Technology & Developer

Sva znanja namenjena profesionalcima čija se ekspertiza zasniva na tehnologiji. Vrhunski esksperti ili početnici, ovo je kolekcija za inženjere, programere i ostale IT stručnjake.

  Certified Information Systems Security Professional (CISSP) Bootcamp

Ceratified Information Systems Security Professional CISSP Bootcamp: Live Session 1
CISSP Bootcamp: Live Session 2
CISSP Bootcamp: Live Session 3
CISSP Bootcamp: Live Session 4
CISSP Bootcamp: Live Session 5
CISSP 2015 LAB: Certified Information Systems Security Professional (CISSP)
CISSP 2018 TestPrep: Certified Information Systems Security Professional (CISSP) 2018

 Enterprise Developer to DevOps Engineer

Agile DevOps Agile Development: Agile Processes for DevOps
DevOps Agile Development: DevOps Methodologies for Developers
Ansible 2.8 Ansible: Ansible for DevOps Provisioning
Ansible: Continuous Delivery and Monitoring Using Ansible Playbook and Tower
Chef 15.1 Chef for DevOps: Automate Infrastructure Using Chef Tools & Templates
Chef for DevOps: Managing Infrastructure Using Chef
DevOps CI/CD Implementation for DevOps
DevOps Automation: Configuration Management
DevOps Mindset: DevOps Implementation Using Tools
DevOps Mindset: DevOps Principles & Implementation Approach
The Language of DevOps: DevOps Principles & Practices
The Language of DevOps: DevOps Tools & Processes
DevOps DevOps Smart Failure: Fail Fast & DevOps
DevOps Tools: Selecting the Right Tools
Docker DevOps with Docker: Container Management
DevOps with Docker: Management in the Cloud
Docker 19.03 DevOps with Docker: Implementing DevOps Using Docker
Docker 19.03.1 Using Docker for DevOps: Configuring Docker for Continuous Delivery
Using Docker for DevOps: Introduction to Docker
Git 2.22.0 Using Git for DevOps: Managing Conflict & Effectively Using Git Workflow
Using Git for DevOps: Using Git Effectively
Jenkins 2.176 Jenkins for DevOps: Automated Testing & Advanced Jobs Using Jenkins
Jenkins for DevOps: Jenkins Configuration for DevOps
Puppet 6.x Puppet for DevOps: Installing & Working with Puppet Components
Puppet for DevOps: Working with Puppet Bolt & Continuous Delivery for PE
SaltStack 2019.2 SaltStack for DevOps: Configuration Management with SaltStack
SaltStack for DevOps: Working with SaltStack Components
Confronting Your Assumptions
Cultivating Cross-functional Team Collaboration
Defining Alternative Solutions to a Problem
Developing a Growth Mind-set
DevOps Automation: Delivery Mechanisms
DevOps Cloud Automation: AWS DevOps Tools
DevOps Collaboration Tools: Tools for Continuous Delivery
DevOps Collaboration Tools: Tools for Continuous Integration
Innovating with Lean Product Management
Investigating Arguments
Managing a Project to Minimize Risk and Maximize Quality
Managing Pressure and Stress to Optimize Your Performance
Reaching Efficient Solutions with Computational Thinking
Running Meetings in Better Directions
The Essential Role of the Agile Product Owner
Using Strategic Thinking to Consider the Big Picture

Agile Development

Agile Agile for Software Development: Lean, Agile, & Scrum Methodologies
Agile Hybrid Approaches
Agile Software Development: Agile Development Life Cycle
Secure Agile Programming: Agile Concepts
Secure Agile Programming: Agile Modeling
Secure Agile Programming: Agile Techniques
Secure Agile Programming: Testing
Value-driven Delivery: Delivering Value in Agile Projects
Agile Software Development Agile Architecture, Design, & Collaboration
Agile Programming & Testing
Agile Software Development – Scrum
Agile Software Development Methodologies
Agile Software Development: Agile Project Management Techniques
Agile Test-Driven Development
Introduction to Agile Software Development
Managing Agile Software Development
Planning an Agile Software Development Project
Project Management Project Management Tools: Understanding the Collaboration Tools
Advanced Agile: Leadership Techniques
Advanced Agile: Tools & Techniques
Agile Methodologies
Business Analysis for Project Management: Practices for Early Project Stages
Business Analysis for Project Management: Practices for Later Project Stages
Business Orientation: Strategic Organizational Goals
Decision Making for Software Project Managers
Managing and Engaging Stakeholders
Project Evaluation: Defining Success Metrics
Project Management Needs vs. Expectations
Project Meetings: Agile Project Meetings
Risk Management: Project Risk Assessment
Skills for Project Analysts: Negotiation Skills
Software Data Analysis: Project Management Metrics
Software Project Management Communication Skills
Software Projects: Recruiting the Project Team
Software Requirements Planning
Stakeholder Communication: Software Projects & Stakeholder Communication
Techniques & Tools
Testing Approaches
TestPrep: Agile Tester Foundation Extension

Agile Project Management

Agile Key Exam Concepts
Agile Principles and Methodologies
Agile Project Planning
Agile Project Scheduling and Monitoring
Agile Stakeholder Engagement and Team Development

Agile Project Management Bootcamp

Agile Project Management Agile Project Management Bootcamp: Live Session 1
Agile Project Management Bootcamp: Live Session 2
Agile Project Management Bootcamp: Live Session 3
Agile Project Management Bootcamp: Live Session 4
Agile Project Management Bootcamp: Live Session 5
Agile Key Exam Concepts
Agile Principles and Methodologies
Agile Project Management Bootcamp: Session 1 Replay
Agile Project Planning
Agile Project Scheduling and Monitoring
Agile Stakeholder Engagement and Team Development
TestPrep: Agile PM Practitioner

Ajax

Ajax Ajax Data Requests & Responses

Akka

Akka 2.3.12 Akka: Getting Started
Clustering
Managing Actors & Actor Features
Utilities & Network Features

Alexa Development

Alexa API 2019 Alexa Architecture & Components
Skill Development Using Alexa Components
Working with ASK API Using Node.js & Java
Working with Smart Home & Business
Working with SSML & AVS

Amazon Web Services Architecture

Amazon Web Services (AWS) 2019 AWS Associate Solutions Architect 2019:  Management & Migration
Amazon Web Services 2018 AWS Associate Solution Architect: Amazon CloudFront & Route 53
AWS Associate Solution Architect: Amazon Machine Images
AWS Associate Solution Architect: Architecting for the Cloud
AWS Associate Solution Architect: Architecture Security
AWS Associate Solution Architect: Auto Scaling
AWS Associate Solution Architect: AWS Primer
AWS Associate Solution Architect: Building & Managing AWS Solutions
AWS Associate Solution Architect: Caching
AWS Associate Solution Architect: Database Managed Services
AWS Associate Solution Architect: High Availability
AWS Associate Solution Architect: Loose Coupling
AWS Associate Solution Architect: Managing AWS
AWS Associate Solution Architect: Optimizing Compute Resources
AWS Associate Solution Architect: Optimizing Storage
AWS Associate Solution Architect: Scalability & Elasticity
AWS Associate Solution Architect: Storage Solutions
AWS Associate Solution Architect: Virtual Private Cloud
Business Continuity
Cloud Migration
Costing
Data Replication
Data Security
Data Storage
High Availability
Hybrid Architecture
Image Deployment Management
Network Design
Scalability and Elasticity
Security Controls
Amazon Web Services 2019 Data Lake Framework & Design Implementation
Data Lake Sources, Visualizations, & ETL Operations
Data Lakes on AWS
Data Silos, Lakes, & Streams Introduction
Securing AWS: Data Protection
Securing AWS: Fundamentals
Securing AWS: Identity & Access Management
Securing AWS: Infrastructure Security
AWS Lambda 2018 AWS Serverless Architecture
AWS Serverless Monitoring & Security
AWS Serverless Storage
Introduction to Lambda
Big Data Data Lake Architectures & Data Management Principles

Amazon Web Services Core Concepts

Amazon Web Services 2017 Amazon ECS & OpsWorks
AWS CodeDeploy
Cloud Primer
Deployment and Delivery
Management Tools
Networking
Other Services
Source Control
Storage
Virtual Machines & Identity & Access Management
WorkDocs
Amazon Web Services 2019 AWS Cloud Practitioner 2019: Architecture Design Principles
AWS Cloud Practitioner 2019: AWS Access Management
AWS Cloud Practitioner 2019: AWS Cloud & the Value Proposition
AWS Cloud Practitioner 2019: AWS Cloud Deployment and Operation
AWS Cloud Practitioner 2019: Cloud Economics
AWS Cloud Practitioner 2019: Cloud Security & Compliance
AWS Cloud Practitioner 2019: Core AWS Services
AWS Cloud Practitioner 2019: Security Support Resources
AWS Cloud Practitioner 2019: Shared Responsibility
AWS Cloud Practitioner 2019: Technology Support Resources

Amazon Web Services Development

Amazon Web Services 2018 Application Development
Code Management & Monitoring Tools
Plan Applications & Infrastructure Security
Principles & Essential Services
Serverless Application & Container Management
Service Integration & Orchestration

Amazon Web Services SysOps

Amazon Web Services 2018 Application Infrastructure
Compute Services
Database Services
High Availability
Introduction
Monitoring the AWS Environment
Networking Services
Preparing for Cloud Service Management
Security & IAM Services
Storage Services

Android Development

Android 6 Components, Activities, & Layout
Components, Classes, Services, & Methods
Designing & Creating Android Databases
Development Features, Installation, & Usage
Development Life Cycle Management & Debugging
Fragments & Customization
LAB: Android App Development Essentials
Manipulating Android Databases
User Interfaces & Controls
Android 7 New Features of Android 7
Android Lollipop 5 New Features For Developers
Updates for Developers
Android Studio 1.2.0 Architecture & Development Best Practices
Protection Best Practices
Security Vulnerabilities & Enterprise Considerations
Security Vulnerabilities & Testing
Android Studio 3.1.4 Android Activities, Connectivity, & Services
Android App Layout
Android App Structure & Formatting
Android Debugging & Testing
Android Defensive Programming & Security
Creating an Android App with Java
Introduction to Android Development
Genymotion 1.0.5 Testing Android Apps
Visual Studio 2015 Advanced Design, Build, & Android Wear
Android OS Overview
Approaches to .NET Development
Creating an Android Application
Debugging, Profiling, & Publishing
Device Rotation, Permissions, & Services
Installation, Requirements, & Android Wear
Introduction to Xamarin For .NET
Java & Runtime
Java, Garbage Collection, & Debugging
Platforms & Publishing
User Interface Date & Time
User Interface Design Features
User Interface Elements

