RAID
- 3.6 Motherboards and Form Factors
- 3.7 Motherboard Connections
- 3.8 BIOS and UEFI
- 3.9 CPUs and CPU Architecture
- 3.10 Expansion Cards
- 3.11 System Cooling
- 3.12 Power Supply Units
- 3.13 Printers and Multifunction Devices
- 3.14 Printer Maintenance
- 3.15 Troubleshooting Computer Components
- 3.16 Troubleshooting Storage and RAID Issues
- 3.17 Troubleshooting Video and Display Issues
- 3.18 Troubleshooting Printer Issues
- Module 4 – Operating Systems
- 4.1 Workstation Operating Systems
- 4.2 Common File System Types
- 4.3 Operating System Installation Types
- 4.4 Operating System Boot Methods
- 4.5 Storage Partitioning
- 4.5.1 Demo – Working with Storage Partitions
- 4.6 Identifying Windows Editions
- 4.7 Windows Upgrades
- 4.8 Windows OS Installations
- 4.9 Using Windows Task Manager
- 4.9.1 Demo – Working with Windows Task Manager
- 4.10 MMC Snap-ins
- 4.10.1 Demo – Working with MMC Snap-ins
- 4.11 Windows Operating System Tools
- 4.12 Microsoft Command Line Tools
- 4.12.1 Demo – Working with Microsoft Command Prompt
- 4.13 Configuring Microsoft Windows Settings
- 4.14 Configuring Windows Power Options
- 4.14.1 Demo – Working with Windows Power Options
- 4.15 Windows File Explorer
- 4.15.1 Demo – Working with File Explorer
- 4.16 Windows Domains vs Workgroups
- 4.17 macOS System Configuration
- 4.17.1 Demo – macOS Features and Tools
- 4.18 Linux Components
- 4.19 Linux Tools
- 4.20 Common Application Installation
- Module 5 – Virtualization and Cloud Computing
- 5.1 Virtualization Concepts
- 5.1.1 Demo – Working with Virtual Machines
- 5.2 Cloud Computing
- 5.2.1 Demo – Working with the Cloud
- 5.3 Cloud Productivity Tools
- Module 6 – Security
- 6.1 Physical Security
- 6.2 Physical Access Security
- 6.3 Logical Security
- 6.4 Windows Security – Firewalls and Antivirus
- 6.4.1 Demo – Working with the Windows Firewalls and Antivirus
- 6.5 Windows Security Users and Groups
- 6.6 Windows Security – NTFS and Share Permissions
- 6.6.1 Demo – Working with NTFS and Share Permissions
- 6.7 Windows Security – Active Directory
- 6.8 Windows Security – Data Encryption
- 6.9 Wireless Security
- 6.10 Malware Types
- 6.11 Malware Detection and Prevention
- 6.12 Social Engineering
- 6.13 Security Threats
- 6.13.1 Demo – Security Vulnerabilities
- 6.14 Malware Removal Process
- 6.15 Workstation Security
- 6.16 Data Destruction Concepts
- 6.17 SOHO Network Security
- 6.18 Browser Security Settings
- 6.19 Troubleshooting PC Security Issues
- Module 7 – Operational Procedures
- 7.1 Ticketing Systems
- 7.2 Asset Management
- 7.3 Document Types
- 7.4 Change Management
- 7.5 Workstation Backup and Recovery
- 7.6 Common Safety Procedures
- 7.7 Environmental Impact and Controls
- 7.8 Licensing and Policy Concepts
- 7.9 Communication and Professionalism
- 7.10 Basics of Scripting
- 7.11 Remote Access Technologies
- 7.12 Basics of Artificial Intelligence
- 7.13 Troubleshooting Methodology
- 7.14 CompTIA A+ Course Closeout
- Module 1 – Engagement Management
- 1.1 Pre Engagement Activities
- 1.2 Collaboration and Communication Activities
- 1.3 Testing Frameworks and Methodologies
- 1.3.1 Examining MITRE ATT&CK
- 1.4 Engagement Management Review
- Module 2 – Reconnaissance and Enumeration
- 2.1 Passive Reconnaissance
- 2.1.1 Google Hacking
- 2.2 Active Reconnaissance
- 2.2.1 Port Scanning and Fingerprinting
- 2.2.2 Tracing a Network Path with Traceroute
- 2.2.3 Intercepting Data with Wireshark
- 2.2.4 Web Scraping
- 2.3 Enumeration Techniques
- 2.3.1 Directory Enumeration
- 2.3.2 Email Enumeration
- 2.4 Reconnaissance and Enumeration Scripts
- 2.4.1 Using Scripts
- 2.5 Reconnaissance and Enumeration Tools
- 2.5.1 Perform OSINT with Recon ng
- 2.5.2 Adding an API Key to Recon ng
- 2.5.3 Discovering IoT with Shodan
- 2.5.4 Performing WHOIS Lookups
- 2.5.5 Performing DNS Lookups
- 2.5.6 Using NMAP Scripts
- 2.5.7 Performing OSINT with theHarvester
- 2.6 Reconnaissance and Enumeration Review
- Module 3 – Vulnerability Discovery and Analysis
- 3.1 Vulnerability Discovery
- 3.1.1 Performing a Vulnerability Scan with OpenVAS
- 3.1.2 Performing Static Code Analysis
- 3.2 Reconnaissance, Scanning and Enumeration Output Analysis
- 3.3 Physical Security
- 3.3.1 Cloning an RFID Badge
- 3.3.2 Cloning NFC with Flipper Zero
- 3.4 Vulnerability Discover and Analysis Review
- Module 4 – Attacks and Exploits
- 4.1 Prioritize and Prepare Attacks
- 4.2 Network Attacks
- 4.2.1 Performing an On Path Attack
- 4.2.2 Executing a Network Attack with Metasploit
- 4.2.3 Migrating Meterpreter to Another Process
- 4.2.4 Creating a Malware Dropper with Msfvenom
- 4.2.5 Using Netcat
- 4.2.6 Capturing Files with Wireshark
- 4.3 Authentication Attacks
- 4.3.1 Brute Forcing with Medusa
- 4.3.2 Pass the Hash
- 4.3.3 Password Spraying with Hydra
- 4.3.4 Pass the Token Attack
- 4.3.5 Spoofing Authentication with Responder
- 4.3.6 Cracking Linux Passwords with John the Ripper
- 4.3.7 Hashcat Password Cracking
- 4.4 Host Based Attacks
- 4.4.1 Privilege Escalation with Eternal Blue
- 4.4.2 Log Tampering
- 4.4.3 Pwn a Linux Target from Start to Finish
- 4.5 Web Application Attacks
- 4.5.1 Performing Directory Traversal
- 4.5.2 Grabbing Passwords with SQL Injection
- 4.5.3 SQLi on a Live Website Part 1
- 4.5.4 SQLi on a Live Website Part 2
- 4.5.5 Command Injection
- 4.5.6 Injecting an iFrame with Stored XSS
- 4.5.7 Busting the DOM
- 4.5.8 IDOR Abuse with Burp Suite
- 4.5.9 Web Session Hijacking
- 4.5.10 Parameter Tampering with Burp Suite
- 4.6 Cloud Based Attacks
- 4.6.1 Hacking S3 Buckets
- 4.7 Wireless Attacks
- 4.7.1 WiFi Pumpkin Evil Twin
- 4.7.2 WPA2 Crack Attack
- 4.8 Social Engineering Attacks
- 4.8.1 Phishing for Credentials
- 4.8.2 OMG Cable Baiting
- 4.9 Specialized System Attacks
- 4.9.1 Pwn a Mobile Device
- 4.10 Automated Script Attacks
- 4.11 Attacks and Exploits Review
- Module 5 – Post-exploitation and Lateral Movement
- 5.1 Establishing and Maintaining Persistence
- 5.1.1 Creating a Persistent Netcat Back Door
- 5.1.2 Exfiltrating Data with a Scheduled Task
- 5.2 Lateral Movement
- 5.2.1 Preparing to Pivot
- 5.2.2 Lateral Movement through Pivoting
- 5.3 Staging and Exfiltration
- 5.3.1 Hiding Data with Steganography
- 5.3.2 Automatically Exfiltrating Data
- 5.4 Cleanup and Restoration
- 5.5 Post-Exploitation and Lateral Movement Review
- Module 6 – Deliverables
- 6.1 Penetration Test Report Components
- 6.2 Report Findings and Recommendations
- 6.2.1 Examining Pentest Reports
- 6.3 Deliverables Review
- 6.4 Course Conclusion
- Module 1: Networking Concepts
- 1.1 Networking Overview
- 1.1.1 Activity – Creating a Network
- 1.2 OSI and DOD Model
- 1.2.1 Activity – Examining the OSI Layers
- 1.3 Networking Appliances, Applications and Functions
- 1.3.1 Activity – Using Online Proxies
- 1.4 Cloud Concepts and Connectivity
- 1.4.1 Activity – Creating Cloud Resources
- 1.5 Ports, Protocols, Services and Traffic Types
- 1.5.1 Activity – Examining ARP and ICMP
- 1.5.2 Activity – Examining DNS and Ports
- 1.6 Wireless Transmission Media
- 1.6.1 Activity – Configuring WiFi
- 1.7 Wired Transmission Media and Transceivers
- 1.8 Network Topologies, Architectures and Types
- 1.9a IPv4 Network Addressing – Part 1
- 1.9b IPv4 Network Addressing – Part 2
- 1.9.1 Activity – Configuring Client IP Settings
- 1.9.2 Activity – Subnetting – Delta 128
- 1.9.3 Activity – Subnetting – Delta 64
- 1.9.4 Activity – Subnetting WAN Links
- 1.10a Modern Network Environments – Part 1
- 1.10b Modern Network Environments – Part 2
- Module 2: Network Implementation
- 2.1 Implementing Routing Technologies
- 2.1.1 Activity – Setting Up Basic Routing
- 2.1.2 Activity – Adding Static Routes
- 2.1.3 Activity – Configuring Routing Protocols
- 2.1.4 Activity – Configuring Port Address Translation
- 2.2 Configuring Switching Technologies and Features
- 2.2.1 Activity – Connecting Devices with a Switch
- 2.2.2 Activity – Creating VLANs
- 2.2.3 Activity – Voice and Data VLANs
- 2.2.4 Activity – VLAN Trunking
- 2.2.5 Activity – VLAN Routing
- 2.3 Selecting and Configuring Wireless Devices and Technologies
- 2.3.1 Activity – Creating a WLAN
- 2.4 Physical Installations
- 2.4.1 Activity – Managing Cable
- 2.4.2 Activity – Punching Down Twisted Pair
- Module 3: Network Operations
- 3.1 Organizational Processes and Procedures
- 3.2 Network Monitoring Technologies
- 3.2.1 Activity – Exploring SNMP
- 3.3 Disaster Recovery (DR)
- 3.4 IPv4 and IPv6 Network Services
- 3.4.1 Activity – Implementing a DHCP Relay Agent – Part 1
- 3.4.2 Activity – Implementing a DHCP Relay Agent – Part 2
- 3.4.3 Activity – DNS – Part 1
- 3.4.4 Activity – DNS – Part 2
- 3.5 Network Access and Management
- Module 4: Network Security
- 4.1a Network Security Concepts – Part 1
- 4.1b Network Security Concepts – Part 2
- 4.1.1 Activity – Exploring Encryption
- 4.1.2 Activity – Applying Authorization
- 4.1.3 Activity – Testing a Honeypot
- 4.2 Network Attacks
- 4.2.1 Activity – Launching a Denial of Service Attack
- 4.2.2 Activity – Phishing for Credentials
- 4.2.3 Activity – Deploying a Malicious Charging Cable
- 4.3 Network Defense
- 4.3.1 Activity – Implementing ACLs
- Module 5: Network Troubleshooting
- 5.1 Troubleshooting Methodology
- 5.2 Common Cabling and Physical Interface Issues
- 5.2.1 Activity – Selecting the Right Cable
- 5.2.2 Activity – Crimping an RJ-45 End on a Cable
- 5.3 Network Service Issues
- 5.3.1 Activity – Troubleshooting a Routed Network
- 5.4 Performance Issues
- 5.5 Troubleshooting Tools and Protocols
- 5.5.1 Activity – Using Command Line Commands
- 5.5.2 Activity – Using NSLOOKUP and DIG
- 5.5.3 Activity – Using NMAP
- 5.5.4 Activity – Troubleshooting Using CDP and LLDP
- 5.5.5 Activity – Testing a Cable
- 5.5.6 Activity – Toning a Cable
- 5.5.7 Activity – Using a Spectrum Analyzer
- 5.5.8 Activity – Testing a Fiber Optic Cable
- 5.5.9 Activity – Using Network Device Commands
- 5.6 Course Closeout
- Module 1: Performing Basic Linux Tasks
- 1.1 Introduction to Linux XK0-005
- 1.2 Instructor Introduction
- 1.3 Course Introduction
- 1.4 Identify the Linux Design Philosophy
- 1.5 Enter Shell Commands
- 1.6 Shell Commands Activity
- 1.7 Get Help with Linux
- Module 2: Managing Users and Groups
- 2.1 Assume Superuser Privileges
- 2.2 Create, Modify, and Delete Users
- 2.3 Create, Modify, and Delete Groups
- 2.4 Query Users and Groups
- 2.5 Configure Account Profiles
- Module 3: Managing Permissions and Ownership
- 3.1 Modify File and Directory Permissions
- 3.2 Modify File and Directory Ownership
- 3.3 Configure Special Permissions and Attributes
- 3.4 Troubleshoot Permissions Issues
- Module 4: Managing Storage
- 4.1 Create Partitions
- 4.2 Manage Logical Volumes
- 4.3 Mount File Systems
- 4.4 Manage File Systems
- 4.5 Navigate the Linux Directory Structure
- 4.6 Troubleshoot Storage Issues
- 4.7 Container Storage Management
- 4.8 Advanced Data Management and Security for Containers
- Module 5: Managing Files and Directories
- 5.1 Create and Edit Text Files
- 5.2 Search for Files
- 5.3 Perform Operations on Files and Directories
- 5.4 Process Text Files
- 5.5 Manipulate File Output
- Module 6: Managing Kernel Modules
- 6.1 Explore the Linux Kernel
- 6.2 Install and Configure Kernel Modules
- 6.3 Monitor Kernel Modules
- Module 7: Managing the Linux Boot Process
- 7.1 Configure Linux Boot Components
- 7.2 Configure GRUB
- Module 8: Managing System Components
- 8.1 Configure Localization Options
- 8.2 Configure GUIs
- 8.3 Manage Services
- 8.4 Troubleshoot Process Issues
- 8.5 Troubleshoot CPU and Memory Issues
- 8.6 Troubleshooting with systemd
- Module 9: Managing Devices
- 9.1 Identify the Types of Linux Devices
- 9.2 Configure Devices
- 9.3 Monitor Devices
- 9.4 Troubleshoot Hardware Issues
- Module 10: Managing Networking
- 10.1 Identify TCP/IP Fundamentals
- 10.2 Identify Linux Server Roles
- 10.3 Connect to a Network
- 10.4 Configure DHCP and DNS Client Services
- 10.5 Configure Cloud and Virtualization Technologies
- 10.6 Troubleshoot Networking Issues
- Module 11: Managing Packages and Software
- 11.1 Identify Package Managers
- 11.2 Manage RPM Packages with YUM
- 11.3 Manage Debian Packages with APT
- 11.4 Configure Repositories
- 11.5 Acquire Software
- 11.6 Build Software from Source Code
- 11.7 Troubleshoot Software Dependency Issues
- Module 12: Securing Linux Systems
- 12.1 Implement Cybersecurity Best Practices
- 12.2 Implement Identity and Access Management Methods
- 12.3 Configure SELinux or AppArmor
