CALL (888) 887-8244
Free Consultation
Pricing
Blog
Contact
Login
Remote Work Essentials
Training Catalogs
Training Solutions
Self Paced Online Courses
Live Virtual Online Classes
My SkillSource Licensed Professional
Video & Task Based Online Training
eBooks & Manuals Online Training
eRegister Online Course Enrollment
Learner Management System
Online Training Services
Online Training Implementation Support
Online Training Branding & Customization
Training Competency Mapping
Custom Online Courses
Third Party Training Management Integration
Public Sector Training
Federal Government
State Government
Educational Institutions
About Enterprise Training
Our Approach
Company Overview
Community Involvement
Careers
Contact & Location
Case Studies
News & Articles
Course Syllabus
|
Print Syllabus
×
Browse All Information Technology Courses
Start Your Free Trial
Information Technology
SK - IT - Big Data - Apache
Apache Hadoop
Apache Solr – Deployment and Configuration
Apache Solr - Query and Data Management
Apache Spark SQL
Apache Storm Introduction - API and Topology
Apache Storm Introduction – Architecture and Installation
Introduction to Apache Spark
MapReduce Essentials
MLlib GraphX and R
Programming and Deploying Apache Spark Applications
Spark Core
Spark Monitoring and Tuning
Spark Security
Spark Streaming
Structured Streaming
SK - IT - Big Data - General
Apache Kafka Development
Apache Kafka Operations
Automation and Machine Learning
Big Data - The Legal Perspective
Big Data Corporate Leadership Perspective
Big Data Engineering Perspectives
Big Data Marketing Perspective
Big Data Opportunities and Challenges
Big Data Sales Perspective
Big Data Strategic Planning
Clustering
Designing Batch Processing and Data Security
Designing the Lambda Architecture and Real-time Processing
IBM BigInsights Fundamentals: Analyzing Querying and Extracting Big Data
IBM BigInsights Fundamentals: Hadoop Solution
Ingesting Data and Computing for Batch Processing
Ingesting Data and Computing for Real-time Processing
Kafka Integration with Spark
Kafka Integration with Storm
Managing Activities and Data for Azure Big Data Analytics
Managing Big Data Operations
Provisioning an Azure Data Factory
Quality and Security of Big Data Operations
Real-time Applications
The Big Data Technology Wave
SK - IT - Big Data - Hadoop
Apache Hadoop on Amazon EMR
Capacity Management for Hadoop Clusters
Cloudera Manager and Hadoop Clusters
Data Factory with Hive
Data Factory with Oozie and Hue
Data Factory with Pig
Data Flow for the Hadoop Ecosystem
Data Refinery with YARN and MapReduce
Data Repository with Flume
Data Repository with HDFS and HBase
Data Repository with Sqoop
Deploying Hadoop Clusters
Designing Hadoop Clusters
Ecosystem for Hadoop
Hadoop Cluster Availability
Hadoop Clusters
Hadoop Distributed File System
Hadoop in the Cloud
Hadoop Maintenance and Distributions
Hadoop Ranger
Installation of Hadoop
Introduction to Data Modeling in Hadoop
Introduction to Hadoop
Operating Hadoop Clusters
Performance Tuning of Hadoop Clusters
Securing Hadoop Clusters
Stabilizing Hadoop Clusters
SK - IT - Big Data - Spark
Accessing Data with Spark: An Introduction to Spark
Accessing Data with Spark: Data Analysis using Spark SQL
Accessing Data with Spark: Data Analysis Using the Spark DataFrame API
SK - IT - Blockchain
Bitcoin Internals and Wallet Configuration
Bitcoin Technology Fundamentals
Blockchain and Your Business
Blockchain Architectural Components and Platforms
Blockchain in Action and IoT
Blockchain Trust and Design
Blockchains & Ethereum: Introduction
Blockchains & Ethereum: Mining and Smart Contracts in Ethereum
Blockchains & Ethereum: Performing Transactions in Ethereum
Building Decentralized Applications for Ethereum: An Introduction to dApps
Building Decentralized Applications for Ethereum: Bespoke Ethereum Tokens
Building Decentralized Applications for Ethereum: Building the Back End
Building Decentralized Applications for Ethereum: Building the Front End
Cloud Blockchains: An Introduction to Blockchain on the Cloud
Cloud Blockchains: Building Apps on the Azure Blockchain Workbench
Cloud Blockchains: Multi-Organization Networks on Amazon Managed Blockchain
Cloud Blockchains: Single Organization Networks on Amazon Managed Blockchain
Developing with Blockchain
Ethereum Smart Contracts with Solidity: An Overview of Ethereum and Solidity
Ethereum Smart Contracts with Solidity: Build Decentralized Apps
Ethereum Smart Contracts with Solidity: Data & Control Structures in Solidity
Ethereum Smart Contracts with Solidity: Ether Transfer Operations in Solidity
Ethereum Smart Contracts with Solidity: Functions in Solidity
Ethereum Smart Contracts with Solidity: The Remix Solidity IDE
Exploring Blockchain
Introduction to Digital Currency
Securing Blockchain Implementations
Smart Contracts & Hyperledger Fabric: Foundations of Hyperledger Fabric
Smart Contracts & Hyperledger Fabric: Hyperledger Composer Playground
Smart Contracts & Hyperledger Fabric: Hyperledger Fabric Web App
Smart Contracts & Hyperledger Fabric: Setting Up a Hyperledger Fabric Network
Smart Contracts & Hyperledger Fabric: Web Apps for Hyperledger Composer Networks
Smart Contracts & Hyperledger Fabric: Working with Fabric Chaincode in Golang
Smart Contracts & Hyperledger Fabric: Working with Fabric Chaincode in NodeJS
The Basics of Blockchain
Truffle Suite: Automating Development with the Truffle Framework
Truffle Suite: BlockBuilding Private Blockchain Networks with Ganache
Truffle Suite: Introduction
Working with Bitcoin
Working with Ethereum: Lifecycle of a Smart Contract
Working with Ethereum: Metamask & the Ethereum Wallet
Working with Ethereum: Smart Contract Development
Working with Ethereum: Storing Data
Working with Ethereum: The Geth Client
Working with Ethereum: Tools for Smart Contract Development
SK - IT - Business Intelligence
Advanced TIBCO Spotfire
Application Deployment and Performance
Business Intelligence with QlikView
Complex Visualizations and Analytics
Dashboards and Comparative Analysis
Data Governance and Metadata Management
Data Modeling
Diving into the World of Spotfire
Macros and Properties
Microsoft SQL Server Data Warehousing and Business Intelligence Overview
More Spotfire Visualization Techniques
Scripting and Designing
Scripting with Spotfire
Server
Spotfire Automation Analyzation and Visualization
Spotfire Basics
Spotfire Data Combinations
Spotfire Visualizations and Relationships
SK - IT - Cisco - CCNA
CCNA 2020: AAA Security & VPN Types
CCNA 2020: APIs & Cisco DNA Center
CCNA 2020: Automation Network Programmability & SDN Architectures
CCNA 2020: Cisco Wireless Architecture & WLAN Components
CCNA 2020: Cisco WLC Configuration & Wireless Management Access
CCNA 2020: Configuration Management & JSON Encoded Data
CCNA 2020: Configuring & Verifying ACLs
CCNA 2020: Configuring & Verifying NAT
CCNA 2020: Configuring Port Security DHCP Snooping & DAI
CCNA 2020: Configuring SSH FTP & TFTP
CCNA 2020: Dynamic Routing
CCNA 2020: IP Addressing Basics & Configuration
CCNA 2020: IPv4 Subnetting
CCNA 2020: IPv6 Addressing & Configuration
CCNA 2020: IT Security Concepts
CCNA 2020: L2 Discovery Protocols & L2 and L3 EtherChannel Configuration
CCNA 2020: Layer 1 Interfaces & Cabling
CCNA 2020: Layer 1 Physical & Configuration Issues
CCNA 2020: Network Access VLAN Configuration & Interswitch Connectivity
CCNA 2020: Network Topology Architectures
CCNA 2020: Network Topology Architectures - WAN Cloud & SOHO
CCNA 2020: Networking Components
CCNA 2020: Networking Components - NGFW NGIPS & Cisco DNA Center
CCNA 2020: Networking Protocols
CCNA 2020: NTP DNS & DHCP
CCNA 2020: Security Program &Password Policy Components
CCNA 2020: SNMP Syslog & PHB for QoS
CCNA 2020: Spanning Tree Protocol
CCNA 2020: Static Routing
CCNA 2020: Virtualization Concepts
CCNA 2020: WLCs Access Points Servers & Endpoints
SK - IT - Cisco - Certified Entry Networking Technician (CCENT)
CCENT: Access Control Lists Part 1
CCENT: Access Control Lists Part 2
CCENT: Device Hardening
CCENT: Device Management
CCENT: DHCP Configuration
CCENT: Discovering Ethernet
CCENT: DiscoveringEthernet
CCENT: Discovery Protocols
CCENT: DNS Configuration
CCENT: Functions of Routing
CCENT: Initial Device Configuration
CCENT: Inter VLAN Routing
CCENT: Interswitch Connectivity
CCENT: IPv4 Addressing Part 1
CCENT: IPv4 Configuration
CCENT: IPv4AddressingPart1
CCENT: IPv4AddressingPart2
CCENT: IPv6 Addressing
CCENT: IPv6 Configuration
CCENT: IPv6Addressing
CCENT: IPv6Configuration
CCENT: NAT Configuration
CCENT: Network Cabling
CCENT: Network Components, Topologies, and Architecture
CCENT: NTP Configuration
CCENT: OSI Model
CCENT: Overview of Cisco Devices
CCENT: Overview of Networking
CCENT: OverviewofCiscoDevices
CCENT: Port Security
CCENT: RIPv2 Configuration
CCENT: Static Routing
CCENT: Subnetting Part 2
CCENT: Subnetting Practice
CCENT: SubnettingPart1
CCENT: SubnettingPart2
CCENT: Switching Functions
CCENT: TCP/IP Model
CCENT: Troubleshooting Interfaces and Cables
CCENT: Troubleshooting Methodologies
CCENT: TroubleshootingInterfacesandCables
CCENT: VLAN Configuration
SK - IT - Cisco - CLDFND
CLDFND: Block & File Storage Access
CLDFND: Block & File Storage Access
CLDFND: Cisco Application Centric Infrastructure
CLDFND: Cisco Application Centric Infrastructure
CLDFND: Cisco Cloud Virtualization
CLDFND: Cisco Cloud Virtualization
CLDFND: Cisco CloudCenter
CLDFND: Cisco CloudCenter
CLDFND: Cisco CloudCenter Components
CLDFND: Cisco CloudCenter Components
CLDFND: Cisco UCS
CLDFND: Cisco UCS
CLDFND: Cisco Unified Fabric
CLDFND: Cisco Unified Fabric
CLDFND: Cloud Characteristics
CLDFND: Cloud Characteristics
CLDFND: Cloud Service Models
CLDFND: Cloud Service Models
CLDFND: Community & Hybrid Cloud
CLDFND: Community & Hybrid Cloud
CLDFND: IaaS PaaS & SaaS
CLDFND: IaaS PaaS & SaaS
CLDFND: Integrated Infrastructure & Cisco InterCloud Fabric
CLDFND: Integrated Infrastructure & Cisco InterCloud Fabric
CLDFND: Public & Private Cloud Deployment Models
CLDFND: Public & Private Cloud Deployment Models
CLDFND: SAN NAS & Cisco Storage Network Devices
CLDFND: SAN NAS & Cisco Storage Network Devices
CLDFND: Server & Infrastructure Virtualization
CLDFND: Server & Infrastructure Virtualization
CLDFND: Software-Defined Networking
CLDFND: Software-Defined Networking
CLDFND: Storage Access Technologies
CLDFND: Storage Access Technologies
CLDFND: Storage Provisioning
CLDFND: Storage Provisioning
CLDFND: Virtual Application Containers
CLDFND: Virtual Application Containers
CLDFND: Virtual Networking Services
CLDFND: Virtual Networking Services
CLDFND: VLANs & VXLANs
CLDFND: VLANs & VXLANs
SK - IT - Cisco - DESGN
DESGN 3.0: Branch Network Design
DESGN 3.0: Campus Design
DESGN 3.0: Campus Design Part 2
DESGN 3.0: Design Hierarchy
DESGN 3.0: Design Lifecycle
DESGN 3.0: Design Methodology
DESGN 3.0: Design Modularity
DESGN 3.0: Design Resiliency
DESGN 3.0: Design Scalability
DESGN 3.0: Enterprise Architecture
DESGN 3.0: Enterprise Network WAN and Edge
DESGN 3.0: Fault Domain Design
DESGN 3.0: IGP Expansion
DESGN 3.0: Implementing Network Design
DESGN 3.0: Network Programmability and Data Center Component Design
DESGN 3.0: Networking Information Gathering and Auditing
DESGN 3.0: OSPF and BGP Expansion
DESGN 3.0: Routing Protocol Scalability
DESGN 3.0: Scalable Addressing and IP Addressing Schemes
DESGN 3.0: Security Control Considerations
DESGN 3.0: Virtualization in Network Design
DESGN 3.0: Voice and Video Design Considerations
DESGN 3.0: Wireless LAN Design
DESGN 3.0: Wireless LAN Requirements
SK - IT - Cisco - DEVASC
DEVASC: API Usage & Authentication
DEVASC: Application Infrastructure Deployment Security & CI/CD
DEVASC: Code Organization Design Patterns & Version Control
DEVASC: Coding Testing & Managing Cisco Devices
DEVASC: Configuring Devices with Bash Python & Ansible
DEVASC: Development Methodologies & Software Quality
DEVASC: DevNet Overview & Setting up Tools in Linux
DEVASC: DevOps Docker Bash & Unit Testing Basics
DEVASC: HTTP APIs & Webhooks
DEVASC: IP Services & Operational Planes
DEVASC: IPv4 Addressing Binary Conversion & Subnetting
DEVASC: Network & Network Communication Basics
DEVASC: Network Collaboration Security & Compute Capabilities
DEVASC: Network Components Connectivity & Troubleshooting
DEVASC: Python Scripting & Managing WebEx Resources
DEVASC: Setting up Development & Virtualization Tools in Windows
DEVASC: Software Development Methodologies
DEVASC: Working with Data Formats
DEVASC: Working with Git
SK - IT - Cisco - ENARSI
ENARSI: Advanced OSPF Features
ENARSI: BGP Address Families Peers AS Numbers & Neighbor States
ENARSI: BGP Path Attributes Route Reflectors & Routing Policies
ENARSI: BGP Synchronization Peer Groups Route Refresh & Timers
ENARSI: Device SNMP DHCP & Syslog Troubleshooting
ENARSI: DMVPN Basics & Configuration
ENARSI: EIGRP Concepts
ENARSI: EIGRP Stub & BGP Concepts
ENARSI: IP SLA NetFlow & Cisco DNA Center Troubleshooting
ENARSI: IPv6 First Hop Security and AAA ACL uRPF & CoPP Troubleshooting
ENARSI: MPLS Basic Operations & Layer 3 VPNs
ENARSI: OSPF Concepts
ENARSI: Routing Protocol Redistribution Route Tagging & Filtering
ENARSI: Summarization Policy-based Routing VRF-lite & BFD
ENARSI: Troubleshooting Administrative Distance Route Maps & Loops
SK - IT - Cisco - ENCOR
ENCOR: Access Control & REST API Security
ENCOR: Device & Path Virtualization Technologies
ENCOR: eBGP & BGP
ENCOR: First Hop Redundancy Protocols & Multicast
ENCOR: LISP & VXLAN
ENCOR: Network Programmability EEM & Orchestration Tools
ENCOR: NTP NAT & PAT
ENCOR: OSPF LSAs Features & Troubleshooting
ENCOR: Overview Enterprise Network Design & High Availability
ENCOR: Path Virtualization Technologies & Troubleshooting
ENCOR: QoS & Cisco Express Forwarding
ENCOR: RSTP MST & Routing Concepts
ENCOR: SPAN IP SLA SDN & Remote Device Configuration
ENCOR: Troubleshooting Tools System Logging & NetFlow
ENCOR: VTP and Troubleshooting 802.1Q & EtherChannel
ENCOR: Wireless & Network Security
ENCOR: Wireless Roaming & Troubleshooting
ENCOR: WLAN Deployment SD-WAN & SD-Access
ENCOR: WLAN Layer 1 & Access Point Concepts
SK - IT - Cisco - ENSLD
ENSLD: Advanced Design Principles
ENSLD: BGP Concepts & IPv6 Migration Designs
ENSLD: Designing IPv4 & IPv6 Addressing Plans
ENSLD: ENSLD: QoS and Multicast Design
ENSLD: ENSLD: Routing Designs
ENSLD: The YANG Model & Model-driven Telemetry
ENSLD: WAN VPN & SD-WAN Design
SK - IT - Cisco - ICND2 3.0
ICND2 3.0: Wide Area Networks Using PPP
SK - IT - Cisco - IINS 3.0
IINS 3.0: AnyConnect VPN Using ASDM
IINS 3.0: ASA Security and Policies
IINS 3.0: Attack Mitigation
IINS 3.0: Clientless SSL VPN & ASDM
IINS 3.0: Configuring Cisco IPS
IINS 3.0: Control Plane Policing
IINS 3.0: Firewall Features
IINS 3.0: Firewall Technology
IINS 3.0: IPS Deployment Configuration
IINS 3.0: IPsec and VPN
IINS 3.0: IPSec Site-to-Site VPN
IINS 3.0: Network Access Control
IINS 3.0: Network Address Translation
IINS 3.0: Network Time Protocol
IINS 3.0: OSPF and EIGRP Authentication
IINS 3.0: Port Based Access Control BYOD and MDM
IINS 3.0: PVLANs and VLAN Security
IINS 3.0: Secure CLI Access
IINS 3.0: TACACS+
IINS 3.0: Threat Mitigation for Email Web and Endpoints
IINS 3.0: Zone-Based Firewall Configuration
SK - IT - Cisco - Implementing Cisco Network Security (IINS) 3.0
IINS 3.0: AnyConnect VPN Using ASDM
IINS 3.0: Auto Secure
IINS 3.0: Cryptographic Key Exchange
IINS 3.0: Encryption Methods
IINS 3.0: Introduction to Cisco Security
IINS 3.0: Introduction to Network Attacks
IINS 3.0: IPsec and VPN
IINS 3.0: Malware and Data Loss
IINS 3.0: Management Plane Access
IINS 3.0: Network Access Control
IINS 3.0: Network Time Protocol
IINS 3.0: Network Topologies
IINS 3.0: Port Based Access Control, BYOD, and MDM
IINS 3.0: SCP and AAA Technologies
IINS 3.0: Secure Device Management
IINS 3.0: SIEM Technology and Security Terminology
IINS 3.0: Simple Network Management Protocol
IINS 3.0: Specific Network Attacks
IINS 3.0: TACACS+
SK - IT - Cisco - Interconnecting Cisco Network Devices Part 2 (ICND2)
ICND2 3.0: Switch Aggregation and Threat Mitigation
ICND2 3.0: Configuring ACLs
ICND2 3.0: Configuring and Verifying EIGRP
ICND2 3.0: Configuring and Verifying OSPFv3
ICND2 3.0: Configuring EtherChannel
ICND2 3.0: Configuring EtherChannel
ICND2 3.0: Configuring Multiarea OSPFv2
ICND2 3.0: Configuring OSPFv2
ICND2 3.0: Configuring Trunking
ICND2 3.0: Device Monitoring Management and Programmability
ICND2 3.0: Implementing EIGRP
ICND2 3.0: Implementing VLANs
ICND2 3.0: Infrastructure Services
ICND2 3.0: InterVLAN Routing
ICND2 3.0: InterVLAN Routing
ICND2 3.0: OSPFv2 Operations
ICND2 3.0: PortFast and BPDU guard
ICND2 3.0: QoS Overview
ICND2 3.0: Routing Protocols
ICND2 3.0: Routing Protocols
ICND2 3.0: SNMP Monitoring
ICND2 3.0: Spanning Tree Configuration and Verification
ICND2 3.0: Spanning Tree Overview
ICND2 3.0: Spanning Tree Overview
ICND2 3.0: Troubleshooting Connectivity
ICND2 3.0: Trunking Overview
ICND2 3.0: WAN Topologies and Connectivity
ICND2 3.0: Wide Area Networks Using GRE and eBGP
ICND2 3.0: Wide Area Networks Using PPP
ICND2 3.0:Switch Aggregation and Threat Mitigation
SK - IT - Cisco - Route 2.0
ROUTE 2.0: Access Control
ROUTE 2.0: Access Control
ROUTE 2.0: Administrative Distance and Passive Interfaces
ROUTE 2.0: Administrative Distance and Passive Interfaces
ROUTE 2.0: Authentication Authorization and Accounting
ROUTE 2.0: BGP Attributes
ROUTE 2.0: BGP Loopback and Propagation
ROUTE 2.0: Border Gateway Protocol Introduction
ROUTE 2.0: Border Gateway Protocol Introduction
ROUTE 2.0: Default Routes
ROUTE 2.0: Device Management
ROUTE 2.0: Device Management
ROUTE 2.0: DHCP IPv6 Stateless Server
ROUTE 2.0: DHCP Server
ROUTE 2.0: Dynamic Multipoint Easy VPN and Ipsec
ROUTE 2.0: Dynamic Multipoint Easy VPN and Ipsec
ROUTE 2.0: EIGRP Authentication
ROUTE 2.0: EIGRP Load Balancing and Metrics
ROUTE 2.0: EIGRP Neighbors
ROUTE 2.0: EIGRP Over IPv6
ROUTE 2.0: EIGRP Stubs
ROUTE 2.0: Frame Relay Operations
ROUTE 2.0: Generic Routing Encapsulation Tunnels
ROUTE 2.0: Introduction to EIGRP
ROUTE 2.0: Introduction to Networking
ROUTE 2.0: IP Addressing and DHCP
ROUTE 2.0: IP Operations
ROUTE 2.0: IPv4 Addressing Types
ROUTE 2.0: IPv6 Addressing
ROUTE 2.0: IPv6 Addressing and DHCP
ROUTE 2.0: Logging and Debugging
ROUTE 2.0: Loop Prevention Using Built-In Mechanisms
ROUTE 2.0: Loop Prevention Using Route Tags and Maps
ROUTE 2.0: Multiprotocol BGP
ROUTE 2.0: NetFlow
ROUTE 2.0: Network Address Translation
ROUTE 2.0: Network Migration
ROUTE 2.0: OSPF Area Types
ROUTE 2.0: OSPF Configuration
ROUTE 2.0: OSPF IPv6 Routing
ROUTE 2.0: OSPF Network and LSA Types
ROUTE 2.0: OSPF Packet Types
ROUTE 2.0: OSPF Route Types
ROUTE 2.0: OSPF Virtual Links and Paths
ROUTE 2.0: OSPF Virtual Links and Paths
ROUTE 2.0: Point-to-Point Networking
ROUTE 2.0: Route Filtering
ROUTE 2.0: Route Filtering for EIGRP OSPF and BGP
ROUTE 2.0: Route Redistribution with OSPF
ROUTE 2.0: Route Redistribution with RIP and EIGRP
ROUTE 2.0: Router Summarization for EIGRP and OSPF
ROUTE 2.0: Router Summarization for RIP
ROUTE 2.0: Routing Information Protocol
ROUTE 2.0: Routing Protocol Types
ROUTE 2.0: Security Features
ROUTE 2.0: Security Features
ROUTE 2.0: SLAs and Object Tracking
ROUTE 2.0: SNMP and NTP
ROUTE 2.0: SNMP and NTP
ROUTE 2.0: Static Routing
ROUTE 2.0: TCP and UDP Operations
ROUTE 2.0: Using VRF Lite
ROUTE 2.0:Routing Policies
SK - IT - Cisco - SECFND
SECFND: ACLs & Filtering
SECFND: Attacks and Evasion
SECFND: Basic Networking Protocols
SECFND: Basic Networking Services
SECFND: Cryptographic Encryption Algorithms
SECFND: Cryptographic Hashing Algorithms
SECFND: Cryptography
SECFND: Data Loss & Defense in Depth
SECFND: Digital Signatures
SECFND: Endpoint Security
SECFND: Filtering and Packet Capture
SECFND: Interpreting Log Data
SECFND: Linux Host Terminology
SECFND: Monitoring Network Protocols
SECFND: Network Addressing
SECFND: Network and Web Attacks
SECFND: Network Data Types
SECFND: Network Data Types and Security Monitoring
SECFND: Network Devices Operations & Security
SECFND: Network Models
SECFND: Network Monitoring
SECFND: Next Generation Firewalls
SECFND: Overview and Network Models
SECFND: Packet Analysis
SECFND: Security Attack Concepts
SECFND: Security Concepts
SECFND: Security Management
SECFND: Security Management
SECFND: SSL/TLS Components
SECFND: VLANS and Data Visibility
SECFND: Windows Host Terminology
SK - IT - Cisco - SECOPS
SECOPS: Analyzing Intrusion Impact
SECOPS: Analyzing Threat Mitigation Reports
SECOPS: Categorize and Classify Intrusions
SECOPS: CSIRT Goals and Cybersec Elements
SECOPS: Data Normalization and 5-Tuple Correlation
SECOPS: Examining Intrusion Events
SECOPS: Firepower Management Console and Analysis Methods
SECOPS: Handling Incident Events and Evidence
SECOPS: HTTP Headers
SECOPS: ICMP Intrusion
SECOPS: ICMP Intrusion Part 2
SECOPS: Identifying Forensic Evidence
SECOPS: Identifying NetFlow v5 Records
SECOPS: Interpreting Regular Expressions
SECOPS: Intrusion Event Technologies
SECOPS: IP Header Security
SECOPS: Protocol Header Security
SECOPS: Protocol Header Security
SECOPS: Responding to Incidents
SECOPS: Scoring with CVSS 3.0
SECOPS: Securing File Systems
SECOPS: Transport Layer Headers
SK - IT - Cisco - SENSS
SENSS 1.0: ASA Firewall Access Control
SENSS 1.0: ASA Firewall Configuration & Access Control
SENSS 1.0: Centralized Logging & Device Management
SENSS 1.0: Cisco Port-Based Traffic Control
SENSS 1.0: DHCP Snooping & IP Source Guard
SENSS 1.0: High Availability & Private VLANs
SENSS 1.0: IOS Security Configuration
SENSS 1.0: IPv6 Support & Traffic Inspection
SENSS 1.0: Role-Based Access Control
SENSS 1.0: Traffic & Device Monitoring