Angular

Angular 2 Angular CLI
Angular Security
Creating & Maintaining Forms
Installing & Using Angular
Route Parameters & Observables
Routing Basics
Supporting Mobile Devices
Template Syntax, Directives, & Pipes
Test Environment
Testing Angular Apps
Using Animation
Working with App Components
Angular 4 Animation
Components & Bindings
Creating an Application
Directives
Form Management
LAB: Angular 4 Application Development
Model-driven Forms
NativeScript
Pipes
Routing
Services, Promises, & Route Protection
Angular 5 Bootstrap & Dashboards
Features & Changes
Material & Universal Components
Angular 6 Introduction
Libraries
Material & Elements
Reactive Programming
Testing & TDD
Angular RxJS Angular & ngrx
Angular, Reactive, & Observable
AngularJS 1 Aliasing, Selection, & Routing with AngularUI
AngularJS & TypeScript
AngularJS & UI Bootstrap
AngularUI Backend Utilities
AngularUI Input Utilities
AngularUI Interface Utilities
AngularUI Utilities & Modules
Configuring Routing & Using Other Services
Data Modeling & Storage
Examining Isolate Scope Directives
Getting Started with CSS-based Animations
Introducing Directives
Introduction
JavaScript Animations & Internationalization
Security Considerations
Testing AngularJS
TypeScript & AngularJS Components
Using Built-in, Custom, & HTTP Services
Using NG-Grid in AngularJS
Working with AngularJS
Working with Controllers & Directives
Working with Data
Working with Display Directives
Visual Studio 2015 Application Security
Creating an SPA
Data Persistence & Validation

Apache Cassandra

Apache Cassandra 2.1 Architecture & Installation
Clustering & Admin Tools
Apache Cassandra 3.6 Administration & Development
Big Data Solutions, Architecture, CQL, & DDL
Data Manipulation, Queries, Collections, & Indexing
Working with JSON, Java, Node.js, & Python

Apache Cordova

Apache Cordova 5.4 Apache Cordova: Getting Started
CLI & Basic Native APIs
Exploring the Basic Features
Working with Advanced Features

Apache Hadoop

Apache Hadoop 1.0 Availability Configuration
Balancing, Backup, & Upgrades
Capacity Management
Capacity Management Strategies
Cloudera Manager & Hadoop Clusters
Cloudera Manager Administration
Cloudera Manager Tools & Configuration
Cluster Administration
Cluster Architecture Configuration
Cluster Availability
Cluster Deployment
Cluster Deployment Planning
Cluster Deployment Tools & Images
Cluster Performance Tuning
Data Migration & EMR
Designing Clusters
Ganglia & Metrics2
Hadoop Cluster Architecture
Hadoop in the Cloud
Managing Security
Monitoring & Troubleshooting
Operating Hadoop Clusters
Performance Tuning Best Practices
Securing Clusters
Securing with Kerberos
Stabilizing Clusters
YARN Availability
Apache Hadoop 2.0 Configuration & Troubleshooting
Data Factory with Hive
Data Factory with Hue
Data Factory with Oozie
Data Factory with Pig
Data Flow for the Hadoop Ecosystem
Data Refinery with MapReduce
Data Refinery with YARN
Data Repository with Flume
Data Repository with HDFS & HBase
Data Repository with Sqoop
Design Principles
Ecosystem & MapReduce
Ecosystem Components
Ecosystem for Hadoop
Fundamentals & Installation
HBase & ZooKeeper
Hive Joining, Partitioning, & Troubleshooting
HiveServer2 & HCatalog
Installation & Configuration
Introduction
Introduction to Data Modeling
Pig Functions & Troubleshooting
Programming with MapReduce
Selecting & Creating an Environment
Storage & MapReduce
Timestamps, Sources, & Troubleshooting
Using Hive & Pig with Hadoop
Apache Hadoop 2.7 HDInsight & Retail Sales Implementation Using Hive
Managing Big Data Using HDInsight Hadoop
Microsoft Analytics Platform System & Hive
Working with Spark Using HDInsight & Cluster Management
Apache Hadoop 2.9 Advanced Operations Using Hadoop MapReduce
Developing a Basic MapReduce Hadoop Application
Filtering Data Using Hadoop MapReduce
Hadoop & MapReduce Getting Started
Hadoop HDFS File Permissions
Hadoop HDFS Getting Started
Hadoop MapReduce Applications With Combiners
Introduction to the Shell for Hadoop HDFS
Working with Files in Hadoop HDFS
Apache Hadoop 3.0 Clusters
Hadoop Distributed File System
Hadoop on Amazon EMR
Hadoop Ranger
Maintenance & Distributions

Apache HBase

Apache HBase 1.1.1 Access Data through the Java Client API
Access Data through the Shell
Apache HBase Fundamentals: Installation, Architecture, and Data Modeling
Filters and Administration
HBase Installation
Snapshots, Backups, and MapReduce

Apache JMeter

JMeter 3.3 Comprehensive JMeter Operations
JMeter Architecture & Operations
Performance Testing & JMeter

Apache Kafka

Kafka 2.1 Clustering with Kafka
Concepts & Components
Deployment & Operating Tasks
Kafka Development
Kafka Integration with Spark
Kafka Integration with Storm
Kafka Operations
Kafka Real-time Applications
LAB: Apache Kafka

Apache Maven

Apache Maven 3.3.3 Lifecycle Phases, Plugins, Archetypes, & Build Profiles
Maven Repositories & Dependency Management
Plugins, Deployment, Troubleshooting, & Integration
Running Tests, Generating Reports, & Specifying Resources

Apache Solr

Apache Solr 6.2 Data Management
Deployment & Configuration
Schema, Indexes, & Administration
Solr Queries

Apache Spark

Apache Spark LAB: Developing with Apache Spark
Apache Spark 2.2 Apache Spark SQL
Introduction to Apache Spark
Spark Monitoring & Tuning
Spark Security
Structured Streaming
Apache Spark 2.3 Apache Spark Getting Started
Data Analysis using Spark SQL
Data Analysis Using the Spark DataFrame API

Apache Storm

Apache Storm 0.9.6 Architecture & Installation
Deployment, Configuration, & Concepts
Exploring Storm Integration & Automation
Storm UI & Topology

Apache Subversion

Apache Subversion 1.9 Getting to Know Subversion

Apache Tomcat

Apache Tomcat 7.0 Alternative Deployments & Tools
Building REST Applications
Configuring & Controlling Services
Fundamentals of Web Services & CXF
Introduction to Services
Security & Advanced Configurations
Apache Tomcat 8.5 Configuring Tomcat & PHP
LAMP Overview and Deployment
MySQL as a Datastore
The Apache Web Server Engine

APIs

Apache Airflow 1.10 Building Data Pipelines
API Gateways API Gateways
API Management
API Security
Node.js 10.15.1 Creating Data APIs Using Node.js
Visual Studio 2013 Binding, Attributes, & Configuration
Consuming the Web API
Exploring & Debugging Web API
RESTful Services, OData, & Media-Type Formatting
Web API Security & Hosting

Appcelerator

Titanium 5.1.1 Components, Services, & APIs
Configuration
Creating an Application
Location Services, Testing, & Debugging

Appium

Appium 1.2.7 Appium Concepts with Mac OS X
Exploring Appium & Windows
Introduction to Appium Testing

Application Developer to Blockchain Solutions Architect

Blockchain Blockchain & Hyperledger Fabric: An Overview of Blockchain Technology
Blockchain & Hyperledger Fabric: An Overview of Hyperledger
Blockchain & Hyperledger Fabric: The Hyperledger Fabric
Blockchains & Ethereum: Introduction
Blockchains & Ethereum: Mining & Smart Contracts in Ethereum
Blockchains & Ethereum: Performing Transactions in Ethereum
Cloud Blockchains: An Introduction to Blockchain on the Cloud
Cloud Blockchains: Building Apps on the Azure Blockchain Workbench
Cloud Blockchains: Multi-Organization Networks on Amazon Managed Blockchain
Cloud Blockchains: Single Organization Networks on Amazon Managed Blockchain
Ethereum Smart Contracts with Solidity: An Overview of Ethereum and Solidity
Ethereum Smart Contracts with Solidity: Build Decentralized Apps
Ethereum Smart Contracts with Solidity: Data & Control Structures in Solidity
Ethereum Smart Contracts with Solidity: Ether Transfer Operations in Solidity
Ethereum Smart Contracts with Solidity: Features of the Solidity Language
Ethereum Smart Contracts with Solidity: Functions in Solidity
Ethereum Smart Contracts with Solidity: The Remix Solidity IDE
Final Exam – Blockchain Application Developer
Smart Contracts & Hyperledger Fabric: Foundations of Hyperledger Fabric
Smart Contracts & Hyperledger Fabric: Hyperledger Composer Playground
Smart Contracts & Hyperledger Fabric: Hyperledger Fabric Web App
Smart Contracts & Hyperledger Fabric: Setting Up a Hyperledger Fabric Network
Smart Contracts & Hyperledger Fabric: Web Apps for Hyperledger Composer Networks
Smart Contracts & Hyperledger Fabric: Working with Fabric Chaincode in Golang
Smart Contracts & Hyperledger Fabric: Working with Fabric Chaincode in NodeJS
Confluence Web Configuring Spaces
Setting Up & Managing Spaces
Signing in & Navigating within Spaces
Working with Spaces
Working with Team Members
Ethereum Building Decentralized Applications for Ethereum: An Introduction to dApps
Building Decentralized Applications for Ethereum: Bespoke Ethereum Tokens
Building Decentralized Applications for Ethereum: Building the Back End
Building Decentralized Applications for Ethereum: Building the Front End
Working with Ethereum: Lifecycle of a Smart Contract
Working with Ethereum: Metamask & the Ethereum Wallet
Working with Ethereum: Smart Contract Development
Working with Ethereum: Storing Data
Working with Ethereum: The Geth Client
Working with Ethereum: Tools for Smart Contract Development
Slack for iOS Using the iOS App
Slack Web Configuring Slack
Creating, Finding & Sharing Information
Private Messaging & Communication Tools
Signing In & Setting Up
Using Channels
Truffle Suite Truffle Suite: Automating Development with the Truffle Framework
Truffle Suite: BlockBuilding Private Blockchain Networks with Ganache
Truffle Suite: Introduction
Truffle Suite: Using Drizzle to Build Decentralized Apps
Being an Effective Team Member
Building a Culture of Design Thinking
Cultivating Cross-functional Team Collaboration
Developing and Supporting an Agile Mind-set
Embracing an Agile Culture for Business Growth
Encouraging Team Communication and Collaboration
Getting to the Root of a Problem
Knowing When to Take Strategic Risks
Leading a Cross-functional Team
Reaching Sound Conclusions
Strategies for Managing Technical Teams

