Most popular
PECB Certified ISO/IEC 27001 Lead Auditor eLearning Training Course
23 Lessons
Intermediate
What you'll learn
Understand the operations of an Information Security Management System based on ISO/IEC 27001
Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
Understand an auditor’s role to plan, lead, and follow-up on a management system audit in accordance with ISO 19011
Learn how to lead an audit and audit team
Learn how to interpret the requirements of ISO/IEC 27001 in the context of an ISMS audit
Acquire the competencies of an auditor to plan an audit, lead an audit, draft reports, and follow-up on an audit in compliance with ISO 19011
70-667: Configuring Microsoft SharePoint 2010 eLearning
88 Lessons
Intermediate
What you'll learn
Installing and Configuring a Microsoft SharePoint 2010 Environment
Managing a SharePoint Environment
Deploying and Managing Applications
Maintaining a SharePoint Environment
Understand appropriate command-Line, PowerShell and applicable management shell commands
Cisco CCNP Collaboration: CLCOR eLearning
Intermediate
What you'll learn
Describe the Cisco Collaboration solutions architecture
Compare the IP Phone signaling protocols of Session Initiation Protocol (SIP), H323, Media Gateway Control Protocol (MGCP), and Skinny Client Control Protocol (SCCP)
Integrate and troubleshoot Cisco Unified Communications Manager with LDAP for user synchronization and user authentication
Implement Cisco Unified Communications Manager provisioning features
Describe the different codecs and how they are used to transform analogue voice into digital streams
Describe a dial plan, and explain call routing in Cisco Unified Communications Manager
Implement Public Switched Telephone Network (PSTN) access using MGCP gateways
Implement a Cisco gateway for PSTN access
Configure calling privileges in Cisco Unified Communications Manager
Implement toll fraud prevention
Implement globalized call routing within a Cisco Unified Communications Manager cluster
Implement and troubleshoot media resources in Cisco Unified Communications Manager
Describe Cisco Instant Messaging and Presence, including call flows and protocols
Describe and configure endpoints and commonly required features
Configure and troubleshoot Cisco Unity Connection integration
Configure and troubleshoot Cisco Unity Connection call handlers
Describe how Mobile Remote Access (MRA) is used to allow endpoints to work from outside the company
Analyze traffic patterns and quality issues in converged IP networks supporting voice, video, and data traffic
Define QoS and its models
Implement classification and marking
Configure classification and marking options on Cisco Catalyst switches
70-412: Configuring Advanced Windows Server 2012 R2 Services eLearning
74 Lessons
Intermediate
What you'll learn
Implement a Group Policy infrastructure
Manage user desktops with Group Policy
Manage user and service accounts
Maintain Active Directory Domain Services (AD DS)
Configure and troubleshoot Domain Name System (DNS)
Configure and troubleshoot Remote Access
Install, configure, and troubleshoot the Network Policy Server (NPS) role
Implement Network Access Protection (NAP)
Optimize file services
Configure encryption and advanced auditing
Deploy and maintain server images
Implement Update Management
Monitor Windows Server 2012
Understand appropriate command-line, PowerShell and applicable management shell commands
HTML Foundations eLearning
26 Lessons
Intermediate
What you'll learn
Structure of a HTML page
head, p, spa, em, and strong elements
Parent and child relationships
Tables, forms, and special characters
Headers and footers
Certified Penetration Testing Professional | CPENT eLearning
14 Lessons
24 hours
All Levels
70-744: Securing Windows Server 2016 eLearning
14 Lessons
Intermediate
What you'll learn
Secure Windows Server
Secure application development and a server workload infrastructure
Manage security baselines
Configure and manage just enough and just-in-time (JIT) administration
Manage data security
Configure Windows Firewall and a software-defined distributed firewall
Secure network traffic
Secure your virtualization infrastructure
Manage malware and threats
Configure advanced auditing
Manage software updates
Manage threats by using Advanced Threat Analytics (ATA) and Microsoft Operations Management Suite (OMS)
AZ-104: Microsoft Azure Administrator eLearning
23 Lessons
Intermediate
What you'll learn
Implement access management with Azure users, groups, and role-based access control.
Use Azure Monitor to configure Azure alerts and review the Azure Activity Log.
Query and analyze Log Analytics data.
Deploy resources with ARM templates and organize Azure resources.
Optimize your use of Azure tools like the Azure portal, Azure PowerShell, Cloud Shell and the Azure CLI.
Create Azure storage accounts for different data replication, pricing, and content scenarios.
Implement virtual machine storage, blob storage, Azure files, and structured storage.
Secure and manage storage with shared access keys, Azure backup, and Azure File Sync.
Store and access data using Azure Content Delivery Network, and the Import and Export service.
Explain virtual machine usage cases, storage options, pricing, operating systems, networking capabilities, and general planning considerations.
Create Windows virtual machines in the Azure Portal, with Azure PowerShell, or using ARM Templates.