SENSS 1.0: Transparent Firewalls & Security Contexts
SENSS 1.0: Twice NAT & Network Object NAT
SENSS 1.0: Zone-Based Firewalls
SK - IT - Cisco - SRE
Cloud and Containers for the SRE: Cloud Architectures & Solutions
Core Skills for Site Reliability Engineers: SRE Collaboration & Communication
SRE Data Pipelines & Integrity: Data Pipelines
SRE Data Pipelines and Integrity: Data Integrity
SRE Emergency & Incident Response: Incident Response
SRE Engagement: The SRE Engagement Model
SRE Load Balancing Techniques: Data Center Load Balancing
SRE Load Balancing Techniques: Front-end Load Balancing
SRE Metric Management: Software Reliability Metrics
SRE Products at Scale: Product Launches
SRE Team Management: Operational Overload
SRE Testing Tasks: Software Reliability & Testing
SK - IT - Cisco - Switch 2.0
SWITCH 2.0 : DHCP Snooping IPSG and DAI
SWITCH 2.0 : EtherChannel
SWITCH 2.0 : Hot Standby Router Protocol
SWITCH 2.0 : L2 Attacks and Port Security
SWITCH 2.0 : Layer 2 Network Discovery
SWITCH 2.0 : Layer 3 Switching
SWITCH 2.0 : Rapid and Multiple Spanning Tree
SWITCH 2.0 : SPAN RSPAN and StackWise Clustering
SWITCH 2.0 : Spanning Tree and Per VLAN Spanning Tree
SWITCH 2.0 : Storm Control and Port-Based Authentication
SWITCH 2.0 : STP Enhancements
SWITCH 2.0 : STP Timers and Failover
SWITCH 2.0 : STP Timers and Failover
SWITCH 2.0 : Switch Overview and Administartion
SWITCH 2.0 : Trunking
SWITCH 2.0 : Trunking
SWITCH 2.0 : Virtual LANs
SWITCH 2.0 : VLAN ACLs and Private VLANs
SWITCH 2.0 : VLAN Trunk Protocol
SWITCH 2.0 : VLAN Trunk Protocol
SWITCH 2.0 : VLAN Trunk Protocol Pruning
SWITCH 2.0 : VRRP and GLBP
SK - IT - Cisco - TSHOOT 2.0
TSHOOT 2.0 : BGP IPv6 Troubleshooting
TSHOOT 2.0 : BGP IPv6 Troubleshooting
TSHOOT 2.0 : BGP Troubleshooting Part 1
TSHOOT 2.0 : BGP Troubleshooting Part 1
TSHOOT 2.0 : BGP Troubleshooting Part 2
TSHOOT 2.0 : BGP Troubleshooting Part 2
TSHOOT 2.0 : EIGRP Troubleshooting Part 1
TSHOOT 2.0 : EIGRP Troubleshooting Part 1
TSHOOT 2.0 : EIGRP Troubleshooting Part 2
TSHOOT 2.0 : EIGRP Troubleshooting Part 2
TSHOOT 2.0 : EIGRP Troubleshooting Part 3
TSHOOT 2.0 : EtherChannel & Spanning Tree Troubleshooting
TSHOOT 2.0 : EtherChannel & Spanning Tree Troubleshooting
TSHOOT 2.0 : HSRP Troubleshooting
TSHOOT 2.0 : Layer 2 Troubleshooting Part 1
TSHOOT 2.0 : Layer 2 Troubleshooting Part 2
TSHOOT 2.0 : Layer 2 Troubleshooting Part 2
TSHOOT 2.0 : Layer 2 Troubleshooting Part 3
TSHOOT 2.0 : Layer 2 Troubleshooting Part 3
TSHOOT 2.0 : Layer 3 Troubleshooting
TSHOOT 2.0 : Logging & Path Verification
TSHOOT 2.0 : Miscellaneous Troubleshooting
TSHOOT 2.0 : Miscellaneous Troubleshooting
TSHOOT 2.0 : Network Traffic Viewing Reporting & Monitoring
TSHOOT 2.0 : OSPF Troubleshooting Part 1
TSHOOT 2.0 : OSPF Troubleshooting Part 2
TSHOOT 2.0 : OSPF Troubleshooting Part 3
TSHOOT 2.0 : Response Automation & Backups
TSHOOT 2.0 : Routing Troubleshooting Part 1
TSHOOT 2.0 : Routing Troubleshooting Part 2
TSHOOT 2.0 : Troubleshooting & Manipulating Output
TSHOOT 2.0 : Troubleshooting & Manipulating Output
TSHOOT 2.0 : Troubleshooting Basics
TSHOOT 2.0 : VRRP Troubleshooting
SK - IT - Cloud Computing
AWS Associate Solutions Architect 2020: Application Scalability
AWS Associate Solutions Architect 2020: AWS Cost Management
AWS Associate Solutions Architect 2020: AWS Developer Options
AWS Associate Solutions Architect 2020: AWS Review Course 1
AWS Associate Solutions Architect 2020: AWS Review Course 2
AWS Associate Solutions Architect 2020: Database Solutions
AWS Associate Solutions Architect 2020: Identity & Access Management
AWS Associate Solutions Architect 2020: Network Security & Name Resolution
AWS Associate Solutions Architect 2020: Security
AWS Associate Solutions Architect 2020: Storage Security & Resiliency
AWS Associate Solutions Architect 2020: Storage Solutions
AWS Automated Testing: Environments & Services
AWS Cloud Practitioner 2019: Architecture Design Principles
AWS Cloud Practitioner 2019: AWS Access Management
AWS Cloud Practitioner 2019: AWS Cloud and the Value Proposition
AWS Cloud Practitioner 2019: AWS Cloud Deployment and Operation
AWS Cloud Practitioner 2019: Cloud Economics
AWS Cloud Practitioner 2019: Cloud Security & Compliance
AWS Cloud Practitioner 2019: Core AWS Services
AWS Cloud Practitioner 2019: Security Support Resources
AWS Cloud Practitioner 2019: Shared Responsibility
AWS Cloud Practitioner 2019: Technology Support Resources
AWS Professional Solutions Architect 2020: AWS Management
AWS Professional Solutions Architect 2020: Name Resolution Solutions
AWS Professional Solutions Architect 2020: S3 Management
AWS Professional Solutions Architect 2020: S3 Security
AZ-103 - Microsoft Azure Administrator: Azure Hybrid Identities
AZ-103 - Microsoft Azure Administrator: Azure Load Balancer
AZ-103 - Microsoft Azure Administrator: Azure Multi-Factor Authentication
AZ-300 - Microsoft Azure Architect Technologies: Architect Azure Networking
AZ-300 - Microsoft Azure Architect Technologies: Architecting Azure Solutions I
AZ-300 - Microsoft Azure Architect Technologies: Architecting Azure Solutions II
AZ-300 - Microsoft Azure Architect Technologies: Architecting Azure Storage
AZ-300 - Microsoft Azure Architect Technologies: Azure AD Connect
AZ-300 - Microsoft Azure Architect Technologies: Azure AD MFA
AZ-300 - Microsoft Azure Architect Technologies: Azure Monitoring
AZ-300 - Microsoft Azure Architect Technologies: Azure Roles and Policies
AZ-300 - Microsoft Azure Architect Technologies: Azure Roles and Policies
AZ-300 - Microsoft Azure Architect Technologies: Azure Virtual Machines
AZ-300 - Microsoft Azure Architect Technologies: Azure Web Apps
AZ-300 - Microsoft Azure Architect Technologies: DevOps & Azure
AZ-300 - Microsoft Azure Architect Technologies: High Availability
AZ-300 - Microsoft Azure Architect Technologies: Managing Azure
AZ-300 - Microsoft Azure Architect Technologies: Managing Azure Costs
AZ-301 - Microsoft Azure Architect Design: Azure AD & RBAC Design
AZ-301 - Microsoft Azure Architect Design: Azure AD Connect MFA & SSO Design
AZ-301 - Microsoft Azure Architect Design: Azure AD Permissions Design
AZ-301 - Microsoft Azure Architect Design: Azure AD Permissions Design
AZ-301 - Microsoft Azure Architect Design: Azure App Design
AZ-301 - Microsoft Azure Architect Design: Azure App Design
AZ-301 - Microsoft Azure Architect Design: Azure Compute Design
AZ-301 - Microsoft Azure Architect Design: Azure Cost Management
AZ-301 - Microsoft Azure Architect Design: Azure Cost Management
AZ-301 - Microsoft Azure Architect Design: Azure DevOps Planning
AZ-301 - Microsoft Azure Architect Design: Azure Key Vault and Key Design
AZ-301 - Microsoft Azure Architect Design: Azure Key Vault and Key Design
AZ-301 - Microsoft Azure Architect Design: Azure Migration Planning
AZ-301 - Microsoft Azure Architect Design: Azure Network Design
AZ-301 - Microsoft Azure Architect Design: Azure Policy Planning
AZ-301 - Microsoft Azure Architect Design: Azure Service Design Part 1
AZ-301 - Microsoft Azure Architect Design: Azure Service Design Part 2
AZ-301 - Microsoft Azure Architect Design: Azure Site Recovery Design
AZ-301 - Microsoft Azure Architect Design: Azure Storage Design
AZ-301 - Microsoft Azure Architect Design: Azure VPN Design
AZ-400 - MS Azure DevOps Solutions: Application Configuration & Secrets
AZ-400 - MS Azure DevOps Solutions: Azure DevOps Infrastructure
AZ-400 - MS Azure DevOps Solutions: Dependency Management & Security Compliance
AZ-400 - MS Azure DevOps Solutions: Design & Implement Agile Work Management Approach
AZ-400 - MS Azure DevOps Solutions: Design a Quality Strategy & Secure Development Process
AZ-400 - MS Azure DevOps Solutions: Design a Quality Strategy & Secure Development Process
AZ-400 - MS Azure DevOps Solutions: Design and Set Up Release Strategy & Workflow
AZ-400 - MS Azure DevOps Solutions: Implement Deployment Patterns
AZ-400 - MS Azure DevOps Solutions: Manage Code Quality & Security Policies
AZ-400 - MS Azure DevOps Solutions: Migration & Consolidation Strategy for Tools
AZ-400 - MS Azure DevOps Solutions: Tool Integration
AZ-400 - MS Azure DevOps Solutions: Tool Integration
AZ-400 - MS Azure DevOps Solutions: Version & Source Control
AZ-400 - MS Azure DevOps Solutions: Version & Source Control
CCSP 2019: Cloud Infrastructure
CCSP 2019: Cloud System Architecture Design
CCSP 2019: Data Center Security
CCSP 2019: Secure Cloud Computing
Cloud Computing Fundamentals: Cloud Protocols & Standards
Cloud Computing Fundamentals: Cloud Virtualization & Data Centers
Cloud Computing Fundamentals: Migrating to the Cloud
Cloud Computing Fundamentals: Storing & Managing Cloud Data
Microsoft Azure Architect Technologies: Azure Active Directory
Microsoft Azure Architect Technologies: Azure Files and Databases
Microsoft Azure Architect Technologies: Azure Remote Connectivity
MS Azure DevOps Solutions: Code Flow & Mobile DevOps
MS-100 - Microsoft 365 Identity and Services: Application Access
MS-100 - Microsoft 365 Identity and Services: Application Deployment
MS-100 - Microsoft 365 Identity and Services: Authentication
MS-100 - Microsoft 365 Identity and Services: Designing a Hybrid Identity
MS-100 - Microsoft 365 Identity and Services: External Users
MS-100 - Microsoft 365 Identity and Services: Identity Strategy
MS-100 - Microsoft 365 Identity and Services: Manage Azure AD Identities
MS-100 - Microsoft 365 Identity and Services: Migrating Users & Data
MS-100 - Microsoft 365 Identity and Services: Multi-Factor Authentication (MFA)
MS-100 - Microsoft 365 Identity and Services: Office 365 Workload Deployment
MS-100 - Microsoft 365 Identity and Services: Planning a Microsoft Implementation
MS-100 - Microsoft 365 Identity and Services: Subscription & Tenant Health
MS-100 - Microsoft 365 Identity and Services: Tenancy & Subscriptions
MS-100 - Microsoft 365 Identity and Services: User Roles
MS-200 - Configuring a Messaging Platform: Client Access
MS-200 - Configuring a Messaging Platform: Disaster Recovery
MS-200 - Configuring a Messaging Platform: Mail Flow
MS-200 - Configuring a Messaging Platform: Mobile Devices
MS-200 - Configuring a Messaging Platform: Troubleshooting Mail Flow Problems
MS-300 - Deploying Microsoft 365 Teamwork: Customizations Apps & Metadata
MS-300 - Deploying Microsoft 365 Teamwork: Guest Access
MS300 - Deploying Microsoft 365 Teamwork: Integrate Microsoft 365 Workloads
MS300 - Deploying Microsoft 365 Teamwork: Microsoft 365 and External Data & Systems
MS-300 - Deploying Microsoft 365 Teamwork: Monitoring OneDrive
MS-300 - Deploying Microsoft 365 Teamwork: OneDrive Users & Groups
MS-300 - Deploying Microsoft 365 Teamwork: Sharing & Security
MS-300 - Deploying Microsoft 365 Teamwork: Site Collections & Hub Sites
MS300 - Deploying Microsoft 365 Teamwork: Stream Capabilities
MS300 - Deploying Microsoft 365 Teamwork: Yammer
MS-300: Deploying Microsoft 365 Teamwork: Identity and Authentication for Teams
MS-300: Deploying Microsoft 365 Teamwork: Managing & Monitoring the Teams Environment & Service
MS-300: Deploying Microsoft 365 Teamwork: OneDrive for Business
MS-300: Deploying Microsoft 365 Teamwork: Teams Settings
MS-300: Manage and Monitor SharePoint Online
Securing AWS: Data Protection
Untitled Object
Untitled Object
SK - IT - Cloud Computing - AWS
Advanced Architecting on Amazon Web Services: Cloud Migration and Architecture
Advanced Architecting on Amazon Web Services: Costing
Advanced Architecting on Amazon Web Services: Data Storage Architecture
Advanced Architecting on Amazon Web Services: Deployment Management
Advanced Architecting on Amazon Web Services: HA and Business Continuity
Advanced Architecting on Amazon Web Services: Scalability and Elasticity
Advanced Architecting on Amazon Web Services: Security Architecture
Advanced AWS Management
Amazon ECS and OpsWorks
Architecting on Amazon Web Services: Databases and Application Services
Architecting on Amazon Web Services: Elastic Compute Cloud (EC2) Auto Scaling
Architecting on Amazon Web Services: Elastic Compute Cloud (EC2) Overview
Architecting on Amazon Web Services: IAM and Object Storage
Architecting on Amazon Web Services: Networking and Best Practice
AWS Associate Solution Architect: Amazon Machine Images
AWS Associate Solution Architect: Auto Scaling
AWS Associate Solution Architect: Building and Managing AWS Solutions
AWS Associate Solution Architect: Managing AWS
AWS Database Services
AWS Disaster Recovery
AWS Lambda
AWS Professional Solution Architect: Business Continuity
AWS Professional Solution Architect: Cloud Migration
AWS Professional Solution Architect: Costing
AWS Professional Solution Architect: Data Replication
AWS Professional Solution Architect: Data Security
AWS Professional Solution Architect: Data Storage
AWS Professional Solution Architect: Deployment Management
AWS Professional Solution Architect: High Availability
AWS Professional Solution Architect: Hybrid Architecture
AWS Professional Solution Architect: Network Design
AWS Professional Solution Architect: Scalability and Elasticity
AWS Professional Solution Architect: Security Controls
AWS Security
AWS Serverless Architecture
AWS Serverless Monitoring & Security
AWS Serverless Storage
AWS SysOps Associate: High Availability and Data Management
AWS SysOps Associate: Monitoring Metrics Analysis and Deployment
AWS SysOps Associate: Security and Networking
AWS Troubleshooting
AWS: Cloud Primer
AWS: Management Tools
AWS: Networking
AWS: Other Services
AWS: Storage
AWS: Virtual Machines and Identity and Access Management
AWS: WorkDocs
Caching Performance and High Availability
CDN Route 53
Cloud Storage Solutions
Cloud Tech Primer
Command Line VM Management
Core AWS Management
Deployment and Delivery on AWS
EBS Snapshots Monitoring and Logging
EFS and EBS
GUI VM Management
Identity and Access Management
Securing AWS: Infrastructure Security
Source Control on AWS
The AWS Cloud
Using AWS CodeDeploy
Virtual Private Clouds (VPCs) and Subnets
SK - IT - Cloud Computing - AWS Certified Developer - Associate
AWS Certified Developer - Associate: Application Development
AWS Certified Developer - Associate: Code Management and Monitoring Tools
AWS Certified Developer - Associate: Plan Application and Infrastructure Security
AWS Certified Developer - Associate: Principles and Essential Services
AWS Certified Developer - Associate: Serverless Application and Container Management
AWS Certified Developer - Associate: Service Integration and Orchestration
AWS Developer Associate: Amazon Elastic Compute Cloud
AWS Developer Associate: Application Integration & Microservices
AWS Developer Associate: AWS CloudFormation
AWS Developer Associate: AWS Database Services
AWS Developer Associate: AWS Elastic Beanstalk (EB)
AWS Developer Associate: AWS Security & Encryption
AWS Developer Associate: CI/CD in AWS
AWS Developer Associate: Configuration as Code
AWS Developer Associate: DynamoDB NoSQL Database
AWS Developer Associate: Interacting with AWS Cloud Services
AWS Developer Associate: Serverless Applications
AWS Developer Associate: Serverless Compute Services
AWS Developer Associate: Stateless Applications
AWS Developer Associate: Storage Services
AWS Developer Associate: Troubleshooting & Monitoring on AWS
AWS Infrastructure Services
Core Services on AWS
Getting Started with Amazon Web Services
SK - IT - Cloud Computing - AWS Certified Developer - Professional
AWS Professional Solution Architect: Data Security
SK - IT - Cloud Computing - AWS Certified Solutions Architect Professional 2020
AWS Associate Solutions Architect 2020: EC2 Instance Management
AWS Associate Solutions Architect 2020:Management & Migration
AWS Professional Solutions Architect 2020: Account & Centralized Management
AWS Professional Solutions Architect 2020: AWS & Data Protection
AWS Professional Solutions Architect 2020: Cryptography & PKI
AWS Professional Solutions Architect 2020: Data Processing & Analysis
AWS Professional Solutions Architect 2020: Database Solutions
AWS Professional Solutions Architect 2020: Desktop & Cost Management
AWS Professional Solutions Architect 2020: Developer Managed Services
AWS Professional Solutions Architect 2020: Development Strategies
AWS Professional Solutions Architect 2020: EC2 Instance Deployment
AWS Professional Solutions Architect 2020: High Availability
AWS Professional Solutions Architect 2020: IAM Configurations
AWS Professional Solutions Architect 2020: IAM Users & Groups
AWS Professional Solutions Architect 2020: Migration Strategies
AWS Professional Solutions Architect 2020: Network Security & Disaster Recovery
AWS Professional Solutions Architect 2020: Resource Monitoring & Performance
AWS Professional Solutions Architect 2020: Review Course 1
AWS Professional Solutions Architect 2020: Review Course 2
AWS Professional Solutions Architect 2020: VPC Connectivity
AWS Professional Solutions Architect 2020: VPC Management & Peering
SK - IT - Cloud Computing - AWS Certified SysOps Administrator - Associate
AWS Certified SysOps Administrator: Application Infrastructure
AWS Certified SysOps Administrator: Compute Services
AWS Certified SysOps Administrator: Database Services
AWS Certified SysOps Administrator: Database Services
AWS Certified SysOps Administrator: High Availabilty
AWS Certified SysOps Administrator: Introduction
AWS Certified SysOps Administrator: Monitoring the AWS Environment
AWS Certified SysOps Administrator: Networking Services
AWS Certified SysOps Administrator: Preparing for Cloud Service Management
AWS Certified SysOps Administrator: Security and IAM Services
AWS Certified SysOps Administrator: Storage Services
AWS Certified SysOps Administrator: Storage Services
AWS SysOps Associate: Amazon VDI & Apps
AWS SysOps Associate: AWS & DNS
AWS SysOps Associate: AWS & Public Key Infrastructure
AWS SysOps Associate: AWS Developer Tools
AWS SysOps Associate: AWS Directory Services & Identity Federation
AWS SysOps Associate: AWS NoSQL & Data Warehousing
AWS SysOps Associate: AWS Organizations & Service Control Policies
AWS SysOps Associate: AWS SQL Solutions
AWS SysOps Associate: Backup & Replication
AWS SysOps Associate: EC2 Instance Management
AWS SysOps Associate: IAM Policies & MFA
AWS SysOps Associate: IAM Users & Groups
AWS SysOps Associate: Load Balancing Replicas & Placement Groups
AWS SysOps Associate: Managing AWS Costs
AWS SysOps Associate: Monitoring & Tagging
AWS SysOps Associate: Network Connectivity
AWS SysOps Associate: Network Security
AWS SysOps Associate: Planning AWS Migrations
AWS SysOps Associate: S3 Storage Management
AWS SysOps Associate: Securing AWS Resources & Data
AWS SysOps Associate: Templates & Data Analysis
AWS SysOps Associate: Virtual Private Cloud (VPC) Deployment
AWS SysOps Associate: VPC Peering & Endpoints
SK - IT - Cloud Computing - AWS Certified SysOps Administrator - Associate 2018
AWS Associate Solution Architect: AWS Primer
AWS Associate Solution Architect: AWS Storage Solutions
AWS Associate Solution Architect: Loose Coupling
SK - IT - Cloud Computing - AWS Cloud Practitioner 2020
AWS Cloud Practitioner 2020: Cloud and the Value Proposition
AWS Cloud Practitioner 2020: Cloud Economics
AWS Cloud Practitioner 2020: Cloud Security & Compliance
AWS Cloud Practitioner 2020: Security Support Resources
SK - IT - Cloud Computing - AWS CloudOps
Advanced CloudOps Deployments: CI/CD in CloudOps
Advanced CloudOps Deployments: Deploying Multi-cloud Environments
Building Multi-cloud Deployments: Deploying Environments
Building Multi-cloud Deployments: Managing Environments
CloudOps Automation: Designing & Prototyping Solutions
CloudOps Container Clustering: Clustering Containers
CloudOps Container Clustering: Implementing Container Orchestration in DevOps
CloudOps Machine Data Analytics: Splunk for CloudOps
CloudOps Performance Tuning: Applying Performance Principles
CloudOps Performance Tuning: Managing Multi-cloud Performance
High-availability Cloud Deployments: Designing High-availability Solutions
The Skilled CloudOps Engineer: Roles & Responsibilities
SK - IT - Cloud Computing - AWS Design and Implement Cloud Platform Solutions
Automating and Managing Databases
Azure High Availability Solutions
Azure SQL Database Security
Azure Virtual Machines
Cloud Data Platform Solutions: SQL Databases
Data Warehousing
Hybrid SQL Server Solutions
Implementing a SQL Database
Performance Monitoring
Recovering SQL Databases
Scaling Cloud Solutions
SQL Server Database Security
Troubleshooting SQL Database Errors
SK - IT - Cloud Computing - AZ-104: Microsoft Azure Administrator
AZ-104 - Microsoft Azure Administrator: Availability Solutions
AZ-104 - Microsoft Azure Administrator: Azure App Service & Batch Jobs
AZ-104 - Microsoft Azure Administrator: Azure Policies
AZ-104 - Microsoft Azure Administrator: Manage Azure AD Groups & Devices
AZ-104 - Microsoft Azure Administrator: Manage Azure AD Subscriptions and Costs
AZ-104 - Microsoft Azure Administrator: Manage Azure AD Users
AZ-104 - Microsoft Azure Administrator: Managing Azure DNS & Network Security
AZ-104 - Microsoft Azure Administrator: Managing Azure Files
AZ-104 - Microsoft Azure Administrator: Managing Azure Network Solutions
AZ-104 - Microsoft Azure Administrator: Managing Azure Roles & Tags
AZ-104 - Microsoft Azure Administrator: Managing Azure Storage Accounts
AZ-104 - Microsoft Azure Administrator: Managing Azure Virtual Machines
AZ-104 - Microsoft Azure Administrator: Monitoring Azure Resources
SK - IT - Cloud Computing - AZ-204: Developing Solutions for Microsoft Azure
AZ-204 - Developing Solutions for Microsoft Azure: App Service Web Apps
AZ-204 - Developing Solutions for Microsoft Azure: Blob Storage
AZ-204 - Developing Solutions for Microsoft Azure: Developing an App Service Logic App