Architecting Data

Cloud Architecture Cloud Data Architecture: Data Management & Adoption Frameworks
Data Architecture Data Architecture Getting Started
Scalable Data Architectures: Getting Started
Scalable Data Architectures: Using Amazon Redshift
Scalable Data Architectures: Using Amazon Redshift & QuickSight
Data Science Data Architecture Deep Dive –  Design & Implementation
Data Architecture Deep Dive – Microservices & Serverless Computing
Streaming Data Architectures: An Introduction to Streaming Data in Spark

Artificial Intelligence (AI)

Artificial Intelligence Adversarial Problems
Constraint Satisfaction Problems
Introducing Natural Language Processing
Introduction to Artificial Intelligence
Machine Learning
Planning AI Implementation
Reinforcement Learning
Search Problems
Uncertainty
Chatbots Understanding Bots: Amazon Alexa Skills Development
Understanding Bots: Building Bots with Dialogflow
Understanding Bots: Chatbot Advanced Concepts and Features
Understanding Bots: Chatbot Architecture
Java SE 8 AI Fundamentals
Expert Systems & Reinforcement Learning
Machine Learning Implementation
Neural Network & Neuroph Framework
Neural Network & NLP Implementation
TensorFlow TensorFlow: Building Autoencoders
TensorFlow: Convolutional Neural Networks for Image Classification
TensorFlow: Deep Neural Networks & Image Classification Using Estimators
TensorFlow: Introduction to Machine Learning
TensorFlow: K-means Clustering
TensorFlow: Sentiment Analysis with Recurrent Neural Networks
TensorFlow: Simple Regression & Classification Models
TensorFlow: Word Embeddings & Recurrent Neural Networks

ASP.NET

ASP.NET Core 1.0 Exceptions & Logging
Introduction to ASP.NET Core 1.0
Middleware & Dependency Injection
MVC, Tag Helpers, & View Components
Services, Configuration, & Middleware
Visual Studio 2013 Introducing MVC5 Applications
MVC 5 with Entity Framework 6 (EF6) & Web API 2
MVC 5 with SignalR & Azure
Securing MVC5 Applications
Visual Studio 2015 Application Security
Creating an SPA
Data Persistence & Validation
Visual Studio 2017 ASP.NET MVC Web Applications: Adaptive UI Layout & Caching Strategy
ASP.NET MVC Web Applications: Asynchronous Tasks
ASP.NET MVC Web Applications: Authorization & Exception Handling
ASP.NET MVC Web Applications: Claims-Based Authentication
ASP.NET MVC Web Applications: Composing the UI Layout
ASP.NET MVC Web Applications: Configuring & Deploying
ASP.NET MVC Web Applications: Data & State Management
ASP.NET MVC Web Applications: Databases & Entity Framework
ASP.NET MVC Web Applications: Debugging Web Applications
ASP.NET MVC Web Applications: Deployment Architecture
ASP.NET MVC Web Applications: Design & Implement UI Behavior
ASP.NET MVC Web Applications: Designing Application Architecture
ASP.NET MVC Web Applications: Designing Build & Publishing Strategies
ASP.NET MVC Web Applications: Distributed Applications
ASP.NET MVC Web Applications: Globalization, Azure Events, & NuGet
ASP.NET MVC Web Applications: Host Options & WebApp Composition
ASP.NET MVC Web Applications: Implementing ASP.NET Authentication
ASP.NET MVC Web Applications: Implementing Secure Sites
ASP.NET MVC Web Applications: Introduction
ASP.NET MVC Web Applications: JSON & XML Data Formats
ASP.NET MVC Web Applications: Models & Unit Testing
ASP.NET MVC Web Applications: MVC Application Routes
ASP.NET MVC Web Applications: MVC Controllers & Actions
ASP.NET MVC Web Applications: Optimization & Encryption
ASP.NET MVC Web Applications: State & Configuration Management
ASP.NET MVC Web Applications: Troubleshooting, HTTP Modules, & Handlers
ASP.NET MVC Web Applications: Web API Routes & Controllers
LAB: Developing ASP.NET MVC Web Applications

Automation & Scripting

Apache Solr 6.2 Data Management
Deployment & Configuration
Schema, Indexes, & Administration
Solr Queries
DevOps DevOps Automation: Configuration Management
Kafka 2.1 Concepts & Components
Deployment & Operating Tasks
Kafka Development
Kafka Integration with Spark
Kafka Integration with Storm
Kafka Operations
PowerShell 5.1 Aliases, Providers, & Objects
Cmdlet Structure & Help
Configuration, Advanced Help, & Queries
Desired State Configuration (DSC)
DSC & Azure
DSC Resources
DSC with Linux & JEA
DSC, Configurations, & Repositories
Introduction
Local Configuration Manager (LCM)
Output Formatting, Modules, & Customization
Remote Management
Resource Creation & Configuration
Syntax, Help, & Conditionals
Unix Automation Using Bash & Expect
Bash Advanced Scripting & File I/O
Bash Scripting Flow Control & Data Types
Introduction to Bash Scripting
LAB: Shell Scripting Essentials
DevOps Automation: Delivery Mechanisms

AWS Certified Cloud Practitioner – Foundational

Amazon Web Services 2019 AWS Cloud Practitioner 2019: Architecture Design Principles
AWS Cloud Practitioner 2019: AWS Access Management
AWS Cloud Practitioner 2019: AWS Cloud & the Value Proposition
AWS Cloud Practitioner 2019: AWS Cloud Deployment and Operation
AWS Cloud Practitioner 2019: Cloud Economics
AWS Cloud Practitioner 2019: Cloud Security & Compliance
AWS Cloud Practitioner 2019: Core AWS Services
AWS Cloud Practitioner 2019: Security Support Resources
AWS Cloud Practitioner 2019: Shared Responsibility
AWS Cloud Practitioner 2019: Technology Support Resources

AWS Certified Developer – Associate

Amazon Web Services 2018 Application Development
Code Management & Monitoring Tools
Plan Applications & Infrastructure Security
Principles & Essential Services
Serverless Application & Container Management
Service Integration & Orchestration

AWS Certified Solutions Architect – Associate

Amazon Web Services 2018 AWS Associate Solution Architect: Amazon CloudFront & Route 53
AWS Associate Solution Architect: Amazon Machine Images
AWS Associate Solution Architect: Architecting for the Cloud
AWS Associate Solution Architect: Architecture Security
AWS Associate Solution Architect: Auto Scaling
AWS Associate Solution Architect: AWS Primer
AWS Associate Solution Architect: Building & Managing AWS Solutions
AWS Associate Solution Architect: Caching
AWS Associate Solution Architect: Database Managed Services
AWS Associate Solution Architect: High Availability
AWS Associate Solution Architect: Loose Coupling
AWS Associate Solution Architect: Managing AWS
AWS Associate Solution Architect: Optimizing Compute Resources
AWS Associate Solution Architect: Optimizing Storage
AWS Associate Solution Architect: Scalability & Elasticity
AWS Associate Solution Architect: Storage Solutions
AWS Associate Solution Architect: Virtual Private Cloud

AWS Certified Solutions Architect – Professional

Amazon Web Services 2018 Business Continuity
Cloud Migration
Costing
Data Replication
Data Security
Data Storage
High Availability
Hybrid Architecture
Image Deployment Management
Network Design
Scalability and Elasticity
Security Controls

AWS Certified SysOps Administrator – Associate

Amazon Web Services 2018 Application Infrastructure
Compute Services
Database Services
High Availability
Introduction
Monitoring the AWS Environment
Networking Services
Preparing for Cloud Service Management
Security & IAM Services
Storage Services

