Most popular
PECB Certified ISO/IEC 27001 Lead Auditor eLearning Training Course
23 Lessons
Intermediate
What you'll learn
Understand the operations of an Information Security Management System based on ISO/IEC 27001
Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
Understand an auditor’s role to plan, lead, and follow-up on a management system audit in accordance with ISO 19011
Learn how to lead an audit and audit team
Learn how to interpret the requirements of ISO/IEC 27001 in the context of an ISMS audit
Acquire the competencies of an auditor to plan an audit, lead an audit, draft reports, and follow-up on an audit in compliance with ISO 19011
70-336: Core Solutions of Lync Server 2013 eLearning
45 Lessons
Intermediate
What you'll learn
Describe the overall server and client Lync Server 2013 architecture.
Describe Lync Server 2013 features and user scenarios.
Describe the Lync Server deployment process.
Describe the components of a Lync Server 2013 Design.
Plan for Microsoft Solutions Framework for Lync Server 2013.
Plan Infrastructure Requirements for Lync Server 2013.
Use the Lync Server 2013 Planning Tool.
Use Topology Builder.
Plan for Site Topology.
Design a Site Topology.
Plan the Server Infrastructure.
Design Documentation Using Microsoft Office.
Use Lync Server 2013 management interfaces.
Configure Role-Based Access Control.
Prepare for client deployment.
Deploy and manage clients.
Prepare for device deployment.
Deploy and manage Internet Protocol (IP) phones.
Describe conferencing in Lync Server 2013.
Describe dial-in conferencing in Lync Server 2013.
Manage and administer dial-in conferencing in Lync Server 2013.
Describe the conferencing capabilities of Lync Server 2013.
Design audio and video for web conferencing.
Plan for instant message and presence Federation.
Design Edge services.
Describe the features and concepts for Persistent Chat in Lync Server 2013.
Design Lync Server 2013 to include Persistent Chat.
Deploy and configure Persistent chat in Lync Server 2013.
Describe the Archiving service.
Describe the Monitoring service.
Configure the Archiving and Monitoring services.
Describe and use the Lync Server 2013 troubleshooting tools.
Describe the required daily, weekly, and monthly maintenance tasks.
Describe the fundamental troubleshooting approach to Lync Server 2013 issues.
Use SIP commands and analyze SIP logs.
Describe high availability in Lync Server 2013.
Configure High Availability features in Lync Server 2013.
Plan for load balancing in Lync Server 2013.
Design load balancing in Lync Server 2013.
Describe the high availability options in Lync Server 2013.
Describe the tools for backing up and restoring Lync Server 2013 data.
Backup and restore critical Lync Server 2013 data.
Export and import critical Lync Server 2013 data.
Describe design considerations for branch site scenarios.
Describe the migration process.
Describe migration and coexistence topologies.
Plan for client and device migration.
Design a software deployment strategy for Lync Server 2013.
Cisco CCNP Data Center: DCCOR eLearning
Intermediate
What you'll learn
Implement routing and switching protocols in data center environment
Implement overlay networks in data center
Introduce high-level Cisco Application Centric Infrastructure (Cisco ACI) concepts and Cisco Virtual Machine manager (VMM) domain integration
Describe Cisco Cloud Service and deployment models
Implement Fibre Channel fabric
Implement Fibre Channel over Ethernet (FCoE) unified fabric
Implement security features in data center
Implement software management and infrastructure monitoring
Implement Cisco UCS Fabric Interconnect and Server abstraction
Implement SAN connectivity for Cisco UCS
Describe Cisco HyperFlex infrastructure concepts and benefits
Implement Cisco automation and scripting tools in data center
Evaluate automation and orchestration technologies
70-646: Microsoft Windows Server 2008 R2 Administration eLearning
39 Lessons
Intermediate
What you'll learn
Plan Windows Server 2008 and Windows Server 2008 R2 SP1 deployments and upgrades
Plan server management and delegated administration strategies
Plan for network addressing with IPv4 and IPv6 and also the provisioning of DNS services
Plan and provision Active Directory Domain Services
Plan and implement Group Policy strategy
Plan and implement Active Directory Certificate Services
Plan and provision Application servers including Web services, presentation virtualization and application virtualization
Plan and implement file and print server roles
Plan and implement secure network access policies such as VPNs, Network Access Protection (NAP) and Direct Access
Plan and provision data and storage
Plan and implement an update management strategy using Windows Server Update Services (WSUS)
Plan and implement high availability
Plan for server performance and event monitoring
Plan and implement a backup and recovery strategy
Introduction to Kubernetes Containerization eLearning
56 Lessons
Intermediate
What you'll learn
What Kubernetes is and what its used for
Key Kubernetes concepts, including the Kubernetes API, cluster architecture, and more
How to install, configure, and validate Kubernetes clusters
Scheduling pods
Daemon sets
Resource limitation
Pod and service networking
Persistent and creating volumes
Security primitives
Authentication and authorization
Logging and monitoring applications and cluster components
Troubleshooting applications, the control plane, the worker node, and the network
C)DFE – Certified Digital Forensic Examiner eLearning
32 Lessons
40 hours
Intermediate
What you'll learn
Upon completion, the Certified Digital Forensics Examiner candidate will be able to competently take the CDFE exam.