AZ-204 - Developing Solutions for Microsoft Azure: Developing Event-driven Solutions
AZ-204 - Developing Solutions for Microsoft Azure: Developing Message-based Solutions
AZ-204 - Developing Solutions for Microsoft Azure: Development with Cosmos DB
AZ-204 - Developing Solutions for Microsoft Azure: Implementing API Management
AZ-204 - Developing Solutions for Microsoft Azure: Implementing Azure Functions
AZ-204 - Developing Solutions for Microsoft Azure: Implementing IaaS Solutions
AZ-204 - Developing Solutions for Microsoft Azure: Implementing User Authentication & Authorization
AZ-204 - Developing Solutions for Microsoft Azure: Instrumenting Monitoring & Logging Solutions
AZ-204 - Developing Solutions for Microsoft Azure: Integrating Caching & Content Delivery
AZ-204 - Developing Solutions for Microsoft Azure: Managing IaaS
AZ-204 - Developing Solutions for Microsoft Azure: Secure Cloud Solutions
AZ-204 - Developing Solutions for Microsoft Azure: Securing Azure Resources
SK - IT - Cloud Computing - AZ-303: Microsoft Azure Administrator
AZ-303 - Microsoft Azure Architect Technologies: Automating Azure Administrative Tasks
AZ-303 - Microsoft Azure Architect Technologies: Azure & Business Continuity
AZ-303 - Microsoft Azure Architect Technologies: Azure Resource Governance
AZ-303 - Microsoft Azure Architect Technologies: Azure Storage Accounts
AZ-303 - Microsoft Azure Architect Technologies: Deploying & Managing Azure VMs
AZ-303 - Microsoft Azure Architect Technologies: Deploying Azure Database Solutions
AZ-303 - Microsoft Azure Architect Technologies: Management Tools
AZ-303 - Microsoft Azure Architect Technologies: Managing Azure AD
AZ-303 - Microsoft Azure Architect Technologies: Managing Azure AD Devices & Groups
AZ-303 - Microsoft Azure Architect Technologies: Managing Azure Files
AZ-303 - Microsoft Azure Architect Technologies: Managing Azure Web Applications
AZ-303 - Microsoft Azure Architect Technologies: Migrating to Azure
AZ-303 - Microsoft Azure Architect Technologies: Monitoring Azure
AZ-303 - Microsoft Azure Architect Technologies: Securing Azure Networks
AZ-303 - Microsoft Azure Architect Technologies: Storage Account Content Management
AZ-303 - Microsoft Azure Architect Technologies: Virtual Networking
AZ-303 - Microsoft Azure Architect Technologies: Web App Availability & Security
AZ-303 -Microsoft Azure Architect Technologies: Deploying Azure AD Connect
SK - IT - Cloud Computing - AZ-304: Microsoft Azure Architect Design
AZ:304: Microsoft Azure Architect Design: Azure Application High Availability
AZ:304: Microsoft Azure Architect Design: Reducing Azure Costs
AZ:304: Microsoft Azure Architect Design: Windows Virtual Desktop & Containers
AZ-304 - Microsoft Azure Architect Design: Azure AD & User Implementation
AZ-304 - Microsoft Azure Architect Design: Azure AD Groups Apps & Devices
AZ-304 - Microsoft Azure Architect Design: Azure Data and Service Migration Planning
AZ-304 - Microsoft Azure Architect Design: Azure Database Solution Design
AZ-304 - Microsoft Azure Architect Design: Azure DevOps
AZ-304 - Microsoft Azure Architect Design: Azure Files Planning
AZ-304 - Microsoft Azure Architect Design: Azure Monitoring
AZ-304 - Microsoft Azure Architect Design: Azure Network Connectivity & Security
AZ-304 - Microsoft Azure Architect Design: Azure Security Governance
AZ-304 - Microsoft Azure Architect Design: Security Management
AZ-304 - Microsoft Azure Architect Design: Storage Account & Key Vault Design
AZ-304 - Microsoft Azure Architect Design: Storage Account Blob Management
AZ-304 - Microsoft Azure Architect Design: Storage Account Security Planning
AZ-304 - Microsoft Azure Architect Design: Virtual Machine Design & Deployment
AZ-304 - Microsoft Azure Architect Design: VNet Design & Implementation
AZ-304 - Microsoft Azure Architect Design: Windows Virtual Desktop & Containers
SK - IT - Cloud Computing - Azure
Architecting Microsoft Azure Solutions: Application Design and Messaging
Architecting Microsoft Azure Solutions: Automation with PowerShell Chef and Puppet
Architecting Microsoft Azure Solutions: Azure External Network Connectivity Design
Architecting Microsoft Azure Solutions: Azure Storage Design
Architecting Microsoft Azure Solutions: Compute Design Considerations
Architecting Microsoft Azure Solutions: Data Services Design
Architecting Microsoft Azure Solutions: Implement Azure Automation
Architecting Microsoft Azure Solutions: Managing Identities
Architecting Microsoft Azure Solutions: Monitoring Resources
Architecting Microsoft Azure Solutions: Network Design
Architecting Microsoft Azure Solutions: Plan Azure SQL-Compliant Database Usage
Architecting Microsoft Azure Solutions: Planning Artificial Intelligence Services
Architecting Microsoft Azure Solutions: Planning Azure NoSQL Deployments
Architecting Microsoft Azure Solutions: Securing the Azure Environment
Architecting Microsoft Azure Solutions: Template and Runbook Automation
Architecting Microsoft Azure Solutions: Web Application Design
Architecting Microsoft Azure: Architecture Design
Architecting Microsoft Azure: Compute-Intensive Applications
Architecting Microsoft Azure: Messaging and Hybrid Applications
Architecting Microsoft Azure: Monitoring and Disaster Recovery
Architecting Microsoft Azure: Network Design
Architecting Microsoft Azure: Security Strategy Design
Architecting Microsoft Azure: Storage Design
Architecting Microsoft Azure: Virtual Machines
Architecting Microsoft Azure: Web Apps Design
Automation and High Availability
AZ-103 - Microsoft Azure Administrator: Azure Active Directory
AZ-103 - Microsoft Azure Administrator: Azure AD Objects
AZ-103 - Microsoft Azure Administrator: Azure Backup and Recovery
AZ-103 - Microsoft Azure Administrator: Azure Hybrid Identities
AZ-103 - Microsoft Azure Administrator: Azure Import/Export
AZ-103 - Microsoft Azure Administrator: Azure Load Balancer
AZ-103 - Microsoft Azure Administrator: Azure Monitoring
AZ-103 - Microsoft Azure Administrator: Azure Multi-Factor Authentication
AZ-103 - Microsoft Azure Administrator: Azure Name Resolution & Network Security
AZ-103 - Microsoft Azure Administrator: Azure Network Monitoring
AZ-103 - Microsoft Azure Administrator: Azure Policies
AZ-103 - Microsoft Azure Administrator: Azure Storage Accounts
AZ-103 - Microsoft Azure Administrator: Azure Virtual Machine Templates
AZ-103 - Microsoft Azure Administrator: Azure Virtual Machines (VMs)
AZ-103 - Microsoft Azure Administrator: Azure Virtual Network Connectivity
AZ-103 - Microsoft Azure Administrator: Azure Virtual Networks
AZ-103 - Microsoft Azure Administrator: Integrating Azure On-Premise & Virtual Networks
AZ-103 - Microsoft Azure Administrator: Managing Azure Virtual Machines
AZ-103 - Microsoft Azure Administrator: Subscriptions
Azure Active Directory and Authentication
Azure Active Directory and Collaboration
Azure App Services
Azure Backup and Recovery
Azure Blob Storage
Azure Developer: Advanced Scalability Using Azure
Azure Developer: Advanced Security & Integration Using Azure Services
Azure Developer: Azure Batch & Scheduling Bulk Operations
Azure Developer: Azure Cloud Technology Solutions
Azure Developer: Blob Storage Solutions
Azure Developer: Common Application Design & Connectivity Patterns
Azure Developer: Cosmos DB Storage Solutions
Azure Developer: Creating Mobile Apps
Azure Developer: File Storage Solutions
Azure Developer: Implementing Authentication & Access Control
Azure Developer: Implementing Secure Data Solutions
Azure Developer: Kubernetes Service Solutions
Azure Developer: Media Services Solutions
Azure Developer: PaaS Web Applications
Azure Developer: Relational Database Solutions
Azure Developer: Storage Solutions
Azure Developer: Storage Tables
Azure Developer: Working With Azure Functions
Azure Developer: Working with Azure Service Fabric
Azure Functions and API Management
Azure Fundamentals: Azure Data Privacy
Azure Fundamentals: Azure Network Security
Azure Fundamentals: Azure Security Services
Azure Fundamentals: Big Data Analytics
Azure Fundamentals: Monitoring the Azure Environment
Azure Fundamentals: Network Components
Azure Fundamentals: Storage Components
Azure Fundamentals: Virtual Machines
Azure Networking
Azure Security and Monitoring
Azure Service Fabric Apps
Azure SQL Database and Caching
Azure SQL DB and ARM Templates
Azure Storage and the Azure Environment
Azure Storage Tables and Queues
Azure Virtual Machine Management
Azure VM Monitoring and Availability
Azure VM Scaling and Storage
Configure Azure VM Networking Storage Scaling and Monitoring
Configuring Azure VM Networking
Configuring Azure Websites
Cosmos DB and Azure Search
Create and Manage Azure Virtual Machines (VMs)
Creating Virtual Machines (VMs) and Workloads
Designing and Implementing Azure Apps
Designing Web Apps
Implementing Communication and Messaging Strategies
Managing and Monitoring Azure Storage
Managing Azure VMs
Microsoft Azure – Architecting Solutions: Design Web Sites
Microsoft Azure – Architecting Solutions: Designing a Continuity Strategy
Microsoft Azure – Architecting Solutions: Designing a Management Strategy
Microsoft Azure – Architecting Solutions: Designing Advanced Applications
Microsoft Azure – Architecting Solutions: Designing Storage and Data Access
Microsoft Azure – Architecting Solutions: Infrastructure and Networking
Microsoft Azure – Architecting Solutions: Securing Resources
Microsoft Azure – Architecting Solutions: Service Support for Azure Data
SK - IT - Cloud Computing - Azure Developer AZ-200
Azure Developer: Caching & Content Delivery Solutions
Azure Developer: Cosmos DB Storage Solutions
Azure Developer: Creating Mobile Apps
Azure Developer: File Storage Solutions
Azure Developer: Media Services Solutions
Azure Developer: PaaS Web Applications
Azure Developer: Storage Solutions
Azure Developer: Storage Tables
Azure Developer: Working with Azure Logic Apps
Azure Developer: Working with Azure Service Fabric
SK - IT - Cloud Computing - Azure Developer AZ-400
AZ-400 - MS Azure DevOps Solutions: Dependency Management & Security Compliance
AZ-400 - MS Azure DevOps Solutions: Implement Continuous Feedback
AZ-400 - MS Azure DevOps Solutions: Implement Infrastructure as Code
AZ-400 - MS Azure DevOps Solutions: Infrastructure as Code & Security Compliance
SK - IT - Cloud Computing - Azure Developer AZ-500
AZ-500 - Microsoft Azure Security Technologies: Azure AD Connect
AZ-500 - Microsoft Azure Security Technologies: Azure AD Group Management
AZ-500 - Microsoft Azure Security Technologies: Azure AD User Management
AZ-500 - Microsoft Azure Security Technologies: Azure Key Vault
AZ-500 - Microsoft Azure Security Technologies: Azure RBAC & Policies
AZ-500 - Microsoft Azure Security Technologies: Azure Security Center
AZ-500 - Microsoft Azure Security Technologies: Azure Storage Account Security
AZ-500 - Microsoft Azure Security Technologies: Data Classification
AZ-500 - Microsoft Azure Security Technologies: Database Security
AZ-500 - Microsoft Azure Security Technologies: Database User Access
AZ-500 - Microsoft Azure Security Technologies: Identity & Access Management
AZ-500 - Microsoft Azure Security Technologies: Monitoring Logging & Alerts
AZ-500 - Microsoft Azure Security Technologies: Network Security
AZ-500 - Microsoft Azure Security Technologies: Review Course 1
AZ-500 - Microsoft Azure Security Technologies: Review Course 2
AZ-500 - Microsoft Azure Security Technologies: VM Security
AZ-500 - Microsoft Azure Security Technologies: VPNs
AZ-500 - Microsoft Azure Security Technologies: Web Application Security
AZ-500 - Microsoft Azure Security Technologies:Application Containers
SK - IT - Cloud Computing - Azure Web Services
Developing Azure & Web Services: Entity Framework
Developing Azure & Web Services: Introduction
Developing Azure and Web Services: Azure Scalability
Developing Azure and Web Services: Azure Storage
Developing Azure and Web Services: Configuring Web Applications for Deployment
Developing Azure and Web Services: Deployment Strategy
Developing Azure and Web Services: Diagnostics Debugging and ACS
Developing Azure and Web Services: Hosting Web APIs
Developing Azure and Web Services: Managing Data
Developing Azure and Web Services: WCF Transactions and Services
Developing Azure and Web Services: Web API Services
Developing Azure and Web Services: Working with Assemblies
Developing Azure and Web Services:API Management and Monitoring
SK - IT - Cloud Computing - Certified AWS Solution Architect - Associate 2018
AWS Associate Solution Architect: Amazon CloudFront and Route 53
AWS Associate Solution Architect: Amazon Machine Images
AWS Associate Solution Architect: Architecting for the Cloud
AWS Associate Solution Architect: Architecture Security
AWS Associate Solution Architect: Caching
AWS Associate Solution Architect: Database Managed Services
AWS Associate Solution Architect: High Availability
AWS Associate Solution Architect: Managing AWS
AWS Associate Solution Architect: Optimizing Compute Resources
AWS Associate Solution Architect: Optimizing Storage
AWS Associate Solution Architect: Scalability and Elasticity
AWS Associate Solution Architect: Virtual Private Cloud
SK - IT - Cloud Computing - Certified AWS Solution Architect - Associate 2019
AWS Associate Solutions Architect 2019: Storage Solutions
AWS Associate Solutions Architect 2020: Application Scalability
AWS Associate Solutions Architect 2020: Database Solutions
AWS Associate Solutions Architect 2020: Identity & Access Management
AWS Associate Solutions Architect 2020: Network Options
AWS Associate Solutions Architect 2020: Security
AWS Associate Solutions Architect 2020: Storage Security & Resiliency
SK - IT - Cloud Computing - Certified Cloud Security Professional (CCSP)
CCSP 2019: Application Development & Security
CCSP 2019: Cloud Infrastructure
CCSP 2019: Cloud System Architecture Design
CCSP 2019: Data Retention & Events
CCSP 2019: Data Security Technologies
CCSP 2019: Identity & Access Management
CCSP 2019: Implementing Data Discovery & Classification
CCSP 2019: Operational Controls & Standards
Cloud Application Security
Cloud Data Security
Cloud Service – Legal and Compliance
Cloud Service – Operations Management
Cloud System Architecture – Concepts and Design
Cloud System Security - Platform and Infrastructure
SK - IT - Cloud Computing - Cloud Platform Security
Cloud Platform Security: Designing Secure Access
Cloud Platform Security: Incident Response & Remediation
Cloud Platform Security: Infrastructure Protection
Cloud Platform Security: Platform & Infrastructure Security
Cloud Platform Security: System Monitoring & Protection
SK - IT - Cloud Computing - Cloud Security Administration
Cloud Security Administration: Cloud Data & Application Security
Cloud Security Administration: Continuous Operational Improvement
Cloud Security Administration: Hardened Cloud Security
Cloud Security Administration: Infrastructure Planning
Cloud Security Administration: Regulatory Conformance
SK - IT - Cloud Computing - Cloud Security Management
Cloud Security Management: Architecture Security
Cloud Security Management: Data Security
Cloud Security Management: Legal & Compliance
Cloud Security Management: Operations Security
Cloud Security Management: Platform & Infrastructure Security
Cloud Security Management: Risk Management
SK - IT - Cloud Computing - CompTIA Cloud+ CV0-001
Cloud Computing for the Business User: Concepts and Moving to the Cloud
Cloud Computing Fundamentals: Cloud Security
Cloud Computing Fundamentals: Identity Presence and Privacy
Cloud Computing Fundamentals: Migrating to the Cloud
Cloud Computing Fundamentals: Overview
Cloud Computing Fundamentals: Storing and Managing Cloud Data
Cloud Computing Fundamentals: Virtualization and Data Centers
CompTIA Cloud+ CV0-001: Cloud Fundamentals
CompTIA Cloud+ CV0-001: Cloud Management
CompTIA Cloud+ CV0-001: Cloud Security
CompTIA Cloud+ CV0-001: Data Center Infrastructure
CompTIA Cloud+ CV0-001: Managing Cloud Systems
CompTIA Cloud+ CV0-001: Virtualization
CompTIA Cloud+ CV0-002: Disaster Recovery
CompTIA Cloud+ CV0-002: Performance Management
CompTIA Cloud+ CV0-002: Planning Cloud Compute Resources
CompTIA Cloud+ CV0-002: Planning Cloud Deployments
CompTIA Cloud+ CV0-002: Planning Cloud Migrations and Extensions
CompTIA Cloud+ CV0-002: Planning Cloud Networking
CompTIA Cloud+ CV0-002: Planning Cloud Storage Resources
CompTIA Cloud+ CV0-002: Security Configurations and Compliance Controls
CompTIA Cloud+ CV0-002: Security Technologies and Automation Techniques
CompTIA Cloud+ CV0-002: System Patching and Maintenance
CompTIA Cloud+ CV0-002: Troubleshooting Deployments
SK - IT - Cloud Computing - CompTIA Cloud+ CV0-002
Final Exam: CompTIA Cloud+
SK - IT - Cloud Computing - General
Administrating XenDesktop 7.5 and Hypervisor Management
Configuring Citrix XenDesktop 7.6 Components
Configuring OpenStack
Hybrid Cloud Architecture & Deployment: Adopting Migration Strategies
Hybrid Cloud Architecture & Deployment: AWS Data & Service Migration
Hybrid Cloud Architecture & Deployment: AWS Migration Management
Hybrid Cloud Architecture & Deployment: AWS Services & Application Migration
Hybrid Cloud Architecture & Deployment: Azure IaaS & Data Migration tools
Hybrid Cloud Architecture & Deployment: Azure Migration Tools & Best Practices
Hybrid Cloud Architecture & Deployment: Cloud Migration Essentials
Hybrid Cloud Architecture & Deployment: Implementing Migration in Azure
Implementing OpenStack
Managing a Citrix XenDesktop 7.6 Environment
Managing XenDesktop 7.5 Desktops and Applications
Monitoring a Citrix XenDesktop 7.6 Environment
Troubleshooting a Citrix XenDesktop 7.6 Environment
SK - IT - Cloud Computing - Google
APIs and Machine Learning
CLI Cloud Resource Management
Cloud Identity Management
Cloud Solution Management & Testing
Container Compute and App Engine with Networking Services
Continued Dataproc Operations
Dataflow Autoscaling Pipelines
Dataproc Architecture
Deeper through GCP Analytics and Scaling
Fundamentals of Big Query
G Suite: E-mail and Calendar Management
G Suite: Group and OU Management
G Suite: Security Service and Mobile Device Management
GCP Big Data and Security
GCP Engineering and Streaming Architecture
GCP Network Data Processing Models
Google Cloud
Google Cloud Basics
Google Cloud Big Data and Machine Learning
Google Cloud Data Storage
Google Cloud Dataproc
Google Cloud Design
Google Cloud Network Components
Google Cloud Platform Fundamentals
Google Cloud Platform Storage and Analytics
Google Cloud Programmatic Access
Google Cloud SQL for Developers: Instance Management in the Developers Console
Google Cloud SQL for Developers: Interacting Connecting and Management
Google Cloud Troubleshooting
Google Cloud Virtual Machine Configuration
Google Cloud Virtual Machine Deployment
Google Cloud Web Applications and Name Resolution
Google G Suite Admin: User Management
Google G Suite Admin: User Management
Implementations with BigQuery for Big Data
Machine Learning with TensorFlow and Cloud ML
Monitoring & Logging
Streaming Pipelines and Analytics
SK - IT - Cloud Computing - Microsoft 365
Microsoft 365 Fundamentals: Mobile Management & Security and Compliance
MS-900 - Microsoft 365 Fundamentals: Deployment Planning Azure & Updates
MS-900 - Microsoft 365 Fundamentals: Microsoft 365 Pricing and Support
SK - IT - Cloud Computing - Microsoft System Center 2012 R2
Microsoft System Center 2012 R2 – Configure and Deploy: Application Delivery
Microsoft System Center 2012 R2 – Configure and Deploy: Automation
Microsoft System Center 2012 R2 – Configure and Deploy: Building Private Clouds
Microsoft System Center 2012 R2 – Configure and Deploy: DPM
Microsoft System Center 2012 R2 – Configure and Deploy: Extending & Maintaining
Microsoft System Center 2012 R2 – Configure and Deploy: Monitoring
Microsoft System Center 2012 R2 – Configure and Deploy: Service Management
Microsoft System Center 2012 R2 – Configure and Deploy: VMM Overview
Microsoft System Center 2012 R2 – Monitor and Operate: Backup and Recovery
Microsoft System Center 2012 R2 – Monitor and Operate: Compliance
Microsoft System Center 2012 R2 – Monitor and Operate: Deploying Cloud Services
Microsoft System Center 2012 R2 – Monitor and Operate: Monitoring Cloud Services
Microsoft System Center 2012 R2 – Monitor and Operate: Private Cloud Overview
Microsoft System Center 2012 R2 – Monitor and Operate: Problem Management
Microsoft System Center 2012 R2 – Monitor and Operate: Service Management
Microsoft System Center 2012 R2 – Monitor and Operate: SLAs Widgets & Dashboards
SK - IT - Cloud Computing - MS-201: Implementing a Hybrid and Secure Messaging Platform
MS-201 - Implementing a Hybrid and Secure Messaging Platform: Address Lists
MS201 - Implementing a Hybrid and Secure Messaging Platform: Advanced Threat Protection (ATP)
MS-201 - Implementing a Hybrid and Secure Messaging Platform: Compliance
MS201 - Implementing a Hybrid and Secure Messaging Platform: Deploying Hybrid Environments
MS-201 - Implementing a Hybrid and Secure Messaging Platform: E-mail Address Policies and Workload Management
MS201 - Implementing a Hybrid and Secure Messaging Platform: Message Hygiene
MS-201 - Implementing a Hybrid and Secure Messaging Platform: Migration
MS-201 - Implementing a Hybrid and Secure Messaging Platform: Offline Address Books (OAB)
MS-201 - Implementing a Hybrid and Secure Messaging Platform: Planning Hybrid Environments
MS-201 - Implementing a Hybrid and Secure Messaging Platform: Public Folders
MS-201 - Implementing a Hybrid and Secure Messaging Platform: Retention & Data Loss Prevention
MS-201 - Implementing a Hybrid and Secure Messaging Platform: Role-based Permissions