Azure Architecture

Azure 2014 Cloud Models & Storage
Microsoft Azure: Getting Started
Publishing & Caching
Storage
Traffic Manager, AD, Alerts, & Backups
Virtual Machines & Load Balancing
Virtual Networks & PowerShell
Azure 2015 Microsoft Azure Administrator: Azure Resource Groups
Azure 2017 Automation & Machine Learning
Designing Batch Processing & Data Security
Designing the Lambda Architecture & Real-time Processing
Ingesting Data & Computing for Batch Processing
Ingesting Data & Computing for Real-time Processing
Managing Activities & Data for Azure Big Data Analytics
Provisioning an Azure Data Factory
Azure 2018 Application Design & Messaging
Automation with PowerShell, Chef, & Puppet
Azure AI Gallery & Azure Machine Learning
Azure External Network Connectivity Design
Azure Storage Design
Compute Design Considerations
Consume Models & APIs Using Azure Machine Learning Studio
Data Cleanup with Azure Machine Learning Studio
Data Services Design
Deploying Models with Azure Machine Learning Studio
Implement Automation
Importing and Exporting in Azure Machine Learning Studio
Introduction to Azure Machine Learning
Managing Identities
Microsoft Cognitive Toolkit & Azure Machine Learning
Monitoring Resources
Network Design
Optimize & Validate Models in Azure Machine Learning Studio
Plan Azure SQL-Compliant Database Usage
Planning Artificial Intelligence Services
Planning Azure NoSQL Deployments
Securing the Azure Environment
SQL Server & Azure Machine Learning
Summarize Data with Azure Machine Learning Studio
Template & Runbook Automation
Transforming Data in Azure Machine Learning Studio
Using Algorithms in Azure Machine Learning Studio
Virtual Machines & HDInsight
Web Application Design
Azure 2019 Microsoft Azure Administrator: Azure Active Directory
Microsoft Azure Administrator: Azure AD Objects
Microsoft Azure Administrator: Azure Backup and Recovery
Microsoft Azure Administrator: Azure Hybrid Identities
Microsoft Azure Administrator: Azure Import/Export
Microsoft Azure Administrator: Azure Load Balancer
Microsoft Azure Administrator: Azure Monitoring
Microsoft Azure Administrator: Azure Multi-Factor Authentication
Microsoft Azure Administrator: Azure Name Resolution & Network Security
Microsoft Azure Administrator: Azure Network Monitoring
Microsoft Azure Administrator: Azure Policies
Microsoft Azure Administrator: Azure Storage Accounts
Microsoft Azure Administrator: Azure Virtual Machine Templates
Microsoft Azure Administrator: Azure Virtual Machines (VMs)
Microsoft Azure Administrator: Azure Virtual Network Connectivity
Microsoft Azure Administrator: Integrating Azure On-Premise & Virtual Networks
Microsoft Azure Administrator: Managing Azure Virtual Machines
Microsoft Azure Administrator: Subscriptions
Microsoft Azure Architect Design: Azure AD & RBAC Design
Microsoft Azure Architect Design: Azure AD Connect, MFA, & SSO Design
Microsoft Azure Architect Design: Azure AD Permissions Design
Microsoft Azure Architect Design: Azure App Design
Microsoft Azure Architect Design: Azure Compute Design
Microsoft Azure Architect Design: Azure Cost Management
Microsoft Azure Architect Design: Azure DevOps Planning
Microsoft Azure Architect Design: Azure Key Vault and Key Design
Microsoft Azure Architect Design: Azure Migration Planning
Microsoft Azure Architect Design: Azure Network Design
Microsoft Azure Architect Design: Azure Policy Planning
Microsoft Azure Architect Design: Azure Service Design Part 1
Microsoft Azure Architect Design: Azure Service Design Part 2
Microsoft Azure Architect Design: Azure Site Recovery Design
Microsoft Azure Architect Design: Azure Storage Design
Microsoft Azure Architect Design: Azure VPN Design
Microsoft Azure Architect Technologies: Architect Azure Networking
Microsoft Azure Architect Technologies: Architecting Azure Solutions I
Microsoft Azure Architect Technologies: Architecting Azure Solutions II
Microsoft Azure Architect Technologies: Architecting Azure Storage
Microsoft Azure Architect Technologies: Azure Active Directory
Microsoft Azure Architect Technologies: Azure AD Connect & Authentication
Microsoft Azure Architect Technologies: Azure AD MFA
Microsoft Azure Architect Technologies: Azure Files & Databases
Microsoft Azure Architect Technologies: Azure Monitoring
Microsoft Azure Architect Technologies: Azure Remote Connectivity
Microsoft Azure Architect Technologies: Azure Roles and Policies
Microsoft Azure Architect Technologies: Azure Virtual Machines
Microsoft Azure Architect Technologies: Azure Web Apps
Microsoft Azure Architect Technologies: DevOps & Azure
Microsoft Azure Architect Technologies: High Availability
Microsoft Azure Architect Technologies: Load Balancing
Microsoft Azure Architect Technologies: Managing Azure
Microsoft Azure Architect Technologies: Managing Azure Costs
MS Azure DevOps Solutions: Application Configuration & Secrets
MS Azure DevOps Solutions: Azure DevOps Infrastructure
MS Azure DevOps Solutions: Code Flow & Mobile DevOps
MS Azure DevOps Solutions: Dependency Management & Security Compliance
MS Azure DevOps Solutions: Design & Implement Agile Work Management Approach
MS Azure DevOps Solutions: Design a Quality Strategy & Secure Development Process
MS Azure DevOps Solutions: Design and Set Up Release Strategy & Workflow
MS Azure DevOps Solutions: Implement Continuous Feedback
MS Azure DevOps Solutions: Implement Deployment Patterns
MS Azure DevOps Solutions: Implement Infrastructure as Code
MS Azure DevOps Solutions: Infrastructure as Code & Security Compliance
MS Azure DevOps Solutions: Manage Code Quality & Security Policies
MS Azure DevOps Solutions: Migration & Consolidation Strategy for Tools
MS Azure DevOps Solutions: Tool Integration
MS Azure DevOps Solutions: Version & Source Control
Microsoft Azure Administrator: Azure Virtual Networks

Azure Development

Azure 2017 Automating & Managing Databases
Azure Active Directory & Collaboration
Azure Blob Storage
Azure Functions & API Management
Azure High Availability Solutions
Azure Service Fabric Apps
Azure SQL Database & Caching
Azure SQL Database Security
Azure Storage Tables & Queues
Azure Virtual Machines
Azure VM Monitoring
Azure VM Scaling & Storage
Configuring Azure VM Networking
Cosmos DB and Azure Search
Creating Virtual Machines & Workloads
Data Warehousing
Designing & Implementing Azure Apps
Designing Web Apps
Hybrid SQL Server Solutions
Implementing a SQL Database
Implementing Communication & Messaging Strategies
Managing & Monitoring Azure Storage
Managing Azure Virtual Machines
Performance Monitoring
Recovering SQL Databases
Scaling Cloud Solutions
SQL Databases
SQL Server Database Security
Troubleshooting SQL Database Errors
Azure 2018 Azure Developer: Advanced Scalability Using Azure
Azure Developer: Advanced Security & Integration Using Azure Services
Azure Developer: Azure Batch & Scheduling Bulk Operations
Azure Developer: Azure Cloud Technology Solutions
Azure Developer: Blob Storage Solutions
Azure Developer: Caching & Content Delivery Solutions
Azure Developer: Common Application Design & Connectivity Patterns
Azure Developer: Cosmos DB Storage Solutions
Azure Developer: Creating Mobile Apps
Azure Developer: File Storage Solutions
Azure Developer: Implementing Authentication & Access Control
Azure Developer: Implementing Secure Data Solutions
Azure Developer: Kubernetes Service Solutions
Azure Developer: Media Services Solutions
Azure Developer: PaaS Web Applications
Azure Developer: Relational Database Solutions
Azure Developer: Storage Solutions
Azure Developer: Storage Tables
Azure Developer: Working With Azure Functions
Azure Developer: Working with Azure Logic Apps
Azure Developer: Working with Azure Service Fabric

Azure HDInsight

Azure HDInsight 2018 Azure HDInsight: Batch Solutions with Apache Hive & Pig
Azure HDInsight: Building Solutions using Kafka & HBase
Azure HDInsight: Create Spark Streaming Applications
Azure HDInsight: Data Analysis Using Spark SQL & Hive
Azure HDInsight: Develop Real-time Processing Solutions with Apache Storm
Azure HDInsight: Interactive Processing using Apache Phoenix on HBase
Azure HDInsight: Interactive Queries with Spark SQL & Interactive Hive
Azure HDInsight: Introduction
Azure HDInsight: Managing Data, Jobs, and Security
Azure HDInsight: Operationalize & Design with Spark
Azure HDInsight: Working with Clusters

Azure Infrastructure

Azure Microsoft Azure Security Technologies: Azure Storage Account Security
Azure 2014 Cloud Models & Storage
Microsoft Azure: Getting Started
Publishing & Caching
Storage
Traffic Manager, AD, Alerts, & Backups
Virtual Machines & Load Balancing
Virtual Networks & PowerShell
Azure 2017 Active Directory
AD Authentication
App Services
Backup & Recovery
DB & ARM Templates
High Availability
Monitoring
Network Connectivity
Security
Storage
The Azure Environment
Virtual Machine Management
Virtual Machine Overview
Virtual Networking
Web App Deployment
Azure 2019 Azure Fundamentals: Azure Data Privacy
Azure Fundamentals: Azure Network Security
Azure Fundamentals: Azure Security Services
Azure Fundamentals: Big Data Analytics
Azure Fundamentals: Cloud Computing
Azure Fundamentals: Database Solutions
Azure Fundamentals: IoT & AI
Azure Fundamentals: Monitoring the Azure Environment
Azure Fundamentals: Network Components
Azure Fundamentals: Storage Components
Azure Fundamentals: The Ecosystem
Azure Fundamentals: Virtual Machines
Microsoft Azure Security Technologies:  Application Containers
Microsoft Azure Security Technologies: Azure AD Connect
Microsoft Azure Security Technologies: Azure AD Group Management
Microsoft Azure Security Technologies: Azure AD User Management
Microsoft Azure Security Technologies: Azure Database Security
Microsoft Azure Security Technologies: Azure Key Vault
Microsoft Azure Security Technologies: Azure RBAC & Policies
Microsoft Azure Security Technologies: Azure Security Center
Microsoft Azure Security Technologies: Data Classification
Microsoft Azure Security Technologies: Database User Access
Microsoft Azure Security Technologies: Identity & Access Management
Microsoft Azure Security Technologies: Monitoring, Logging, & Alerts
Microsoft Azure Security Technologies: Network Security
Microsoft Azure Security Technologies: Review Course 1
Microsoft Azure Security Technologies: Review Course 2
Microsoft Azure Security Technologies: VM Security
Microsoft Azure Security Technologies: VPNs
Microsoft Azure Security Technologies: Web Application Security

Azure Machine Learning

Azure 2018 Azure AI Gallery & Azure Machine Learning
Consume Models & APIs Using Azure Machine Learning Studio
Data Cleanup with Azure Machine Learning Studio
Deploying Models with Azure Machine Learning Studio
Importing and Exporting in Azure Machine Learning Studio
Introduction to Azure Machine Learning
Microsoft Cognitive Toolkit & Azure Machine Learning
Optimize & Validate Models in Azure Machine Learning Studio
SQL Server & Azure Machine Learning
Summarize Data with Azure Machine Learning Studio
Transforming Data in Azure Machine Learning Studio
Using Algorithms in Azure Machine Learning Studio
Virtual Machines & HDInsight

Backbone.js

Backbone.js 1.1 Complex Application Development
Events & Server Databases
Handlebars, Collections, & Routing
Models, Events, & Views
Node.js, Lists, & Form Views