- 12.4 Configure Firewalls
- 12.5 Implement Logging Services
- 12.6 Back Up, Restore, and Verify Data
- 12.7 NFTables – Setting Up Advanced Firewalls
- Module 13: Working with Bash Scripts
- 13.1 Customize the Bash Shell Environment
- 13.2 Identify Scripting and Programming Fundamentals
- 13.3 Write and Execute a Simple Bash Script
- 13.4 Incorporate Control Statements in Bash Scripts
- Module 14: Automating Tasks
- 14.1 Schedule Jobs
- 14.2 Implement Version Control Using Git
- 14.3 Identify Orchestration Concepts
- Module 15: Installing Linux
- 15.1 Prepare for Linux Installation
- 15.2 Perform the Installation
- Module 16: Working With Modern IT Infrastructure
- 16.1 Infrastructure as Code (IaC)
- 16.2 Containers, Cloud, and Orchestration Concepts
- 16.3 Container Management
- 16.4 Container and Cloud Networking Basics
- Module 1 – IT Concepts and Terminology
- 1.1 – Introduction to Tech+
- 1.2 – Understanding Notational Systems
- 1.3 – The Basics of Computing
- 1.4 – Comparing Units of Measure
- 1.5 – Troubleshooting Methodology, Cases and Tips
- Module 2 – Infrastructure
- 2.1 – Introduction to Infrastructure
- 2.2 – Types of Computing Devices
- 2.3 – Internal Components of a Computer
- 2.4 – Types of Storage
- 2.5 – Peripheral Devices and Installation
- 2.6 – Virtualization and Cloud Technologies
- 2.7 – Common Internet Service Types
- Module 3 – Networking Fundamentals
- 3.1 – Introduction to Networking
- 3.2 – Core Principles of Computer Networking
- 3.3 – Network Ports
- 3.4 – Network Addresses and Identifiers
- 3.5 – Network Models and Types
- 3.6 – Networking Devices and Connectors
- 3.7 – Small Wireless Networks
- Module 4 – Operating Systems
- 4.1 – Introduction to Operating Systems (OS)
- 4.2 – What is an Operating System
- 4.3 – Drivers, Applications, Tasks and System Services
- 4.4 – File and Disk Management
- 4.5 – Backup and Recovery
- Module 5 – Software and Applications
- 5.1 – Common Software Applications
- 5.2 – Productivity Software
- 5.3 – Business and Enterprise Software
- 5.4 – Managing Software
- 5.5 – Trusted Software Sources
- Module 6 – Web Browsing, Configuration & Security
- 6.1 – Introduction to Web Browsing
- 6.2 – Browser Settings, Configuration and Maintenance
- 6.3 – Secure Web Browsing
- 6.4 – Protecting Your Privacy
- Module 7 – Software Development Concepts
- 7.1 – Introduction to Programming
- 7.2 – Programming Tools
- 7.3 – Programming Organization and Logic Flows
- 7.4 – Understanding Programming Language Categories
- 7.5 – Code Maintenance, Version Control Systems and Branching
- 7.6 – Fundamental Data Types and Their Characteristics
- Module 8 – Data and Database Fundamentals
- 8.1 – Introduction to Databases and the Value of Data
- 8.2 – Database Concepts and Structures
- 8.3 – Working with Relational Databases
- 8.4 – Database Operations and Access
- 8.5 – Database Backup and Recovery
- Module 9 – Security: Keeping Things Safe
- 9.1 – Basic Security Concepts and Strategies
- 9.2 – Identifying Common Security Threats
- 9.3 – Securing Devices and Networks
- 9.4 – Security Tools and Software
- 9.5 – Encryption and Data Protection
- Module 10 – AI Uses and Impact
- 10.1 – The Impact and Use of AI
- 10.2 – Course Closeout
- Introduction To CompTIA Data+
- Course Welcome
- Module Overview
- Instructor Introduction
- What is the CompTIA Data Plus Exam
- Roles that should consider the exam
- Exam Objectives
- Discussion – The Importance of Data
- US DOD Member Data Directives and 8570
- Module 1 – Data Concepts and Environments
- 1.1 Module Overview
- 1.2 Understanding Data Schemes
- 1.3 Databases
- 1.4 Demonstration – Google Cloud SQL
- 1.5 Data Warehouses and Data Lakes
- 1.7 Comparing OLTP and OLAP Processing
- 1.8 Demonstration – AWS Redshift
- 1.9 Demonstration – Deploy SQL DemoBench
- 1.10 What is Column Database
- 1.11 Data Structures, Files and Types
- 1.12 Module Summary Review
- 1.13 Module Review Questions
- Module 2 – Data Mining
- 2.1 Module 2 Overview
- 2.2 Data Acquisition and Integration
- 2.3 Demonstration – Data Integration Techniques
- 2.4 API Fundamentals
- 2.5 Demonstration – Google Vision API
- 2.6 Data Profiling and Cleansing
- 2.7 Data Collection Method Options
- 2.8 Data Outliers
- 2.9 Understanding ETL and ELT
- 2.10 Query Optimization
- 2.11 Understanding Data Manipulation Techniques
- 2.12 Module Summary Review
- 2.13 Module Review Questions
- Module 3 – Data Analysis
- 3.1 Module Overview
- 3.2 Descriptive Statistical Methods
- 3.3 Measures of Tendency and Dispersion
- 3.4 Understanding Percentages
- 3.5 Inferential Statistical Methods
- 3.6 Hypothesis Testing with Excel
- 3.7 Whiteboard – Linear Regression and Correlation
- 3.8 Whiteboard – Analysis Testing
- 3.9 Module Summary Review
- 3.10 Module Review Questions
- Module 4 – Data Visualization
- 4.1 Module Overview
- 4.2 Translate Business Requirements to Reports
- 4.3 Whiteboard – Translate Business Requirements
- 4.4 Dashboard Fundamentals
- 4.5 Demonstration – Dashboard Components
- 4.6 Data Sources and Attributes
- 4.7 Understanding Charts and Graphs
- 4.8 Report Types and Elements
- 4.9 Module Summary Review
- 4.10 Module Review Questions
- Module 5 – Data Governance, Quality and Controls
- 5.1 Module Overview
- 5.2 Introduction to Data Governance
- 5.3 The Data Lifecycle
- 5.4 Determining Data Classification
- 5.5 Data Ownership
- 5.6 Data Storage Access
- 5.7 Data Privacy and Frameworks
- 5.8 Information Rights Management (IRM) and Data Loss Prevention (DLP)
- 5.9 Setting Data Quality Control
- 5.10 Methods to Validate Quality
- 5.11 Data Transformation Tools
- 5.12 Data Security Fundamentals
- 5.13 Master Data Management (MDM)
- 5.14 Module Summary Review
- 5.15 Module Review Questions
- Module 6 – Exam Preparation and Practice Exams
- 6.1 Module Overview
- 6.2 Course Summary Review
- 6.3 Data Plus Exam Experience
- 6.4 Certification CEU Requirements
- 6.5 Practice Exams – Additional Resources
- 6.6 Course Closeout
- Module 1 – CompTIA CySA+ CS0-003 Basics
- 1.1 Course Introduction
- 1.2 Instructor Introduction
- 1.3 What is CySA
- 1.4 Exam Objectives
- 1.5 Cybersecurity Pathway
- 1.6 DoD Baseline Certification
- Module 2 – CompTIA CySA+ CS0-003 Domain 1 – Security Operations
- 2.1 Domain 1 – Security Operations Overview
- 2.2 System and Network Architecture Concepts in Security Operations
- 2.3 Log Files
- 2.4 Operating Systems
- 2.5 Infrastructure Concepts
- 2.6 Network Architecture
- 2.7 Software Defined Networking
- 2.8 Whiteboard Discussion – Network Architectures
- 2.9 Identity and Access Management (IAM) Basics
- 2.10 Demonstration – IAM
- 2.11 Encryption
- 2.12 Sensitive Data
- 2.13 Analyze Indicators of Potentially Malicious Activity
- 2.14 Network Attacks
- 2.15 Host Attacks
- 2.16 Application Related Attacks
- 2.17 Social Attacks
- 2.18 Tools or Techniques to Determine Malicious Activity Overview
- 2.19 Tools and Toolsets for Identifying Malicious Activity
- 2.20 Common Techniques
- 2.21 Programming Concerns
- 2.22 Threat Intelligence and Threat Hunting Concepts Overview
- 2.23 Threat Actors
- 2.24 Tactics, Techniques and Procedures
- 2.25 Confidence Levels (IOC)
- 2.26 Collection Sources
- 2.27 Threat Intelligence
- 2.28 Cyber Response Teams
- 2.29 Security Operations
- 2.30 Standardized Processes and Operations
- 2.31 Security Operations Tools and Toolsets
- 2.32 Module 2 Review
- Module 3 – CompTIA CySA+ CS0-003 Domain 2 – Vulnerability Management
- 3.1 Domain 2 – Vulnerability Management Overview
- 3.2 Vulnerability Discovery and Scanning
- 3.3 Asset Discovery and Scanning
- 3.4 Industry Frameworks
- 3.5 Mitigating Attacks
- 3.6 CVSS and CVE
- 3.7 CVSS Interpretation
- 3.8 CVE Databases
- 3.9 Cross Site Scripting (XSS)
- 3.10 Vulnerability Response, Handling, and Management
- 3.11 Control Types (Defense in Depth, Zero Trust)
- 3.12 Patching and Configurations
- 3.13 Attack Surface Management
- 3.14 Risk Management Principles
- 3.15 Threat Modeling
- 3.16 Threat Models
- 3.17 Secure Coding and Development (SDLC)
- 3.18 Module 3 Review
- Module 4 – CompTIA CySA+ CS0-003 Domain 3 – Incident Response and Management
- 4.1 Domain 3 – Incident Response and Management Overview
- 4.2 Attack Methodology Frameworks
- 4.3 Cyber Kill Chain
- 4.4 Frameworks to Know
- 4.5 Incident Response and Post Response
- 4.6 Detection and Analysis
- 4.7 Post Incident Activities
- 4.8 Containment, Eradication and Recovery
- 4.9 Module 4 Review
- Module 5 – CompTIA CySA+ CS0-003 Domain 4 – Reporting and Communication
- 5.1 Domain 4 – Reporting and Communication Overview
- 5.2 Reporting Vulnerabilities Overview
- 5.2.1 Vulnerability Reporting
- 5.3 Compliance Reports
- 5.4 Inhibitors to Remediation
- 5.5 Metrics and KPI’s
- 5.6 Incident Response Reporting and Communications Overview
- 5.7 Incident Declaration
- 5.8 Communication with Stakeholders
- 5.9 Root Cause Analysis
- 5.10 Lessons Learned and Incident Closure
- 5.11 Module 5 Review
- Module 6 – CompTIA CySA+ CS0-003 – Course Closeout
- 6.1 Course Closeout Overview
- 6.2 Practice Questions
- 6.3 Exam Process
- 6.4 Continuing Education
- 6.5 Course Closeout
- Module 1 – CompTIA Cloud+ CV0-003 Course Overview
- 1.0 Course Trailer
- 1.1 Course Overview
- 1.2 What is the Cloud+ Exam
- 1.3 Cloud+ Domain Objectives Overview
- 1.4 CompTIA Certification Pathways
- 1.5 DoD and ISO Requirements
- Module 2 – General Cloud Knowledge
- 2.1 Domain Overview
- 2.2 Compare and Contrast Cloud Models
- 2.3 Cloud Computing Defined
- 2.4 Deployment Models
- 2.5 Service Models
- 2.6 Cloud Characteristics
- 2.7 Cloud Roles
- 2.8 Evaluate Cloud Providers and Services
- 2.9 Regions and Zones
- 2.10 Shared Responsibility Model
- 2.11 Demonstration – AWS Shared Security Model
- 2.12 Comparing Cloud to Virtualization
- 2.13 Comparing Cloud to On Premises
- 2.14 What is a Virtual Machine
- 2.15 Demonstration – Deploy a Cloud VM (AWS EC2)
- 2.16 What is an API
- 2.17 Capacity Planning Factors
- 2.18 Licensing, Factors, Requirements and Planning
- 2.19 Capacity Planning
- 2.20 Demonstration – AWS Trusted Advisor
- 2.21 HA and Scaling
- 2.22 High Availability and Disaster Recovery
- 2.23 Virtual, System and Communication Protection
- 2.24 Hypervisor Affinity
- 2.25 Analyze the solution design
- 2.26 Business Requirements
- 2.27 Business Enablers
- 2.28 Demonstration – AWS Well Architected Tool
- 2.29 Testing Techniques
- 2.30 Testing Success Factors
- 2.31 Module Review Questions
- 2.32 Module Summary Review
- Module 3 – Cloud Security
- 3.1 Domain Overview
- 3.2 Configure Identity and Access Management
- 3.3 Identification and Authorization Management (IAM)
- 3.4 SDLC
- 3.5 Directory Services
- 3.6 Security and Access Controls
- 3.7 Federation
- 3.8 SSO and MFA
- 3.9 Certificates and Key Management
- 3.10 Secure a Network in a Cloud Environment
- 3.11 Networking Devices and Segmentation
- 3.12 Firewalls and Proxies
- 3.13 NAT and PAT
- 3.14 Secure Network Configurations (Tunnelling and Encryption)
- 3.15 Demo – Hardening and Configuration Changes
- 3.16 OS Application Controls and Security Credentials
- 3.17 Policies and Permissions
- 3.18 Host and Network Protections (HIDS/IPS)
- 3.19 Virtualization Security
- 3.20 Monitoring
- 3.21 Data Security and Compliance Controls in Cloud Environments
- 3.22 Structured, Unstructured and Semi Structured Data
- 3.23 Data Classification and Labeling
- 3.24 Data Loss Prevention
- 3.25 Demonstration – Google Cloud DLP
- 3.26 Chain of Custody and Non-Repudiation
- 3.27 Discussion – CASB
- 3.28 Module Summary Review
- 3.29 Module Review Questions
- Module 4 – Cloud Deployment
- 4.1 Domain Overview
- 4.2 Integrate Components into Cloud Solutions
- 4.3 Subscription Services
- 4.4 Demonstration – Provision VM
- 4.5 Cloud Infrastructure Components
- 4.6 Whiteboard – Design a Resilient AWS Cloud Architecture
- 4.7 Containers
- 4.8 Microservices
- 4.9 Demonstration – Deploy Containers
- 4.10 Scaling
- 4.11 Provision Storage
- 4.12 Cloud Storage Protocols
- 4.13 Storage Features
- 4.14 Storage Cost Considerations
- 4.15 Storage Performance
- 4.16 RAID and Tiering
- 4.17 Demonstration – AWS S3
- 4.18 Deploy Cloud Networking Solutions
- 4.19 Connecting to the Cloud
- 4.20 Network Protocols
- 4.21 VPNs, VPC and Connectivity
- 4.22 Whiteboard – AWS VPC Connectivity
- 4.23 Demonstration – AWS VPC
- 4.24 Software Defined Networking (SDN)
- 4.25 Compute Sizing
- 4.26 Virtualization Considerations
- 4.27 Resource Rightsizing (CPU, Memory, etc.)