Deploy custom server images and Linux virtual machines.
Configure virtual machine networking and storage options.
Implement virtual machine high availability, scalability, and custom scripts extensions.
Backup, restore, and monitor virtual machines.
Understand virtual networking components, IP addressing, and network routing options.
Implement Azure DNS domains, zones, record types, and resolution methods.
Configure network security groups, service endpoints, logging, and network troubleshooting.
Implement site connectivity schemas including VNet-to-VNet connections and virtual network peering.
Implement Azure Active Directory, Self-Service Password Reset, Azure AD Identity Protection, and integrated SaaS applications.
Configure domains and tenants, users and groups, roles, and devices.
Implement and manage Azure Active Directory integration options and Azure AD Application Proxy.
Implement and configure Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway.
Use Azure RBAC to grant a granular level of access based on an administrator’s assigned tasks.
Use Azure Multi-Factor Authentication to configure a strong authentication for users at sign-in.
Certified Associate in Project Management (CAPM)® eLearning
50 Lessons
24 hours
Intermediate
What you'll learn
Prepare to pass the CAPM exam while completing the required 23 contact hours/PDUs
Decipher PMBOK® Guide processes and knowledge areas:
Project Management Framework
Project Integration Management
Project Scope Management
Project Schedule Management
Project Cost Management
Project Quality Management
Project Resource Management
Project Communication Management
Project Risk Management
Project Procurement Management
Project Stakeholder Management
Identify significant steps of the project life cycle
Examine the PMBOK® Guide tools and techniques for exam success
Evaluate your exam preparedness and create a study plan
PM Leadership: Negotiating For More eLearning
6 Lessons
Intermediate
What you'll learn
Techniques to identify objectives and requirements to prepare for negotiation
Techniques to identify your own negotiation personality and that of the party
Top skills to employ during a negotiation
Tips and tricks to increase the win-win
Trending
70-667: Configuring Microsoft SharePoint 2010 eLearning
88 Lessons
Intermediate
What you'll learn
Installing and Configuring a Microsoft SharePoint 2010 Environment
Managing a SharePoint Environment
Deploying and Managing Applications
Maintaining a SharePoint Environment
Understand appropriate command-Line, PowerShell and applicable management shell commands
Cisco CCNP Collaboration: CLCOR eLearning
Intermediate
What you'll learn
Describe the Cisco Collaboration solutions architecture
Compare the IP Phone signaling protocols of Session Initiation Protocol (SIP), H323, Media Gateway Control Protocol (MGCP), and Skinny Client Control Protocol (SCCP)
Integrate and troubleshoot Cisco Unified Communications Manager with LDAP for user synchronization and user authentication
Implement Cisco Unified Communications Manager provisioning features
Describe the different codecs and how they are used to transform analogue voice into digital streams
Describe a dial plan, and explain call routing in Cisco Unified Communications Manager
Implement Public Switched Telephone Network (PSTN) access using MGCP gateways
Implement a Cisco gateway for PSTN access
Configure calling privileges in Cisco Unified Communications Manager
Implement toll fraud prevention
Implement globalized call routing within a Cisco Unified Communications Manager cluster
Implement and troubleshoot media resources in Cisco Unified Communications Manager
Describe Cisco Instant Messaging and Presence, including call flows and protocols
Describe and configure endpoints and commonly required features
Configure and troubleshoot Cisco Unity Connection integration
Configure and troubleshoot Cisco Unity Connection call handlers
Describe how Mobile Remote Access (MRA) is used to allow endpoints to work from outside the company
Analyze traffic patterns and quality issues in converged IP networks supporting voice, video, and data traffic
Define QoS and its models
Implement classification and marking
Configure classification and marking options on Cisco Catalyst switches
70-412: Configuring Advanced Windows Server 2012 R2 Services eLearning
74 Lessons
Intermediate
What you'll learn
Implement a Group Policy infrastructure
Manage user desktops with Group Policy
Manage user and service accounts
Maintain Active Directory Domain Services (AD DS)
Configure and troubleshoot Domain Name System (DNS)
Configure and troubleshoot Remote Access
Install, configure, and troubleshoot the Network Policy Server (NPS) role
Implement Network Access Protection (NAP)
Optimize file services
Configure encryption and advanced auditing
Deploy and maintain server images
Implement Update Management
Monitor Windows Server 2012
Understand appropriate command-line, PowerShell and applicable management shell commands
HTML Foundations eLearning
26 Lessons
Intermediate
What you'll learn
Structure of a HTML page
head, p, spa, em, and strong elements
Parent and child relationships
Tables, forms, and special characters
Headers and footers
PECB Certified ISO/IEC 27001 Lead Auditor eLearning Training Course
23 Lessons
Intermediate
What you'll learn
Understand the operations of an Information Security Management System based on ISO/IEC 27001
Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
Understand an auditor’s role to plan, lead, and follow-up on a management system audit in accordance with ISO 19011
Learn how to lead an audit and audit team
Learn how to interpret the requirements of ISO/IEC 27001 in the context of an ISMS audit
Acquire the competencies of an auditor to plan an audit, lead an audit, draft reports, and follow-up on an audit in compliance with ISO 19011
Certified Penetration Testing Professional | CPENT eLearning
14 Lessons
24 hours
All Levels
70-744: Securing Windows Server 2016 eLearning
14 Lessons
Intermediate
What you'll learn
Secure Windows Server
Secure application development and a server workload infrastructure
Manage security baselines
Configure and manage just enough and just-in-time (JIT) administration
Manage data security
Configure Windows Firewall and a software-defined distributed firewall
Secure network traffic
Secure your virtualization infrastructure
Manage malware and threats
Configure advanced auditing
Manage software updates
Manage threats by using Advanced Threat Analytics (ATA) and Microsoft Operations Management Suite (OMS)
AZ-104: Microsoft Azure Administrator eLearning
23 Lessons
Intermediate
What you'll learn
Implement access management with Azure users, groups, and role-based access control.