MS-201 - Implementing a Hybrid and Secure Messaging Platform: Sharing
SK - IT - Cloud Computing - Planning and Configuring a Messaging Platform - MS-200
MS-200 - Configuring a Messaging Platform: Client Access
MS-200 - Configuring a Messaging Platform: Connectors
MS-200 - Configuring a Messaging Platform: Database Availability Groups
MS-200 - Configuring a Messaging Platform: Disaster Recovery
MS-200 - Configuring a Messaging Platform: Messaging Infrastructure Lifecycle
MS-200 - Configuring a Messaging Platform: Recipient Resources
MS-200 - Configuring a Messaging Platform: Transport Pipeline
SK - IT - Cloud Computing - Virtualizing Enterprise Desktops and Apps
Virtualizing Enterprise Desktops and Apps: App-V Clients and App Sequencing
Virtualizing Enterprise Desktops and Apps: Plan App Virtualization and Use MAP
Virtualizing Enterprise Desktops and Apps: Plan for Resilient Virtualized Apps
Virtualizing Enterprise Desktops and Apps: RemoteApps
Virtualizing Enterprise Desktops and Apps: VM-based and Session-based RDS
SK - IT - CompTIA A+
CompTIA A+ 220-1001: Basic Cable Types
CompTIA A+ 220-1001: Cloud Computing
CompTIA A+ 220-1001: Common Devices
CompTIA A+ 220-1001: Configuring a Wired/Wireless Network
CompTIA A+ 220-1001: Connectors
CompTIA A+ 220-1001: Custom PC configuration
CompTIA A+ 220-1001: Implementing Network Concepts
CompTIA A+ 220-1001: Network Hosts
CompTIA A+ 220-1001: Network Types
CompTIA A+ 220-1001: Networking
CompTIA A+ 220-1001: Networking Tools
CompTIA A+ 220-1001: Power Supplies
CompTIA A+ 220-1001: Printers
CompTIA A+ 220-1001: Random Access Memory
CompTIA A+ 220-1001: Resolving Problems
CompTIA A+ 220-1001: SOHO Devices
CompTIA A+ 220-1001: Storage Solutions
CompTIA A+ 220-1001: TCP and UDP ports
CompTIA A+ 220-1001: Troubleshooting
CompTIA A+ 220-1001: Troubleshooting Printers
CompTIA A+ 220-1001: Virtualization
CompTIA A+ 220-1001: Wireless Networking Protocols
CompTIA A+ 220-1001: Working with Motherboards CPUs & Add-On Cards
CompTIA A+ 220-1001: Working with Peripheral Devices
CompTIA A+ 220-1002: Application Installation Networking & Tools
CompTIA A+ 220-1002: Comparing Common Operating Systems
CompTIA A+ 220-1002: Critical Security Concepts
CompTIA A+ 220-1002: Microsoft Command Line Tools
CompTIA A+ 220-1002: Microsoft Operating System Installation & Upgrade
CompTIA A+ 220-1002: MS Operating System Administrative Tools
CompTIA A+ 220-1002: Security Fundamentals
CompTIA A+ 220-1002: Software Troubleshooting
CompTIA A+ 220-1002: System Utilities
CompTIA A+ 220-1002: System Utilities
CompTIA A+ 220-1002: Windows Control Panel Utilities
CompTIA A+ 220-901: Computer Hardware Troubleshooting
CompTIA A+ 220-901: Internet Connectivity
CompTIA A+ 220-901: Laptops
CompTIA A+ 220-901: Memory and Storage
CompTIA A+ 220-901: Mobile Devices
CompTIA A+ 220-901: Monitors and Output Devices
CompTIA A+ 220-901: Networking
CompTIA A+ 220-901: PC Components
CompTIA A+ 220-901: Printers
CompTIA A+ 220-901: Troubleshooting Networking Devices
CompTIA A+ 220-901: Troubleshooting Printers
CompTIA A+ 220-902: A Practical Approach to Troubleshooting
CompTIA A+ 220-902: Adding Hardware to Windows and Storage Options
CompTIA A+ 220-902: Common Troubleshooting and Security Practices
CompTIA A+ 220-902: Desktop Security
CompTIA A+ 220-902: Introduction to Mobile Operating Systems
CompTIA A+ 220-902: Introduction to Virtualization and Basic Security Concepts
CompTIA A+ 220-902: Introduction to Windows
CompTIA A+ 220-902: Mac OSX Features and an Introduction to Linux
CompTIA A+ 220-902: Mobile Troubleshooting
CompTIA A+ 220-902: Monitoring the Windows OS and an Introduction to Other OSs
CompTIA A+ 220-902: Networking with the Windows Operating System
CompTIA A+ 220-902: Operational Procedures
CompTIA A+ 220-902: Safety
CompTIA A+ 220-902: Shell and Terminal Commands for Linux or Mac OSX
CompTIA A+ 220-902: Various Features and Requirements of Microsoft OS
CompTIA A+ 220-902: Windows Applications and Features
CompTIA A+ 220-902: Windows Interaction and Personalization
CompTIA A+ 220-902: Windows Overview and Installation
CompTIA A+ 220-902: Windows Security Features and Management
CompTIA A+ 220-902: Windows Utilities and Management
CompTIA A+ Exam 220-901: BIOS and Startup
CompTIA A+ Exam 220-901: BIOS Motherboards
CompTIA A+ Exam 220-901: Broadband Routers
CompTIA A+ Exam 220-901: Connectors and Connections
CompTIA A+ Exam 220-901: CPUs
CompTIA A+ Exam 220-901: Different Computer Form Factors
CompTIA A+ Exam 220-901: Display Devices
CompTIA A+ Exam 220-901: Internet Connections
CompTIA A+ Exam 220-901: Introduction to Networking
CompTIA A+ Exam 220-901: Miscellaneous Tools and Connectors
CompTIA A+ Exam 220-901: Mobile Computing
CompTIA A+ Exam 220-901: Motherboards
CompTIA A+ Exam 220-901: Network Protocols and Cabling
CompTIA A+ Exam 220-901: Peripheral Devices
CompTIA A+ Exam 220-901: Portable Computer Hardware
CompTIA A+ Exam 220-901: Printer Maintenance
CompTIA A+ Exam 220-901: Printers
CompTIA A+ Exam 220-901: RAM
CompTIA A+ Exam 220-901: Storage Solutions
CompTIA A+ Exam 220-901: Troubleshooting Peripheral and Mobile Devices
CompTIA A+ Exam 220-901: Troubleshooting Printers
CompTIA A+ Exam 220-901: Wireless Networking
CompTIA A+ Exam 220-902: Non-desktop Technologies
CompTIA A+ Exam 220-902: Non-Windows Operating Systems
CompTIA A+ Exam 220-902: Troubleshooting
CompTIA A+ Exam 220-902: Using and Managing Windows
CompTIA A+ Exam 220-902: Windows Networking
SK - IT - CompTIA Linux+
CompTIA Linux+ 2014 Powered By LPI: LX0-103: Advanced GNU and Unix Commands
CompTIA Linux+ 2014 Powered By LPI: LX0-103: Devices and Filesystems
CompTIA Linux+ 2014 Powered By LPI: LX0-103: GNU and Unix Commands
CompTIA Linux+ 2014 Powered By LPI: LX0-103: Installation and Package Management
CompTIA Linux+ 2014 Powered By LPI: LX0-103: System Architecture
CompTIA Linux+ 2014 Powered By LPI: LX0-104 Essential System Services
CompTIA Linux+ 2014 Powered By LPI: LX0-104 Networking Fundamentals
CompTIA Linux+ 2014 Powered By LPI: LX0-104 Scripting and Administrative Tasks
CompTIA Linux+ 2014 Powered By LPI: LX0-104 Security Data and Accessibility
CompTIA Linux+ XK0-004: Backup & Restore
CompTIA Linux+ XK0-004: Boot Process & Kernel
CompTIA Linux+ XK0-004: Bourne-again Shell & Scripting
CompTIA Linux+ XK0-004: Disk Partitions & File Systems
CompTIA Linux+ XK0-004: File Access & Permissions
CompTIA Linux+ XK0-004: Git Version Control
CompTIA Linux+ XK0-004: Graphical User Interfaces
CompTIA Linux+ XK0-004: Installing & Managing Software
CompTIA Linux+ XK0-004: Installing CentOS
CompTIA Linux+ XK0-004: Installing Software from Source Code
CompTIA Linux+ XK0-004: Installing Ubuntu
CompTIA Linux+ XK0-004: Introduction to Linux & the Command Line
CompTIA Linux+ XK0-004: Locating & Manipulating Files
CompTIA Linux+ XK0-004: Logical Volumes & Filesystem Hierarchy
CompTIA Linux+ XK0-004: Managing & Configuring Hardware
CompTIA Linux+ XK0-004: Managing Services
CompTIA Linux+ XK0-004: Managing Users & Groups
CompTIA Linux+ XK0-004: Network Firewall & Traffic Filtering
CompTIA Linux+ XK0-004: Scheduling Tasks
CompTIA Linux+ XK0-004: Searching & Manipulating File Contents
CompTIA Linux+ XK0-004: Security Best Practices
CompTIA Linux+ XK0-004: SELinux & AppArmor
CompTIA Linux+ XK0-004: TCP/IP & Networking
CompTIA Linux+ XK0-004: Troubleshooting Network Connections
CompTIA Linux+ XK0-004: Troubleshooting Services
CompTIA Linux+ XK0-004: Using vi/vim to Edit Files
SK - IT - CompTIA Network+
Additional Network Services
CompTIA Network+ N10-007: Cloud Concepts Network Services & Cabling Solutions
CompTIA Network+ N10-007: Network Monitoring & Remote Access Methods
CompTIA Network+ N10-007: Network Storage Virtualization & WAN Technologies
CompTIA Network+ N10-007: Network Topologies & Technologies
CompTIA Network+ N10-007: Networking Devices
CompTIA Network+ N10-007: Ports and Protocols and the OSI Model
CompTIA Network+ N10-007: Security Devices Wireless Security & Access Control
CompTIA Network+ N10-007: Troubleshooting Connectivity & Performance Issues
CompTIA Network+ N10-007: Troubleshooting Methodology & Tools
Documentation and Diagrams & Business Continuity
Mitigation Techniques
Network Attacks & Device Hardening
Policies and Best Practices
Routing Switching & IP Addressing
Troubleshooting Common Network Service Issues
SK - IT - CompTIA Networking Internetworking and Security Technologies
CompTIA Mobility+ MB0-001: Mobile Device Management 1
CompTIA Mobility+ MB0-001: Mobile Device Management 2
CompTIA Mobility+ MB0-001: Network Infrastructure
CompTIA Mobility+ MB0-001: Over The Air Technologies
CompTIA Mobility+ MB0-001: Security
CompTIA Mobility+ MB0-001: Troubleshooting 1
CompTIA Mobility+ MB0-001: Troubleshooting 2
CompTIA Network+ N10-006: Industry Standards Practices and Network Theory
CompTIA Network+ N10-006: Industry Standards Practices and Network Theory
CompTIA Network+ N10-006: Network Architecture Part 1
CompTIA Network+ N10-006: Network Architecture Part 2
CompTIA Network+ N10-006: Network Operations Part 1
CompTIA Network+ N10-006: Network Operations Part 2
CompTIA Network+ N10-006: Network Security
CompTIA Network+ N10-006: Troubleshooting Part 1
CompTIA Network+ N10-006: Troubleshooting Part 2
CompTIA PenTest+: Application-Based Vulnerabilities
CompTIA PenTest+: Information Gathering
CompTIA PenTest+: Local Host Vulnerabilities
CompTIA PenTest+: Network-Based Exploits
CompTIA PenTest+: Post-Exploitation and Facilities Attacks
CompTIA PenTest+: Scoping an Engagement
CompTIA PenTest+: Social Engineering and Specialized System Attacks
CompTIA PenTest+: Vulnerability Identification
CompTIA Security+ SY0-401: Continuity Disaster Recovery and Computer Forensics
CompTIA Security+ SY0-401: Control Fundamentals and Security Threats
CompTIA Security+ SY0-401: Creating Secure Networks
CompTIA Security+ SY0-401: Cryptographic Methods and Public Key Infrastructures
CompTIA Security+ SY0-401: Network Protocols Attacks and Defenses
CompTIA Security+ SY0-401: Remote Access Mobile and Wireless Security
CompTIA Security+ SY0-401: Secure Account Management Security Policies and LDAP
CompTIA Security+ SY0-401: Securing a Networked Environment
CompTIA Security+ SY0-401: Vulnerability Assessment and Penetration Testing
CompTIA Security+ SY0-501: Analyzing Output from Security Technologies
CompTIA Security+ SY0-501: Application and Service Attacks
CompTIA Security+ SY0-501: Business Impact Analysis and Risk Management
CompTIA Security+ SY0-501: Cloud Virtualization and Resiliency Concepts
CompTIA Security+ SY0-501: Common Account Management Practices
CompTIA Security+ SY0-501: Components Supporting Organizational Security
CompTIA Security+ SY0-501: Cryptographic and Wireless Attacks
CompTIA Security+ SY0-501: Cryptography
CompTIA Security+ SY0-501: Deploying Mobile Devices Securely
CompTIA Security+ SY0-501: Frameworks Guidelines and Physical Security
CompTIA Security+ SY0-501: Identity and Access Management Controls
CompTIA Security+ SY0-501: Identity Concepts and Access Services
CompTIA Security+ SY0-501: Impacts from Vulnerability Types
CompTIA Security+ SY0-501: Implement Secure Network Architecture Concepts
CompTIA Security+ SY0-501: Implementing Secure Protocols
CompTIA Security+ SY0-501: Incident Response Forensics and Disaster Recovery
CompTIA Security+ SY0-501: Penetration Testing and Vulnerability Scanning
CompTIA Security+ SY0-501: Policies Plans and Procedures
CompTIA Security+ SY0-501: Public Key Infrastructure
CompTIA Security+ SY0-501: Secure System and Application Design and Deployment
CompTIA Security+ SY0-501: Security Assessment Using Software Tools
CompTIA Security+ SY0-501: Social Engineering and Related Attacks
CompTIA Security+ SY0-501: The Present Threat Landscape
CompTIA Security+ SY0-501: Troubleshooting Common Security Issues
CompTIA Security+ SY0-501: Types of Malware
CompTIA Security+ SY0-501: Wireless Security Settings
CompTIA Security+ SY0-401: Securing Applications Virtualization and the Cloud
SK - IT - CompTIA Server+
CompTIA Server+ SK0-004: Networking and Disaster Recovery
CompTIA Server+ SK0-004: Security
CompTIA Server+ SK0-004: Server Administration I
CompTIA Server+ SK0-004: Server Administration II
CompTIA Server+ SK0-004: Server Architecture
CompTIA Server+ SK0-004: Storage
CompTIA Server+ SK0-004: Troubleshooting I
CompTIA Server+ SK0-004: Troubleshooting II
SK - IT - Data Management
A/B Testing Bayesian Networks and Support Vector Machine
Clustering Techniques
Correlation & Regression
Data Collection & Exploration
Data Mining Data Distributions & Hypothesis Testing
Data Preprocessing
Data Reduction & Exploratory Data Analysis (EDA)
Key Statistical Concepts
K-Nearest Neighbor (k-NN) & Artificial Neural Networks
Linear and Logistic Regression
Machine Learning Propensity Score & Segmentation Modeling
Model Development Validation & Evaluation
Model Life Cycle Management
Predictive Analytics & Big Data
Process & Application
Random Forests & Uplift Models
Text Mining & Social Network Analysis
Time Series Modeling
SK - IT - Data Science
Advanced Visualizations & Dashboards: Visualization Using Python
Advanced Visualizations & Dashboards: Visualization Using R
Analyzing Data Using Python: Cleaning & Analyzing Data in Pandas
Analyzing Data Using Python: Importing Exporting & Analyzing Data With Pandas
Balancing the Four Vs of Data: The Four Vs of Data
Batch Solutions with Hive and Apache Pig
Blockchain & Hyperledger Fabric: An Overview of Blockchain Technology
Blockchain & Hyperledger Fabric: An Overview of Hyperledger
Blockchain & Hyperledger Fabric: The Hyperledger Fabric
Building Data Pipelines
Building Decentralized Applications for Ethereum: Bespoke Ethereum Tokens
Building Solutions using Kafka and HBase
Business Reporting: Creating & Formatting Matrix Visualizations in Power BI
Business Reporting: Getting Started with Power BI Desktop for Data Analysis
Business Reporting: Leveraging Treemaps Matrices & Slicers in Power BI
Business Reporting: Visualizing & Merging Data in Power BI
Cloud Data Architecture: Data Management & Adoption Frameworks
Cloud Data Architecture: DevOps & Containerization
Cloud Data Science: Azure AI Gallery and Azure Machine Learning
Cloud Data Science: Consume Models and APIs Using Azure Machine Learning Studio
Cloud Data Science: Data Cleanup with Azure Machine Learning Studio
Cloud Data Science: Deploying Models with Azure Machine Learning Studio
Cloud Data Science: Importing and Exporting in Azure Machine Learning Studio
Cloud Data Science: Introduction to Azure Machine Learning
Cloud Data Science: Microsoft Cognitive Toolkit and Azure Machine Learning
Cloud Data Science: Optimize and Validate Models in Azure Machine Learning Studio
Cloud Data Science: SQL Server & Azure Machine Learning
Cloud Data Science: Summarize Data with Azure Machine Learning Studio
Cloud Data Science: Transforming Data in Azure Machine Learning Studio
Cloud Data Science: Using Algorithms in Azure Machine Learning Studio
Cloud Data Science: Virtual Machines & HDInsight
Cluster Analysis and Ensemble Learning
Complete Guide to Excel 365: Getting Started
Complete Guide to Excel 365: Linking Printing & Protecting Workbooks
Complete Guide to Excel 365: Pivot PowerPivot & Financial Modeling
Complete Guide to Excel 365: Using Formatting Styles & Themes
Complete Guide to Excel 365: Validating Cleaning & Performing Lookups on Data
Complete Guide to Excel 365: What-If Analysis Solver & Analysis ToolPak
Complete Guide to Excel 365: Working With Charts & Sparklines
Create Spark Streaming Applications
Creating Data APIs Using Node.js
Data Access & Governance Policies: Data Access Oversight and IAM
Data Access & Governance Policies: Data Classification Encryption and Monitoring
Data Analysis Application
Data Analysis Concepts
Data Analysis Using Spark SQL and Hive
Data Architecture - Deep Dive: Design & Implementation
Data Architecture - Deep Dive: Microservices & Serverless Computing
Data Architecture Primer
Data Classification and Machine Learning
Data Communication and Visualization
Data Engineering Fundamentals
Data Exploration
Data Filtering
Data Gathering
Data Insights Anomalies & Verification: Handling Anomalies
Data Insights Anomalies & Verification: Machine Learning & Visualization Tools
Data Integration
Data Lake: Architectures & Data Management Principles
Data Lake: Framework & Design Implementation
Data Lake: Framework & Design Implementation
Data Ops 16: Securing Big Data Streams
Data Pipeline: Process Implementation Using Tableau & AWS
Data Pipeline: Using Frameworks for Advanced Data Management
Data Rollbacks: Transaction Management & Rollbacks in NoSQL
Data Rollbacks: Transaction Rollbacks & Their Impact
Data Science 10: Data Research Exploration Techniques
Data Science 2: Data Driven Organizations
Data Science 9: Data Research Techniques
Data Science Overview
Data Science Statisitcs: Applied Inferential Statistics
Data Science Statistics: Common Approaches to Sampling Data
Data Science Statistics: Inferential Statistics
Data Science Statistics: Simple Descriptive Statistics
Data Science Statistics: Using Python to Compute & Visualize Statistics
Data Scientist 14: Data Research Statistical Approaches
Data Silos Lakes & Streams: Introduction
Data Silos Lakes & Streams: Sources Visualizations & ETL Operations
Data Silos Lakes and Streams: Data Lakes on AWS
Data Sources: Implementing Edge on the Cloud
Data Sources: Integration
Data Sources: Integration
Data Tools: Machine Learning & Deep Learning in the Cloud
Data Tools: Technology Landscape & Tools for Data Management
Data Transformation
Data Visualization and Predictive Analytics
Data Wrangler 4: Cleaning Data in R
Data Wrangling in R
Data Wrangling with Pandas: Advanced Features
Data Wrangling with Pandas: Visualizations and Time-Series Data
Data Wrangling with Pandas: Working with Series & DataFrames
Debugging in R
Decision Tree and Classification Analysis
Delivering Dashboards: Exploration & Analytics
Delivering Dashboards: Management Patterns
Deploying Data Tools: Data Science Tools
Develop Real-time Processing Solutions with Apache Storm
DevOps for Data Scientists: Containers for Data Science
DevOps for Data Scientists: Data DevOps Concepts
DevOps for Data Scientists: Data Science DevOps
DevOps for Data Scientists: Deploying Data DevOps
Domain-Specific Tools in R
Ethereum Smart Contracts with Solidity: An Overview of Ethereum and Solidity
Ethereum Smart Contracts with Solidity: Build Decentralized Apps
Ethereum Smart Contracts with Solidity: Data & Control Structures in Solidity
Ethereum Smart Contracts with Solidity: Ether Transfer Operations in Solidity
Ethereum Smart Contracts with Solidity: Features of the Solidity Language
Ethereum Smart Contracts with Solidity: Functions in Solidity
Ethereum Smart Contracts with Solidity: The Remix Solidity IDE
Fundamental Methods for Data Science in R
Getting Started with Hadoop: Advanced Operations Using MapReduce
Getting Started with Hadoop: Developing a Basic MapReduce Application
Getting Started with Hadoop: Filtering Data Using MapReduce
Getting Started with Hadoop: Fundamentals & MapReduce
Getting Started with Hadoop: MapReduce Applications With Combiners
Getting Started with Hive: Bucketing & Window Functions
Getting Started with Hive: Introduction
Getting Started with Hive: Loading and Querying Data
Getting Started with Hive: Optimizing Query Executions
Getting Started with Hive: Optimizing Query Executions with Partitioning
Getting Started with Hive: Viewing and Querying Complex Data
Getting Started with Microsoft Azure HDInsight and Administering clusters
Getting Started with Microsoft R
Google Chart Tools: Advanced Visuals with Charts
Google Chart Tools: Basic Charts
Google Chart Tools: Interacting with Charts
Hadoop HDFS: File Permissions
Hadoop HDFS: Introduction
Hadoop HDFS: Introduction to the Shell
Hadoop HDFS: Working with Files
Harnessing Data Volume & Velocity: Big Data to Smart Data
Implementing Governance Strategies
Importing and Manipulating Data
Interactive Processing using Apache Phoenix on HBase
Interactive Queries with Spark SQL and Interactive Hive
Machine Learning Examples for Data Science in R
Managing HDInsight Data Jobs and Security
Modifying and Summarizing Data
MongoDB for Data Wrangling: Aggregation
MongoDB for Data Wrangling: Querying
Operationalize and Design with Spark
Packages and Data Types
Plotly for Data Visualization: Advanced Charts & Features in Chart Studio
Plotly for Data Visualization: Exploring Chart Studio Visualizations
Powering Recommendation Engines: Recommendation Engines
Programming Techniques in R
R for Data Science: Classification & Clustering
R for Data Science: Data Exploration
R for Data Science: Data Structures
R for Data Science: Data Visualization
R for Data Science: Importing and Exporting Data
R for Data Science: Regression Methods
Raw Data to Insights: Data Ingestion & Statistical Analysis
Raw Data to Insights: Data Management & Decision Making
Regression Analysis
Reinforcement Learning: Essentials
Scalable Data Architectures: Introduction
Scalable Data Architectures: Introduction to Amazon Redshift
Scalable Data Architectures: Working with Amazon Redshift & QuickSight
Smart Contracts & Hyperledger Fabric: Foundations of Hyperledger Fabric
Smart Contracts & Hyperledger Fabric: Hyperledger Composer Playground
Smart Contracts & Hyperledger Fabric: Hyperledger Fabric Web App
Smart Contracts & Hyperledger Fabric: Setting Up a Hyperledger Fabric Network
Smart Contracts & Hyperledger Fabric: Web Apps for Hyperledger Composer Networks
Smart Contracts & Hyperledger Fabric: Working with Fabric Chaincode in Golang