- 4.28 Module Summary Review
- 4.29 Module Review Questions
- Module 5 – Operations and Support
- 5.1 Domain Overview
- 5.2 Logging Monitoring and Alerting
- 5.3 Logging, Storage and Analysis of Data Events
- 5.4 Monitoring Cloud Resources
- 5.5 Service Level Agreements
- 5.6 Demonstration – SLAs in AWS
- 5.7 Maintain Efficient Operations of a Cloud Environment
- 5.8 Lifecycle Management
- 5.9 Change and Asset Management
- 5.10 SOP, Patching and Upgrades
- 5.11 Orchestration and Automation
- 5.12 Orchestration and Automation
- 5.13 DevOps, IaC and CI/CD Pipelines
- 5.14 Playbooks and Templates
- 5.15 Backup and Restore Operations
- 5.16 Backup Types, Objects, Targets
- 5.17 Restore and Recovery
- 5.18 Module Summary Review
- 5.19 Module Review Questions
- Module 6 – Troubleshooting
- 6.1 Domain Overview
- 6.2 Troubleshooting Methodology Intro
- 6.3 Troubleshooting Methodology
- 6.4 Troubleshoot Security Issues
- 6.5 Cloud Attacks
- 6.6 Security Groups and NACLs
- 6.7 Troubleshoot Deployment Issues
- 6.8 Discussion – Site Connectivity Issues
- 6.9 Discussion – Capacity Issues
- 6.10 Connectivity Issues
- 6.11 Connectivity Troubleshooting Tools
- 6.12 Demonstration – GCP AWS Azure Latency Test
- 6.13 Module Summary Review
- 6.14 Module Review Questions
- Module 7 – Course Closeout
- 7.1 Exam Preparation
- 7.2 Course Closeout
- Module 1 – Mobile Devices
- Module 2 – Networking
- Module 3 – Hardware
- Module 4 – Virtualization and Cloud Computing
- Module 5 – Hardware and Network Troubleshooting
- Module 1 – Operating Systems
- Module 2 – Security
- Module 3 – Software Troubleshooting
- Module 4 – Operational Procedures
- Module 1 – Risk Management
- Module 2 – Enterprise Security Architecture
- Module 3 – Enterprise Security Operations
- Module 4 – Technical Integration of Enterprise Security
- Module 5 – Research, Development and Collaboration
Domain 1 – Characteristics of Cloud Services from a Business Perspect Domain 2 – Cloud Computing and Business Value Domain 3 – Technical Perspectives/Cloud Types Domain 4 – Steps to Successful Adoption of Cloud Domain 5 – Impact and Changes of Cloud Computing on IT Service Management Domain 6 – Risks and Consequences of Cloud Computing
- Module 1
- Module 2
- Module 3
- Module 4
- Module 5
- Module 6
- Module 7
- Module 1: Threat Management
- Module 2: Vulnerability Management
- Module 3: Cyber Incident Response
- Module 4: Security Architecture and Tool Sets
- Module 1: Threat and Vulnerability Management
- Module 2: Software and Systems Security
- Module 3: Security Operations and Monitoring
- Module 4: Incident Response
- Module 5: Compliance and Assessment
- Module 6: Afterword
- Module 1 – IT Concepts and Terminology
- Module 2 – Infrastructure
- Module 3 – Applications and Software
- Module 4 – Software Development
- Module 5 – Database Fundamentals
- Module 6 – Security
- Module 1: Intro & Performing Basic Linux Tasks
- Module 2: Managing Users and Groups
- Module 3: Managing Permissions and Ownership
- Module 4: Managing Storage
- Module 5: Managing Files and Directories
- Module 6: Managing Kernel Modules
- Module 7: Managing the Linux Boot Process
- Module 8: Managing System Components
- Module 9: Managing Devices
- Module 10: Managing Networking
- Module 11: Managing Packages and Software
- Module 12: Securing Linux Systems
- Module 13: Working with Bash Scripts
- Module 14: Automating Tasks
- Module 15: Installing Linux
- Module 1: Instructions
- Module 2: Managing Software
- Module 3: Configuring Hardware
- Module 4: Managing Files
- Module 5: Booting Files
- Module 6: X
- Module 7: Admin
- Module 8: Basic Networking
- Module 9: Scripts
- Module 10: Security
- Module 1: Over-The-Air Technologies
- Module 2: Network Infrastructure
- Module 3: Mobile Device Manager
- Module 4: Security
- Module 5: Troubleshooting
- Module 1 – Networking Concepts
- Module 2 – Infrastructure
- Module 3 – Network Operation
- Module 4 – Network Security
- Module 5 – Network Troubleshooting and Tools
- Module 1 – The Pen Test Engagement
- Module 2 – Passive Reconnaissance
- Module 3 – Active Reconnaissance
- Module 4 – Physical Security
- Module 5 – Social Engineering
- Module 6 – Vulnerability Scan Analysis
- Module 7 – Password Cracking
- Module 8 – Penetrating Wired Networks
- Module 9 – Penetrating Wireless Networks
- Module 10 – Windows Exploits
- Module 11 – Linux Exploits
- Module 12 – Mobile Devices
- Module 13 – Specialized Systems
- Module 14 – Scripts
- Module 15 – Application Testing
- Module 16 – Web App Exploits
- Module 17 – Lateral Movement
- Module 18 – Persistence
- Module 19 – Cover Your Tracks
- Module 20 – The Report
- Module 21 – Post Engagement Cleanup
- Module 1 – SY0-701 General Security Concepts
- 1.0 Introduction to the Course
- 1.1 Fundamental Security Concepts
- 1.2 Zero Trust
- 1.3 Deception and Disruption
- 1.3.1 ACTIVITY – Testing a Honeypot
- 1.4 Security Controls
- 1.5 Change Management and Security
- 1.6 Cryptography Basics
- 1.6.1 ACTIVITY – Examining Symmetric Encryption
- 1.7 Asymmetric Encryption
- 1.7.1 ACTIVITY – Exploring Asymmetric Encryption
- 1.8 Hashing
- 1.8.1 ACTIVITY – Verifying Integrity with Hashing
- 1.9 Digital Certificates
- 1.10 Public Key Infrastructure
- 1.11 Data and Keys
- 1.12 Crypto Implementations
- 1.13 Blockchain
- 1.14 Non-Cryptographic Data Protection
- Module 2 – SY0-701 Threats, Vulnerabilities, and Mitigations
- 2.1 Threat Actors and Motivations
- 2.2 Threat Vectors
- 2.2.1 ACTIVITY – O.MG Cable Baiting
- 2.2.2 O.MG-No Cable
- 2.3 Social Engineering
- 2.4 Operating System Vulnerabilities and Attacks
- 2.5 Application Vulnerabilities and Attacks
- 2.5.1 ACTIVITY – Performing a Buffer Overflow
- 2.6 Web-based Vulnerabilities and Attacks
- 2.6.1 ACTIVITY – Abusing Unsanitized Input
- 2.6.2 ACTIVITY – Grabbing Passwords with SQL Injection
- 2.6.3 ACTIVITY – Swiping a Token with XSS
- 2.7 Other Vulnerabilities
- 2.8 Common Malicious Activity Indicators
- 2.9 Insider Threat Indicators
- 2.10 Social Engineering Indicators
- 2.10.1 ACTIVITY – Capturing Credentials through Social Engineering
- 2.11 Malware Activity Indicators
- 2.12 Operating System Attack Indicators
- 2.13 Application Attack Indicators
- 2.13.1 ACTIVITY – Recognizing Directory Traversal
- 2.14 Physical Attack Indicators
- 2.14.1 ACTIVITY – Quickly Cloning an RFID Badge
- 2.15 Network Attack Indicators
- 2.15.1 ACTIVITY – Crashing a Target with DoS
- 2.16 Cryptographic Attack Indicators
- 2.17 Password Attack Indicators
- 2.17.1 ACTIVITY – Password Cracking
- 2.18 Network Segmentation
- 2.19 Access Control
- 2.20 Enterprise Device Hardening
- Module 3 – SY0-701 Security Architecture
- 3.1 Network Segmentation
- 3.1.1 ACTIVITY – Segmenting a Network
- 3.2 High Availability
- 3.3 Virtualization
- 3.3.1 ACTIVITY – Deploying Docker Containers
- 3.4 Cloud
- 3.5 Serverless Computing
- 3.6 IoT
- 3.7 ICS SCADA
- 3.7.1 ACTIVITY – Operating a SCADA System
- 3.8 RTOS and Embedded Systems
- 3.9 Reducing the Attack Surface
- 3.10 Firewalls
- 3.11 IDS/IPS
- 3.12 Secure Communications – Access
- 3.13 Port Security
- 3.14 SD-WAN and SASE
- 3.15 Data Classifications
- 3.16 Protecting Data Types
- 3.17 Data Considerations
- 3.18 Redundancy
- 3.19 Alternate Sites
- 3.20 Multiple Platforms
- 3.21 Business Continuity
- Module 4 – SY0-701 Security Operations
- 4.1 Secure Baselines
- 4.2 Attack Surface Reduction
- 4.3 Wireless Installation
- 4.4 Wireless Security Settings
- 4.5 Mobile Solutions
- 4.5.1 ACTIVITY – Pwning a Mobile Device
- 4.6 Application Security Management
- 4.7 Asset Management
- 4.8 Vulnerability Management
- 4.9 Monitoring Activities
- 4.10 Monitoring Tools
- 4.10.1 ACTIVITY – Scanning a Network for Vulnerabilities
- 4.11 Firewall Configuration
- 4.11.1 ACTIVITY – Configuring Firewall Rules
- 4.12 Intrusion Detection Configuration
- 4.13 Web Traffic Filtering
- 4.14 Operating System Policy
- 4.14.1 ACTIVITY – Examining Windows Group Policy
- 4.15 Network Service Security
- 4.16 Data Loss Protection
- 4.16.1 ACTIVITY – Checking File Integrity
- 4.17 Network Access Control
- 4.17.1 ACTIVITY – Require Multifactor Authentication
- 4.18 Identity Management
- 4.19 Access Management
- 4.19.1 ACTIVITY – Implementing Access Control
- 4.20 Security Automation
- 4.21 Incident Response
- 4.22 Digital Forensics
- Module 5 – SY0-701 Security Program Management and Oversight
- 5.1 Elements of Effective Security Governance
- 5.2 Elements of the Risk Management Process
- 5.3 Third Party Risk Assessment and Management
- 5.3.1 ACTIVITY – Analyzing the SolarWinds Supply Chain Failure
- 5.4 Effective Security Compliance
- 5.5 Audits and Assessments
- 5.5.1 ACTIVITY – Conducting OSINT
- 5.5.2 ACTIVITY – Performing Active Reconnaissance
- 5.6 Security Awareness Practices
- 5.7 Course Outro
- Module 1: Information Security Roles Security Control and Framework Types
- Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources
- Module 3: Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing
- Module 4: Social Engineering, Indicators of Malware Attacks
- Module 5: Cryptography
- Module 6: Certificates and PKI
- Module 7: Authentication
- Module 8: Identity and Accounts, Authorization, Personnel Polices
- Module 9: Network Design and Hardware (Part 1)
- Module 10: Network Hardware (Part 2)
- Module 11: Network Protocols
- Module 12: Endpoint Security
- Module 13: Mobile Devices
- Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation
- Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualization
- Module 16: Privacy and Data Protection
- Module 17: Incident Response
- Module 18: Forensics
- Module 19: Risk Management and Business Impact Analysis
- Module 20: Redundancy and Backup Strategies
- Module 21: Physical Security
- Module 22: Afterword
Module 1: Threats, Attacks and Vulnerabilities Module 2: Technologies and Tools Module 3: Architecture and Design Module 4: Identity and Access Management Module 5: Risk Management Module 6: Cryptography and PKI
Kubernetes
- Module 1: Course Overview
- Module 2: Kubernetes and Container Fundamentals
- Module 3: Configuration
- Module 4: Multi Container Pods
- Module 5: Observability
- Module 6: Pod Design
- Module 7: Services and Networking
- Module 8: State Persistence
- Module 9: CKA Practice Exams
- Module 10: Course Closeout
- Module 1: Course Overview
- Module 2: Kubernetes and Container Fundamentals
- Module 3: Kubernetes Installation
- Module 4: Working with Kubernetes Clusters and Nodes
- Module 5: API Access and Commands
- Module 6: Running Pods and Deployments
- Module 7: Configuring Storage
- Module 8: Kubernetes Networking
- Module 9: Managing Security
- Module 10: Managing Kubernetes In the Enterprise
- Module 11: Kubernetes Monitoring and Troubleshooting
- Module 12: CKA Practice Exams
- Module 13: Course Closeout
- Module 1: Course Overview
- Module 2: Basics of Kubernetes
- Module 3: Kubernetes Design and Architecture
- Module 4: Deployments
- Module 5: Course Closeout
Dev Ops
- Module 1: Course Overview
- Module 2: The Basics
- Module 3: Development
- Module 4: Infrastructure
- Module 5: Key Performance Indicators (KPIs)
- Module 6: Course Closeout
AWS
- Introduction – AWS Redshift Fundamentals
- Course Welcome
- Course Overview
- Course Pre-Requirements
- Section 1: AWS Redshift Fundamentals
- 1.1 Fundamentals of data warehouses and Amazon Redshift
- 1.2 AWS Benefits and Limitations
- 1.3 AWS Redshift Pricing
- 1.4 Enterprise Use Cases
- 1.5 Node Types
- 1.6 Cluster Options
- 1.7 Demo – Free Tier- Startup Credits
- 1.8 Hands on Exercise 1 – Deploy a Cluster
- 1.9 Whiteboard- Redshift Architecture
- 1.10 Life of a Query
- 1.11 Query and Cost Optimization
- 1.12 Workload Management
- 1.13 Whiteboard- Redshift WLM
- 1.14 Redshift Performance Notes
- 1.15 Column Oriented structures
- 1.16 Section Review
- 1.17 Review Questions
- Section 2: Advanced Capabilities
- 2.1 Advanced Capabilities
- 2.2 Deployment Options (node types, cluster options, etc.)