Balsamiq

Balsamiq 3 Creating Mockups
Text, Images, Markup, Symbols, & Menu Controls
Versions & Plugins
Wireframes & UI Controls

BI & Monitoring

Elasticsearch 6.2 Data Management
ELK Operations on the Cloud
Kibana & Reporting Capabilities
Logstash for Data Ingestion
Visualization Using Kibana
Performance Engineering ANTS Performance Profiler
Application Performance Analyzer
Application Performance Engineering Elements
Application Performance Engineering Fundamentals
Heap & Thread and Monitor Dump Analyzers
IBM Memory Analyzer & Visualizer
IBM Pattern Modelling Analysis Tool (PMAT)
Java Application Performance Analysis Tools

Big Data Core Concepts

Big Data Big Data Essentials
Big Data Sales Perspective
Corporate Leadership Perspective
Engineering Perspectives
Introduction to Hadoop
Managing Big Data Operations
Quality & Security of Big Data Operations
Securing Big Data Streams
Strategic Planning
Teams & Projects
The Legal Perspective
The Marketing Perspective
Use Cases, Opportunities, & Challenges

Blockchain

Blockchain Bitcoin Basics
Bitcoin Design & Security
Bitcoin Internals & Wallet Configuration
Bitcoin Technology Fundamentals
Blockchain & Hyperledger Fabric: An Overview of Blockchain Technology
Blockchain & Hyperledger Fabric: An Overview of Hyperledger
Blockchain & Hyperledger Fabric: The Hyperledger Fabric
Blockchain Architectural Components & Platforms
Blockchain in Action & IoT
Blockchains & Ethereum: Introduction
Blockchains & Ethereum: Mining & Smart Contracts in Ethereum
Blockchains & Ethereum: Performing Transactions in Ethereum
Cloud Blockchains: An Introduction to Blockchain on the Cloud
Cloud Blockchains: Building Apps on the Azure Blockchain Workbench
Cloud Blockchains: Multi-Organization Networks on Amazon Managed Blockchain
Cloud Blockchains: Single Organization Networks on Amazon Managed Blockchain
Cryptocurrency & Cryptography
Developing with Blockchain
Ethereum Smart Contracts with Solidity: An Overview of Ethereum and Solidity
Ethereum Smart Contracts with Solidity: Build Decentralized Apps
Ethereum Smart Contracts with Solidity: Data & Control Structures in Solidity
Ethereum Smart Contracts with Solidity: Ether Transfer Operations in Solidity
Ethereum Smart Contracts with Solidity: Features of the Solidity Language
Ethereum Smart Contracts with Solidity: Functions in Solidity
Ethereum Smart Contracts with Solidity: The Remix Solidity IDE
Exploring Blockchain
Implementing Smart Contracts Using Ethereum
Introduction to Bitcoin
Introduction to Digital Currency
Mining, Wallets, & Clients
Securing Blockchain Implementations
Smart Contracts & Hyperledger Fabric: Foundations of Hyperledger Fabric
Smart Contracts & Hyperledger Fabric: Hyperledger Composer Playground
Smart Contracts & Hyperledger Fabric: Hyperledger Fabric Web App
Smart Contracts & Hyperledger Fabric: Setting Up a Hyperledger Fabric Network
Smart Contracts & Hyperledger Fabric: Web Apps for Hyperledger Composer Networks
Smart Contracts & Hyperledger Fabric: Working with Fabric Chaincode in Golang
Smart Contracts & Hyperledger Fabric: Working with Fabric Chaincode in NodeJS
Transaction Pros and Cons & Bitcoin’s Impact
Transforming Your Business
Trust & Design
Ethereum Building Decentralized Applications for Ethereum: An Introduction to dApps
Building Decentralized Applications for Ethereum: Bespoke Ethereum Tokens
Building Decentralized Applications for Ethereum: Building the Back End
Building Decentralized Applications for Ethereum: Building the Front End
Working with Ethereum: Lifecycle of a Smart Contract
Working with Ethereum: Metamask & the Ethereum Wallet
Working with Ethereum: Smart Contract Development
Working with Ethereum: Storing Data
Working with Ethereum: The Geth Client
Working with Ethereum: Tools for Smart Contract Development
Truffle Suite Truffle Suite: Automating Development with the Truffle Framework
Truffle Suite: BlockBuilding Private Blockchain Networks with Ganache
Truffle Suite: Introduction
Truffle Suite: Using Drizzle to Build Decentralized Apps

Bootstrap

Bootstrap 4 Bootstrap Environment, Requirements, & Setup
Bootstrap Forms & Layout
Whole Page Controls & Extending Bootstrap

Build

Apache Maven 3.3.3 Lifecycle Phases, Plugins, Archetypes, & Build Profiles
Maven Repositories & Dependency Management
Plugins, Deployment, Troubleshooting, & Integration
Running Tests, Generating Reports, & Specifying Resources
Grunt 4 Getting Started with Grunt
Grunt Performance, Plugins, & Tasks
Managing Visual Assets
Testing & Site Performance
Using Grunt
Gulp.js 3.9 Introduction & Preparing the Environment
Managing HTML Assets, Servers, & Browsers
Preparing the Build Folder & Testing
Using Gulp.js Plugins for JavaScript Analysis

C Programming

ANSI C C11 Basics, Data Types, Constants, & Variables
Common Functions
Data Structures
Functions, Storage Classes, & Data Modifiers
Looping & Functions
Operators, Conditional Statements, & Branching
The C Preprocessor & Optimization
Unions & File Management
C++ 14 C++ Classes
C++ Standard Template Library Algorithms and Operations
C++ Templates and Containers
Classes, Functions, and Object-oriented Programming
Data Types, Modifiers, Operators, and Flow Control
Functions, References, Exceptions Strings & Namespaces
Fundamentals of C++ Programming

C#

Visual Studio 2013 Programming in C#: Creating Types
Programming in C#: Debugging & Security Implementation
Programming in C#: Implementing Data Access
Programming in C#: IO Operations
Programming in C#: Managing Program Flow
Programming in C#: Manipulating & Retrieving Data
Programming in C#: Memory Management & String Operations
Programming in C#: Using Types
Visual Studio 2017 Programming in C#: Managing Multithreating

CAPM®

PMBOK® Guide Sixth Edition Analyzing Risk (PMBOK® Guide Sixth Edition)
Capturing, Analyzing, and Using Project Lessons Learned
Control the Project Schedule (PMBOK® Guide Sixth Edition)
Create Work Breakdown Structure (PMBOK® Guide Sixth Edition)
Creating a Project Budget (PMBOK® Guide Sixth Edition)
Define and Sequence Activities (PMBOK® Guide Sixth Edition)
Develop and Manage Resources (PMBOK® Guide Sixth Edition)
Develop the Project Schedule (PMBOK® Guide Sixth Edition)
Identifying Risk (PMBOK® Guide Sixth Edition)
Keeping Your Project on Budget (PMBOK® Guide Sixth Edition)
Manage and Control Quality (PMBOK® Guide Sixth Edition)
Managing Project Work (PMBOK® Guide Sixth Edition)
Managing Stakeholder Engagement (PMBOK® Guide Sixth Edition)
Monitor Project Communications (PMBOK® Guide Sixth Edition)
Plan and Acquire Resources (PMBOK® Guide Sixth Edition)
Plan and Define Project Scope (PMBOK® Guide Sixth Edition)
Plan and Manage Communications (PMBOK® Guide Sixth Edition)
Planning Quality Management (PMBOK® Guide Sixth Edition)
Planning Risk Management (PMBOK® Guide Sixth Edition)
Planning Stakeholder Engagement (PMBOK® Guide Sixth Edition)
Procurement Management (PMBOK® Guide Sixth Edition)
Procurement Planning (PMBOK® Guide Sixth Edition)
Project Changes and Closing (PMBOK® Guide Sixth Edition)
Project Fundamentals (PMBOK® Guide Sixth Edition)
Project Initiation and Planning (PMBOK® Guide Sixth Edition)
Project Management Introduction (PMBOK® Guide Sixth Edition)
Quality Methodologies and Standards for Project Management
Responding to Risk (PMBOK® Guide Sixth Edition)
Strategically Focused Project Management
The Process Groups (PMBOK® Guide Sixth Edition)
Validate and Control Scope (PMBOK® Guide Sixth Edition)
Ethical Standards and PMI® Core Values
Ethics and Project Management
TestPrep: Certified Associate in Project Management (CAPM) 6th Edition

Certified Cloud Security Professional (CCSP)

Cloud Application Security Awareness & Validation
Cloud Computing & Reference Architecture
Cloud Data Security
Cloud Infrastructure & Risk Analysis
Cloud Infrastructure Management
Data Center Design
Data Rights Management, Policies, & Event Tracing
Legal Requirements & Compliance
Operations Management
Risk Management & Outsourcing Design
Secure Application Architecture & IAM
Secure Cloud Computing & Trusted Cloud Services
Security Controls & Business Continuity
Software Development Security & Life Cycle
CCSP 2019: Application Development & Security
CCSP 2019: Cloud Infrastructure
CCSP 2019: Cloud System Architecture Design
CCSP 2019: Data Center Security
CCSP 2019: Data Retention & Events
CCSP 2019: Data Security Technologies
CCSP 2019: Identity & Access Management
CCSP 2019: Implementing Data Discovery & Classification
CCSP 2019: Operational Controls & Standards
CCSP 2019: Secure Cloud Computing