Smart Contracts & Hyperledger Fabric: Working with Fabric Chaincode in NodeJS
Streaming Data Architectures: An Introduction to Streaming Data
Streaming Data Architectures: Processing Streaming Data
Tableau Desktop: Real Time Dashboards
Tableau for Data Visualization: Advanced Features
Tableau for Data Visualization: Exploring Visualizations & Data Formats
Tableau for Data Visualization: Introduction
The R Language and Big Data Processing
Trifacta for Data Wrangling: Wrangling Data
Truffle Suite: Automating Development with the Truffle Framework
Truffle Suite: BlockBuilding Private Blockchain Networks with Ganache
Truffle Suite: Introduction
Truffle Suite: Using Drizzle to Build Decentralized Apps
Working with HDInsight Clusters
SK - IT - Data Visualization
Data Analytics using Power BI: Concepts
Data Analytics Using Power BI: Data Modeling and Visualization
Data Analytics Using Power BI: Data Sourcing and Preparation
Data Visualization: Essentials
Tableau Advanced Visualizations
Tableau Calculations
Tableau Charts
Tableau Charts Maps and Dashboards
Tableau Dashboards and Data Organization
Tableau Data Connections
Tableau Desktop: Analyzing Data
Tableau Desktop: Creating Data Visualizations
Tableau Desktop: Enhancing Data Visualizations
Tableau Desktop: Going Deeper with Maps
Tableau Desktop: Opening & Connecting Data Sources
Tableau Desktop: Performing Calculations
Tableau Desktop: Preparing & Cleaning Data
Tableau Desktop: Presenting & Delivering Vizzes
Tableau Desktop: Working with Data & Fields
Tableau Interface and Sharing
Tableau Maps
Tableau Scripting
Tableau Time Dimensions
Tableau Visualization
Tableau Visualization Design
Untitled Object
SK - IT - Database
Generic Database Fundamentals: Architecture and Normalization Concepts
Generic Database Fundamentals: Relation Algebra SQL and Concurrency Concepts
Generic Design and Modeling Databases: Concepts and Conceptual Design
Generic Design and Modeling Databases: Logical and Physical Design
Introduction to SQL
Introduction to SQL: Managing Table Design
Introduction to SQL: Multiple Tables and Advanced Queries
Introduction to SQL: Views Transactions and SQL Security Architecture
SQL Server Database Fundamentals: Creating Optimizing and Securing Databases
SQL Server Database Fundamentals: Design Principles and Data Manipulation
SK - IT - Database Warehousing
Data Warehouse Essential: Architecure Frameworks and Implementation
Data Warehouse Essential: Concepts
Data Warehousing with Azure: Analytics and Reporting
Data Warehousing with Azure: Architecture & Modeling Techniques
Data Warehousing with Azure: Data Lake Implementation Using Azure
Data Warehousing with Azure: Data Lake Implementation Using Azure
Data Warehousing with Azure: Implementing Azure SQL Data Warehouse
Data Warehousing with Azure: Managing Azure Data Lake
Data Warehousing with Azure: Working with SQL Data Warehouse Objects
Data Warehousing with Hadoop: HDInsight and Retail Sales Implementation Using Hive
Data Warehousing with Hadoop: Managing Big Data Using HDInsight Hadoop
Data Warehousing with Hadoop: Microsoft Analytics Platform System and Hive
Data Warehousing with Hadoop: Spark HDInsight and Cluster Management
SK - IT - DevOps - Automation
Introduction to Automation with Terraform
IT Infrastructure Automation: Automated Monitoring
IT Infrastructure Automation: Automation and Scalability
IT Infrastructure Automation: Introduction to Automation
IT Infrastructure Automation: Version Control and GIT
Python Automation Programming
Terraform Configurations
Terraform Infrastructure
Terraform Provisioning and Modules
Terraform Variables
Text File Processing and RegEx
SK - IT - DevOps - General
Adopting the DevOps Mindset
Advanced Provisioning in Vagrant
Ansible: Ansible for DevOps Provisioning
Ansible: Continuous Delivery and Monitoring Using Ansible Playbook and Tower
ANTS Performance Profiler
Automated Testing with Docker
Automation Using Bash and Expect
Bash Advanced Scripting and File I/O
Bash Scripting Flow Control and Data Types
Best Practices for DevOps Implementation
Building and Administering a Complex Puppet Installation
Building and Administering Complex Jenkins Projects
Building the Puppet Environment
Chef Advanced Administration
Chef for DevOps: Automate Infrastructure Using Chef Tools & Templates
Chef for DevOps: Managing Infrastructure Using Chef
Chef Server Basics
CI/CD Implementation for DevOps
Community Cookbooks and Chef Server Patterns
CompTIA PenTest+: Analyzing Tool and Script Output
CompTIA PenTest+: Application-Based Vulnerabilities
CompTIA PenTest+: Local Host Vulnerabilities
CompTIA PenTest+: Network-Based Exploits
CompTIA PenTest+: Penetration Testing Tools
CompTIA PenTest+: Post-Exploitation and Facilities Attacks
CompTIA PenTest+: Reporting and Communication
Configuration and Troubleshooting in RabbitMQ
Configuring Puppet Environments and Managing Files
Configuring the Puppet Master and Puppet Agent
Creating Application Builds
DevOps Automation: Configuration Management
DevOps Automation: Delivery Mechanisms
DevOps Cloud Automation: Advanced AWS Pipelines and DevOps Using Azure
DevOps Cloud Automation: AWS DevOps Tools
DevOps Cloud Automation: DevOps with Google Cloud Platform
DevOps Collaboration Tools: Tools for Continuous Delivery
DevOps Collaboration Tools: Tools for Continuous Delivery
DevOps Collaboration Tools: Tools for Continuous Integration
DevOps Collaboration Tools: Tools for Continuous Integration
DevOps Continuous Feedback: Implementing Continuous Feedback
DevOps Continuous Feedback: Loop Tools
DevOps Continuous Testing: Testing Approaches
DevOps Continuous Testing: Testing Methodologies
DevOps Fundamentals: Tools Technologies and Infrastructures
DevOps Management and Capabilities
DevOps Methodologies and Development
DevOps Mindset: DevOps Implementation Using Tools
DevOps Mindset: DevOps Principles & Implementation Approach
DevOps Security Considerations: DevSecOps Principles
DevOps Security Considerations: Securing DevOps Pipeline
DevOps Testing and Delivery
DevOps Tools: Selecting the Right Tools
DevOps Troubleshooting Essentials
DevOps Troubleshooting Scenarios
DevOps with Docker: Container Management
DevOps with Docker: Implementing DevOps Using Docker
DevOps with Docker: Management in the Cloud
DevOps with Saltstack: Configuration and Components
DevOps with Saltstack: Remote Execution & State System
Docker and Windows
Docker Configuration and Management
Docker Containers Images and Swarms
Docker Installation and Management
Docker Introduction
Docker Programmatic Access
Elasticsearch Data Management
ELK Operations on the Cloud
Enterprise DevOps with Docker
Exploring CI: Continuous Integration & CI Tools
First Steps with Chef
Getting Started with DevOps Pipelines
Heap Thread and Monitor Dump Analyzer
HP LoadRunner 12 Essentials: Enhancing Vuser Scripts
HP LoadRunner 12 Essentials: Working with Controller and Analysis
HP LoadRunner 12 Essentials: Working with VuGen
IBM Memory Analyzer and Visualizer
IBM Pattern Modeling Analysis Tool
Intermediate Jenkins Considerations
Introduction to Application Performance Engineering
Introduction to Bash Scripting
Introduction to Kubernetes
Introduction to RabbitMQ
Java Application Performance Analysis Tools
JavaScript Objects and Event Handlers
JavaScript Operators Arrays and Functions
Jenkins 2 Nuts and Bolts
Jenkins Administration
Jenkins for DevOps: Automated Testing & Advanced Jobs Using Jenkins
Jenkins for DevOps: Jenkins Configuration for DevOps
Kibana and Reporting Capabilities
Kubernetes & Automation Testing
Kubernetes API and Components
Kubernetes Clusters
Kubernetes Concepts
Kubernetes on Google Cloud Platform
Logstash for Data Ingestion in Elasticsearch
Managing Stacks and Application Deployment
Message Handling and Clustering in RabbitMQ
Navigating Software Testing Tools: Types of Software Testing Tools
Performance Analyzer Features
Promoting DevOps Discipline: DevOps Practices for the Enterprise
Puppet for DevOps: Installing & Working with Puppet Components
Puppet for DevOps: Working with Puppet Bolt & Continuous Delivery for PE
Puppet Refactoring Patterns
Python Applications
Python Data Processing
Python Fundamentals
SaltStack for DevOps: Configuration Management with SaltStack
SaltStack for DevOps: Working with SaltStack Components
Scaling DevOps: Infrastructure at Scale
Scaling DevOps: Pipelines at Scale
Software Testing for DevOps: DevOps Test Tools
Software Testing for DevOps: DevOps Testing Pipeline
Software Testing for DevOps: Testing & DevOps Overview
Test-driven Cookbooks
Testing and Continuous Integration
The DevOps Deployment Pipeline: Implementing DevOps Principles Using Azure Pipelines
The DevOps Deployment Pipeline: Managing Releases Using AWS Pipelines
The DevOps Deployment Pipeline: Pipeline Implementation Using GCP
The Language of DevOps: DevOps Principles & Practices
The Language of DevOps: DevOps Principles & Practices
The Language of DevOps: DevOps Tools & Processes
Using Docker for DevOps: Configuring Docker for Continuous Delivery
Using Docker for DevOps: Introduction to Docker
Using Docker: Benefits and Installation
Using Docker: Customizing and Clustering
Using Docker: Dockerizing Applications
Using Git for DevOps: Managing Conflict & Effectively Using Git Workflow
Using Git for DevOps: Managing Conflict & Effectively Using Git Workflow
Using Git for DevOps: Using Git Effectively
Using Puppet: Configuration and Programming
Using Puppet: Implementation and Benefits
Using Splunk for Data Analysis
Using Vagrant: Configuration
Using Vagrant: Introduction
Vagrant Advanced Administration
Version & Source Control: Basics
Version & Source Control: Working With Source Control Tools
Visualization Using Kibana
Working with Chef Analytics
Working with Chef: Fundamentals
Working with Docker Machine Security and APIs
Working with Puppet Agent and Puppet Apply
SK - IT - DevOps - General Library
DevOps with Ansible: Working with Ansible Features
DevOps with Saltstack: Configuration and Components
DevOps with Saltstack: Overview
DevOps with Saltstack: Remote Execution & State System
SK - IT - DevOps - PowerShell for Server 2016
Introduction to PowerShell 5.0
PowerShell 5.0 Aliases Providers and Objects
PowerShell 5.0 Cmdlet Structure and Help
PowerShell 5.0 Configuration Advanced Help and Queries
PowerShell 5.0 Desired State Configuration (DSC)
PowerShell 5.0 DSC and Azure
PowerShell 5.0 DSC Configurations and Repositories
PowerShell 5.0 DSC Resources
PowerShell 5.0 DSC with Linux and JEA
PowerShell 5.0 Local Configuration Manager (LCM)
PowerShell 5.0 Output Formatting Modules and Customization
PowerShell 5.0 Remote Management
PowerShell 5.0 Resource Creation and Configuration
PowerShell 5.0 Syntax Help and Conditionals
SK - IT - ITIL
ITIL 2011 Edition OSA: Function Activities
ITIL 2011 Edition OSA: Incident Management Interactions
ITIL 2011 Edition OSA: Introduction to Access Management
ITIL 2011 Edition OSA: Introduction to Event Management
ITIL 2011 Edition OSA: Introduction to Functions
ITIL 2011 Edition OSA: Introduction to Incident Management
ITIL 2011 Edition OSA: Introduction to Operational Support and Analysis
ITIL 2011 Edition OSA: Introduction to Problem Management
ITIL 2011 Edition OSA: Introduction to Request Fulfillment
ITIL 2011 Edition OSA: Introduction to the Service Desk
ITIL 2011 Edition OSA: Problem Management Process Interfaces and Challenges
ITIL 2011 Edition OSA: Request Fulfillment Process Interfaces and Challenges
ITIL 2011 Edition OSA: Service Desk Metrics and Outsourcing
ITIL 2011 Edition OSA: Technology and Implementation Considerations
ITIL 4 Foundation: General Management Practices
ITIL 4 Foundation: Introduction
ITIL 4 Foundation: Key Concepts
ITIL 4 Foundation: Key Concepts of Service Management
ITIL 4 Foundation: Service Management Practices (Part 1)
ITIL 4 Foundation: Service Management Practices (Part 2)
ITIL 4 Foundation: The Guiding Principles
ITIL 4 Foundation: The Service Value Chain
ITIL 4 Foundation: The Service Value System
ITIL Continual Service Improvement
ITIL Service Design Concepts
ITIL Service Design Processes
ITIL Service Operation Concepts
ITIL Service Operation Processes
ITIL Service Strategy Concepts
ITIL Service Strategy Processes
ITIL Service Transition Concepts and Processes
Overview of the ITIL Service Lifecycle
SK - IT - MariaDB
SQL Programming with MariaDB: Analyzing Relational Data
SQL Programming with MariaDB: Getting Started with MariaDB for Data Analysis
SQL Programming with MariaDB: Using Joins Triggers & Stored Procedures
SK - IT - Microsoft Dynamics
Application Skills in Microsoft Dynamics CRM 2013
Customer Service Automation in Microsoft Dynamics CRM 2013
Marketing Automation in Microsoft Dynamics CRM 2013
Microsoft Dynamics CRM 2013 - Customization and Configuration: Entities
Microsoft Dynamics CRM 2013 - Customization and Configuration: Introduction
Microsoft Dynamics CRM 2013 - Customization and Configuration: Relationships
Microsoft Dynamics CRM 2013: Forms Marketing Contacts and Processes
Sales Automation in Microsoft Dynamics CRM 2013
SK - IT - Microsoft Exchange Server 2013
Microsoft Exchange Server 2013 - Advanced Solutions: Advanced Security
Microsoft Exchange Server 2013 - Advanced Solutions: Availability
Microsoft Exchange Server 2013 - Advanced Solutions: Compliance and Discovery
Microsoft Exchange Server 2013 - Advanced Solutions: Migration and Federation
Microsoft Exchange Server 2013 - Advanced Solutions: Site-resilience Solutions
Microsoft Exchange Server 2013 - Advanced Solutions: Troubleshooting
Microsoft Exchange Server 2013 - Advanced Solutions: Unified Messaging
SK - IT - Microsoft Exchange Server 2016
Collaboration in Exchange 2016
Design and Secure Remote Access and Multiple Namespaces Solutions
Exchange 2016 Migration Federation and Sharing
Message Records Management
Planning for and Deploying Mailbox Servers
Recovery Strategies And Client Access Services
Security Strategies
Server 2016: Advanced Network Infrastructures
Server 2016: Configuring DNS Zones
Server 2016: DHCP Management
Server 2016: DNS Name Resolution
Server 2016: Implementing IP Address Management (IPAM)
Server 2016: IPv4 and IPv6 Address Management
Server 2016: Network Connectivity and Remote Access
Server 2016: Securing Remote Authentication
Server 2016: Supporting Branch Office Technologies
Understanding Mailflow and Auditing
SK - IT - Microsoft Mobility and Device Fundamentals
Cloud Services and Enterprise Mobility
Data Management and Device Security
Device Configuration and Data Access
Windows 10: Designing for Cloud and Hybrid Identity
Windows 10: Designing for Data Access Protection and Remote Access
Windows 10: Designing for Device Access and Protection
Windows 10: Planning for Apps Updates and Recovery
SK - IT - Microsoft Office 365
Client Connectivity and Administrator Roles in Office 365
Enabling Office 365 Service: Telemetry
Enabling Office 365 Services: Collaboration Solutions
Enabling Office 365 Services: Configuring and Managing Skype for Business Online
Enabling Office 365 Services: Exchange Online Addresses Mailboxes Archiving
Enabling Office 365 Services: Exchange Online Policy Migration and Compliance
Enabling Office 365 Services: Managing Client User-driven and IT Deployments
Enabling Office 365 Services: SharePoint Online Sharing & Site Collections
Managing Identities in Office 365
Managing Office 365 Cloud Identities Synchronization and Clients
Managing Office 365 Identities Using Azure AD Connect
Managing Office 365 Identities with PowerShell
Microsoft 365 Mobility & Security: Implementing Mobile Device Management
Monitoring and Troubleshooting Office 365 Usage
Monitoring Office 365 Usage
MS-101 - Microsoft 365 Mobility & Security: Auditing
MS-101 - Microsoft 365 Mobility & Security: Azure Information Protection
MS-101 - Microsoft 365 Mobility & Security: Cloud App Security
MS-101 - Microsoft 365 Mobility & Security: Data Governance
MS-101 - Microsoft 365 Mobility & Security: Data Loss Prevention
MS-101 - Microsoft 365 Mobility & Security: Devices & Apps
MS-101 - Microsoft 365 Mobility & Security: eDiscovery
MS-101 - Microsoft 365 Mobility & Security: Managing Device Compliance
MS-101 - Microsoft 365 Mobility & Security: Security Reports & Alerts
MS-101 - Microsoft 365 Mobility & Security: Threat Management
MS-101 - Microsoft 365 Mobility & Security: Windows 10 Deployment
MS-101 - Microsoft 365 Mobility & Security: Windows Defender Threat Protection
MS-101 - Microsoft 365 Mobility & Security: Windows Defender Threat Protection
MS-900 - Microsoft 365 Fundamentals: Cloud Benefits & Considerations
MS-900 - Microsoft 365 Fundamentals: Cloud Services & Principles
MS-900 - Microsoft 365 Fundamentals: Microsoft 365 Exchange & SharePoint
MS-900 - Microsoft 365 Fundamentals: Office 365 & Collaboration
MS-900 - Microsoft 365 Fundamentals: Skype for Business Teams & Collaboration
MS-900 - Microsoft 365 Fundamentals: Understanding Cloud Concepts
MS-900 - Microsoft 365 Fundamentals: Windows 10 & Admin Center
MS-900 - Microsoft 365 Fundamentals: Windows 10 Autopilot & Azure
MS-900 - Microsoft 365 Fundamentals: Windows 10 Enterprise
Office 365 and Azure AD Connect
Office 365 Configuration
Office 365 Configuring Domains
Office 365 Deployment
Office 365 DNS Records and Rights Management
Office 365 Federated Identities - Single Sign-On
Office 365 Federated Identities (Single Sign-On)
Office 365 Managing AD FS Servers
Office 365 Pilot Deployment
Office 365 Services: Configuring Exchange Online and Lync Online
Office 365 Services: Managing Clients and End-User Devices
Office 365 Services: Planning for Exchange Online and Lync Online
Office 365 Services: SharePoint Online Site Collections
Office 365 Tenancy and Licensing
Troubleshooting Office 365 Usage
SK - IT - Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Applications
Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Content Support
Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Continuity
Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Search Services
Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Solutions
Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Support Service
Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Upgrading
Microsoft SharePoint Server 2013 - Developing Core Solutions: Business Processes
Microsoft SharePoint Server 2013 - Developing Core Solutions: Create Office Apps
Microsoft SharePoint Server 2013 - Developing Core Solutions: Implement Security
Microsoft SharePoint Server 2013 - Developing Core Solutions: Manage Solutions
Microsoft SharePoint Server 2013 - Developing Core Solutions: Managing Data
Microsoft SharePoint Server 2013 - Developing Core Solutions: Planning Sites
Microsoft SharePoint Server 2013 - Developing Core Solutions: User Experience
SK - IT - Microsoft SharePoint Server 2016
Ensuring SharePoint 2016 Stability
Interconnecting SharePoint 2016
Monitor Tune and Troubleshoot SharePoint 2016
Planning and Installing SharePoint 2016
SharePoint 2016 Content Management
SharePoint 2016 Security
SharePoint 2016 Service Applications
SharePoint 2016 Taxonomy and Search
Upgrading and Updating SharePoint 2016
SK - IT - Microsoft Skype for Business
Archiving and External Access
Chatting and Conferencing
Client Configuration
Configuring Enterprise Voice
High Availability and Disaster Recovery
Planning Installation and Upgrading
Troubleshooting Skype for Business
SK - IT - Microsoft SQL Server 2014
Auditing Logging and Event Handling
Connection Managers and Data Sources
Data Flow Implementation
Data Load Options
Data Quality Projects
Data Quality Services (DQS) and Master Data Services (MDS)
Designing a Fact Table
Designing and Implementing Dimensions
Designing Control Flow
Designing Data Flow
Implementing Control Flow
Microsoft SQL Server 2014 - Designing BI Solutions: Availability and Recovery
Microsoft SQL Server 2014 - Designing BI Solutions: BI Infrastructure Design
Microsoft SQL Server 2014 - Designing BI Solutions: Data Models
Microsoft SQL Server 2014 - Designing BI Solutions: Extract Transform and Load
Microsoft SQL Server 2014 - Designing BI Solutions: MDX Queries and Performance
Microsoft SQL Server 2014 - Designing BI Solutions: Reporting Services
Microsoft SQL Server 2014 - Designing BI Solutions: SharePoint Integration
Microsoft SQL Server 2014 - Designing Solutions: Backup and Recovery
Microsoft SQL Server 2014 - Designing Solutions: Clustering and AlwaysOn
Microsoft SQL Server 2014 - Designing Solutions: High Availability
Microsoft SQL Server 2014 - Designing Solutions: Planning Infrastructure
Microsoft SQL Server 2014 - Designing Solutions: Private Clouds
Microsoft SQL Server 2014 - Designing Solutions: Windows Azure SQL Database
Microsoft SQL Server 2014: Create and Manage Tabular Data Models
Microsoft SQL Server 2014: Design and Implement Dimensions
Microsoft SQL Server 2014: Design and Install Analysis Services and Tools
Microsoft SQL Server 2014: Design Reports and Create Data Sources and Datasets
Microsoft SQL Server 2014: Designing Multidimensional Models and Data Sources
Microsoft SQL Server 2014: Manage Maintain and Troubleshoot SSAS
Microsoft SQL Server 2014: Manage Reporting Services
Microsoft SQL Server 2014: MDX Queries Process Models and Deploy Databases
Microsoft SQL Server 2014: Process Report and Create Subscriptions and Schedules
Microsoft SQL Server 2014: Report Formatting and Interactivity
Microsoft SQL Server: Implement and Configure Cubes
Microsoft SQL Server: Implement Partitions and Custom Logic
Script Components
SSIS Components
SSIS Package Execution and Script Tasks
SSIS Packages
SSIS Security
SSIS Solutions
SSIS Variables
Troubleshooting Data Integration