Systems Administration – Windows and Linux
32 hours
All Levels
ITIL® 4 Foundation eLearning
41 Lessons
Beginner
What you'll learn
Key IT service management concepts
How ITIL guiding principles can help and organization to adopt and adapt service management
The 4 dimensions of service management
The purpose and components of the service value system
The activities of the service value chain and how they interconnect
Know the purpose of key ITIL practices
MS-100: Microsoft 365 Identity and Services eLearning
11 Lessons
Intermediate
What you'll learn
Office 365 overview
Moving your organization to Office 365
Configuring Office 365
Managing Office 365 ProPlus deployments
Plan their Microsoft 365 on-premises infrastructure
Plan their identity and authentication solution
Plan and configure their Microsoft 365 experience
Leverage Microsoft’s FastTrack and partner services
Implement their domain services
Configure their Microsoft 365 tenant roles
Manage their Microsoft 365 tenant health and services
Manage user accounts and licenses in Microsoft 365
Manage admin roles and security groups in Microsoft 365
Plan and implement password management
Manage Microsoft 365 authentication and provisioning options
Plan for directory synchronization
Plan and implement Azure AD Connect
Manage synchronized identities
Plan and implement an ADFS deployment
Implement applications in Azure AD
Configure Azure AD Application Proxy
Design solutions for external access
Manage their Microsoft 365 tenant health and services
AWS Architect Associate eLearning
30 Lessons
Intermediate
What you'll learn
Make architectural decisions based on AWS architectual principles and best practices
Leverage AWS services to make your infrastructure scalable, reliable, and highly available
Leverage AWS Managed Services to enable greater flexibility and resiliency in an infrastructure
Make an AWS-based infrastructure more efficient to increase performance and reduce costs
Use the Well-Architected Framework to improve architectures with AWS solutions
Trending
70-336: Core Solutions of Lync Server 2013 eLearning
45 Lessons
Intermediate
What you'll learn
Describe the overall server and client Lync Server 2013 architecture.
Describe Lync Server 2013 features and user scenarios.
Describe the Lync Server deployment process.
Describe the components of a Lync Server 2013 Design.
Plan for Microsoft Solutions Framework for Lync Server 2013.
Plan Infrastructure Requirements for Lync Server 2013.
Use the Lync Server 2013 Planning Tool.
Use Topology Builder.
Plan for Site Topology.
Design a Site Topology.
Plan the Server Infrastructure.
Design Documentation Using Microsoft Office.
Use Lync Server 2013 management interfaces.
Configure Role-Based Access Control.
Prepare for client deployment.
Deploy and manage clients.
Prepare for device deployment.
Deploy and manage Internet Protocol (IP) phones.
Describe conferencing in Lync Server 2013.
Describe dial-in conferencing in Lync Server 2013.
Manage and administer dial-in conferencing in Lync Server 2013.
Describe the conferencing capabilities of Lync Server 2013.
Design audio and video for web conferencing.
Plan for instant message and presence Federation.
Design Edge services.
Describe the features and concepts for Persistent Chat in Lync Server 2013.
Design Lync Server 2013 to include Persistent Chat.
Deploy and configure Persistent chat in Lync Server 2013.
Describe the Archiving service.
Describe the Monitoring service.
Configure the Archiving and Monitoring services.
Describe and use the Lync Server 2013 troubleshooting tools.
Describe the required daily, weekly, and monthly maintenance tasks.
Describe the fundamental troubleshooting approach to Lync Server 2013 issues.
Use SIP commands and analyze SIP logs.
Describe high availability in Lync Server 2013.
Configure High Availability features in Lync Server 2013.
Plan for load balancing in Lync Server 2013.
Design load balancing in Lync Server 2013.
Describe the high availability options in Lync Server 2013.
Describe the tools for backing up and restoring Lync Server 2013 data.
Backup and restore critical Lync Server 2013 data.
Export and import critical Lync Server 2013 data.
Describe design considerations for branch site scenarios.
Describe the migration process.
Describe migration and coexistence topologies.
Plan for client and device migration.
Design a software deployment strategy for Lync Server 2013.