Certified Ethical Hacker

Certified Ethical Hacker TestPrep: Certified Ethical Hacker (CEH) v10
Certified Ethical Hacker v10 Ethical Hacker: Covert Data Gathering
Ethical Hacker: Password Attacks Part 2
Ethical Hacker: Privilege Escalation
Ethical Hacker: Cloud Computer Attacks
Ethical Hacker: Cloud Computing Concepts
Ethical Hacker: Common Web App Threats
Ethical Hacker: Common Web App Threats Part 2
Ethical Hacker: Cracking & Mobile Hacking
Ethical Hacker: Cryptography Attacks
Ethical Hacker: Cryptography Concepts
Ethical Hacker: Cryptography Concepts Part 2
Ethical Hacker: Cryptography Concepts Part 3
Ethical Hacker: Denial of Service
Ethical Hacker: Evading IDS, Firewall, & Honeypots
Ethical Hacker: Evading IDS, Firewall, & Honeypots Part 2
Ethical Hacker: Evading IDS, Firewall, & Honeypots Part 3
Ethical Hacker: Footprinting
Ethical Hacker: Hacking Concepts
Ethical Hacker: Hacking Web Servers
Ethical Hacker: Hidden Files & Covering Tracks
Ethical Hacker: Host Discovery & Scanning with Nmap
Ethical Hacker: IoT Attacks
Ethical Hacker: IoT Concepts
Ethical Hacker: IoT Hacking & Countermeasures
Ethical Hacker: Malware Distribution
Ethical Hacker: Malware Threats
Ethical Hacker: Network Sniffing
Ethical Hacker: Overview & Threats
Ethical Hacker: Password Attacks
Ethical Hacker: Pentesting, Laws, & Standards
Ethical Hacker: Practical Web App Hacking
Ethical Hacker: ProxyChains & Enumeration
Ethical Hacker: Security Controls
Ethical Hacker: Security Controls Part 2
Ethical Hacker: Session Hijacking
Ethical Hacker: Social Engineering
Ethical Hacker: SQL Injection
Ethical Hacker: SQL Injection Types & Tools
Ethical Hacker: Vulnerability Analysis Concepts & Tools
Ethical Hacker: Wireless Hacking Common Threats
Ethical Hacker: Wireless Hacking Concepts
Ethical Hacker: Wireless Hacking Tools
LAB: Certified Ethical Hacker v9

Certified Information Security Manager (CISM)

CISM Information Risk Management Part I
Information Risk Management Part II
Information Security Governance Part I
Information Security Governance Part II
Information Security Incident Management Part I
Information Security Incident Management Part II
Information Security Program Development Part I
Information Security Program Development Part II
TestPrep: Certified Information Security Manager

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) 2019: BCP & Network Security
Certified Information Systems Auditor (CISA) 2019: Continuous Monitoring
Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk
Certified Information Systems Auditor (CISA) 2019: Data Storage & Malware
Certified Information Systems Auditor (CISA) 2019: Digital Asset Protection
Certified Information Systems Auditor (CISA) 2019: Digital Evidence Gathering
Certified Information Systems Auditor (CISA) 2019: IAM & Data Classification
Certified Information Systems Auditor (CISA) 2019: Information System Auditing
Certified Information Systems Auditor (CISA) 2019: IT Management Frameworks
Certified Information Systems Auditor (CISA) 2019: Performance & Management
Certified Information Systems Auditor (CISA) 2019: PKI & Data Protection
Certified Information Systems Auditor (CISA) 2019: Scenario-Based Practice
Certified Information Systems Auditor (CISA) 2019: System Design & Analysis
Certified Information Systems Auditor (CISA) 2019: Testing & Vulnerability
Certified Information Systems Auditor (CISA) 2019: Virtualization & Cloud

Certified Information Systems Security Professional (CISSP)

CISSP 2015 LAB: Certified Information Systems Security Professional (CISSP)
CISSP 2018 TestPrep: Certified Information Systems Security Professional (CISSP) 2018
(ISC)² & Security Fundamentals
CISSP: Risk Management
CISSP: Security
Communication & Network Security
Conducting Incident Management
Cryptographic Client-based Systems
Identity and Access Management (IAM)
Monitoring & Reporting
Security Architecture and Engineering
Security Assessment & Testing
Security Operations
Site & Facility Security Controls
Software Development Security
Vulnerability Assessment & Mitigation

Certified Secure Software Lifecycle Professional (CSSLP)

Certified Secure Software Lifecycle Professional (CSSLP) 2019: Abuse Cases & RTMs
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Data Classification
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Privacy
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Design Principles
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Requirements
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Threat Modeling
Secure Concepts
Secure Design
Secure Implementation & Coding
Secure Requirements
Secure Risk, Vulnerabilities, & Exposure
Secure Testing
Secure Versioning & Analysis
Software Acceptance, Deployment, Operations, & Maintenance
Software Acquisition
Software Design Technologies
Supply Chain & Software Acquisition

Chef

Chef LAB: DevOps with Chef
Chef 13.6.4 Chef: Getting Started
Community Cookbooks & Server Patterns
Server Basics
Test Driven Cookbooks
Chef 15.1 Chef for DevOps: Automate Infrastructure Using Chef Tools & Templates
Chef for DevOps: Managing Infrastructure Using Chef

Cisco Certified Design Associate (CCDA)

Cisco DESGN 3.0 200-310 – Designing for Cisco Internetwork Solutions
DESGN 3.0: Branch Network Design
DESGN 3.0: Campus Design
DESGN 3.0: Campus Design Considerations
DESGN 3.0: Design Hierarchy
DESGN 3.0: Design Lifecycle
DESGN 3.0: Design Methodology
DESGN 3.0: Design Modularity
DESGN 3.0: Design Resiliency
DESGN 3.0: Design Scalability
DESGN 3.0: Enterprise Architecture
DESGN 3.0: Enterprise Network WAN and Edge
DESGN 3.0: Fault Domain Design
DESGN 3.0: IGP Expansion
DESGN 3.0: Implementing Network Design
DESGN 3.0: Network Programmability & Data Center Component Design
DESGN 3.0: Networking Information Gathering & Auditing
DESGN 3.0: OSPF & BGP Expansion
DESGN 3.0: Routing Protocol Scalability
DESGN 3.0: Scalable Addressing & IP Addressing Schemes
DESGN 3.0: Security Control Considerations
DESGN 3.0: Virtualization in Network Design
DESGN 3.0: Voice and Video Design Considerations
DESGN 3.0: Wireless LAN Design
DESGN 3.0: Wireless LAN Requirements

Cisco Certified Entry Networking Technician (CCENT)

Cisco CCENT CCENT: Access Control Lists Part 1
CCENT: Access Control Lists Part 2
CCENT: Device Hardening
CCENT: Device Management
CCENT: DHCP Configuration
CCENT: Discovering Ethernet
CCENT: Discovery Protocols
CCENT: DNS Configuration
CCENT: Functions of Routing
CCENT: Initial Device Configuration
CCENT: Interswitch Connectivity
CCENT: InterVLAN Routing
CCENT: IPv4 Addressing Part 1
CCENT: IPv4 Addressing Part 2
CCENT: IPv4 Configuration
CCENT: IPv6 Addressing
CCENT: IPv6 Configuration
CCENT: NAT Configuration
CCENT: Network Cabling
CCENT: Network Components, Topologies, & Architecture
CCENT: NTP Configuration
CCENT: OSI Model
CCENT: Overview of Cisco Devices
CCENT: Overview of Networking
CCENT: Port Security
CCENT: RIPv2 Configuration
CCENT: Static Routing
CCENT: Subnetting Part 1
CCENT: Subnetting Part 2
CCENT: Subnetting Practice
CCENT: Switching Functions
CCENT: The TCP/IP Model
CCENT: Troubleshooting Interfaces & Cables
CCENT: Troubleshooting Methodologies
CCENT: VLAN Configuration
LAB: Interconnecting Cisco Networking Devices Part 1
TestPrep: Interconnecting Cisco Networking Devices Part 1

Cisco Certified Network Associate (CCNA): Cloud

Cisco CLDFND CLDFND: Block & File Storage Access
CLDFND: Cisco Application Centric Infrastructure
CLDFND: Cisco Cloud Virtualization
CLDFND: Cisco CloudCenter
CLDFND: Cisco CloudCenter Components
CLDFND: Cisco UCS
CLDFND: Cisco Unified Fabric
CLDFND: Cloud Characteristics
CLDFND: Cloud Service Models
CLDFND: Community & Hybrid Cloud
CLDFND: IaaS, PaaS, & SaaS
CLDFND: Integrated Infrastructure & Cisco InterCloud Fabric
CLDFND: Public & Private Cloud Deployment Models
CLDFND: SAN, NAS, & Cisco Storage Network Devices
CLDFND: Server & Infrastructure Virtualization
CLDFND: Software-Defined Networking
CLDFND: Storage Access Technologies
CLDFND: Storage Provisioning
CLDFND: Virtual Application Containers
CLDFND: Virtual Networking Services
CLDFND: VLANs & VXLANs
Cisco CLDFND 1.0 TestPrep: Understanding Cisco Cloud Fundamentals (CLDFND)

Cisco Certified Network Associate (CCNA): CyberOps

Cisco  SECFND SECFND: Interpreting Log Data
SECFND: Network Monitoring
SECFND: Security Attack Concepts
Cisco SECFND SECFND: ACLs & Filtering
SECFND: Attack & Evasion
SECFND: Basic Networking Protocols
SECFND: Basic Networking Services
SECFND: Cryptographic Encryption Algorithms
SECFND: Cryptographic Hashing Algorithms
SECFND: Cryptography
SECFND: Data Loss & Defense-in-Depth
SECFND: Digital Signatures
SECFND: Endpoint Security
SECFND: Filtering & Packet Capture
SECFND: Linux Host Terminology
SECFND: Monitoring Network Protocols
SECFND: Network & Web Attacks
SECFND: Network Addressing
SECFND: Network Data Types
SECFND: Network Data Types & Security Monitoring
SECFND: Network Devices Operations & Security
SECFND: Network Models
SECFND: Next-Generation IPS Events
SECFND: Overview & Network Models
SECFND: Packet Analysis
SECFND: Security Concepts
SECFND: Security Management Part 1
SECFND: Security Management Part 2
SECFND: SSL/TLS Components
SECFND: VLANS & Data Visibility
SECFND: Windows Host Terminology
Cisco SECOPS SECOPS: Analyzing Intrusion Impact
SECOPS: Analyzing Threat Mitigation Reports
SECOPS: Categorize & Classify Intrusions
SECOPS: CSIRT Goals & Cybersec Elements
SECOPS: Data Normalization & 5-Tuple Correlation
SECOPS: Examining Intrusion Events
SECOPS: Firepower Management Console & Analysis Methods
SECOPS: Handling Incident Events & Evidence
SECOPS: HTTP Headers
SECOPS: ICMP Intrusion
SECOPS: ICMP Intrusion Part 2
SECOPS: Identifying Forensic Evidence
SECOPS: Identifying NetFlow v5 Records
SECOPS: Interpreting Regular Expressions
SECOPS: IP Header Security
SECOPS: Protocol Header Security
SECOPS: Responding to Incidents
SECOPS: Scoring with CVSS 3.0
SECOPS: Securing File Systems
SECOPS: Transport Layer Headers
SECOPS: Using Intrusion Event Technologies