SK - IT - Microsoft SQL Server 2016
Aggregating Data in SQL Server 2016
Azure SQL Database Encryption
Azure Virtual Machines
Columnstore Indexes
Components of a SQL Server 2016 Installation
Database Instances
Database Programmability Objects and Non-Relational Data
Deploying Applications to Microsoft Azure SQL Databases
Filter and Modify Data in SQL Server 2016
Installing and Upgrading SQL Server 2016
Managing Database Concurrency
Microsoft Azure SQL Database Security
Microsoft SQL Server 2016 First Look: Preview
Microsoft SQL Server 2016: Auditing
Microsoft SQL Server 2016: Backing Up Databases
Microsoft SQL Server 2016: Data Access and Permissions
Microsoft SQL Server 2016: Encryption
Microsoft SQL Server 2016: High Availability and Disaster Recovery
Microsoft SQL Server 2016: Managing Database Integrity
Microsoft SQL Server 2016: Managing Indexes and Statistics
Microsoft SQL Server 2016: Monitoring Database Activity and Queries
Microsoft SQL Server 2016: Monitoring SQL Server Instances
Microsoft SQL Server 2016: Restoring Databases
Migrating Client Applications
Operators and Expressions in SQL Server 2016
Optimize SQL Database Objects and Infrastructure
Performance Tuning
Programmability Objects
Querying and Manipulating Data
SQL Server 2016 Database Objects
SQL Server 2016 Indexes and Views
SQL Server Instances and Storage Considerations
SQL Server Performance Settings
SQL Server Virtual Machines on Azure
Subqueries and Predicate
Transactions and Isolation Levels
Triggers and Functions
T-SQL Querying
Using Functions in SQL Server 2016
SK - IT - Microsoft System Center
Deploy and Install Virtual Machine Manager
Deploy and Manage Orchestrator
Deploy and Manage Service Management Automation
Deploying Service Manager
Installing and Monitoring Data Protection Manager
Installing Operations Manager
Installing System Center Configuration Manager
Manage Virtual Machine Manager
Operations Manager
Orchestrator Performance and Requirements
Planning for Data Protection Manager
Service Management Automation and Runbooks
Service Manager
System Center Configuration Manager Introduction and Planning
SK - IT - Microsoft Windows 10
Apps and Gaming
Configure Authentication and Secure Identities for Windows 10
Configure Devices and Disks in Windows 10
Configure Networking and Remote Connections in Windows 10
Configure User Data in Windows 10
Data Protection in Windows 10
Deploy Windows 10 with New and Traditional Tools
First Encounters with Windows 10
Install and Manage Windows 10 Applications and Universal Windows Apps
Introducing the Windows 10 Creators Update
Introduction to Windows 10
Maintain Windows 10 and Configure Virtualization Technologies in Windows 10
Manage Windows 10 Devices
MD-100 - Windows 10: Active Directory Management
MD-100 - Windows 10: Configure Networking
MD-100 - Windows 10: Configure Remote Connectivity
MD-100 - Windows 10: Configure System & Data Recovery
MD-100 - Windows 10: Deployment
MD-100 - Windows 10: Manage Devices & Data
MD-100 - Windows 10: Manage Updates
MD-100 - Windows 10: Monitor a& Manage Windows
MD-100 - Windows 10: Perform Post-Installation Configuration
MD-100 - Windows 10: Policy-Based Management
MD-100 - Windows 10: Prepare for Deployment
MD-101 - Managing Modern Desktops: Co-Management
MD-101 - Managing Modern Desktops: Conditional Access & Compliance
MD-101 - Managing Modern Desktops: Deploy & Update Applications
MD-101 - Managing Modern Desktops: Device Authentication
MD-101 - Managing Modern Desktops: Device Profiles
MD-101 - Managing Modern Desktops: Dynamic Deployments
MD-101 - Managing Modern Desktops: Intune Device Enrollment
MD-101 - Managing Modern Desktops: Managing Updates
MD-101 - Managing Modern Desktops: Mobile Application Management
MD-101 - Managing Modern Desktops: Monitoring Devices
MD-101 - Managing Modern Desktops: Upgrading Devices
MD-101 - Managing Modern Desktops: User Profiles
MD-101 - Managing Modern Desktops: Windows Autopilot
Microsoft Windows 10 First Look: Configuration
Microsoft Windows 10 First Look: Interface and New Features
Microsoft Windows 10: Configuring Core Services
Microsoft Windows 10: Implementing Windows
Microsoft Windows 10: Managing and Maintaining Windows
Microsoft Windows 10: Supporting Authentication Permissions and Data Security
Microsoft Windows 10: Supporting Client Compliance and Managing Clients
Microsoft Windows 10: Supporting Connectivity and Data Storage
Microsoft Windows 10: Supporting Hardware Performance and Mobile Devices
Microsoft Windows 10: Supporting Operating System and Application Installation
OS Deployment Strategies: Deploying Modern Systems
OS Deployment Strategies: Maintaining and Managing Modern Systems
OS Deployment Strategies: Upgrading & Maintaining Systems
Threat Resistance Technologies in Windows 10
Web Browsing and Cortana
Windows 10: Exploring the May 2019 Update
Windows Ink and Paint 3D
Windows Store Security and Browsing
SK - IT - Microsoft Windows 10 - Configure Devices
Configuring Windows 10 Devices: Authentication
Configuring Windows 10 Devices: Bitlocker Recovery and Maintenance
Configuring Windows 10 Devices: Data Protection
Configuring Windows 10 Devices: Deployment Tools and Procedures
Configuring Windows 10 Devices: Devices and Disks
Configuring Windows 10 Devices: Installing and Managing Applications
Configuring Windows 10 Devices: Introduction to Deployment
Configuring Windows 10 Devices: Introduction to Windows 10
Configuring Windows 10 Devices: Maintaining Windows 10
Configuring Windows 10 Devices: Managing Devices
Configuring Windows 10 Devices: Networking
Configuring Windows 10 Devices: Remote Connections
Configuring Windows 10 Devices: Secure Identities
Configuring Windows 10 Devices: Start Menu Personalization and Multitasking
Configuring Windows 10 Devices: Threat Resistance and UAC
Configuring Windows 10 Devices: Threat Resistance Technologies
Configuring Windows 10 Devices: Universal Windows Apps
Configuring Windows 10 Devices: User Data
Configuring Windows 10 Devices: Virtualization Technologies
SK - IT - Microsoft Windows Server 2012 - Administration
Microsoft Windows Server 2012 R2 - Administration: Deploying and Managing WDS
Microsoft Windows Server 2012 R2 - Administration: File Services and Encryption
Microsoft Windows Server 2012 R2 - Administration: Group Policy Processing
Microsoft Windows Server 2012 R2 - Administration: Managing Active Directory
Microsoft Windows Server 2012 R2 - Administration: Managing GPOs and Preferences
Microsoft Windows Server 2012 R2 - Administration: Network Services and Access
Microsoft Windows Server 2012 R2 - Administration: RADIUS NPS and NAP
Microsoft Windows Server 2012 R2 - Administration: Service Accounts and Policies
Microsoft Windows Server 2012 R2 - Administration: Updating and Monitoring
SK - IT - Microsoft Windows Server 2012 - Configure Adv. Services
Microsoft Windows Server 2012 R2 - Configuring Advanced Services: AD Domains
Microsoft Windows Server 2012 R2 - Configuring Advanced Services: AD Replication
Microsoft Windows Server 2012 R2 - Configuring Advanced Services: DAC
Microsoft Windows Server 2012 R2 - Configuring Advanced Services: DHCP & DNS
Microsoft Windows Server 2012 R2 - Configuring Advanced Services: Federation
Microsoft Windows Server 2012 R2 - Configuring Advanced Services: HA
Microsoft Windows Server 2012 R2 - Configuring Advanced Services: PKI
Microsoft Windows Server 2012 R2 - Configuring Advanced Services: Storage
Microsoft Windows Server 2012 R2 - Configuring Advanced Services: VMs and DR
SK - IT - Microsoft Windows Server 2012 - Designing and Implementing an Infrastructure
Microsoft Windows Server 2012 R2 - Advanced Infrastructure: AD RMS and AD FS
Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Business Continuity
Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Certificate Services
Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Clustering and NLB
Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Monitoring
Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Storage and Networks
Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Updates
Microsoft Windows Server 2012 R2 - Advanced Infrastructure: VM Administration
Microsoft Windows Server 2012 R2 - Advanced Infrastructure: VM hosts and guests
Microsoft Windows Server 2012 R2: Server Infrastructure - AD Design
Microsoft Windows Server 2012 R2: Server Infrastructure - AD DS
Microsoft Windows Server 2012 R2: Server Infrastructure - DHCP Design
Microsoft Windows Server 2012 R2: Server Infrastructure – DirectAccess
Microsoft Windows Server 2012 R2: Server Infrastructure - DNS File and Storage
Microsoft Windows Server 2012 R2: Server Infrastructure - Implement NPS and WAP
Microsoft Windows Server 2012 R2: Server Infrastructure - IPAM and VPN
Microsoft Windows Server 2012 R2: Server Infrastructure - Network Protection
Microsoft Windows Server 2012 R2: Server Infrastructure - OU and Group Policy
Microsoft Windows Server 2012 R2: Server Infrastructure – Server Deployment
SK - IT - Microsoft Windows Server 2012 - Installing and Configuring
Microsoft Windows Server 2012 R2 - Installing and Configuring: Active Directory
Microsoft Windows Server 2012 R2 - Installing and Configuring: AD Groups & GPOs
Microsoft Windows Server 2012 R2 - Installing and Configuring: DNS
Microsoft Windows Server 2012 R2 - Installing and Configuring: Hyper - V
Microsoft Windows Server 2012 R2 - Installing and Configuring: Networking
Microsoft Windows Server 2012 R2 - Installing and Configuring: Print Services
Microsoft Windows Server 2012 R2 - Installing and Configuring: Security
Microsoft Windows Server 2012 R2 - Installing and Configuring: Servers
Microsoft Windows Server 2012 R2 - Installing and Configuring: Storage
SK - IT - Microsoft Windows Server 2016 - Install Store and Compute
Server 2016 - Install Store and Compute: Containers and Hyper-V Migration
Server 2016 - Install Store and Compute: Data Deduplication and Hyper-V Setup
Server 2016 - Install Store and Compute: Hyper-V Configuration
Server 2016 - Install Store and Compute: Hyper-V Networking and Containers
Server 2016 - Install Store and Compute: Implementing Failover Clustering
Server 2016 - Install Store and Compute: Installation Options
Server 2016 - Install Store and Compute: Maintaining Servers and Images
Server 2016 - Install Store and Compute: Managing High Availability Solutions
Server 2016 - Install Store and Compute: Storage Solutions
Server 2016 - Install Store and Compute: Upgrading Managing and Monitoring
Server 2016 - Install Store and Compute: VM Motion and Network Load Balancing
SK - IT - Microsoft Windows Server 2016 - Identity
Server 2016 - Identity: Active Directory Accounts & Permissions
Server 2016 - Identity: Active Directory Accounts and Permissions
Server 2016 - Identity: Active Directory Certificate Services
Server 2016 - Identity: Active Directory Certificate Services
Server 2016 - Identity: Active Directory Domain Controllers
Server 2016 - Identity: Active Directory Domain Controllers
Server 2016 - Identity: Active Directory Federation Services & Web Application Proxy
Server 2016 - Identity: Active Directory Group Policy Objects
Server 2016 - Identity: Active Directory Group Policy Preferences
Server 2016 - Identity: Active Directory Group Policy Processing
Server 2016 - Identity: Active Directory Group Policy Settings
Server 2016 - Identity: Active Directory Groups & Organizational Units
Server 2016 - Identity: Active Directory Object Management
Server 2016 - Identity: Active Directory Rights Management Services
Server 2016 - Identity: Active Directory Service Authentication & Account Policies
Server 2016 - Identity: Active Directory Trusts & Sites
Server 2016 - Identity: Active Directroy Maintenance & Recovery
Server 2016 - Identity: AD Federation Services and Web Application Proxy
Server 2016 - Identity: AD Rights Management Services
Server 2016 - Identity: Defining Group Policy Objects
Server 2016 - Identity: Implementing Group Policy Preferences
Server 2016 - Identity: Maintaining Active Directory
Server 2016 - Identity: Trusts and Site Management
SK - IT - Microsoft Windows Server 2016 - Install Store and Compute
Server 2016: Install Store and Compute: Backup Strategies & Server Monitoring
Server 2016: Install Store and Compute: Data Deduplication & Hyper-V Setup
Server 2016: Install Store and Compute: Disk & Volume Configuration
Server 2016: Install Store and Compute: Failover Clustering Strategies
Server 2016: Install Store and Compute: Hyper-V Networking Configuration
Server 2016: Install Store and Compute: Hyper-V Storage Configuration
Server 2016: Install Store and Compute: Image Deployment Management
Server 2016: Install Store and Compute: Installation Options
Server 2016: Install Store and Compute: Managing High Availability Solutions
Server 2016: Install Store and Compute: Server Storage Solutions
Server 2016: Install Store and Compute: Upgrades Migrations & Activation Models
Server 2016: Install Store and Compute: Virtual Machine (VM) Settings
Server 2016: Install Store and Compute: VM Motion and Network Load Balancing
Server 2016: Install Store and Compute: Windows Container Deployment
Server 2016: Install Store and Compute: Windows Container Management and Hyper-V
SK - IT - Microsoft Windows Server 2016 - Networking
Server 2016: Networking: Advanced Network Infrastructures
Server 2016: Networking: DHCP Configuration
Server 2016: Networking: DHCP Management
Server 2016: Networking: Distributed File System & Branch Office Solutions
Server 2016: Networking: DNS & DHCP Management Using IPAM
Server 2016: Networking: DNS Configuration
Server 2016: Networking: DNS Zones & Records
Server 2016: Networking: IP Address Management Configuration
Server 2016: Networking: IPv4 & IPv6 Address Management
Server 2016: Networking: Network Connectivity & Remote Access
Server 2016: Networking: Network Policy Server
SK - IT - Microsoft Windows Server 2016 - Security
Additional Malware Protection
Implementing Disk Encryption
Implementing File Encryption
Implementing Server Patching and Updating
Implementing Workload-specific Security Part I
Implementing Workload-specific Security Part II
Managing Privileged Identities Part I
Managing Privileged Identities Part II
Managing Server 2016 Malware Solutions
PAWS and LAPS
Securing a Network Infrastructure with Windows Firewalls
Securing a Virtualization Infrastructure
Securing Network Infrastructure Traffic
Threat Detection Solutions
SK - IT - Microsoft Windows Server 2019
Updating to Server 2019 : Windows Server 2019 Features
Updating to Server 2019: PowerShell for Windows Server
Updating to Server 2019: Server Configuration
Updating to Server 2019: Server Roles
Updating to Server 2019: Storage Failover Clustering & Application Platform
Updating to Server 2019: Windows Server Installations
SK - IT - MySQL
An Overview of Apache Cassandra
Apache HBase Fundamentals: Access Data through the Shell and Client API
Apache HBase Fundamentals: Advanced API Administration and MapReduce
Apache HBase Fundamentals: Installation Architecture and Data Modeling
Cassandra vs. SQL
In Depth with NoSQL
Java ASYNC Interface
MongoDB with Python
MongoDB: Backups Monitoring and Stats
MongoDB: Cloud and Hadoop Deployments
MongoDB: Concepts Installation and Querying
MongoDB: Indexes and Query Optimization
MongoDB: Indexing Replication and Security
MongoDB: Installation Overview
MongoDB: Integration with Spark
MongoDB: Java REST and GridFS
MongoDB: Map Reduce Atomic Counters and Binary Data
MongoDB: Replication and Security
MongoDB: User Management
MongoDB: Write Read and Aggregate Data
MySQL Database Development: Database Design Fundamentals
MySQL Database Development: DDL Statements
MySQL Database Development: GIS Cloud and Connectors for MySQL
MySQL Database Development: Introduction
MySQL Database Development: Manipulating Data
MySQL Database Development: Query and Performance Optimization
MySQL Database Development: SELECT Statement and Operators
MySQL Database Development: Stored Routines Triggers and the InnoDB memcached Plugin
MySQL Database Development: Working with Functions
MySQL: Administration Transactions Optimization Scaling Backup and Recovery
MySQL: Advanced Routines Optimization and DCL
MySQL: Creating & Updating Tables
MySQL: Database Concepts Design and Installation
MySQL: General Syntax Advanced Queries and Stored Programs
MySQL: Getting Started
MySQL: Grouping & Aggregation Operations
MySQL: Performance Monitoring Database Health and Integrity and Security
MySQL: Querying Data
MySQL: Querying Data Using the SELECT Statement
MySQL: Storage Engines Advanced Indexing and Maintenance
MySQL: Transactions Savepoints & Locks
MySQL: Triggers & Stored Procedures
MySQL: Understanding & Implementing Joins
MySQL: Using the Data Manipulation and Definition Statements
MySQL: Views Indices & Normal Forms
NoSQL Concepts and Background
NoSQL Models and Applications
Programming with NoSQL
RavenDB Integration
RavenDB Overview
System Management
Working with Cassandra
SK - IT - Operational Intelligence
Indexers Clusters and Advanced Search
Splunk Administration
Splunk Fundamentals
Splunk Visualizations and Dashboards
Using Your Data with Splunk
SK - IT - Oracle 12c
Backing Up Recovering Importing and Exporting Data in Oracle Database 12c
Connectivity and Space Management in Oracle Database 12c
Database Maintenance and Performance Tuning in Oracle Database 12c
Managing an Oracle Database 12c Instance
Oracle 12c Performance Tuning: Application Monitoring and SQL Diagnostics
Oracle 12c Performance Tuning: Automatic Workload Repository
Oracle 12c Performance Tuning: Introduction
Oracle 12c Performance Tuning: Measuring and Maintaining SQL Performance
Oracle 12c Performance Tuning: Metrics and Monitoring
Oracle 12c Performance Tuning: Performance Tuning Summary
Oracle 12c Performance Tuning: Tuning Instance Memory
Oracle 12c Performance Tuning: Tuning Problem SQL Statements
Oracle Database 12c - Backup and Recovery: Configuring for Recoverability
Oracle Database 12c - Backup and Recovery: Duplicating Databases and Tuning RMAN
Oracle Database 12c - Backup and Recovery: Failure and Recovery Concepts
Oracle Database 12c - Backup and Recovery: Perform Recovery and Secure Backup
Oracle Database 12c - Backup and Recovery: Performing and Managing Backups
Oracle Database 12c - Backup and Recovery: Transporting Data and Performing PITR
Oracle Database 12c - Backup and Recovery: Using Flashback Technologies
Oracle Database 12c – Install and Upgrade: Database Architecture
Oracle Database 12c – Install and Upgrade: Installation
Oracle Database 12c – Install and Upgrade: Upgrading
Oracle Database 12c - Introduction to SQL: Data Conversion and Aggregating Data
Oracle Database 12c - Introduction to SQL: Data Manipulation Language
Oracle Database 12c - Introduction to SQL: Relational Database and SQL Developer
Oracle Database 12c - Introduction to SQL: Restrict Sort and Customize Output
Oracle Database 12c - Introduction to SQL: SQL*Plus and SELECT Statement
Oracle Database 12c - Introduction to SQL: Working with Joins and Subqueries
Oracle Database 12c - Introduction to SQL: Working with SET Operators and DDL
Oracle Database 12c R2 SQL: Controlling User Access
Oracle Database 12c R2 SQL: Controlling User Access
Oracle Database 12c R2 SQL: Conversion Functions and Conditional Expressions
Oracle Database 12c R2 SQL: Creating Other Schema Objects
Oracle Database 12c R2 SQL: Creating Other Schema Objects
Oracle Database 12c R2 SQL: Data Definition Language (DDL)
Oracle Database 12c R2 SQL: Data Manipulation Language and Transaction Control Language
Oracle Database 12c R2 SQL: Displaying Data from Multiple Tables
Oracle Database 12c R2 SQL: Managing Objects with Data Dictionary Views
Oracle Database 12c R2 SQL: Managing Schema Objects
Oracle Database 12c R2 SQL: Manipulating Data Using Advanced Queries
Oracle Database 12c R2 SQL: Manipulating Data Using Advanced Queries
Oracle Database 12c R2 SQL: Reporting Aggregated Data Using the Group Functions
Oracle Database 12c R2 SQL: Reporting Aggregated Data Using the Group Functions
Oracle Database 12c R2 SQL: Restricting and Sorting Data
Oracle Database 12c R2 SQL: SQL*Plus
Oracle Database 12c R2 SQL: Using Basic SELECT statements
Oracle Database 12c R2 SQL: Using Single-Row Functions to Customize Output
Oracle Database 12c R2 SQL: Using Single-Row Functions to Customize Output
Oracle Database 12c R2 SQL: Using Structured Query Language (SQL)
Oracle Database 12c R2 SQL: Using Subqueries to Solve Queries
Oracle Database 12c R2 SQL: Using Subqueries to Solve Queries
Oracle Database 12c R2 SQL: Using the Set Operators
Oracle Database 12c RAC Administration: Backup and Recovery
Oracle Database 12c RAC Administration: Client Connections and QoS
Oracle Database 12c RAC Administration: Day-to-Day Administration
Oracle Database 12c RAC Administration: Global Resource Management
Oracle Database 12c RAC Administration: Installing Configuring and Patching
Oracle Database 12c RAC Administration: Introduction to Oracle RAC
Oracle Database 12c RAC Administration: Monitoring and Tuning
Oracle Database 12c RAC Administration: Services and Multitenant Architecture
Oracle Database 12c: Enterprise Manager Cloud Control and Creating CDB and PDB
Oracle Database 12c: High Availability and Database Management
Oracle Database 12c: Managing CDB and PDB and Data Optimization
Oracle Database 12c: Managing Security
Oracle Database 12c: Resource Manager Online Operations and ADR
Oracle Database 12c: Transporting Databases and Managing Data
Oracle Database 12c: Tuning SQL and Using ADDM
Oracle Database 12c: Using Automatic Data Optimization Storage and Archiving