- 2.3 Multi-AZ deployment with Amazon Redshift
- 2.4 Backup and Recovery
- 2.5 Demo -Deploy Cluster
- 2.6 Demo – Resize Cluster
- 2.7 Networking and Security
- 2.8 Demo – Networking and Security
- 2.9 HOE – Setup IAM and Deploy Cluster
- 2.10 Whiteboard – Networking
- 2.11 Demo – Connect to Database
- 2.12 HOE – SQLWB
- 2.13 Excel Connections
- 2.14 Setting up and managing data ingestion with Amazon Redshift
- 2.15 HOE – AWS S3 Data Load
- 2.16 Monitoring Redshift
- 2.17 Demo – Monitor Redshift
- 2.18 HOE – Deploy an Amazon Redshift data warehouse cluster, load data into the cluster
- 2.19 Amazon Redshift Spectrum
- 2.20 Section Review
- 2.21 Review Questions
- 2.22 Resources
- 2.23 Course Closeout
- Module 1: Introduction to AWS Basics
- Module 2: AWS Web Services and Cloud Platform Services
- Module 3: AWS Basic Summary
- Module 4: Introduction to AWS Deep Dive
- Module 5: AWS Management of Services and Features Deep Dive
- Module 6: AWS Deep Dive Summary
- Module 1: Introduction to Cloud Computing
- Module 2: Identity and Access Management IAM
- Module 3: Elastic Cloud Computing EC2
- Module 4: EC2 Storage
- Module 5: Elastic Load Balancer and Auto Scaling Group ELB and ESG
- Module 6: Amazon S3
- Module 7: Database and Analytics
- Module 8: Other Services
- Module 9: Scaling Your Infrastructure
- Module 10: Global Applications
- Module 11: Cloud Integration
- Module 12: Cloud Monitoring
- Module 13: Virtual Private Network
- Module 14: Security and Compliance
- Module 15: Machine Learning
- Module 16: Advanced Identity
- Module 17: Are You Well Architected?
- Module 18: Congratulations & Exam Preparation
Cyber Security
- Module 1 – Overview of Privileged Access Management (PAM)
- 1.1 – Your Complete PAM Solution
- 1.2 – Overview of CyberArk
- Module 2 – CyberArk Architecture and Components
- 2.1 – CyberArk Architecture Overview
- 2.2 – CyberArk Deployment Models
- Module 3 – Working With The CyberArk Vault
- 3.1 – The CyberArk Digital Vault
- 3.2 – Managing Users and Permissions
- Module 4 – Privileged Account Management
- 4.1 – Add and Managing PAM Accounts
- 4.2 – Password Rotation and Policy Management
- Module 5 – Monitoring and Session Management
- 5.1 – Using the Privileged Session Manager (PSM)
- 5.2 – Session Monitoring and Reporting
- Module 6 – Security Best Practices
- 6.1 – CyberArk Hardening and Best Practices
- 6.2 – Incident Response With CyberArk
- Module 7 – Use Cases, Certification & Closeout
- 7.1 – Real World Use Cases of CyberArk
- 7.2 – CyberArk Certification Paths
- 7.3 – CyberArk Fundamentals Course Closeout
- Module 1 – Introduction and Security Concepts
- Certification Overview
- Exam Objectives
- Instructor Introduction
- ISC CiC Course Intro
- 1.0 Module 1 Overview
- 1.1.5 Password Security
- 1.1.6 Whiteboard – Multifactor Authentication (MFA)
- 1.2 Understand the risk management process
- 1.2.1 Risk Management
- 1.2.2 Risk Identification, assessment and treatment
- 1.3 Understand security controls
- 1.3.1 Technical Controls
- 1.3.2 Administrative Controls
- 1.3.3 Physical Controls
- 1.3.4 Whiteboard Discussion – Controls
- 1.3.5 Demonstration – AWS Access Controls
- 1.4 Understand ISC2 Code of Ethics
- 1.4.1 Professional Code of Ethics
- 1.5 Understand Governance processes
- 1.5.1 Standards, Regulations, etc.
- 1.5.2 Security Policies
- 1.5.3 Module Summary Review
- 1.5.4 Module Review Questions
- Module 2 – Incident Response, Business Continuity and Disaster Recovery Concepts
- 2.0 Module 2 Overview
- 2.1 Understand Business Continuity
- 2.1.1 Business Continuity
- 2.1.2 Components of a Business Continuity Plan
- 2.2 Disaster Recovery
- 2.2.1 Disaster Recovery
- 2.2.2 RTO-RPO
- 2.3 Understand Business Response
- 2.3.1 Incident Response
- 2.3.2 Post Incident Review
- 2.3.3 Module Summary Review
- 2.3.4 Module Review Questions
- Module 3 – Access Control Concepts
- 3.0 Module 3 Overview
- 3.1 Understand physical access controls
- 3.1.1 Defense In Depth
- 3.1.2 Compare Physical Control Types
- 3.1.3 Monitoring Controls
- 3.2 Describe logical access controls
- 3.2.1 Logical Access Controls
- 3.2.2 Principle of Least Privilege
- 3.2.3 Segregation of Duties
- 3.2.4 Whiteboard – Access Control
- 3.2.5 Demonstration – Cloud IAM Sequence 32
- 3.2.6 Module Summary Review
- 3.2.7 Module Review Questions
- Module 4 – Network Security
- 4.0 Module 4 Overview
- 4.1 Understanding computer networking
- 4.1.1 Network Security Design
- 4.1.2 Whiteboard – Networking Concepts
- 4.1.3 Networking protocols and ports
- 4.1.4 Demonstration – AWS VPC
- 4.2 Understand Network Threats
- 4.2.1 Types of network (cyber) threats and attacks
- 4.2.2 Threat Actors
- 4.2.3 Tools used to identify and prevent threats
- 4.2.4 Whiteboard Discussion – DDoS attacks
- 4.3 Network Security Infrastructure
- 4.3.1 On Premises Architecture
- 4.3.2 Data Center Design Discussion
- 4.3.3 Cloud Architecture Service and Deployment Models
- 4.3.4 Managed Service Providers
- 4.3.5 Service Level Agreements (SLA)
- 4.3.6 Shared Security Model
- 4.3.7 Zero Trust
- 4.3.8 Module Summary Review
- 4.3.9 Module Review Questions
- Module 5 – Security Operations
- 5.0 Module 5 Overview
- 5.1 Understand Data Security
- 5.1.1 Data Security Fundamentals
- 5.1.2 Data Handling Best Practices
- 5.1.3 Encryption
- 5.1.4 Data Security Compliance
- 5.2 Understand System Hardening
- 5.2.1 System Hardening
- 5.2.2 Configuration Management
- 5.3 Understanding Best Practice Security Policies
- 5.3.1 Common Security Policies
- 5.3.2 Demonstration – AUP
- 5.3.3 Demonstration – Privacy Policy
- 5.4 Security Awareness Training
- 5.4.1 Importance of Security Awareness Training
- 5.4.2 Social Engineering
- 5.4.3 Module Summary Review
- 5.4.4 Module Review Questions
- 5.4.5 Next Steps and Course Closeout
- Module 1 – Data Threats & ID Theft
- Module 1.0 – Introduction
- Module 1.1 – Data Threats & Costs
- Module 2 – Device Security
- Module 2.1 – Device Access
- Module 2.2 – Device Management
- Module 3 – Preventing Inadvertent Disclosure
- Module 3.1 – Inadvertent Disclosure
- Module 3.2 – Removing PII
- Module 3.3 – Social Engineering
- Module 4 – Physical & Technical Safeguards
- Module 4.1 – Physical Security
- Module 4.2 – Issues With Public Networks
- Module 4.3 – Data Encryption and Destruction
- Module 4.4 – Incident Reporting
- Module 4.5 – Course Conclusion
- Module 1 – Understanding Cyber Threats
- 1.1 – Welcome to Essential Cybersecurity 101
- 1.2 – 5 Cyber Threats and How to Stay Safe
- Module 2 – Defending Against Cyber Attacks
- 2.1 – Defending Against Ransomware
- 2.2 – Phishing Attack Awareness
- Module 3 – Securing Your Digital Environment
- 3.1 – Securing Your Home Network
- 3.2 – Best Practices for Securing Work-from-Home Devices and Data
- Module 4 – The Human Element of Cybersecurity
- 4.1 – Understanding Social Engineering
- 4.2 – Protecting Your Digital Identity
- Module 5 – The Role of AI in Cybersecurity
- 5.1 – AI Powered Threat Detection and Prevention
- 5.2 – AI in Cybersecurity Incident Response and Fraud Detection
- Module 1: Introduction
- Module 2: Information Security Governance
- Module 3: Information Security Risk Management
- Module 4: InfoSec Program Development and Management
- Module 5: Information Security Incident Management
- Module 6: Exam Prep
- Domain 1: Information Security Governance
- Domain 2: Risk Management
- Domain 3: Information Security Program
- Domain 4: Information Security Program Implementation
- Domain 5: Information Security Program Management
- Domain 6: Incident Management and Response
- Cloud Concepts, Architecture and Design
- Legal, Risk and Compliance
- Cloud Data Security
- Cloud Platform and Infrastructure Security
- Cloud Application Security
- Cloud Security Operations
- Module 1 – Introduction to Ethical Hacking
- Module 2 – Footprinting and Reconnaissance
- Module 3 – Network Scanning
- Module 4 – Enumeration
- Module 5 – Vulnerability Analysis
- Module 6 – Malware Threats
- Module 7 – Sniffing
- Module 8 – Social Engineering
- Module 9 – Denial of Service
- Module 10 – Session Hijacking
- Module 11 – Hacking Webservers
- Module 12 – Hacking Web Applications
- Module 13 – SQL Injection
- Module 14 – Hacking Wireless Networks
- Module 15 – System Hacking
- Module 16 – Hacking Mobile Platforms
- Module 17 – Evading IDS, Firewalls, and Honeypots
- Module 18 – Cryptography
- Module 19 – Cloud Computing
- Module 20 – IoT Hacking
- Module 1 – CEH v11 Foundations Course Introduction
- 1.1 About this course: CEH Foundations
- 1.2 About the Instructor
- Module 2 – CEH v11 Introduction To Networking
- 2.1 Networking Overview
- 2.2 Network Scope
- 2.3 Network Addressing
- 2.4 Activity – Examining Network Addressing
- Module 3 – CEH v11 LAN Components
- 3.1 Protocols, Ports, Sockets
- 3.2 Network Topologies
- 3.3 LAN Devices
- 3.4 LAN Devices Part 2
- 3.5 VLANs
- 3.6 Activity – Examining Ports and Sockets
- 3.7 Activity – Examining Switches and VLANs
- Module 4 – CEH v11 Routing and Network Access
- 4.1 Routers
- 4.2 Layer 3 Switches
- 4.3 Modems and Remote Access
- 4.4 Firewalls and Proxies
- 4.5 Activity – Examining Routing
- 4.6 Activity – Examining VLAN Routing
- 4.7 Activity – Examining Firewall Rules
- Module 5 – CEH v11 Intrusion Detection and Network Layers
- 5.1 IDS and IPS
- 5.2 OSI Model
- 5.3 TCP-IP
- 5.4 Activity – Examining Network Layers
- Module 6 – CEH v11 Networking Protocols and Addressing
- 6.1 Layer 4 Protocols
- 6.2 Layer 3 Protocols
- 6.3 Layer 2 Protocols
- 6.4 IP Addressing
- 6.5 Subnetting
- 6.6 DHCP
- 6.7 Activity – Examining TCP
- 6.8 Activity – Examining UDP
- 6.9 Activity – Examining IP
- 6.10 Activity – Examining ICMP
- 6.11 Activity – Examining ARP
- Module 7 – CEH v11 Network Services
- 7.1 DNS
- 7.2 DNS Records
- 7.3 NTP
- 7.4 Authentication
- 7.5 Biometrics
- 7.6 Activity – Examining DNS
- 7.7 Activity – Examining DNS Records
- Module 8 – CEH v11 Access Control
- 8.1 Local Authentication
- 8.2 Directory Service Authentication
- 8.3 Extending Authentication
- 8.4 Authorization
- 8.5 Activity – Testing Access Control
- Module 9 – CEH v11 Intro to Linux
- 9.1 Linux Overview
- 9.2 Linux File System
- 9.3 Linux Core Commands
- 9.4 Linux Search and Read Commands
- 9.5 Activity – Exploring Linux
- 9.6 Activity – Using Linux Core Commands
- 9.7 Activity – Using Linux Search Commands
- 9.8 Activity – Using Linux Read Commands
- Module 10 – CEH v11 Configuring Linux
- 10.1 Linux File Permissions
- 10.2 Linux Special Permissions
- 10.3 Linux Configuration
- 10.4 Linux Packages
- 10.5 Linux User Management
- Module 11 – CEH v11 Practicing Linux Configuration
- 11.1 Activity – Setting Linux Permissions
- 11.2 Activity – Setting Linux Special Permissions
- 11.3 Activity – Managing Packages in Kali Linux
- 11.4 Activity – Managing Users and Groups in Linux
- Module 12 – CEH v11 Managing Linux
- 12.1 Linux Job Scheduling
- 12.2 Linux File, Directory, and Download Commands
- 12.3 Linux System Commands
- 12.4 Linux Network Management
- 12.5 Linux Firewall
- Module 13 – CEH v11 Practicing Linux Management
- 13.1 Activity – Scheduling Tasks in Linux
- 13.2 Activity – Using Linux File, Directory, and Download Commands
- 13.3 Activity – Using Linux Edit and Archive Commands
- 13.4 Activity – Compiling Malicious Code
- 13.5 Activity – Using Linux Process and System Commands
- 13.6 Activity – Using Linux Disk, Hardware, and Network Commands
- Module 14 – CEH v11 Intro to Windows
- 14.1 Windows Overview
- 14.2 Windows Registry
- 14.3 Windows Security
- Module 15 – CEH v11 Windows Commands
- 15.1 Windows Commands
- 15.2 Windows Admin Commands
- 15.3 Windows Network Commands
- 15.4 Windows Run Line Commands
- 15.5 Windows PowerShell
- Module 16 – CEH v11 Practicing Windows Commands