Cisco Certified Network Associate (CCNA): Routing and Switching

Cisco  ICND2 3.0 ICND2 3.0: Configuring ACLs
Cisco CCENT CCENT: Access Control Lists Part 1
CCENT: Access Control Lists Part 2
CCENT: Device Hardening
CCENT: Device Management
CCENT: DHCP Configuration
CCENT: Discovering Ethernet
CCENT: Discovery Protocols
CCENT: DNS Configuration
CCENT: Functions of Routing
CCENT: Initial Device Configuration
CCENT: Interswitch Connectivity
CCENT: InterVLAN Routing
CCENT: IPv4 Addressing Part 1
CCENT: IPv4 Addressing Part 2
CCENT: IPv4 Configuration
CCENT: IPv6 Addressing
CCENT: IPv6 Configuration
CCENT: NAT Configuration
CCENT: Network Cabling
CCENT: Network Components, Topologies, & Architecture
CCENT: NTP Configuration
CCENT: OSI Model
CCENT: Overview of Cisco Devices
CCENT: Overview of Networking
CCENT: Port Security
CCENT: RIPv2 Configuration
CCENT: Static Routing
CCENT: Subnetting Part 1
CCENT: Subnetting Part 2
CCENT: Subnetting Practice
CCENT: Switching Functions
CCENT: The TCP/IP Model
CCENT: Troubleshooting Interfaces & Cables
CCENT: Troubleshooting Methodologies
CCENT: VLAN Configuration
LAB: Interconnecting Cisco Networking Devices Part 1
TestPrep: Interconnecting Cisco Networking Devices Part 1
Cisco CCNA LAB: Cisco Certified Network Associate 200-125
Cisco ICND2 3.0 ICND2 3.0: Configuring & Verifying EIGRP
ICND2 3.0: Configuring & Verifying OSPFv3
ICND2 3.0: Configuring EtherChannel
ICND2 3.0: Configuring Multiarea OSPFv2
ICND2 3.0: Configuring OSPFv2
ICND2 3.0: Configuring Trunking
ICND2 3.0: Implementing EIGRP
ICND2 3.0: Implementing VLANs
ICND2 3.0: Infrastructure Services
ICND2 3.0: InterVLAN Routing
ICND2 3.0: Management & Programmability
ICND2 3.0: OSPFv2 Operations
ICND2 3.0: PortFast & BPDU guard
ICND2 3.0: QoS Overview
ICND2 3.0: Routing Protocols
ICND2 3.0: SNMP Monitoring
ICND2 3.0: Spanning Tree Configuration & Verification
ICND2 3.0: Spanning Tree Overview
ICND2 3.0: Switch Aggregation & Threat Mitigation
ICND2 3.0: Troubleshooting Connectivity
ICND2 3.0: Trunking Overview
ICND2 3.0: WAN Topologies & Connectivity
ICND2 3.0: Wide Area Networks Using GRE & eBGP
ICND2 3.0: Wide Area Networks Using PPP
TestPrep: Interconnecting Cisco Networking Devices Part 2 (ICND2)
ICND 2 LAB: Interconnecting Cisco Networking Devices 200-105

Cisco Certified Network Associate (CCNA): Security

Cisco  IINS 3.0 IINS 3.0: Firewall Features
IINS 3.0: Network Time Protocol
Cisco IINS 3.0 IINS 3.0: AnyConnect VPN Using ASDM
IINS 3.0: ASA Security & Policies
IINS 3.0: Attack Mitigation
IINS 3.0: AutoSecure
IINS 3.0: Clientless SSL VPN & ASDM
IINS 3.0: Configuring Cisco IPS
IINS 3.0: Control Plane Policing
IINS 3.0: Cryptographic Key Exchange
IINS 3.0: Encryption Methods
IINS 3.0: Firewall Technology
IINS 3.0: Introduction to Cisco Security
IINS 3.0: Introduction to Network Attacks
IINS 3.0: IPS Deployment Configuration
IINS 3.0: IPsec & VPN
IINS 3.0: IPSec Site-to-Site VPN
IINS 3.0: Malware and Data Loss
IINS 3.0: Management Plane Access
IINS 3.0: Network Access Control
IINS 3.0: Network Address Translation
IINS 3.0: Network Topologies
IINS 3.0: OSPF & EIGRP Authentication
IINS 3.0: Port-based Access Control, BYOD, & MDM
IINS 3.0: PVLANs & VLAN Security
IINS 3.0: SCP & AAA Technologies
IINS 3.0: Secure CLI Access
IINS 3.0: Secure Device Management
IINS 3.0: SIEM Technology & Security Terminology
IINS 3.0: Simple Network Management Protocol
IINS 3.0: Specific Network Attacks
IINS 3.0: TACACS+
IINS 3.0: Threat Mitigation for Email, Web, & Endpoints
IINS 3.0: Zone-Based Firewall Configuration
LAB: Implementing Cisco Network Security (IINS)
TestPrep: Implementing Cisco Network Security (IINS)

Cisco Certified Network Professional (CCNP): Routing and Switching

Cisco ROUTE 2.0 LAB: Implementing Cisco IP Routing (ROUTE)
ROUTE 2.0: Access Control
ROUTE 2.0: Administrative Distance & Passive Interfaces
ROUTE 2.0: Authentication, Authorization, & Accounting
ROUTE 2.0: BGP Attributes
ROUTE 2.0: BGP Loopback & Propagation
ROUTE 2.0: Border Gateway Protocol Introduction
ROUTE 2.0: Configure Static Routing
ROUTE 2.0: Default Routes
ROUTE 2.0: Device Management
ROUTE 2.0: DHCP Server
ROUTE 2.0: DHCP Stateless Server
ROUTE 2.0: Dynamic Multipoint, Easy VPN, & IPsec
ROUTE 2.0: EIGRP Authentication
ROUTE 2.0: EIGRP Load Balancing & Metrics
ROUTE 2.0: EIGRP Neighbors
ROUTE 2.0: EIGRP Over IPv6
ROUTE 2.0: EIGRP Stubs
ROUTE 2.0: Frame Relay Configuration
ROUTE 2.0: Generic Routing Encapsulation Tunnels
ROUTE 2.0: Introduction to EIGRP
ROUTE 2.0: Introduction to Networking
ROUTE 2.0: IP Addressing & DHCP
ROUTE 2.0: IP Operations
ROUTE 2.0: IPv4 Addressing Types
ROUTE 2.0: IPv6 Addresses
ROUTE 2.0: IPv6 Addressing & DHCP
ROUTE 2.0: Logging & Debugging
ROUTE 2.0: Loop Prevention Using Built-In Mechanisms
ROUTE 2.0: Loop Prevention Using Route Tags & Maps
ROUTE 2.0: Multiprotocol BGP
ROUTE 2.0: NetFlow
ROUTE 2.0: Network Address Translation
ROUTE 2.0: Network Migration
ROUTE 2.0: OSPF Area Types
ROUTE 2.0: OSPF Configuration
ROUTE 2.0: OSPF IPv6 Routing
ROUTE 2.0: OSPF Network & LSA Types
ROUTE 2.0: OSPF Packet Types
ROUTE 2.0: OSPF Route Types
ROUTE 2.0: OSPF Virtual Links and Paths
ROUTE 2.0: Point-to-Point Networking
ROUTE 2.0: Route Filtering
ROUTE 2.0: Route Filtering for EIGRP, OSPF, & BGP
ROUTE 2.0: Route Redistribution Using OSPF
ROUTE 2.0: Route Redistribution with RIP & EIGRP
ROUTE 2.0: Router Summarization for EIGRP & OSPF
ROUTE 2.0: Router Summarization Using RIP
ROUTE 2.0: Routing Information Protocol
ROUTE 2.0: Routing Policies
ROUTE 2.0: Routing Protocol Types
ROUTE 2.0: Security Features
ROUTE 2.0: SLAs & Object Tracking
ROUTE 2.0: SNMP & NTP
ROUTE 2.0: TCP & UDP Operations
ROUTE 2.0: Using VRF Lite
TestPrep: Implementing Cisco IP Routing (ROUTE)
Cisco SWITCH 2.0 LAB: Implementing Cisco IP Switched Networks (SWITCH)
SWITCH 2.0: DHCP Snooping, IPSG, & DAI
SWITCH 2.0: EtherChannel
SWITCH 2.0: Hot Standby Router Protocol
SWITCH 2.0: L2 Attacks & Port Security
SWITCH 2.0: Layer 2 Network Discovery
SWITCH 2.0: Layer 3 Switching
SWITCH 2.0: Rapid & Multiple Spanning Tree
SWITCH 2.0: SPAN, RSPAN, & StackWise Clustering
SWITCH 2.0: Spanning Tree & Per VLAN Spanning Tree
SWITCH 2.0: Storm Control & Port-Based Authentication
SWITCH 2.0: STP Enhancements
SWITCH 2.0: STP Timers & Failover
SWITCH 2.0: Switch Overview & Administration
SWITCH 2.0: Trunking Using DTP, Dot1Q, & ISL
SWITCH 2.0: Trunking Using VTP
SWITCH 2.0: Virtual LANs
SWITCH 2.0: VLAN ACLs & Private VLANs
SWITCH 2.0: VLAN Trunk Protocol Pruning
SWITCH 2.0: VRRP & GLBP
TestPrep: Implementing Cisco IP Switched Networks (SWITCH)
Cisco TSHOOT 2.0 LAB: Troubleshooting and Maintaining Cisco IP Networks (TSHOOT)
TestPrep: Troubleshooting and Maintaining Cisco IP Networks (TSHOOT)
TSHOOT 2.0: BGP IPv6 Troubleshooting
TSHOOT 2.0: BGP Troubleshooting Part 1
TSHOOT 2.0: BGP Troubleshooting Part 2
TSHOOT 2.0: EIGRP Troubleshooting Part 1
TSHOOT 2.0: EIGRP Troubleshooting Part 2
TSHOOT 2.0: EIGRP Troubleshooting Part 3
TSHOOT 2.0: EtherChannel & Spanning Tree Troubleshooting
TSHOOT 2.0: HSRP Troubleshooting
TSHOOT 2.0: Layer 2 Troubleshooting Part 1
TSHOOT 2.0: Layer 2 Troubleshooting Part 2
TSHOOT 2.0: Layer 2 Troubleshooting Part 3
TSHOOT 2.0: Layer 3 Troubleshooting
TSHOOT 2.0: Logging & Path Verification
TSHOOT 2.0: Miscellaneous Troubleshooting
TSHOOT 2.0: Network Traffic Viewing, Reporting, & Monitoring
TSHOOT 2.0: OSPF Troubleshooting Part 1
TSHOOT 2.0: OSPF Troubleshooting Part 2
TSHOOT 2.0: OSPF Troubleshooting Part 3
TSHOOT 2.0: Response Automation & Backups
TSHOOT 2.0: Routing Troubleshooting Part 1
TSHOOT 2.0: Routing Troubleshooting Part 2
TSHOOT 2.0: Troubleshooting & Manipulating Output
TSHOOT 2.0: Troubleshooting Basics
TSHOOT 2.0: VRRP Troubleshooting