Use Azure Monitor to configure Azure alerts and review the Azure Activity Log.
Query and analyze Log Analytics data.
Deploy resources with ARM templates and organize Azure resources.
Optimize your use of Azure tools like the Azure portal, Azure PowerShell, Cloud Shell and the Azure CLI.
Create Azure storage accounts for different data replication, pricing, and content scenarios.
Implement virtual machine storage, blob storage, Azure files, and structured storage.
Secure and manage storage with shared access keys, Azure backup, and Azure File Sync.
Store and access data using Azure Content Delivery Network, and the Import and Export service.
Explain virtual machine usage cases, storage options, pricing, operating systems, networking capabilities, and general planning considerations.
Create Windows virtual machines in the Azure Portal, with Azure PowerShell, or using ARM Templates.
Deploy custom server images and Linux virtual machines.
Configure virtual machine networking and storage options.
Implement virtual machine high availability, scalability, and custom scripts extensions.
Backup, restore, and monitor virtual machines.
Understand virtual networking components, IP addressing, and network routing options.
Implement Azure DNS domains, zones, record types, and resolution methods.
Configure network security groups, service endpoints, logging, and network troubleshooting.
Implement site connectivity schemas including VNet-to-VNet connections and virtual network peering.
Implement Azure Active Directory, Self-Service Password Reset, Azure AD Identity Protection, and integrated SaaS applications.
Configure domains and tenants, users and groups, roles, and devices.
Implement and manage Azure Active Directory integration options and Azure AD Application Proxy.
Implement and configure Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway.
Use Azure RBAC to grant a granular level of access based on an administrator’s assigned tasks.
Use Azure Multi-Factor Authentication to configure a strong authentication for users at sign-in.
Certified Associate in Project Management (CAPM)® eLearning
50 Lessons
24 hours
Intermediate
What you'll learn
Prepare to pass the CAPM exam while completing the required 23 contact hours/PDUs
Decipher PMBOK® Guide processes and knowledge areas:
Project Management Framework
Project Integration Management
Project Scope Management
Project Schedule Management
Project Cost Management
Project Quality Management
Project Resource Management
Project Communication Management
Project Risk Management
Project Procurement Management
Project Stakeholder Management
Identify significant steps of the project life cycle
Examine the PMBOK® Guide tools and techniques for exam success
Evaluate your exam preparedness and create a study plan
PM Leadership: Negotiating For More eLearning
6 Lessons
Intermediate
What you'll learn
Techniques to identify objectives and requirements to prepare for negotiation
Techniques to identify your own negotiation personality and that of the party
Top skills to employ during a negotiation
Tips and tricks to increase the win-win
Featured Courses
CompTIA Cloud Essentials+ eLearning Bundle
Beginner
CertMaster Learn Details What is CertMaster Learn? CertMaster Learn is …
$499.00
CompTIA Network+ eLearning Bundle
Intermediate
What is CertMaster Practice? CompTIA CertMaster Practice is an online …
$1,499.00
All eLearning Courses by Practice Area Courses
Filter by Vendor
We found 2 courses available for you
CC (Certified in Cybersecurity) Exam Prep | eLearning Bundle
14 hours
Beginner
Course Description Through self-paced learning content this course will cover …
$349.00
Certified Ethical Hacker | CEH eLearning
20 Lessons
16 hours
All Levels
Course Description The Certified Ethical Hacker (CEH) provides an in-depth …
$2,199.00
What you'll learn
Information security controls, laws, and standards.
Various types of footprinting, footprinting tools, and countermeasures.
Network scanning techniques and scanning countermeasures
Enumeration techniques and enumeration countermeasures
Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities.
Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.
Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures.
DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.
Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures.
Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures.
Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures.
SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.
Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools.
Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures.
Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools.
Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
Threats to IoT and OT platforms and defending IoT and OT devices.
Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.