- 16.1 Activity – Using Windows Built-in Commands
- 16.2 Activity – Using Windows Task Commands
- 16.3 Activity – Using Windows Admin Commands
- 16.4 Activity – Using Windows Network Commands
- 16.5 Activity – Using Windows PowerShell
- 16.6 Networking and OS Penetration Testing
- 16.7 Review
- Module 17 – CEH v11 Intro to Hacking
- 17.1 Information Security Overview
- 17.2 Hacking Concepts
- 17.3 Ethical Hacking Concepts
- 17.4 Penetration Testing
- 17.5 Penetration Testing Part 2
- 17.6 Activity – Performing a Static Code Review
- Module 18 – CEH v11 Information Security
- 18.1 Cyber Kill Chain Concepts
- 18.2 Activity – Performing Weaponization
- 18.3 Information Security
- 18.4 Security Policies
- 18.5 Security Controls
- 18.6 Access Control
- Module 19 – CEH v11 Protecting Data
- 19.1 Data Protection
- 19.2 Backup Sites
- 19.3 Vulnerability Management
- 19.4 SIEM
- 19.5 Risks
- Module 20 – CEH v11 Managing Risk
- 20.1 Risk Management
- 20.2 Incident Handling
- 20.3 Information Security Laws and Standards
- 20.4 Activity – Assessing Risk
- 20.5 Ethical Hacking Penetration Testing
- 20.6 Review
- 20.7 Conclusion
- Module 21 – CEH v11 Ethical Hacker Course Intro
- 21.1 About this course – Ethical Hacker
- 21.2 About the Instructor
- Module 22 – CEH v11 Intro to Footprinting
- 22.1 Footprinting Concepts
- 22.2 Footprinting Methodology
- 22.3 OSINT Tools
- 22.4 Advanced Google Search
- 22.5 Whois Footprinting
- 22.6 Activity – Performing a Whois Lookup
- Module 23 – CEH v11 Footprinting Network Services
- 23.1 DNS Footprinting
- 23.2 Website Footprinting
- 23.3 Email Footprinting
- 23.4 Network Footprinting
- 23.5 Footprinting through Social Networking Sites
- Module 24 – CEH v11 Defend Against Footprinting
- 24.1 Competitive Intelligence Gathering
- 24.2 Footprinting Countermeasures
- 24.3 Footprinting Penetration Testing
- 24.4 Review
- Module 25 – CEH v11 Intro to Scanning
- 25.1 Scanning Concepts
- 25.2 ICMP Discovery Scans
- 25.3 Other Discovery Scans
- Module 26 – CEH v11 Port Scanning
- 26.1 Ports
- 26.2 TCP Flags and Handshakes
- 26.3 TCP Scan Types
- 26.4 Other Scanning Techniques
- Module 27 – CEH v11 Vulnerability Scanning
- 27.1 Banner Grabbing
- 27.2 Vulnerability Scanning
- 27.3 SSDP Scanning
- Module 28 – CEH v11 NMAP
- 28.1 Nmap
- 28.2 Common Nmap Scans
- 28.3 Nmap Options
- 28.4 Nmap Stealth Scans
- 28.5 Hping and Other Scanners
- Module 29 – CEH v11 Firewalls and Intrusion Detection
- 29.1 Firewall Types
- 29.2 Firewall Features
- 29.3 Firewall Features Part 2
- 29.4 Firewall Configurations
- 29.5 Intrusion Detection and Prevention
- Module 30 – CEH v11 Evading Detection
- 30.1 Firewall and IDS Evasion
- 30.2 Firewall and IDS Evasion Part 2
- 30.3 Firewalking
- 30.4 Probing a Firewall
- 30.5 Probing a Firewall Part 2
- Module 31 – CEH v11 Proxies and VPNs
- 31.1 Proxies
- 31.2 VPNs
- 31.3 Tor
- 31.4 Scanning Countermeasures
- 31.5 Scanning Penetration Testing
- 31.6 Review
- Module 32 – CEH v11 Accessing Vulnerability
- 32.1 Vulnerability Assessment Overview
- 32.2 Vulnerability Scoring Systems
- 32.3 Vulnerability Assessment Tools
- Module 33 – CEH v11 Vulnerability Research
- 33.1 Scanner Output and Reports
- 33.2 Vulnerability Research
- 33.3 Review
- Module 34 – CEH v11 Intro to Enumeration
- 34.1 Enumeration Concepts
- 34.2 Enumeration Techniques and Tools
- 34.3 Service and Application Enumeration
- 34.4 SMB and NetBIOS Enumeration
- Module 35 – CEH v11 Service Enumeration
- 35.1 SNMP Enumeration
- 35.2 LDAP Enumeration
- 35.3 DNS Enumeration
- 35.4 SMTP Enumeration
- 35.5 NTP Enumeration
- Module 36 – CEH v11 Advanced Enumeration
- 36.1 Remote Connection Enumeration
- 36.2 File Transfer Enumeration
- 36.3 VoIP Enumeration
- 36.4 IPSEC Enumeration
- 36.5 IPv6 Enumeration
- 36.6 BGP Enumeration
- Module 37 – CEH v11 Command Line Enumeration
- 37.1 Windows Command Line Enumeration
- 37.2 Linux Command Line Enumeration
- 37.3 Linux Command Line Enumeration Part 2
- Module 38 – CEH v11 Defending Against Enumeration
- 38.1 Enumeration Countermeasures
- 38.2 Enumeration Countermeasures Part 2
- 38.3 Enumeration Penetration Testing
- 38.4 Review
- Module 39 – CEH v11 Intro to System Hacking
- 39.1 System Hacking Concepts
- 39.2 System Hacking Tools and Frameworks
- 39.3 Searchsploit
- 39.4 Compiling and Running Exploits
- Module 40 – CEH v11 System Hacking with Metasploit
- 40.1 Metasploit
- 40.2 Metasploit Search
- 40.3 Metasploit Exploits and Payloads
- 40.4 Metasploit Meterpreter
- 40.5 Metasploit Connectivity
- 40.6 Metasploit Impersonation and Migration
- Module 41 – CEH v11 Further Attacking a Compromised System
- 41.1 Netcat
- 41.2 Pivoting
- 41.3 Netcat Relays
- 41.4 Metasploit Post Exploitation Modules
- 41.5 Common Operating System Exploits
- Module 42 – CEH v11 Hacking an Operating System
- 42.1 Hacking Windows
- 42.2 Hacking Linux
- 42.3 Network Service Exploits
- 42.4 Password Attacks
- Module 43 – CEH v11 Password Cracking Overview
- 43.1 Dictionary Attack
- 43.2 Brute Force Attack
- 43.3 Password Spraying
- 43.4 Rainbow Tables
- Module 44 – CEH v11 Performing Password Attacks
- 44.1 Network Service Password Attacks
- 44.2 Password Cracking Tools
- 44.3 Online Password Cracking Sites
- 44.4 Windows Password Cracking
- 44.5 Linux Password Cracking
- 44.6 Other Methods for Obtaining Passwords
- Module 45 – CEH v11 Using Exploits
- 45.1 Keylogging
- 45.2 Spyware
- 45.3 Rootkits
- 45.4 Buffer Overflows
- 45.5 Privilege Escalation
- 45.6 Hiding Files
- Module 46 – CEH v11 Hiding Information
- 46.1 Alternate Data Streams
- 46.2 Steganography
- 46.3 Creating and Maintaining Remote Access
- 46.4 Hiding Evidence
- Module 47 – CEH v11 Covering Tracks
- 47.1 Covering Tracks in Windows
- 47.2 Covering Tracks in Linux
- 47.3 System Hacking Counter-Measures
- 47.4 System Hacking Penetration Testing
- 47.5 Review
- Module 48 – CEH v11 Malware Overview
- 48.1 Intro to Malware
- 48.2 Virus Overview
- 48.3 Virus Types
- 48.4 Self-Hiding Viruses
- 48.5 Worms
- 48.6 Trojans
- 48.7 Trojan Types
- 48.8 RATS
- Module 49 – CEH v11 Hacking With Malware
- 49.1 Ransomware
- 49.2 Botnets
- 49.3 Covert Channel Trojans
- 49.4 Banking Trojans
- 49.5 Rootkits
- Module 50 – CEH v11 Creating Malware
- 50.1 Other Malware
- 50.2 Malware Makers
- 50.3 Dropper and Stage Creation
- 50.4 Exploit Kits
- Module 51 – CEH v11 Detecting Malware
- 51.1 Malware Detection
- 51.2 Malware Detection Part 2
- 51.3 Malware Analysis
- Module 52 – CEH v11 Defending Against Malware
- 52.1 Malware Reverse Engineering
- 52.2 Malware Countermeasures
- 52.3 Malware Penetration Testing
- 52.4 Review
- Module 53 – CEH v11 Sniffing
- 53.1 Sniffing Concepts
- 53.2 Types of Sniffing
- 53.3 Sniffing Protocols
- 53.4 Sniffing Tools
- Module 54 – CEH v11 Spoofing and MITM
- 54.1 ARP
- 54.2 ARP Spoofing
- 54.3 MITM
- 54.4 MAC Attacks
- 54.5 MAC Spoofing
- 54.6 DHCP Attacks
- Module 55 – CEH v11 Defending Against Poisoning and Sniffing
- 55.1 Name Resolution Poisoning
- 55.2 VLAN Hopping
- 55.3 Sniffing Counter Measures
- 55.4 Sniffing Penetration Testing
- 55.5 Review
- Module 56 – CEH v11 Social Engineering
- 56.1 Social Engineering Concepts
- 56.2 Social Engineering Techniques
- 56.3 Social Engineering Examples
- 56.4 Social Engineering Tools
- Module 57 – CEH v11 Defending Against Social Engineering
- 57.1 Social Media
- 57.2 Identity Theft
- 57.3 Insider Threats
- 57.4 Social Engineering Countermeasures
- 57.5 Social Engineering Penetration Testing
- 57.6 Review
- Module 58 – CEH v11 Denial-of-Service
- 58.1 DoS-DDoS Concepts
- 58.2 Volumetric Attacks
- 58.3 Fragmentation Attacks
- 58.4 State Exhaustion Attacks
- 58.5 Application Layer Attacks
- Module 59 – CEH v11 Advanced DoS Attacks
- 59.1 Protocol Attacks
- 59.2 Other Attacks
- 59.3 Botnets
- Module 60 – CEH v11 Defending Against Denial-of-Service
- 60.1 DoS-DDoS Attack Tools
- 60.2 DoS-DDoS Countermeasures
- 60.3 DoS Penetration Testing
- 60.4 Review
- Module 61 – CEH v11 Advanced Ethical Hacker Course Intro
- 61.1 About This Course: Advanced Ethical Hacker
- 61.2 About the Instructor
- Module 62 – CEH v11 Session Hijacking
- 62.1 Session Hijacking Concepts
- 62.2 Token-based Authentication
- 62.3 Compromising a Session Token
- 62.4 XSS
- 62.5 CSRF
- 62.6 Other Attacks
- Module 63 – CEH v11 Defending Against Hijacking
- 63.1 Network Level Hijacking
- 63.2 Session Hijacking Tools
- 63.3 Session Hijacking Countermeasures
- 63.4 Session Penetration Hijacking
- 63.5 Review
- Module 64 – CEH v11 Implementing Intrusion Detection
- 64.1 IDS-IPS
- 64.2 Snort
- 64.3 Snort Rules
- 64.4 Syslog
- Module 65 – CEH v11 Testing Intrusion Detection
- 65.1 WIPS
- 65.2 IDS Considerations
- 65.3 IDS Tools
- 65.4 IDS Evasion
- 65.5 IDS-Firewall Evasion Tools
- 65.6 IDS Scenarios
- Module 66 – CEH v11 Implementing Firewalls
- 66.1 Firewalls
- 66.2 Packet Filtering Rules
- 66.3 Firewall Deployments
- 66.4 Traffic Flow through Firewalls
- 66.5 Split DNS
- Module 67 – CEH v11 Testing Firewalls
- 67.1 Firewall Tools
- 67.2 Firewall Evasion
- 67.3 Firewall Scenarios
- Module 68 – CEH v11 Implementing Honeypots
- 68.1 Honeypots
- 68.2 Honeypot Detection
- 68.3 IDS-Firewall Evasion Countermeasures
- 68.4 IDS-Firewall Honeypot Penetration Testing
- 68.5 Review
- Module 69 – CEH v11 Attacker Webserver
- 69.1 Webserver Security Overview
- 69.2 Common Webservers
- 69.3 Webserver Attacks
- 69.4 Misconfiguration Attack Examples
- Module 70 – CEH v11 Webserver Defense
- 70.1 Webserver Attack Tools
- 70.2 Attack Countermeasures
- 70.3 Webserver Penetration Testing
- 70.4 Review
- Module 71 – CEH v11 Intro To Web Apps
- 71.1 Web Application Concepts
- 71.2 Attacking Web Apps
- Module 72 – CEH v11 OWASP Top 5 Web App Vulnerabilities
- 72.1 A01 – Broken Access Control
- 72.2 A02 – Cryptographic Failures
- 72.3 A03 – Injection
- 72.4 A04 – Insecure Design
- 72.5 A05 – Security Misconfiguration
- Module 73 – CEH v11 OWASP Additional Web App Vulnerabilities
- 73.1 A06 – Vulnerable and Outdated Components
- 73.2 A07 – Identification and Authentication Failures
- 73.3 A08 – Software and Data Integrity Failures
- 73.4 A09 – Security Logging and Monitoring
- 73.5 A10 – Server Side Request Forgery
- Module 74 – CEH v11 Common Web App Attacks
- 74.1 XSS Attacks
- 74.2 CSRF
- 74.3 Parameter Tampering
- 74.4 Clickjacking
- 74.5 SQL Injection
- Module 75 – CEH v11 Unauthorized Access Through Web Apps
- 75.1 Insecure Deserialization Attacks
- 75.2 IDOR
- 75.3 Directory Traversal
- 75.4 Session Management Attacks
- 75.5 Response Splitting
- Module 76 – CEH v11 Web App Overflow Attacks
- 76.1 Denial of Service
- 76.2 Overflow Attacks
- 76.3 XXE Attacks
- 76.4 SOAP Attacks
- 76.5 AJAX Attacks
- Module 77 – CEH v11 Defending Web Apps
- 77.1 Web App Hacking Tools
- 77.2 Web Hacking Countermeasures
- 77.3 Web Application Penetration Testing
- 77.4 Review
- Module 78 – CEH v11 Intro To SQL Injection
- 78.1 SQL Overview
- 78.2 SQL Injection Concepts
- 78.3 Basic SQL Injection
- Module 79 – CEH v11 Performing SQL Injection
- 79.1 Finding Vulnerable Websites
- 79.2 Error-based SQL Injection
- 79.3 Union SQL Injection
- 79.4 Blind SQL Injection
- 79.5 SQL Injection Scenarios
- 79.6 Evading Detection
- Module 80 – CEH v11 Defending Against SQL Injection
- 80.1 SQL Injection Tools
- 80.2 SQL Injection Countermeasures
- 80.3 Safe Coding Examples
- 80.4 SQL Wildcards
- 80.5 SQL Injection Penetration Testing
- 80.6 Review
- Module 81 – CEH v11 Wireless Networking Overview
- 81.1 Wireless Concepts
- 81.2 Wireless Signal Encoding
- 81.3 Wi-Fi Standards
- 81.4 Wi-Fi Antennas
- 81.5 Wireless Authentication
- Module 82 – CEH v11 Wi-Fi Security
- 82.1 Wi-Fi Security Standards
- 82.2 Wireless Network Troubleshooting Tools