Cisco CCNP Data Center: DCCOR eLearning
Intermediate
What you'll learn
Implement routing and switching protocols in data center environment
Implement overlay networks in data center
Introduce high-level Cisco Application Centric Infrastructure (Cisco ACI) concepts and Cisco Virtual Machine manager (VMM) domain integration
Describe Cisco Cloud Service and deployment models
Implement Fibre Channel fabric
Implement Fibre Channel over Ethernet (FCoE) unified fabric
Implement security features in data center
Implement software management and infrastructure monitoring
Implement Cisco UCS Fabric Interconnect and Server abstraction
Implement SAN connectivity for Cisco UCS
Describe Cisco HyperFlex infrastructure concepts and benefits
Implement Cisco automation and scripting tools in data center
Evaluate automation and orchestration technologies
70-646: Microsoft Windows Server 2008 R2 Administration eLearning
39 Lessons
Intermediate
What you'll learn
Plan Windows Server 2008 and Windows Server 2008 R2 SP1 deployments and upgrades
Plan server management and delegated administration strategies
Plan for network addressing with IPv4 and IPv6 and also the provisioning of DNS services
Plan and provision Active Directory Domain Services
Plan and implement Group Policy strategy
Plan and implement Active Directory Certificate Services
Plan and provision Application servers including Web services, presentation virtualization and application virtualization
Plan and implement file and print server roles
Plan and implement secure network access policies such as VPNs, Network Access Protection (NAP) and Direct Access
Plan and provision data and storage
Plan and implement an update management strategy using Windows Server Update Services (WSUS)
Plan and implement high availability
Plan for server performance and event monitoring
Plan and implement a backup and recovery strategy
Introduction to Kubernetes Containerization eLearning
56 Lessons
Intermediate
What you'll learn
What Kubernetes is and what its used for
Key Kubernetes concepts, including the Kubernetes API, cluster architecture, and more
How to install, configure, and validate Kubernetes clusters
Scheduling pods
Daemon sets
Resource limitation
Pod and service networking
Persistent and creating volumes
Security primitives
Authentication and authorization
Logging and monitoring applications and cluster components
Troubleshooting applications, the control plane, the worker node, and the network
C)DFE – Certified Digital Forensic Examiner eLearning
32 Lessons
40 hours
Intermediate
What you'll learn
Upon completion, the Certified Digital Forensics Examiner candidate will be able to competently take the CDFE exam.
Systems Administration – Windows and Linux
32 hours
All Levels
ITIL® 4 Foundation eLearning
41 Lessons
Beginner
What you'll learn
Key IT service management concepts
How ITIL guiding principles can help and organization to adopt and adapt service management
The 4 dimensions of service management
The purpose and components of the service value system
The activities of the service value chain and how they interconnect
Know the purpose of key ITIL practices
MS-100: Microsoft 365 Identity and Services eLearning
11 Lessons
Intermediate
What you'll learn
Office 365 overview
Moving your organization to Office 365
Configuring Office 365
Managing Office 365 ProPlus deployments
Plan their Microsoft 365 on-premises infrastructure
Plan their identity and authentication solution
Plan and configure their Microsoft 365 experience
Leverage Microsoft’s FastTrack and partner services
Implement their domain services
Configure their Microsoft 365 tenant roles
Manage their Microsoft 365 tenant health and services
Manage user accounts and licenses in Microsoft 365
Manage admin roles and security groups in Microsoft 365
Plan and implement password management
Manage Microsoft 365 authentication and provisioning options
Plan for directory synchronization
Plan and implement Azure AD Connect
Manage synchronized identities
Plan and implement an ADFS deployment
Implement applications in Azure AD
Configure Azure AD Application Proxy
Design solutions for external access
Manage their Microsoft 365 tenant health and services
AWS Architect Associate eLearning
30 Lessons
Intermediate
What you'll learn
Make architectural decisions based on AWS architectual principles and best practices
Leverage AWS services to make your infrastructure scalable, reliable, and highly available
Leverage AWS Managed Services to enable greater flexibility and resiliency in an infrastructure
Make an AWS-based infrastructure more efficient to increase performance and reduce costs
Use the Well-Architected Framework to improve architectures with AWS solutions
Project Fundamentals for the Accidental Project Manager eLearning
17 Lessons
Intermediate
What you'll learn
Common best practices utilized by successful project managers
Common processes and documents, and how to utilize them
How organizational variables can affect which best practices to utilize
How to initiate, plan, execute, monitor and control in an effective manner
Featured Courses
CompTIA Cloud Essentials+ eLearning Bundle
Beginner
CertMaster Learn Details What is CertMaster Learn? CertMaster Learn is …
$499.00
CompTIA Network+ eLearning Bundle
Intermediate
What is CertMaster Practice? CompTIA CertMaster Practice is an online …
$1,499.00
All eLearning Courses by Practice Area Courses
Filter by Vendor
We found 2 courses available for you
CC (Certified in Cybersecurity) Exam Prep | eLearning Bundle
14 hours
Beginner
Course Description Through self-paced learning content this course will cover …
$349.00
Certified Ethical Hacker | CEH eLearning
20 Lessons
16 hours
All Levels
Course Description The Certified Ethical Hacker (CEH) provides an in-depth …
$2,199.00
What you'll learn
Information security controls, laws, and standards.
Various types of footprinting, footprinting tools, and countermeasures.
Network scanning techniques and scanning countermeasures
Enumeration techniques and enumeration countermeasures
Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities.
Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.
Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures.
DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.
Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures.
Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures.
Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures.
SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.
Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools.
Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures.
Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools.
Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
Threats to IoT and OT platforms and defending IoT and OT devices.
Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.