SQL Tuning Resource Management and Job Scheduling in Oracle Database 12c
User Security and Auditing in Oracle Database 12c
SK - IT - Oracle ATG
Advanced Configuration Options
Building Simple Applications
Core Commerce and the Product Catalog
Data Models and JSP
Extending Oracle Commerce Applications
Form Handling with Pipelines and REST
Oracle Commerce Application Structure and Deployment
Using the Repository
SK - IT - Red Hat Linux
Red Hat Certified System Administrator: Administration and Permissions
Red Hat Certified System Administrator: Advanced Networking
Red Hat Certified System Administrator: Boot Process and Installation
Red Hat Certified System Administrator: File Systems and Device Management
Red Hat Certified System Administrator: Introduction to Virtualization
Red Hat Certified System Administrator: Processes Networking and Logging
Red Hat Certified System Administrator: Remote Connections and Access
Red Hat Certified System Administrator: Scripting and Scheduling
Red Hat Certified System Administrator: SELinux and Troubleshooting
Red Hat Certified System Administrator: The Command Line
Red Hat Certified System Administrator: The Environment
SK - IT - Redis
The Redis In-memory Data Store: Administering a Redis Server
The Redis In-memory Data Store: An Introduction to Redis
The Redis In-memory Data Store: Data Structures
The Redis In-memory Data Store: Messaging & Streaming
The Redis In-memory Data Store: Working With Redis Clients
SK - IT - Security - Certified Ethical Hacker (CEH) v10
CEHv10: Common Web App Threats
CEHv10: Denial of Service
CEHv10: Ethical Hacking Overview and Threats
CEHv10: Evading IDS Firewalls and Honeypots Part 2
CEHv10: Footprinting
CEHv10: Hacking Concepts
CEHv10: Hacking Web Servers
CEHv10: HiddenFilesandCoveringTracks
CEHv10: Host Discovery and Scanning with Nmap
CEHv10: IoT Hacking and Countermeasures
CEHv10: Network Sniffing
CEHv10: PasswordAttacks
CEHv10: PasswordAttacksPart2
CEHv10: Pentesting Laws and Standards
CEHv10: ProxyChainsandEnumeration
CEHv10: Security Controls
CEHv10: Security Controls Part 2
CEHv10: SQL Injection
CEHv10: VulnerabilityAnalysisConceptsandTools
CEHv10: Wireless Hacking Concepts
Certified Ethical Hacker - CEHv10: Cloud Computer Attacks
Certified Ethical Hacker - CEHv10: Cloud Computer Attacks
Certified Ethical Hacker - CEHv10: Clouding Computing Concepts
Certified Ethical Hacker - CEHv10: Clouding Computing Concepts
Certified Ethical Hacker - CEHv10: Common Web App Threats
Certified Ethical Hacker - CEHv10: Common Web App Threats Part 2
Certified Ethical Hacker - CEHv10: Common Web App Threats Part 2
Certified Ethical Hacker - CEHv10: Covert Data Gathering
Certified Ethical Hacker - CEHv10: Covert Data Gathering
Certified Ethical Hacker - CEHv10: Cracking and Mobile Hacking
Certified Ethical Hacker - CEHv10: Cracking and Mobile Hacking
Certified Ethical Hacker - CEHv10: Cryptography Attacks
Certified Ethical Hacker - CEHv10: Cryptography Attacks
Certified Ethical Hacker - CEHv10: Cryptography Concepts
Certified Ethical Hacker - CEHv10: Cryptography Concepts
Certified Ethical Hacker - CEHv10: Cryptography Concepts Part 2
Certified Ethical Hacker - CEHv10: Cryptography Concepts Part 2
Certified Ethical Hacker - CEHv10: Cryptography Concepts Part 3
Certified Ethical Hacker - CEHv10: Cryptography Concepts Part 3
Certified Ethical Hacker - CEHv10: Denial of Service
Certified Ethical Hacker - CEHv10: Evading IDS Firewalls and Honeypots
Certified Ethical Hacker - CEHv10: Evading IDS Firewalls and Honeypots
Certified Ethical Hacker - CEHv10: Evading IDS Firewalls and Honeypots Part 2
Certified Ethical Hacker - CEHv10: Evading IDS Firewalls and Honeypots Part 3
Certified Ethical Hacker - CEHv10: Evading IDS Firewalls and Honeypots Part 3
Certified Ethical Hacker - CEHv10: Hacking Web Servers
Certified Ethical Hacker - CEHv10: IoT Attacks
Certified Ethical Hacker - CEHv10: IoT Attacks
Certified Ethical Hacker - CEHv10: IoT Concepts
Certified Ethical Hacker - CEHv10: IoT Concepts
Certified Ethical Hacker - CEHv10: IoT Hacking and Countermeasures
Certified Ethical Hacker - CEHv10: Malware Distribution
Certified Ethical Hacker - CEHv10: Malware Distribution
Certified Ethical Hacker - CEHv10: Malware Threats
Certified Ethical Hacker - CEHv10: Malware Threats
Certified Ethical Hacker - CEHv10: Practical Web App Hacking
Certified Ethical Hacker - CEHv10: Practical Web App Hacking
Certified Ethical Hacker - CEHv10: Privilege Escalation
Certified Ethical Hacker - CEHv10: Privilege Escalation
Certified Ethical Hacker - CEHv10: Session Hijacking
Certified Ethical Hacker - CEHv10: Session Hijacking
Certified Ethical Hacker - CEHv10: Social Engineering
Certified Ethical Hacker - CEHv10: SQL Injection
Certified Ethical Hacker - CEHv10: SQL Injection Types and Tools
Certified Ethical Hacker - CEHv10: SQL Injection Types and Tools
Certified Ethical Hacker - CEHv10: Wireless Hacking Common Threats
Certified Ethical Hacker - CEHv10: Wireless Hacking Common Threats
Certified Ethical Hacker - CEHv10: Wireless Hacking Concepts
Certified Ethical Hacker - CEHv10: Wireless Hacking Tools
Certified Ethical Hacker - CEHv10: Wireless Hacking Tools
SK - IT - Security - Certified Information Security Manager (CISM)
CISM 2020: Cryptography & PKI
CISM 2020: Information Security & Business Process Alignment
Information Risk Management (Part 1)
Information Risk Management (Part 2)
Information Security Governance (Part 1)
Information Security Governance (Part 2)
Information Security Incident Management (Part 1)
Information Security Incident Management (Part 2)
Information Security Program Development and Management (Part 1)
Information Security Program Development and Management (Part 2)
SK - IT - Security - Certified Information Systems Auditor
Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk
Certified Information Systems Auditor (CISA) 2019: Data Storage & Malware
Certified Information Systems Auditor (CISA) 2019: IAM & Data Classification
Certified Information Systems Auditor (CISA) 2019: Information System Auditing
Certified Information Systems Auditor (CISA) 2019: IT Management Frameworks
Certified Information Systems Auditor (CISA) 2019: Performance & Management
Certified Information Systems Auditor (CISA) 2019: PKI & Data Protection
Certified Information Systems Auditor (CISA) 2019: System Design & Analysis
Certified Information Systems Auditor (CISA) 2019: Virtualization & Cloud
CISA: Governance and Management of IT - Part 1
CISA: Governance and Management of IT - Part 2
CISA: Information Systems Acquisition Development and Implementation
CISA: Information Systems Operations Maintenance and Service Management
CISA: Protection of Information Assets - Part 1
CISA: Protection of Information Assets - Part 2
CISA: The Process of Auditing Information Systems - Part 1
CISA: The Process of Auditing Information Systems - Part 2
SK - IT - Security - Certified Information Systems Security Professional (CISSP)
CISSP 2018 : Communication and Network Security
CISSP 2018: (ISC)² and Security Fundamentals
CISSP 2018: Conducting Incident Management
CISSP 2018: Cryptographic Client-based Systems
CISSP 2018: Identity and Access Management (IAM)
CISSP 2018: Security and Risk Management (Part 1)
CISSP 2018: Security and Risk Management (Part 2)
CISSP 2018: Security Architecture and Engineering (Part 1)
CISSP 2018: Security Architecture and Engineering (Part 2)
CISSP 2018: Security Assessment and Testing
CISSP 2018: Security Operations (Part 1)
CISSP 2018: Security Operations (Part 2)
CISSP 2018: Site and Facility Security Controls
CISSP 2018: Software Development Security
CISSP: Asset Security
CISSP: Communication & Network Security Design
CISSP: Identity and Access Management
CISSP: Risk Management
CISSP: Security Assessment and Testing
CISSP: Security Engineering Part 1
CISSP: Security Engineering Part 2
CISSP: Security Operations Part 1
CISSP: Security Operations Part 2
CISSP: Security Operations Part 3
CISSP: Security Principles Governance and Guidelines
CISSP: Software Development Security
SK - IT - Security - Certified Secure Software Lifecycle Professional (CSSLP)
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Abuse Cases & RTMs
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Governance Risk & Compliance
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Privacy
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Lifecycle Management
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Software Testing
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Vulnerabilities
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Testing for Security & Quality Assurance
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Testing Types
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Threat Modeling
CSSLP 2019: Architectural Risk Assessment Secure Interface Design & Modeling
CSSLP 2019: Secure Design Principles
CSSLP 2019: Security Architecture
CSSLP: Secure Software Concepts
CSSLP: Secure Software Design
CSSLP: Secure Software Implementation and Coding
CSSLP: Secure Software Requirements
CSSLP: Secure Software Testing
CSSLP: Software Acceptance Deployment Operations Maintenance and Disposal
CSSLP: Supply Chain and Software Acquisition
SK - IT - Security - CompTIA Advanced Security Practitioner (CASP)
CompTIA CASP CAS-003: Applying Research Methods for Trend and Impact Analysis
CompTIA CASP CAS-003: Business and Industry Influences and Risks
CompTIA CASP CAS-003: Conducting Security Assessments
CompTIA CASP CAS-003: Implementing Cryptographic Techniques
CompTIA CASP CAS-003: Implementing Incident Response and Recovery
CompTIA CASP CAS-003: Implementing Security Activities across the Technology Life Cycle
CompTIA CASP CAS-003: Integrating and Troubleshooting Advanced AAA Technologies
CompTIA CASP CAS-003: Integrating Cloud and Virtualization Technologies in the Enterprise
CompTIA CASP CAS-003: Integrating Controls for Mobile and Small Form Factor Devices
CompTIA CASP CAS-003: Integrating Hosts Storage and Applications in the Enterprise
CompTIA CASP CAS-003: Integrating Network and Security Components Concepts and Architectures
CompTIA CASP CAS-003: Integrating Security Controls for Host Devices
CompTIA CASP CAS-003: Interacting across Diverse Business Units
CompTIA CASP CAS-003: Organizational Security and Privacy Policies
CompTIA CASP CAS-003: Risk Metric Scenarios for Enterprise Security
CompTIA CASP CAS-003: Secure Communication and Collaboration Solutions
CompTIA CASP CAS-003: Selecting Software Security Controls
Risk Mitigation Strategies and Controls
SK - IT - Security - CompTIA Advanced Security Practitioner CAS-002
CompTIA CASP CAS-002: Advanced Network Design Management and Controls
CompTIA CASP CAS-002: Application Vulnerabilities and Security Controls
CompTIA CASP CAS-002: Cryptography and Enterprise Storage Concerns
CompTIA CASP CAS-002: Industry Influences Risk Planning Strategy and Control
CompTIA CASP CAS-002: Integration of Computing Communications and Disciplines
CompTIA CASP CAS-002: Privacy Policies & Procedures and Incident Recovery
CompTIA CASP CAS-002: Research Analysis and Assessment
CompTIA CASP CAS-002: Security Controls for Hosts
CompTIA CASP CAS-002: Technical Integration of Enterprise Components
SK - IT - Security - CompTIA Cybersecurity Analyst+ CS0-001
CompTIA Cybersecurity Analyst+ CS0-001: Investigate Security Incidents
CompTIA Cybersecurity Analyst+ CS0-001: Monitoring for Security Issues
CompTIA Cybersecurity Analyst+ CS0-001: Network Architecture and Reconnaissance
CompTIA Cybersecurity Analyst+ CS0-001: Reducing Vulnerabilities
CompTIA Cybersecurity Analyst+ CS0-001: Threat Identification
CompTIA Cybersecurity Analyst+ CS0-001: Threat Mitigation
SK - IT - Security - CompTIA CySA+ (CS0-002)
CS0-002 - CompTIA Cybersecurity Analyst+: Attack Types
CS0-002 - CompTIA Cybersecurity Analyst+: Business Continuity
CS0-002 - CompTIA Cybersecurity Analyst+: Cloud Computing
CS0-002 - CompTIA Cybersecurity Analyst+: Data Privacy
CS0-002 - CompTIA Cybersecurity Analyst+: Digital Forensics
CS0-002 - CompTIA Cybersecurity Analyst+: Encryption & Hashing
CS0-002 - CompTIA Cybersecurity Analyst+: Hardware & Security
CS0-002 - CompTIA Cybersecurity Analyst+: Intrusion Detection & Traffic Analysis
CS0-002 - CompTIA Cybersecurity Analyst+: IT Security Risk Mitigation
CS0-002 - CompTIA Cybersecurity Analyst+: Malware Threats
CS0-002 - CompTIA Cybersecurity Analyst+: Network Infrastructure Security
CS0-002 - CompTIA Cybersecurity Analyst+: Network Scanning & Traffic Analysis
CS0-002 - CompTIA Cybersecurity Analyst+: Software Development Security
CS0-002 - CompTIA Cybersecurity Analyst+: Threat Intelligence
CS0-002 - CompTIA Cybersecurity Analyst+: Threat Monitoring
CS0-002 - CompTIA Cybersecurity Analyst+: User Account Security
SK - IT - Security - CompTIA Security+ (SY0-601)
SY0-601 - CompTIA Security+: Authentication & Authorization Design Concepts
SY0-601 - CompTIA Security+: Basic Cryptography & Public Key Infrastructure
SY0-601 - CompTIA Security+: Controls & Application Development Deployment & Automation
SY0-601 - CompTIA Security+: Implementing Cybersecurity Resilience
SY0-601 - CompTIA Security+: Implementing Identity and Account Management & AAA Solutions
SY0-601 - CompTIA Security+: Implementing Secure Protocols & Application Security Solutions
SY0-601 - CompTIA Security+: Physical Security Controls
SY0-601 - CompTIA Security+: Security Concepts in an Enterprise Environment
SY0-601 - CompTIA Security+: Virtualization Cloud Computing and Cloud Cybersecurity Solutions
SYO-601 - CompTIA Security+: Implementing Secure Network Designs
SYO-601 - CompTIA Security+: Incident Response Digital Forensics & Supporting Investigations
SYO-601 - CompTIA Security+: Monitoring Visibility & Reporting
SYO-601 - CompTIA Security+: Organizational Security Assessment tools & Mitigation Controls
SYO-601 - CompTIA Security+: Risk Management Privacy & Sensitive Data Security
SYO-601 - CompTIA Security+: Security Policies Regulations Standards & Frameworks
SYO-601 - CompTIA Security+: Wireless Mobile & Embedded Device Security
SK - IT - Security - General
Android Architecture Protection and Development Best Practices
Android Security Vulnerabilities Testing and Enterprise Considerations
Attack Vectors and Mitigations
Cloud Security Fundamentals: Architectural & Design Concepts
Cloud Security Fundamentals: Basics of Cloud Operations
Cloud Security Fundamentals: Cloud Data Security
Cloud Security Fundamentals: Cloud Infrastructure Security
Cryptography Fundamentals: Applying Cryptography
Cryptography Fundamentals: Defining Cryptography
Cybersecurity 101: Auditing & Incident Response
Cybersecurity 101: Session & Risk Management
Information Security: APT Defenses
Information Security: Continual Infrastructure Testing
Information Security: Hardened Security Topologies
Information Security: Honeypots
Information Security: NACs & Gateways
Information Security: Pen Testing
Information Security: Securing Networking Protocols
Information Security: Security Governance
Information Security: Subnetting & DNS for Security Architects
iOS Security Architecture and Application Data Protection
Microsoft Security Fundamentals: Network Security
Microsoft Security Fundamentals: Operating System Security
Microsoft Security Fundamentals: Security Layers
Microsoft Security Fundamentals: Security Software
Securing Against Threats Securing for Enterprise and Jailbreaking Devices
Securing User Accounts: Authorization Registration and Passwords
Securing User Accounts: Fundamental Security Concepts
Securing User Accounts: Logon Logoff Account Changes and Attack Mitigation
Vulnerabilities and Exploits
SK - IT - Security - Microsoft Security Solutions
Security Fundamentals: Authentication
Security Fundamentals: Authentication Passwords & Audit Policies
Security Fundamentals: Client and Email Security
Security Fundamentals: Core Security
Security Fundamentals: Encryption and Malware
Security Fundamentals: Firewalls
Security Fundamentals: Internet and Wireless Security
Security Fundamentals: Network Isolation
Security Fundamentals: Permissions
Security Fundamentals: Protocol Security
Security Fundamentals: Server Protection
SK - IT - Security - Network Management and Security
IPv6 Fundamentals
Juniper Networks Junos Essentials: Configuration Basics
Juniper Networks Junos Essentials: Junos OS Fundamentals
Juniper Networks Junos Essentials: Monitoring and Maintenance
Juniper Networks Junos Essentials: Networking Fundamentals
Juniper Networks Junos Essentials: Routing Fundamentals
Juniper Networks Junos Essentials: Routing Policy & Firewall Filters
Networking Fundamentals: Configuring Wired and Wireless Networks and Firewalls
Networking Fundamentals: Remote Connections Shares and Mac OSX Networking
Software Defined Networking Fundamentals
SK - IT - Security - OWASP Top 10
Introduction to OWASP and the Top 10
OWASP A10 and A9: API and Component Attacks
OWASP A4 and A2: Broken Applications
OWASP A5 and A1: Security and Injection
OWASP A7 and A6: Leaky and Unprepared Applications
OWASP A8 and A3: Cross-Site Attacks
OWASP Mitigations for .NET
OWASP Overview
OWASP Top 10: List Item Overview
SK - IT - Security - Securing Mobile Devices in the Enterprise
Securing Mobile Devices in the Enterprise: Configuring Enterprise-level Security
Securing Mobile Devices in the Enterprise: Mobile Security Technologies
Securing Mobile Devices in the Enterprise: Mobile Security Threat Mitigation
Securing Mobile Devices in the Enterprise: Mobile Security Threats
SK - IT - Security - Security Principles
Cloud Security Fundamentals: Cloud Application Security
SecOps Engineer: Cloud & IoT security
SecOps Engineer: Secure Coding
SecOps Engineer: Security Engineering
SecOps Engineer: System Infrastructure Security
SecOps Engineer: Threat Mitigation
SK - IT - Security - Security Solutions
Anomaly Detection: Network Anomaly Detection
AZ-103 - Microsoft Azure Administrator: Azure Backup and Recovery
AZ-103 - Microsoft Azure Administrator: Azure Import/Export
AZ-103 - Microsoft Azure Administrator: Azure Monitoring
AZ-103 - Microsoft Azure Administrator: Azure Resource Groups
AZ-103 - Microsoft Azure Administrator: Azure Storage Accounts
AZ-103 - Microsoft Azure Administrator: Azure Virtual Machine Templates
AZ-103 - Microsoft Azure Administrator: Azure Virtual Machines (VMs)
AZ-103 - Microsoft Azure Administrator: Azure Virtual Network Connectivity
AZ-103 - Microsoft Azure Administrator: Azure Virtual Networks
AZ-103 - Microsoft Azure Administrator: Managing Azure Virtual Machines
Certified Information Systems Auditor (CISA) 2019: BCP & Network Security
Certified Information Systems Auditor (CISA) 2019: Continuous Monitoring
Certified Information Systems Auditor (CISA) 2019: Data Storage & Malware
Certified Information Systems Auditor (CISA) 2019: Digital Asset Protection
Certified Information Systems Auditor (CISA) 2019: Digital Evidence Gathering
Certified Information Systems Auditor (CISA) 2019: IAM & Data Classification
Certified Information Systems Auditor (CISA) 2019: Performance & Management
Certified Information Systems Auditor (CISA) 2019: Scenario-Based Practice
Certified Information Systems Auditor (CISA) 2019: System Design & Analysis
Certified Information Systems Auditor (CISA) 2019: Testing & Vulnerability
Certified Information Systems Auditor (CISA) 2019: Virtualization & Cloud
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Architectural Risk Assessment Secure Interface Design & Modeling
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Data Classification
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Privacy
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Design Principles
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Design Principles
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Requirements
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Technologies
Cloud Security Fundamentals: Cloud Application Security
Cloud Security Fundamentals: Legal & Compliance
CompTIA PenTest+: Post-Exploitation and Facilities Attacks
Cryptography: Introduction to Cryptography Services
Cryptography: Introduction to PKI
Cyber Security Audits
CyberOps Windows Hardening: Windows Server Hardening Best Practices
Data Security Breach Notification Process
Digital Forensic Techniques & Investigative Approaches
End-User Security: Securing End Users against Attackers
End-User Security: The End-User Perspective
End-User Security: The Security Administrator Perspective
Ethical Hacker: Account Creation
Ethical Hacker: Hacking Techniques
Ethical Hacker: Incident Response
Ethical Hacker: Risk Assessment
Ethical Hacker: Scanning
Ethical Hacker: Secure Technology & Applications
Ethical Hacker: Security Standards
Ethics & Privacy: Digital Forensics
Hybrid Cloud Architecture & Deployment: AWS Data & Service Migration
Hybrid Cloud Architecture & Deployment: AWS Migration Management
Hybrid Cloud Architecture & Deployment: AWS Services & Application Migration
Hybrid Cloud Architecture & Deployment: Cloud Migration Essentials
Hybrid Cloud Architecture & Deployment: Implementing Migration in Azure
Intelligent Orchestration: Automating Security Incident Processing
Intrusion Detection Best Practices
Intrusion Prevention: Best Practices
Microsoft 365 Fundamentals: Mobile Management & Security and Compliance
MS-900 - Microsoft 365 Fundamentals: Azure AD & Access Management
MS-900 - Microsoft 365 Fundamentals: Microsoft 365 Exchange & SharePoint
MS-900 - Microsoft 365 Fundamentals: Microsoft 365 Pricing and Support
MS-900 - Microsoft 365 Fundamentals: Microsoft 365 Purchasing & Support
MS-900 - Microsoft 365 Fundamentals: Office 365 & Collaboration