- 82.3 Wi-Fi Discovery Tools
- 82.4 Sniffing Wi-Fi
- Module 83 – CEH v11 Hacking Wi-Fi
- 83.1 Wi-Fi Attack Types
- 83.2 Rogue Access Point Attacks
- 83.3 Wi-Fi Denial of Service Attacks
- 83.4 Wi-Fi Password Cracking Attacks
- 83.5 WEP Cracking
- Module 84 – CEH v11 Advanced Wireless Attacks
- 84.1 WPA-WPA2 Cracking
- 84.2 WPA3 Attacks
- 84.3 WPS Cracking
- 84.4 Wi-Fi Attack Tools for Mobile Devices
- 84.5 Bluetooth Hacking
- 84.6 Other Wireless Hacking
- Module 85 – CEH v11 Defending Wireless Networks
- 85.1 Wireless Hacking Countermeasures
- 85.2 Wireless Security Tools
- 85.3 Wireless Penetration Testing
- 85.4 Review
- Module 86 – CEH v11 Mobile Platform Overview
- 86.1 Mobile Platform Overview
- 86.2 Mobile Device Vulnerabilities
- 86.3 Mobile Device Attacks
- Module 87 – CEH v11 Hacking Android
- 87.1 Android
- 87.2 Android Vulnerabilities
- 87.3 Rooting Android
- 87.4 Android Exploits
- 87.5 Android Hacking Tools
- 87.6 Reverse Engineering an Android App
- 87.7 Securing Android
- Module 88 – CEH v11 Hacking iOS
- 88.1 iOS
- 88.2 iOS Vulnerabilities
- 88.3 Jailbreaking iOS
- 88.4 iOS Exploits
- 88.5 iOS Hacking Tools
- 88.6 Securing iOS
- Module 89 – CEH v11 Mobile Platform Defense
- 89.1 Mobile Device Management
- 89.2 BYOD
- 89.3 Mobile Security Guidelines and Tools
- 89.4 Mobile Device Penetration Testing
- 89.5 Review
- Module 90 – CEH v11 IoT Hacking
- 90.1 IoT Concepts
- 90.2 IoT Infrastructure
- 90.3 Fog Computing
- 90.4 IoT Vulnerabilities
- 90.5 IoT Threats
- Module 91 – CEH v11 IoT Defense
- 91.1 IoT Hacking Methodologies and Tools
- 91.2 IoT Hacking Methodologies and Tools Part 2
- 91.3 Hacking Countermeasures
- 91.4 IoT Penetration Testing
- 91.5 OT Concepts
- 91.6 Industrial IoT
- Module 92 – CEH v11 Operational Technology Overview
- 92.1 IT-OT Convergence
- 92.2 ICS
- 92.3 SCADA
- 92.4 DCS
- 92.5 RTU
- 92.6 PLC
- 92.7 Additional OT Components
- Module 93 – CEH v11 Hacking OT
- 93.1 OT Variables
- 93.2 Well-known OT attacks
- 93.3 OT Attack Methodology and Basic Tools
- 93.4 OT Reconnaissance
- 93.5 OT Penetration and Control
- Module 94 – CEH v11 Defending OT
- 94.1 OT Attack Tools
- 94.2 OT Hacking Countermeasures
- 94.3 OT Penetration Testing
- 94.4 Review
- Module 95 – CEH v11 Attacking The Cloud
- 95.1 Cloud Computing Concepts
- 95.2 Virtualization
- 95.3 Cloud Types
- 95.4 Cloud Benefits and Considerations
- 95.5 Cloud Risks and Vulnerabilities
- Module 96 – CEH v11 Cloud Defense
- 96.1 Cloud Threats and Countermeasures
- 96.2 Cloud Security Tools
- 96.3 Cloud Security Best Practices
- 96.4 Cloud Penetration Testing
- 96.5 Review
- Module 97 – CEH v11 Cryptography Overview
- 97.1 Cryptography Concepts
- 97.2 Symmetric Encryption
- 97.3 Asymmetric Encryption
- 97.4 Public Key Exchange
- 97.5 PKI
- Module 98 – CEH v11 Protecting Data With Cryptography
- 98.1 Digital Certificates
- 98.2 Digital Signatures
- 98.3 Hashing
- 98.4 Email Encryption
- 98.5 Network Communication Encryption
- Module 99 – CEH v11 Protecting Data at Home and in Transit
- 99.1 Disk Encryption
- 99.2 VPN Encryption
- 99.3 Cryptography Tools
- Module 100 – CEH v11 Pentesting Cryptography
- 100.1 Cryptography Attacks
- 100.2 Cryptography Penetration Testing
- 100.3 Review
- 100.4 Conclusion
- Module 1 – Introduction To Ethical Hacking
- 1.0 Introduction to CEH v12
- 1.1 Elements of Security
- 1.2 Cyber Kill Chain
- 1.3 MITRE ATT&CK Framework
- 1.3.1 Activity – Researching the MITRE ATTACK Framework
- 1.4 Hacking
- 1.5 Ethical Hacking
- 1.6 Information Assurance
- 1.7 Risk Management
- 1.8 Incident Management
- 1.9 Information Security Laws and Standards
- 1.10 Introduction to Ethical Hacking Review
- Module 2 – Footprinting and Reconnaissance
- 2.1 Footprinting Concepts
- 2.2 OSINT Tools
- 2.2.1 Activity – Conduct OSINT with OSR Framework
- 2.2.2 Activity – OSINT with theHarvester
- 2.2.3 Activity – Add API Keys to theHarvester
- 2.2.4 Activity – Extract Document Metadata with FOCA
- 2.2.5 Activity – Extract Document Metadata with FOCA
- 2.3 Advanced Google Search
- 2.3.1 Activity – Google Hacking
- 2.4 Whois Footprinting
- 2.4.1 Activity – Conducting Whois Research
- 2.5 DNS Footprinting
- 2.5.1 Activity – Query DNS with NSLOOKUP
- 2.6 Website Footprinting
- 2.6.1 Activity – Fingerprint a Webserver with ID Serve
- 2.6.2 Activity – Extract Data from Websites
- 2.6.3 Activity – Mirror a Website with HTTrack
- 2.7 Email Footprinting
- 2.7.1 Activity – Trace a Suspicious Email
- 2.8 Network Footprinting
- 2.9 Social Network Footprinting
- 2.10 Countermeasures
- 2.11 Review
- Module 3 – Scanning Networks
- 3.1 Scanning Concepts
- 3.2 Discovery Scans
- 3.2.1 Activity – ICMP ECHO and ARP Pings
- 3.2.2 Activity – Host Discovery with Angry IP Scanner
- 3.3 Port Scans
- 3.3.1 Activity – Port Scan with Angry IP Scanner
- 3.4 Other Scan Types
- 3.5 Scanning Tools
- 3.5.1 Activity – Hping3 Packet Crafting
- 3.5.2 Activity – Fingerprinting with Zenmap
- 3.6 NMAP
- 3.6.1 Activity – Nmap Basic Scans
- 3.6.2 Activity – Host Discovery with Nmap
- 3.6.3 Activity – Nmap Version Detection
- 3.6.4 Activity – Nmap Idle (Zombie) Scan
- 3.6.5 Activity – Nmap FTP Bounce Scan
- 3.6.6 Activity – NMAP Scripts
- 3.7 Firewall and IDS Evasion
- 3.7.1 Activity – Nmap Advanced Scans
- 3.8 Proxies
- 3.9 Countermeasures
- 3.10 Review
- Module 4 – Enumeration
- 4.1 Overview
- 4.2 SMB/NetBIOS Enumeration
- 4.2.1 Activity – Enumerate NetBIOS Information with Hyena
- 4.3 File Transfer Enumeration
- 4.4 WMI Enumeration
- 4.4.1 Activity – Enumerating WMI with Hyena
- 4.5 SNMP Enumeration
- 4.5.1 Activity – Enumerate with SoftPerfect
- 4.6 LDAP Enumeration
- 4.7 DNS Enumeration
- 4.8 SMTP Enumeration
- 4.8.1 Activity – Enumerate Email Users
- 4.9 Remote Connection Enumeration
- 4.10 Website Enumeration
- 4.10.1 Activity – DirBuster
- 4.11 Other Types
- 4.12 Countermeasures & Review
- Module 5 – Vulnerability Analysis
- 5.1 Vulnerability Scanning
- 5.1.1 OpenVAS Activity
- 5.2 Vulnerability Assessment
- 5.3 Review
- 5.1 Vulnerability Scanning
- Module 6 – System Hacking
- 6.1 Concepts
- 6.2 OS Exploits
- 6.3 Buffer Overflows
- 6.3.1 Activity
- 6.4 Tools & Frameworks
- 6.4.1 Linux Target Hack Activity
- 6.5 Metasploit
- 6.5.1 Activity
- 6.6 Meterpreter
- 6.7 Keylogging
- 6.7.1 Activity
- 6.8 Netcat
- 6.8.1 Activity
- 6.9 Windows Hacking
- 6.9.1 Eternal Blue Activity
- 6.10 Linux Hacking
- 6.11 Password Attacks
- 6.11.1 Pass the Hash
- 6.11.2 Password Spraying
- 6.12 Password Cracking Tools
- 6.13 Windows Password Cracking
- 6.13.1 Hashcat Activity
- 6.14 Linux Password Cracking
- 6.15 Other Methods
- 6.16 Network Attacks
- 6.16.1 Medusa Activity
- 6.17 Post Exploitation
- 6.18 Pivoting
- 6.19 Persistence
- 6.20 Hiding Data
- 6.21 Covering Tracks
- 6.22 Countermeasures
- 6.23 Review
- Module 7 – Malware Threats
- 7.1 Overview
- 7.2 Viruses
- 7.3 Trojans
- 7.3.1 RAT Activity
- 7.4 Rootkits
- 7.5 APT
- 7.6 Malware Makers
- 7.7.1 Dropper Activity
- 7.8 Detection
- 7.9 Analysis
- 7.10 Countermeasures
- Module 8 – Sniffing
- 8.1 Concepts
- 8.2 Tools
- 8.2.1 Wireshark Activity
- 8.2.2 SMB Capture Activity
- 8.3 ARP Attacks
- 8.3.1 MITM Activity
- 8.4 Name Resolution Attacks
- 8.4.1 Responder Activity
- 8.5 Countermeasures
- Module 9 – Social Engineering
- 9.1 Concepts
- 9.2 Techniques
- 9.2.1 USB Attack
- 9.2.2 O.MG Cable
- 9.3 Phishing Activity
- 9.4 Identity Theft
- 9.5 Countermeasures
- Module 10 – DoS
- 10.1 Concepts
- 10.2 Attacks
- 10.5.1 LOIC
- 10.5.2 HOIC
- 10.5.3 Slowloris
- 10.6 Countermeasures
- Lesson 1
- Lesson 2
- Lesson 3
- Lesson 4
- Lesson 5
- Lesson 6
- Lesson 7
- Module 1: Security and Risk Management
- Module 2: Asset Security
- Module 3: Security Engineering
- Module 4: Communication and Network Security
- Module 5: Identity and Access Management
- Module 6: Security Assessment Testing
- Module 7: Security Operations
- Module 8: Software Development Security
- Module 1: Security and Risk Management
- Module 2: Asset Security
- Module 3: Security Architecture and Engineering
- Module 4: Communication and Network Security
- Module 5: Identity and Access Management (IAM)
- Module 6: Security Assessment and Testing
- Module 7: Security Operations
- Module 8: Software Development Security
- Module 1: Computer Forensics Introduction
- Module 2: Forensics Investigation Process
- Module 3: Searching and Seizing
- Module 4: Digital Evidence
- Module 5: First Responder Procedures
- Module 6: Forensics Lab
- Module 7: Hard Disks and File Systems
- Module 8: Windows Forensics
- Module 9: Data Acquisition and Duplication
- Module 10: Recovering Deleted Files and Partitions
- Module 11: Using Access Data FTK
- Module 12: Using EnCase
- Module 13: Steganography
- Module 14: Password Crackers
- Module 15: Log Correlation
- Module 16: Network Forensics
- Module 17: Wireless Attacks
- Module 18: Web Attacks
- Module 19: Email Crimes
- Module 20: Mobile Investigation
- Module 21: Investigative Reports
- Module 22: Expert Witness
- Module 1: Cyber Security Awareness and Prevention
- Module 2: Managing Mobile Device Security
- Module 1: Data Breaches And ID Theft
- Module 2: Device Security Basics
- Module 3: Avoiding Inadvertent Disclosure
- Module 4: Physical And Technical Safeguards
Agile
- Module 1: What Is Agile
- Module 2: Projects And Project Management In An Agile World
- Module 3: Agile and Scrum
- Module 4: Common Scrum Terminology
- Module 5: Other Iterative Methods
- Module 6: Communication Skills In Agile World
- Module 7: Using Agile Outside Software Development
- Module 8: Case Studies Of Transitioning to Agile
- Module 9: Critique Of Agile
- Module 10: Review Of Agile
- Module 1: Agile Principles and Mindset
- Module 2: Value Driven Delivery
- Module 3: Stakeholder Engagement
- Module 4: Team Performance
- Module 5: Adaptive Planning
- Module 6: Problem Detection and Resolution
- Module 7: Continuous Improvement
- Module 1: Agile Principles and Mindset
- Module 2: Value Driven Delivery
- Module 3: Stakeholder Engagement
- Module 4: Team Performance
- Module 5: Adaptive Planning
- Module 6: Problem Detection and Resolution
- Module 7: Continuous Improvement
Cloud
- Module 1: Architecture
- Module 2: Governance and Enterprise Risk
- Module 3: Legal Issues - Contracts and Electronic
- Module 4: Compliance and Audit Management
- Module 5: Information Management and Data Security
- Module 6: Interoperability and Portability
- Module 7: Traditional Security, Business Continuity, and Disaster Recovery
- Module 8: Data Center Operations
- Module 9: Incident Response
- Module 10: Application Security
- Module 11: Encryption and Key Management
- Module 12: Identity, Entitlement, and Access Management
- Module 13: Virtualization
- Module 14: Security as a Service
- Module 1: The principles of CC
- Module 2: Implementing and Managing CC
- Module 3: Using the Cloud
- Module 4: Security and Compliance
- Module 5: Evaluation of CC
Java
- Module 1: Foundations (Beginner)
- Module 2: Terms and Tools (Beginner)
- Module 3: Identifiers, Variables, and Data Types (Beginner)
- Module 4: Object-Orientated Programming (Intermediate)
- Module 5: Predefined Classes (Intermediate)
- Module 6: Methods Part 1 (Intermediate)
- Module 7: Methods Part 2 (Advanced)
- Module 8: Constructors (Advanced)
- Module 9: Control of Flow (Advanced)
- Module 10: Arrays and Exceptions (Advanced)
- Module 1: Introduction To Javascript
- Module 2: Core Concepts And Syntax
- Module 3: Getting A Handle On The DOM
- Module 4: Working With Libraries
ITIL
- Module 1: The ITIL Qualification Scheme
- Module 2: Introduction to Service Management
- Module 3: ITIL and the Service Lifecycle
- Module 4: Service Strategy
- Module 5: Service Design
- Module 6: Service Transition
- Module 7: Service Operation
- Module 8: Continual Service Improvement
- Module 9: Service Management Technology
- Module 10: How it all Fits Together
- Module 11: Bonus Material
- Module 1: Service Operation Introduction
- Module 2: Service Management As a Practice
- Module 3: Service Operation Principles
- Module 4: Service Operation Process
- Module 5: Common Service Operation Activities
- Module 6: Organizing For Service Operation
- Module 7: Technology Considerations
- Module 8: Service Operation
ORACLE
- Module 1: Introduction To Oracle 12c SQL Fundamentals
- Module 2: Retrieving Data
- Module 3: SQL Functions
- Module 4: Subqueries
- Module 5: Data Manipulation Language
- Module 6: Data Control Language
- Module 7: Data Definition Language
- Module 8: Combining Queries
- Module 9: Oracle 12C SQL Fundamentals Review
- Module 1: Database Concepts And Tools
- Module 2: Memory Structure
- Module 3: Tables
- Module 4: Indexes
- Module 5: Constraints And Triggers
- Module 6: Users
- Module 7: Internal Structures
- Module 8: Starting Up and Shutting Down Database
- Module 9: Critical Storage Files
- Module 10: Data Manipulation Language
- Module 11: Data Concurrency
- Module 12: BackUp And Recovery
- Module 13: Installation
- Module 14: Course Review
- Module 1: Database Administration
- Module 2: Oracle Architecture
- Module 3: Database Schema
- Module 4: Recovery Manager
- Module 5: Introduction to SQL
- Module 6: Filtering and Sorting Data
- Module 7: Functions
- Module 8: SET Operators and Subqueries
- Module 9: Regular Expressions and SQL Loader
Office
- Module 1: Introduction to Cloud Concepts
- Module 1.1: Course Introduction
- Module 1.2: Introduction to Cloud Computing
- Module 1.3: Microsoft SaaS, PaaS, IaaS Offerings
- Module 1.4: Cloud, Hybrid, On-Premises Models – Benefits and Considerations
- Module 1.5: Exploring Public, Private and Hybrid Cloud Models
- Module 1.6: Cost Benefit of Cloud Solutions
- Module 1.7: The Hybrid Work and Flexible Work Concept
- Module 1.8: Introducing Microsoft Co-Pilot
- Module 1.9: Microsoft 365 Tenant
- Module 2: Microsoft 365 Apps and Services
- Module 2.1: Core Productivity Solutions
- Module 2.2: Work Management in Microsoft 365
- Module 2.3: Collaboration Solutions
- Module 2.4: Microsoft Teams and Teams Phone Deep Dive
- Module 2.5: Extending Teams with Collaborative Apps
- Module 2.6: Endpoint Management with Microsoft Intune
- Module 2.7: Windows 365 vs. Azure Virtual Desktop
- Module 2.8: Deployment and Update Channels for Microsoft 365
- Module 2.9: Analytics in Microsoft 365 – Viva I
- Module 3: Security, Compliance, Privacy, and Trust in Microsoft 365
- Module 3.1: Identity and Access Management with Microsoft Entra
- Module 3.2: Threat Protection – Defender Suite Overview
- Module 3.3: Zero Trust Model and Compliance Solutions
- Module 3.4: Information Protection and Data Residency
- Module 4: Microsoft 365 Pricing, Licensing, and Support
- Module 4.1: Understanding Microsoft 365 Pricing and Billing
- Module 4.2: Licensing Options and Management
- Module 4.3: Microsoft 365 Support, SLAs and Monitoring Service
- Module 4.4: Microsoft 365 Fundamentals Course Closeout
- Module 1: What Is Microsoft 365
- Module 2: Word Online
- Module 3: Excel Online
- Module 4: PowerPoint Online
- Module 5: Outlook Online
- Module 6: OneNote Online
- Module 1: Beginner
- Module 2: Intermediate
- Module 3: Advanced
- Module 1: Beginner
- Module 2: Intermediate
- Module 3: Advanced
- Word 2016 Basic
- Word 2016 Advanced
- Word 2016 Basic
- Word 2016 Advanced
- Basic Microsoft PowerPoint 2016
- Intermediate Microsoft PowerPoint 2016
- Advanced Microsoft PowerPoint 2016
- Outlook 2016 Basic
- Outlook 2016 Intermediate
- Outlook 2016 Advanced
- Access 2016 Basic
- Access 2016 Intermediate
- Access 2016 Advanced
- Word 2013 Basic
- Word 2013 Intermediate
- Word 2013 Advanced
- Excel 2013 Basic
- Excel 2013 Intermediate
- Excel 2013 Advanced
- PowerPoint 2013 Basic
- PowerPoint 2013 Intermediate
- PowerPoint 2013 Advanced
- Outlook 2013 Basic
- Outlook 2013 Intermediate
- Outlook 2013 Advanced
- Access 2013 Introduction
- Access 2013 Intermediate
- Access 2013 Advanced
- Word 2010 Basic
- Word 2010 Intermediate
- Word 2010 Advanced
- Excel 2010 Basic
- Excel 2010 Intermediate
- Excel 2010 Advanced
- PowerPoint 2010 Basic
- PowerPoint 2010 Intermediate
- PowerPoint 2010 Advanced
- Outlook 2010 Basic
- Outlook 2010 Intermediate
- Outlook 2010 Advanced
- Access 2010 Basic
- Access 2010 Intermediate
- Access 2010 Advanced
Project Management
- Module 1 – Preparing For and Taking the Exam
- 1.1 What’s New for CAPM in V7
- 1.2 CAPM Certification Overview
- 1.3 CAPM Exam Overview
- 1.4 Mastering the CAPM 7th Edition Exam Tips for Success
- 1.5 Maintaining Your CAPM Certification A Practical Guide
- Module 2 – Project Management Fundamentals and Core Concepts
- 2.1 Project Life Cycles and Processes
- 2.2 Project Management Planning Activities
- 2.3 Project Roles and Responsibilities
- 2.4 Following and Executing Planned Strategies and Frameworks
- 2.5 Common Problem-Solving Tools and Techniques
- Module 3 – Predictive/Plan Based Methodologies
- 3.1 When to Use Predictive Approaches in Project Management
- 3.2 Understanding the Project Management Plan Schedule
- 3.3 Project Controls for Predictive Projects
- Module 4 – Agile Frameworks and Methodologies
- 4.1 Suitability and Application of Adaptive Approaches
- 4.2 Planning Project Iterations
- 4.3 Project Controls for Adaptive Projects
- 4.4 Adaptive Methodologies and Their Components
- 4.5 Prioritization of Tasks in Adaptive Projects
- Module 5 – Business Analysis Frameworks
- 5.1 Business Analyst Roles and Responsibilities
- 5.2 Stakeholder Communication
- 5.3 Gathering Requirements for CAPM Certification
- 5.4 Product Roadmaps
- 5.5 How Project Methodologies Influence Business Analysis Processes
- 5.6 Validating Project Requirements Through Product Delivery
- 5.7 Wrapping Up Your CAPM Journey
- Module 1: Preparing for and Taking the PMI PMP v7 Exam
- 1.1 Preparing to Take the PMP v7 Exam From PMI
- 1.2 PMI PMP v7 Exam Characteristics
- 1.3 Test Taking Tips and Techniques for PMI PMP v7
- 1.4 Question Formats for PMI PMP v7
- 1.5 Post Certification Requirements for PMI PMP
- Module 2: Process Domain – PMI – PMP v7
- 2.1 What’s New in PMBOK 7
- 2.1.1 Performance Domains
- 2.2 Process Domain and Framework defined
- 2.3 Predictive, Iterative, Incremental and Adaptive Project Life Cycles
- 2.4 Framework Definitions
- 2.5 Project Manager Skills
- 2.6 Framework Key Points to Remember
- 2.6.1 Framework Key Points to Remember - Incorporating Agile
- 2.7 Framework Example Questions Review
- 2.8 Project Integration Management Knowledge Area Defined
- 2.9 Develop Project Charter and Develop Project Management Plan
- 2.10 Direct and Manage Project Work, Manage Project Knowledge, and Monitor and Control Project Work
- 2.11 Perform Integrated Change Control
- 2.12 Close Project or Phase
- 2.13 Integration Key Points to Remember
- 2.13.1 Integration Key Points to Remember – Incorporating Agile
- 2.14 Integration Example Questions Review
- 2.15 Project Scope Management Knowledge Area Defined
- 2.16 Plan Scope Management and Collect Requirements
- 2.17 Define Scope and Create WBS
- 2.18 Breakdown Structures used in WBS Dictionary
- 2.19 Validate Scope and Control Scope
- 2.20 Defining Requirements in Agile
- 2.21 Prioritizing requirements in Agile, Definition of Done and Rolling Wave Planning
- 2.22 Scope Key Points to Remember
- 2.22.1 Scope Key Points to Remember – Incorporating Agile
- 2.23 Scope Example Questions Review
- 2.24 Project Schedule Management Knowledge Area Defined
- 2.25 Plan Schedule Management, Define Activities, and Sequence Activities
- 2.26 Dependencies, Predecessors, Leads, and Lags
- 2.27 Estimate Activity Durations
- 2.28 Develop Schedule
- 2.29 Critical Path Method
- 2.30 Schedule Compression
- 2.31 Resource Leveling, Schedule Format, and Control Schedule
- 2.32 Agile Estimating
- 2.33 Agile Schedule Planning and Reporting
- 2.34 Schedule Key Points to Remember and Example Question Review
- 2.35 Project Cost Management Knowledge Area Defined
- 2.36 Plan Cost Management and Estimate Cost
- 2.37 Types of Cost, Expected Present Value, Sunk Costs, and Depreciation
- 2.38 Life Cycle Costing, Status Reporting, and Determine Budget
- 2.39 Control Costs, and Earned Value Management
- 2.40 Earned Schedule, and Agile Cost Control
- 2.41 Cost Key Points to Remember
- 2.41.1 Cost Key Points to Remember – Incorporating Agile
- 2.42 Cost Example Questions Review
- 2.43 Project Quality Management Knowledge Area Defined
- 2.44 Plan Quality Management
- 2.45 Manage Quality
- 2.46 Control Quality
- 2.47 Continuous Improvement in Agile-Adaptive Life Cycles – Kaizen and Process Analysis
- 2.48 Continuous Improvement in Agile-Adaptive Life Cycles – Retrospectives
- 2.49 Quality Key Points to Remember
- 2.49.1 Quality Key Points to Remember – Incorporating Agile
- 2.50 Quality Example Questions Review
- 2.51 Project Risk Management Knowledge Area Defined
- 2.52 Risk Management Plan and Identify Risks
- 2.53 Risk Register and Issues Vs Risk
- 2.54 Perform Qualitative and Quantitative Risk Analysis
- 2.55 Plan Risk Responses
- 2.56 Implement Risk Responses and Monitor Risks
- 2.57 Agile Risk Tools and Risk Key Points to Remember
- 2.57.1 Agile Risk Tools and Risk Key Points to Remember – Incorporating Agile
- 2.58 Risk Example Questions Review
- 2.59 Project Procurement Management Knowledge Area Defined
- 2.60 Plan Procurement Management and Conduct Procurements
- 2.61 Contracts
- 2.62 Share and Point of Total Assumption
- 2.63 Procurement Documents
- 2.64 Non-Competitive Awards and Control Procurements
- 2.65 Agile Contracts
- 2.66 Procurement Key Points to Remember and Example Questions Review
- 2.66.1 Procurement Key Points to Remember – Incorporating Agile
- Module 3: People Domain – PMI – PMP v7
- 3.1 People Domain and Project Communications Management Knowledge Area Defined
- 3.2 Plan Communications Management
- 3.3 Manage and Monitor Communications
- 3.4 Agile Communications
- 3.5 Communications Key Points to Remember
- 3.6 Communications Example Question Review
- 3.7 Project Stakeholder Management Knowledge Area Defined
- 3.8 Stakeholder Position Descriptions
- 3.9 Identify Stakeholders
- 3.9.1 Identify Stakeholders – Incorporating Agile
- 3.10 Plan Stakeholder Engagement and Manage Stakeholder Engagement
- 3.11 Monitor Stakeholder Engagement and Agile Stakeholder Engagement Techniques
- 3.12 Stakeholder Management Key Points to Remember
- 3.12.1 Stakeholder Management Key Points to Remember – Incorporating Agile
- 3.13 Stakeholder Management Example Question Review
- 3.14 Resource Management Knowledge Area Defined
- 3.15 Plan Resource Management and Estimate Activity Resources
- 3.16 Acquire Resources and Develop Team
- 3.17 Manage Team
- 3.17.1 Manage Team – Focus on Servant Leadership
- 3.18 Control Resources and Agile Teaming Concepts
- 3.19 Other Agile Teaming Concepts
- 3.20 Agile team roles and challenges
- 3.21 Resources Key Points to Remember
- 3.22 Resources Example Question Review
- Module 4: Business Environment Domain – PMI – PMP v7
- 4.1 Business Environment Domain Defined
- 4.1.1 Business Environment Domain Defined – Focus on Organization Change Management
- 4.2 Project Selection Tools
- 4.3 PMO, Organizational Structure, and Reports
- 4.3.1 PMO, Organizational Structure and Reports – Matching PMO’s to PMBOK Terms
- 4.4 Agile in the Business Environment
- 4.5 Business Environment Key Points to Remember and Example Question Review
- 4.6 Course Closing
- Module 1 – Course Introduction and Overview