MS-900 - Microsoft 365 Fundamentals: Protecting Your Information
MS-900 - Microsoft 365 Fundamentals: Skype for Business Teams & Collaboration
MS-900 - Microsoft 365 Fundamentals: Windows 10 & Admin Center
MS-900 - Microsoft 365 Fundamentals: Windows 10 Autopilot & Azure
MS-900 - Microsoft 365 Fundamentals: Windows 10 Enterprise
Network & Host Analysis: Network Analysis Formats
Network & Host Analysis: Network Observations
Network & Host Analysis: Network Operations
Network & Host Analysis: Network Protocols
Network & Host Analysis: Protocol Analysis
Pen Testing Awareness: Results Management
Pen Testing: Advanced Pen Testing Techniques
Pen Testing: End-user Behavior
Penetration Testing Fundamentals
Physical Penetration Testing
Planning Measures: Incident Response Planning
Policy & Governance: Incident Response
Preemptive Troubleshooting: Concepts & Strategies
Regulatory Mandates: Security Program Regulatory Integration
Risk Analysis: Security Risk Management
Securing AWS: Fundamentals
Securing AWS: Identity & Access Management
Security Architect: Ethical Hacking Best Practices
Security Architectures: Defensible Security
Security Best Practices: Network Appliance Security
Security Incident Triage
Security Measures: Implementing Security Controls
Security Rules: Rules of Engagement
Security Software Assessments: Security Software Assessments
Security Topologies: Developing Secure Networks
Security Vulnerabilities: Managing Threats & Vulnerabilities
Security Vulnerabilities: Managing Threats & Vulnerablilities
Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts
Unified Security: Playbook Approach to Security
Wi-Fi Penetration Testing
Windows Exploits and Forensics : Windows Environments
Windows Exploits and Forensics: Intelligence Gathering
Windows Exploits and Forensics: SMB & PsExec
SK - IT - Security - Systems Security Certified Practitioner
Systems Security Certified Practitioner: Access Controls
Systems Security Certified Practitioner: Cryptography
Systems Security Certified Practitioner: Incident Response and Recovery
Systems Security Certified Practitioner: Network and Communications Security
Systems Security Certified Practitioner: Risk Management
Systems Security Certified Practitioner: Security Administration
Systems Security Certified Practitioner: Security Operations
Systems Security Certified Practitioner: Systems and Application Security
SK - IT - Security - Systems Security Certified Practitioner (SSCP) 2018
An Executives Guide to Security: Protecting Your Information
An Executives Guide to Security: Understanding Security Threats
System Security Certified Practitioner (SSCP 2018): Asset & Change Management
System Security Certified Practitioner (SSCP 2018): Business Continuity
System Security Certified Practitioner (SSCP 2018): Controlling Resource Access
System Security Certified Practitioner (SSCP 2018): Cryptography Primer
System Security Certified Practitioner (SSCP 2018): Digital Forensics
System Security Certified Practitioner (SSCP 2018): Identity Management
System Security Certified Practitioner (SSCP 2018): Malware & Endpoint Security
System Security Certified Practitioner (SSCP 2018): Network Fundamentals
System Security Certified Practitioner (SSCP 2018): Network Security
System Security Certified Practitioner (SSCP 2018): Public Key Infrastructure
System Security Certified Practitioner (SSCP 2018): Risk Management
System Security Certified Practitioner (SSCP 2018): Securing Environments
System Security Certified Practitioner (SSCP 2018): Security Assessments
System Security Certified Practitioner (SSCP 2018): Security Concepts
System Security Certified Practitioner (SSCP 2018): Security Controls
SK - IT - Software Devlpt - Machine Learning
Advanced Reinforcement Learning: Implementation
Advanced Reinforcement Learning: Principles
Applied Deep Learning: Generative Adversarial Networks and Q-Learning
Applied Deep Learning: Unsupervised Data
Applied Predictive Modeling
Architecting Balance: Designing Hybrid Cloud Solutions
Architecting Balance: Hybrid Cloud Implementation with AWS & Azure
Automation Design & Robotics
Bayesian Methods: Advanced Bayesian Computation Model
Bayesian Methods: Advanced Bayesian Computation Model
Bayesian Methods: Bayesian Concepts & Core Components
Bayesian Methods: Implementing Bayesian Model and Computation with PyMC
Build & Train RNNs: Implementing Recurrent Neural Networks
Build & Train RNNs: Neural Network Components
Building ML Training Sets: Introduction
Building ML Training Sets: Preprocessing Datasets for Linear Regression
Building Neural Networks: Artificial Neural Networks Using Frameworks
Building Neural Networks: Development Principles
Computational Theory: Language Principle & Finite Automata Theory
Computational Theory: Using Turing Transducers & Complexity Classes
ConvNets: Introduction to Convolutional Neural Networks
ConvNets: Working with Convolutional Neural Networks
Convo Nets for Visual Recognition: Computer Vision & CNN Architectures
Convo Nets for Visual Recognition: Filters & Feature Mapping in CNN
Convolutional Neural Networks: Fundamentals
Convolutional Neural Networks: Implementing & Training
Deep Learning Packages: Keras - a Neural Network Framework
Deep Learning with Keras
Enterprise Architecture: Architectural Principles & Patterns
Enterprise Architecture: Design Architecture for Machine Learning Applications
Enterprise Services: Enterprise Machine Learning with AWS
Enterprise Services: Machine Learning Implementation on Google Cloud Platform
Enterprise Services: Machine Learning Implementation on Microsoft Azure
Fundamentals of Sequence Model: Artificial Neural Network & Sequence Modeling
Fundamentals of Sequence Model: Language Model & Modeling Algorithms
Getting Started with Neural Networks: Biological & Artificial Neural Networks
Getting Started with Neural Networks: Perceptrons & Neural Network Algorithms
Implementing Deep Learning: Optimized Deep Learning Applications
Implementing Deep Learning: Practical Deep Learning Using Frameworks & Tools
Improving Neural Networks: Data Scaling & Regularization
Improving Neural Networks: Loss Function & Optimization
Improving Neural Networks: Neural Network Performance Management
Linear Algebra & Probability: Advanced Linear Algebra
Linear Algebra and Probability: Fundamentals of Linear Algebra
Linear Models & Gradient Descent: Gradient Descent and Regularization
Linear Models & Gradient Descent: Managing Linear Models
Linear Regression Models: An Introduction to Logistic Regression
Linear Regression Models: Building Simple Regression Models with Scikit Learn and Keras
Linear Regression Models: Building Simple Regression Models with Scikit Learn and Keras
Linear Regression Models: Introduction to Linear Regression
Linear Regression Models: Introduction to Linear Regression
Linear Regression Models: Multiple and Parsimonious Linear Regression
Linear Regression Models: Simplifying Regression and Classification with Estimators
Machine & Deep Learning Algorithms: Data Preperation in Pandas ML
Machine & Deep Learning Algorithms: Imbalanced Datasets Using Pandas ML
Machine & Deep Learning Algorithms: Introduction
Machine & Deep Learning Algorithms: Regression & Clustering
Math for Data Science & Machine Learning
Math for Data Science & Machine Learning
ML Algorithms: Machine Learning Implementation Using Calculus & Probability
ML Algorithms: Multivariate Calculation & Algorithms
ML/DL in the Enterprise: Machine Learning Infrastructure & Metamodel
ML/DL in the Enterprise: Machine Learning Modeling Development & Deployment
Model Management: Building & Deploying Machine Learning Models in Production
Model Management: Building Machine Learning Models & Pipelines
Planning AI Implementation
Predictive Modeling: Implementing Predictive Models Using Visualizations
Predictive Modeling: Predictive Analytics & Exploratory Data Analysis
Predictive Modelling Best Practices: Applying Predictive Analytics
Refactoring ML/DL Algorithms: Refactor Machine Learning Algorithms
Refactoring ML/DL Algorithms: Techniques & Principles
Research Topics in ML and DL
Training Neural Networks: Advanced Learning Algorithms
Training Neural Networks: Implementing the Learning Process
Using BigML: An Introduction to Machine Learning & BigML
Using BigML: Building Supervised Learning Models
Using Data to Find Data: Correction & Categorization
Using Data to Find Data: Data Discovery & Exploration
Working With the Keras Framework
SK - IT - Software Devlpt - Microsoft .NET Software Development Tools
.NET Core C# and Visual Studio Extensions
.NET Overview: Windows Web and the Cloud
Architecture N-Tier/REST: Designing and Building Applications
Data Workflows and Charting in F#
Define End Value for Software Iterations
Define the ALM Process
Defining Effective End-to-end SDLC Practices
Develop Customer Quality with High Value
Developing ASP.NET Core 1.0 and MVC Applications
Developing Windows and Web Applications
Getting Started with F#
Integrate Development and Operations (DevOps)
Introducing Visual Studio
Introduction to ASP.NET Core 1.0
Mobile Center for Xamarin and React Native
Mobile Center Identity and Troubleshooting
Mobile Center SDK for Android and iOS
Mobile Center Tools
Object-oriented Programming Fundamentals
Programming Fundamentals
Programming Techniques
Securing .NET Programming
Tools and C++ Updates
VBA: Building User Interfaces with Forms in VBA & Excel
VBA: Getting Started with VBA in Excel
VBA: Leveraging VBA to Work with Charts Stocks & MS Access
Visual Studio 2017 Installation and New Features
Visual Studio Code Cross-platform Code Editor: Basics
Visual Studio Frameworks and Tools
Visual Studio Mobile Center Introduction and New Features
Windows Store Applications and Databases
WPF Fundamentals with XAML and C#
SK - IT - Software Devlpt - Microsoft C#
Programming in C#: Creating and Using Types
Programming in C#: Creating Types
Programming in C#: Debugging and Security Implementation
Programming in C#: Implementing Data Access
Programming in C#: Managing Multithreating
Programming in C#: Managing Program Flow
Programming in C#: Managing Program Flow
Programming in C#: Manipulating and Retrieving Data
Programming in C#: Memory Management and String Operations
Programming in C#: Using Types
SK - IT - Software Devlpt - Microsoft Web Applications
Adaptive AI Graphics and Animation
Advanced CSS
Advanced Deployment
Advanced Entity Framework
Advanced HTML5 and JavaScript
Advanced Input Validation
API CI/CD Best Practices: API Lifecycle Management
API Clean and Secure Coding: Clean Coding
API Development: Client-side Web Service Consumption
API Development: Cloud API Gateways
API Development: Cloud API Management
API Development: Firebase Backend as a Service
API Development: Framework Security
API Development: HTML5 & Hypermedia
API Development: Introduction to APIs
API Development: REST & SOAP Web Services
API Development: REST API Data Models
API Development: REST API Semantics
API Development: Tools
API Development: URIs & Caching
API Development: Web API Security
API Development: Web API Technologies
API Error Handling: Best Practices
API Management and DevOps
API Management: Elasticsearch API Analytics
API Management: Strategy & Monitoring
Azure Diagnostics Debugging and Access Control Service
Azure Scalability
Azure Services
Azure Storage
Azure Subscription Messages Security and Troubleshooting
Communicating with WebSockets and Utilizing Asynchronous Processing
Consuming Services Using the ASP.NET Pipeline and Using OData Services
Data Flow Consuming and Transmitting Data
Developing Azure & Web Services: Introduction
Developing Azure & Web Services: WCF Transactions & Services
Developing Azure and Web Services: Advanced Deployment
Developing Azure and Web Services: Azure Scalability
Developing Azure and Web Services: Azure Services
Developing Azure and Web Services: Azure Services
Developing Azure and Web Services: Azure Storage
Developing Azure and Web Services: Configuring Web Applications for Deployment
Developing Azure and Web Services: Consuming Services
Developing Azure and Web Services: Consuming Services
Developing Azure and Web Services: Deployment Strategy
Developing Azure and Web Services: Diagnostics Debugging and ACS
Developing Azure and Web Services: Entity Framework
Developing Azure and Web Services: Hosting Web APIs
Developing Azure and Web Services: IIS & Web Services
Developing Azure and Web Services: IIS & Web Services
Developing Azure and Web Services: Introduction
Developing Azure and Web Services: Managing Data
Developing Azure and Web Services: Messaging Security and Troubleshooting
Developing Azure and Web Services: Messaging Security and Troubleshooting
Developing Azure and Web Services: Web API Services
Developing Azure and Web Services: Working with Assemblies
Getting Started With Entity Framework
Getting Started with LINQ
HTML5 APIs and Local Data Storage
HTML5 with JavaScript & CSS3: Advanced Input Validation
HTML5 with JavaScript & CSS3: APIs & Data Storage
HTML5 with JavaScript & CSS3: Data Flow Consuming & Transmitting Data
HTML5 with JavaScript & CSS3: HTML5 & Javascript
HTML5 with JavaScript & CSS3: Introduction
HTML5 with JavaScript & CSS3: Styling HTML5 & JavaScript
HTML5 with JavaScript & CSS3: WebSockets & Asynchronous Processing
IIS and Web Services
Introduction to HTML5 and CSS
Introduction to the Entity Framework
Introduction to Web Services
Microsoft Azure: Introduction
Microsoft Azure: Networks and Storage
Microsoft Azure: Publishing and Caching
Microsoft Enterprise Library
More Advanced HTML5 and CSS3
NHibernate Advanced Techniques
NHibernate Essentials
Programming in HTML5: Adaptive AI Graphics & Animation
Programming in HTML5: More Advanced HTML5 & CSS3
Queues & Reliable Sessions
Refactor APIs: Refactoring API Code
Reusable APIs: Reusable API Code
Security and WCF Streams
Styling HTML5 and JavaScript
WCF Essentials: Building Clients
WCF Essentials: Contracts
WCF Essentials: Distributed Applications
WCF Essentials: Hosting
WCF Essentials: Interoperability and Integration
WCF Essentials: Introduction to the Framework
WCF Essentials: Managing Transactions
WCF Essentials: Services
WCF Essentials: Tools
WCF Services
WCF Transactions Pipelines and Extensibility
Web API Advanced
Web API Essentials
SK - IT - Software Devlpt - Microsoft Windows Store Apps
ASP.NET MVC Web Applications: Composing the UI Layout
ASP.NET MVC Web Applications: Design and Implement UI Behavior
ASP.NET MVC Web Applications: Implementing Secure Sites
ASP.NET MVC Web Applications: JSON & XML Data Formats
ASP.NET MVC Web Applications: MVC Application Routes
ASP.NET MVC Web Applications: MVC Controllers & Actions
Designing Deployment Architecture
SK - IT - Software Devlpt - Mobile Application Development
Advanced Windows Store Apps with C# in Visual Studio 2013: Data Management
Advanced Windows Store Apps with C# in Visual Studio 2013: Media and Devices
Advanced Windows Store Apps with C# in Visual Studio 2013: Security & Optimizing
Advanced Windows Store Apps with C# in Visual Studio 2013: Testing & Deployment
Advanced Windows Store Apps with C# in Visual Studio 2013: The UI Printing WNS
Android Lollipop New Features For Developers
Apache Cordova: Exploring the Advanced Features
Apache Cordova: Exploring the Basic Features
Build & Integrate React Applications with Redux Capabilities
Build and Test SPA Using React and Redux
Build Apps Using React: Advanced Features in React
Build Apps Using React: In Development & Production
Build Apps Using React: Introducing React for Web Applications
Build Apps Using React: Local Machine & Online Playgrounds
Build Apps Using React: Props & State
Build Apps Using React: Working with Events
Build Apps Using React: Working with Forms
Creating Mobile Apps with Appcelerator Titanium
Cross-Platform Shared Code and Xamarin.Forms in Visual Studio
Developing Advanced Apple Watch Applications
Developing Basic Apple Watch Applications
Enhance Reactive Applications with Advanced React
Exploring the Advanced Features of Appcelerator Titanium
Exploring the Advanced Features of the Ionic Framework
Exploring the Basic Features of the Ionic Framework
Introduction to Kotlin
Kotlin IDEs
Kotlin Loops and Functions
Kotlin Objects and Classes
Kotlin Syntax
PhoneGap: Exploring Advanced Features
PhoneGap: Exploring Basic Features
Programming in the IoT Arena
React and Flux: An Overview
React and Flux: Creating Simple React Components
React and Flux: React Router and Forms
React and Flux: Working with Flux
Reactive Programming Using Redux
Tips and Tricks for Developing Secure Mobile Apps
Xamarin Android and iOS Projects in Cross-Platform Solutions in Visual Studio
SK - IT - Software Devlpt - Mobile Application Development - Alexa
Alexa Architecture and Components
Working with Smart Home and Business
Working with SSML and AVS
SK - IT - Software Devlpt - Mobile Application Development - Android
Android For .NET Developers: Advanced Design Build Android Wear and Emulator
Android For .NET Developers: Android OS
Android For .NET Developers: Android User Interface Elements
Android For .NET Developers: Different Approaches to Development
Android For .NET Developers: Introduction to Xamarin For .NET
Android For .NET Developers: Java Garbage Collection Debugging and Runtime
Designing Creating and Manipulating Android Databases
Developing Android Applications: Activities Connectivity and Services
Developing Android Applications: Activities, Connectivity, and Services
Developing Android Applications: App Layout
Developing Android Applications: App Structure and Formatting
Developing Android Applications: Creating an App with Java
Developing Android Applications: Debugging and Testing
Developing Android Applications: Debugging and Testing
Developing Android Applications: Defensive Programming and Security
Developing Android Applications: Defensive Programming and Security
Developing Android Applications: Introduction
Mobile App Development: An Introduction Android Development
Mobile App Development: Authentication in an Android App
Mobile App Development: Building a Basic Android App
Mobile App Development: Coding the Behavior of an Android App
Mobile App Development: Defining the UI for an Android App
Mobile App Development: Testing an Android App
New Features of Android 7
The Development of Android Applications
The Main Components of Android
User Interfaces Controls and Fragments
SK - IT - Software Devlpt - Mobile Application Development - ASP .NET
Adaptive UI Layout and Caching Strategy
ASP.NET MVC Databases and Entity Framework
ASP.NET MVC Databases and the Entity Framework
Asynchronous Tasks in ASP.NET MVC Web Application
Composing the UI Layout of an Application
Configuring and Deploying an ASP.NET MVC Application
Configuring and Deploying ASP.NET Web Applications
Creating and Securing MVC 5 Applications
Debugging ASP.NET MVC Web Applications
Debugging ASP.NET MVC Web Applications
Design a Distributed ASP.NET MVC Application
Design and Implement UI Behavior
Designing ASP.NET MVC Application Architecture
Designing ASP.NET MVC Application Architecture
Designing the User Experience in ASP.NET MVC Web Applications
Developing the User Experience in ASP.NET MVC
Getting Started with ASP.NET MVC Web Applications in Visual Studio 2013
Implement ASP.NET Authorization and Exception Handling Strategy
Implement ASP.NET Claims-Based Authentication
Implement Globalization Azure Role Lifecycle and Search Engine Optimization
Implementing ASP.NET Authentication
Implementing ASP.NET Authentication and Authorization
Implementing Secure Sites with ASP.NET
Introduction to ASP.NET MVC Web Applications
MVC Application Routes
MVC Controllers and Actions
Optimizing and Protecting Application Data
Optimizing Application Data
Troubleshooting Runtime Issues and HTTP Modules & Handlers
Using MVC 5 with EF6 Web API 2 SignalR and Azure
Working with ASP.NET MVC Models
Working with ASP.NET MVC Models and Unit Testing
Working with ASP.NET Web API Routes and Controllers
Working with JSON and XML Data Formats
SK - IT - Software Devlpt - Mobile Application Development - iOS
iOS Application Development: Application Lifecycle Management
iOS Application Development: Creating a Basic iOS App
iOS Application Development: Creating Adaptive Apps
iOS Application Development: Data Graphics and Media
iOS Application Development: iOS 10 Features
iOS Application Development: Layout and Controls
iOS Application Development: Optimizing Apps
SK - IT - Software Devlpt - Mobile Application Development - iOS 12
iOS 12 Development: Best Practices in iOS Security
iOS 12 Development: Getting Started with Xcode and iOS
iOS 12 Development: Working With Data and Gestures
iOS 12 Development: Working With Data and Gestures
iOS 12 Development: Working With Layout and Controls in iOS
SK - IT - Software Devlpt. - Configuration Management
Advanced Git
Apache Subversion Fundamentals: Getting to Know Subversion
Beginner Git
GitHub Extension for Visual Studio
Introducing Git
Working with Git
Working with GitHub
SK - IT - Software Devlpt. - Defensive Programming
Application Security in .NET
Code Access Security and Cryptography in .NET
Creating Secure C/C++ Code
Defensive Coding for C#
Defensive Coding for C/C++
Defensive Coding for JavaScript and HTML5
Defensive Coding Fundamentals for C#
Defensive Coding Fundamentals for C/C++
Defensive Coding Fundamentals for JavaScript and HTML5
Defensive Programmer: Advanced Concepts
Defensive Programmer: Code Samples
Defensive Programmer: Cryptography
Defensive Programmer: Defensive Concepts
Defensive Programmer: Defensive Techniques
Defensive Programmer: Secure Testing
Defensive Programming in Android: Errors Exceptions and Testing