- Module 1.1 – Welcome and Course Objectives
- Module 1.2 – Introduction to PMBOK 7 Principles
- Module 1.3 – Defining Project Management & Your Role
- Module 2 – Project Scope, Estimating and Planning
- Module 2.1 – Defining the Project Scope
- Module 2.2 – Project Estimating Techniques
- Module 2.3 – Project Planning – Techniques and Task Breakdown
- Module 2.4 – Scheduling and Resource Management
- Module 3 – Effective Communication and Stakeholder Management
- Module 3.1 – Communication Planning
- Module 3.2 – Stakeholder Management
- Module 3.3 – Team Collaboration
- Module 4 – Risk Management and Adaptability
- Module 4.1 – Introduction to Risk Management
- Module 4.2 – Risk Identification and Analysis
- Module 4.3 – Risk Response Planning
- Module 5 – Project Execution and Control
- Module 5.1 – Project Execution and Control
- Module 5.2 – Monitoring and Controlling the Project
- Module 6 – Project Tools and Techniques
- Module 6.1 – Using Project Management Tools
- Module 6.2 – Tools for Different Methodologies
- Module 7 – Closing the Project
- Module 7.1 – Project Closure
- Module 7.2 – Post Project Evaluations
- Module 1: Preparing for and Taking the Exam
- Module 2: Process Domain
- Module 3: People Domain
- Module 4: Business Environment Domain
- Module 1 : Getting Certified to take the Examination
- Module 2 : Techniques for Preparing for and Taking the Examination
- Module 3 : Project Management Framework
- Module 4 : Project Integration Management
- Module 5 : Project Scope Management
- Module 6 : Project Schedule Management
- Module 7 : Project Cost Management
- Module 8 : Project Quality Management
- Module 9 : Project Resource Management
- Module 10 : Project Communications Management
- Module 11 : Project Risk Management
- Module 12 : Project Procurement Management
- Module 13 : Project Stakeholder Management
- Module 1: Introduction
- Module 2: Risk Management Concepts
- Module 3: Risk Management Environment
- Module 4: Project Definition
- Module 5: Risk Management Planning
- Module 6: Risk Identification
- Module 7: Qualitative Risk Analysis
- Module 8: Quantitative Risk Analysis
- Module 9: Risk Response Planning
- Module 10: Risk Monitoring And Controlling
- Module 1: Risk Management Fundamentals
- Module 2: Test Requirements
- Module 3: Test Domains
- Module 4: Risk Strategy and Planning
- Module 5: Stakeholder Engagement
- Module 6: Risk Process Facilitation
- Module 7: Risk Monitoring and Reporting
- Module 8: Specialized Risk Analyses
- Module 9: RMP Recap
- Module 10: RMP Review Questions
- Module 1 : Getting Certified to take the Examination
- Module 2 : Project Management Framework
- Module 3 : Project Integration Management
- Module 4 : Project Scope Management
- Module 5 : Project Schedule Management
- Module 6 : Project Cost Management
- Module 7 : Project Quality Management
- Module 8 : Project Resource Management
- Module 9 : Project Communications Management
- Module 10 : Project Risk Management
- Module 11 : Project Procurement Management
- Module 12 : Project Stakeholder Management
- Module 13 : Review
Scrum
- Module 1: Development Methods
- Module 2: Agile Manifesto Principles
- Module 3: Scrum
- Module 4: Why Scrum
- Module 5: Scrum-Roles Overview
- Module 6: Product Owner
- Module 7: Scrum Master
- Module 8: Scrum Team
- Module 9: Scrum Process
- Module 10: Scrum Project Phase
- Module 11: Plan and Estimate
- Module 12: Implement
- Module 13: Review and Retrospect
- Module 14: Release
- Module 15: Project Vision
- Module 16: Scrum Master and Stake Holder(s)
- Module 17: Form Scrum Team
- Module 18: Develop Epics
- Module 19: User Stories
- Module 20: Justifications and Sample Change(s)
- Module 21: Creating a Prioritized Backlog
- Module 22: Conduct Release Planning
- Module 23: Sprints
- Module 24: Scrum Framework
- Module 25: Scrum of Scrums
- Module 26: Scrum Demo
- Module 27: Review
- Module 1: Development Methods
- Module 2: Agile Manifesto Principles
- Module 3: Scrum
- Module 4: Why Scrum
- Module 5: Scrum-Roles Overview
- Module 6: Product Owner
- Module 7: Scrum Master
- Module 8: Scrum Team
- Module 9: Scrum Process
- Module 10: Scrum Project Phase
- Module 11: Plan and Estimate
- Module 12: Implement
- Module 13: Review and Retrospect
- Module 14: Release
- Module 15: Project Vision
- Module 17: Form Scrum Team
- Module 18: Develop Epics
- Module 19: User Stories
- Module 20: Justifications and Sample Change(s)
- Module 21: Creating a Prioritized Backlog
- Module 22: Conduct Release Planning
- Module 23: Sprints
- Module 24: Scrum Framework
- Module 25: Scrum of Scrums
- Module 26: Scrum Demo
- Module 27: Review
Social Media
- Module 1: Foundations of Digital Transformation for IT Leaders
- 1.1 Defining Digital Transformation in the IT Context
- 1.2 Key Drivers of Digital Change
- 1.3 Common Pitfalls and Misconceptions
- Module 2: Strategic Vision and Roadmap Development
- 2.1 Creating a Digital Transformation Vision
- 2.2 Building a Multi-Year Transformation Roadmap
- 2.3 Using Frameworks and Maturity Models
- Module 3: Technology Selection, Architecture, and Integration
- 3.1 Core Technologies Powering Digital Transformation
- 3.2 Designing a Scalable and Secure Architecture
- 3.3 Vendor Management and Technology Evaluation
- Module 4: Change Management and Cultural Shifts
- 4.1 Leading Through Organizational Resistance
- 4.2 Developing an Agile and Innovative Culture
- 4.3 IT Skill Development and Talent Strategy
- Module 5: Data, Automation, and Customer Experience
- 5.1 Data as a Digital Transformation Catalyst
- 5.2 Intelligent Automation and Business Process Transformation
- 5.3 Enabling Omnichannel Customer Experiences
- Module 6: Governance, Risk, and Compliance in Digital Initiatives
- 6.1 Establishing Governance Models for Transformation
- 6.2 Security and Privacy in a Transformed IT Landscape
- 6.3 Measuring and Managing IT Risk
- Module 7: Execution, Scaling, and Optimization
- 7.1 From Pilot to Enterprise-Scale Rollouts
- 7.2 IT Operating Models for the Digital Age
- 7.3 Continuous Improvement and Transformation Metrics
- 7.4 Final Reflections and Next Steps in Leading Digital Transformation
- Module 1: Understanding Social Networking in the Workplace
- 1.1 – What is Social Networking
- 1.2 – Why Social Networking is an Employment and Labor Law Issue
- Module 2: Social Networking and the Recruiting Process
- 2.1 – Social Networking in Recruitment
- 2.2 – Discrimination Risks in Social Networking-Based Recruitment
- 2.3 – Employer Strategies for Social Media Background Checks
- Module 3: Employees’ Social Networking Use, HR Concerns, and Potential Legal Issues
- 3.1 – On-Duty and Off-Duty Social Networking Behavior
- 3.2 – Handling Social Networking Issues Without Risking Discrimination
- 3.3 – Legal Consequences of Failing to Address Social Networking
- Module 4: Regulatory Views, Employee Rights, and State Laws
- 4.1 – NLRB Guidance on Employees’ Social Networking
- 4.2 – Privacy Rights of Employees on Social Networking Sites
- 4.3 – Overview of State Laws on Employer Access to Social Networking
- Module 5: Developing a Social Networking Policy
- 5.1 – Essentials of a Social Networking Policy
- 5.2 – Course Closeout, Key Takeaways and Final Thoughts
- Social Media Introduction
- Creating A Google Account
- Setting Up Your Twitter Account
- Getting Your Twitter House In Order
- Why Facebook For Your Business
- Using Facebook As A Business
- Setting Up Your Business Page
- Setting Your Cover Photo
- Tying It All Together
- Tip-Adding Admins In Facebook
- Adjusting Your Settings- Part 1
- Adjusting Your Settings- Part 2
- Adjusting Your Settings- Part 3
- Updating Your Page Info- Part 1
- Updating Your Page Info- Part 2
- Tips For Getting 25 Likes
- Using Facebook As Your Business Page
- What Kind Of Person Would Your Business Be
- How To Post To Facebook
- What To Post
- Sharing Posts
- Sharing Links
- Pinning And Highlighting With Posts
- Tips For Generating Traffic
- Getting Notifications And Staying In Clients News Feed
- Comment Moderation
- The Activity Log- Where Do Hidden Posts Go
- Scheduling Posts
- Intro To Facebook Advertising
- Setup Advertising Account
- Types Of Advertising On Facebook
- Ad Testing
- Choosing Our Audience-Location
- Choosing Our Audience-Age And Gender
- Choosing Our Audience-Precise Interests
- Choosing Our Audience-Broad Categories
- Choosing Our Audience-Connections
- Choosing Our Audience-Advanced Targeting Options
- Choosing Our Audience-Campaign And Budget
- Other Types Of Ads-Part 1
- Other Types Of Ads-Part 2
- Ad Campaign Manager-Part 1
- Ad Campaign Manager-Part 2
- Outside URLs
- Building Ad Text
- News Feed Format And Creating Your Audience
- Campaign Pricing And Schedule
- Ad Campaign Tracker
- Facebook Insights-Overview Intro
- Analyzing Page Posts
- Engaged Users
- Talking About This
- Virality
- Likes
- Reach
- Reach And Frequency
- Page Visits
- Talking About This
- Conclusion
- Introduction To LinkedIn
- Overview Of The Interface And Settings
- Open Link Settings
- LinkedIn Groups
- Adding And Removing Applications
- Basic Account Settings
- Updating Your Public Profile
- LinkedIn Connections Groups And Pages
- LinkedIn Channels And Today
- Advertising on LinkedIn
- Determine Your Goals
- Create Your Persona Or Voice
- Decide On Your Platforms
- Establishing A Social Media Manager
- Coordinate With Customer Service
- Create A Predetermined Crisis Management Plan
- Stick To The Script
- Building Relationships With The Media
- Find Your Evangelist
- Stay Informed Part 1
- Stay Informed Part 2
- Bitly
- Woobox Part 1
- Woobox Part 2
- HootSuite Part 1
- HootSuite Part 2
- Storify
- Social Media Rules And Tips
- Social Media Conclusion
- Tweetdeck-Boolean Search
- Introduction To Google Plus
- Overview Of The Interface
- Setting Up A Google Plus Page
- Linking Your Other Social Networks
- Linking Your Website To Your Google Plus Page
- Review Of Your Google Plus Dashboard
- Notification Settings For Google Plus
- Photo Settings In Google Plus
- Google Plus And YouTube
- YouTube Advanced Settings
- Interface For Uploaded Videos
- Sharing Videos Across Your Social Network
- Updating Your About Section
- Quick Recap Of Everything Covered So Far
- Overview Of Pinterest
- How Does Pinterest Relate To Your Business
- Industry Specific Sites
- The Uses of Pinterest
- Conclusion Of Pinterest
- Introduction to Reddit
- The Rules of Reddit
- Module 1.0 Introduction
- Module 2.0 Adjusting Your Facebook Settings
- Module 3.0 Posting on Facebook
- Module 4.0 Facebook Advertising
- Module 5.0 Facebook Insights
- Module 6.0 Facebook Analytics
- Module 7.0 Twitter
- Module 8.0 Pinterest
- Module 9.0 Reddit
- Module 10.0 Tumblr
- Module 11.0 LinkedIn
- Module 12.0 Google+ and Youtube
- Module 13.0 Best Practices
- Module 14.0 Additional Tools
- Module 1 Online Lead Generation
- Module 2 Facebook, LinkedIn, and YouTube 101
- Module 3 List Building & Email Marketing
- Module 4 Creating Social Media Content and Marketing Materials with Canva and other Apps
- Module 5 Sales Funnels
- Module 6 Apps & Tools Review
- Module 1: Social Media Marketing
- Module 2: Social Media Marketing
- Module 3: Social Media Marketing
- Tumblr Introduction
- Setting Up A Tumblr
- Dashboard
- Posting To Tumblr
- Testing Your Post
- URL Post
- Chat Post
- Audio On Tumblr
- Video On Tumblr
- Tumblr Conclusion
- Limiting the Number Of Actions
- Setting Your Twitter Preferences
- Finish Setting Up Your Profile
- Twitter Widgets
- Who To Follow
- Connect
- Bringing Followers From Facebook
- Intro To Hashtags
- Examples Of Hashtags
- Monitoring What’s Going On
- Using Twitter For Social Listening
- Hashtags Across Social Media