Cisco Certified Network Professional (CCNP): Security

Cisco SENSS 1.0 SENSS 1.0: ASA Firewall Access Control
SENSS 1.0: ASA Firewall Configuration & Access Control
SENSS 1.0: Centralized Logging & Device Management
SENSS 1.0: Cisco Port-Based Traffic Control
SENSS 1.0: DHCP Snooping & IP Source Guard
SENSS 1.0: High Availability & Private VLANs
SENSS 1.0: IOS Security Configuration
SENSS 1.0: IPv6 Support & Traffic Inspection
SENSS 1.0: Role-Based Access Control
SENSS 1.0: Traffic & Device Monitoring
SENSS 1.0: Transparent Firewalls & Security Contexts
SENSS 1.0: Twice NAT & Network Object NAT
SENSS 1.0: Zone-Based Firewalls

Cisco Cloud

Cisco CLDFND CLDFND: Block & File Storage Access
CLDFND: Cisco Application Centric Infrastructure
CLDFND: Cisco Cloud Virtualization
CLDFND: Cisco CloudCenter
CLDFND: Cisco CloudCenter Components
CLDFND: Cisco UCS
CLDFND: Cisco Unified Fabric
CLDFND: Cloud Characteristics
CLDFND: Cloud Service Models
CLDFND: Community & Hybrid Cloud
CLDFND: IaaS, PaaS, & SaaS
CLDFND: Integrated Infrastructure & Cisco InterCloud Fabric
CLDFND: Public & Private Cloud Deployment Models
CLDFND: SAN, NAS, & Cisco Storage Network Devices
CLDFND: Server & Infrastructure Virtualization
CLDFND: Software-Defined Networking
CLDFND: Storage Access Technologies
CLDFND: Storage Provisioning
CLDFND: Virtual Application Containers
CLDFND: Virtual Networking Services
CLDFND: VLANs & VXLANs
Cisco CLDFND 1.0 TestPrep: Understanding Cisco Cloud Fundamentals (CLDFND)

Cisco Design

Cisco DESGN 3.0 DESGN 3.0: Branch Network Design
DESGN 3.0: Campus Design
DESGN 3.0: Campus Design Considerations
DESGN 3.0: Design Hierarchy
DESGN 3.0: Design Lifecycle
DESGN 3.0: Design Methodology
DESGN 3.0: Design Modularity
DESGN 3.0: Design Resiliency
DESGN 3.0: Design Scalability
DESGN 3.0: Enterprise Architecture
DESGN 3.0: Enterprise Network WAN and Edge
DESGN 3.0: Fault Domain Design
DESGN 3.0: IGP Expansion
DESGN 3.0: Implementing Network Design
DESGN 3.0: Network Programmability & Data Center Component Design
DESGN 3.0: Networking Information Gathering & Auditing
DESGN 3.0: OSPF & BGP Expansion
DESGN 3.0: Routing Protocol Scalability
DESGN 3.0: Scalable Addressing & IP Addressing Schemes
DESGN 3.0: Security Control Considerations
DESGN 3.0: Virtualization in Network Design
DESGN 3.0: Voice and Video Design Considerations
DESGN 3.0: Wireless LAN Design
DESGN 3.0: Wireless LAN Requirements

Cisco Networking

Cisco  ICND2 3.0 ICND2 3.0: Configuring ACLs
Cisco CCENT CCENT: Access Control Lists Part 1
CCENT: Access Control Lists Part 2
CCENT: Device Hardening
CCENT: Device Management
CCENT: DHCP Configuration
CCENT: Discovering Ethernet
CCENT: Discovery Protocols
CCENT: DNS Configuration
CCENT: Functions of Routing
CCENT: Initial Device Configuration
CCENT: Interswitch Connectivity
CCENT: InterVLAN Routing
CCENT: IPv4 Addressing Part 1
CCENT: IPv4 Addressing Part 2
CCENT: IPv4 Configuration
CCENT: IPv6 Addressing
CCENT: IPv6 Configuration
CCENT: NAT Configuration
CCENT: Network Cabling
CCENT: Network Components, Topologies, & Architecture
CCENT: NTP Configuration
CCENT: OSI Model
CCENT: Overview of Cisco Devices
CCENT: Overview of Networking
CCENT: Port Security
CCENT: RIPv2 Configuration
CCENT: Static Routing
CCENT: Subnetting Part 1
CCENT: Subnetting Part 2
CCENT: Subnetting Practice
CCENT: Switching Functions
CCENT: The TCP/IP Model
CCENT: Troubleshooting Interfaces & Cables
CCENT: Troubleshooting Methodologies
CCENT: VLAN Configuration
LAB: Interconnecting Cisco Networking Devices Part 1
TestPrep: Interconnecting Cisco Networking Devices Part 1
Cisco CCNA LAB: Cisco Certified Network Associate 200-125
Cisco ICND2 3.0 ICND2 3.0: Configuring & Verifying EIGRP
ICND2 3.0: Configuring & Verifying OSPFv3
ICND2 3.0: Configuring EtherChannel
ICND2 3.0: Configuring Multiarea OSPFv2
ICND2 3.0: Configuring OSPFv2
ICND2 3.0: Configuring Trunking
ICND2 3.0: Implementing EIGRP
ICND2 3.0: Implementing VLANs
ICND2 3.0: Infrastructure Services
ICND2 3.0: InterVLAN Routing
ICND2 3.0: Management & Programmability
ICND2 3.0: OSPFv2 Operations
ICND2 3.0: PortFast & BPDU guard
ICND2 3.0: QoS Overview
ICND2 3.0: Routing Protocols
ICND2 3.0: SNMP Monitoring
ICND2 3.0: Spanning Tree Configuration & Verification
ICND2 3.0: Spanning Tree Overview
ICND2 3.0: Switch Aggregation & Threat Mitigation
ICND2 3.0: Troubleshooting Connectivity
ICND2 3.0: Trunking Overview
ICND2 3.0: WAN Topologies & Connectivity
ICND2 3.0: Wide Area Networks Using GRE & eBGP
ICND2 3.0: Wide Area Networks Using PPP
TestPrep: Interconnecting Cisco Networking Devices Part 2 (ICND2)
Cisco ROUTE 2.0 LAB: Implementing Cisco IP Routing (ROUTE)
ROUTE 2.0: Access Control
ROUTE 2.0: Administrative Distance & Passive Interfaces
ROUTE 2.0: Authentication, Authorization, & Accounting
ROUTE 2.0: BGP Attributes
ROUTE 2.0: BGP Loopback & Propagation
ROUTE 2.0: Border Gateway Protocol Introduction
ROUTE 2.0: Configure Static Routing
ROUTE 2.0: Default Routes
ROUTE 2.0: Device Management
ROUTE 2.0: DHCP Server
ROUTE 2.0: DHCP Stateless Server
ROUTE 2.0: Dynamic Multipoint, Easy VPN, & IPsec
ROUTE 2.0: EIGRP Authentication
ROUTE 2.0: EIGRP Load Balancing & Metrics
ROUTE 2.0: EIGRP Neighbors
ROUTE 2.0: EIGRP Over IPv6
ROUTE 2.0: EIGRP Stubs
ROUTE 2.0: Frame Relay Configuration
ROUTE 2.0: Generic Routing Encapsulation Tunnels
ROUTE 2.0: Introduction to EIGRP
ROUTE 2.0: Introduction to Networking
ROUTE 2.0: IP Addressing & DHCP
ROUTE 2.0: IP Operations
ROUTE 2.0: IPv4 Addressing Types
ROUTE 2.0: IPv6 Addresses
ROUTE 2.0: IPv6 Addressing & DHCP
ROUTE 2.0: Logging & Debugging
ROUTE 2.0: Loop Prevention Using Built-In Mechanisms
ROUTE 2.0: Loop Prevention Using Route Tags & Maps
ROUTE 2.0: Multiprotocol BGP
ROUTE 2.0: NetFlow
ROUTE 2.0: Network Address Translation
ROUTE 2.0: Network Migration
ROUTE 2.0: OSPF Area Types
ROUTE 2.0: OSPF Configuration
ROUTE 2.0: OSPF IPv6 Routing
ROUTE 2.0: OSPF Network & LSA Types
ROUTE 2.0: OSPF Packet Types
ROUTE 2.0: OSPF Route Types
ROUTE 2.0: OSPF Virtual Links and Paths
ROUTE 2.0: Point-to-Point Networking
ROUTE 2.0: Route Filtering
ROUTE 2.0: Route Filtering for EIGRP, OSPF, & BGP
ROUTE 2.0: Route Redistribution Using OSPF
ROUTE 2.0: Route Redistribution with RIP & EIGRP
ROUTE 2.0: Router Summarization for EIGRP & OSPF
ROUTE 2.0: Router Summarization Using RIP
ROUTE 2.0: Routing Information Protocol
ROUTE 2.0: Routing Policies
ROUTE 2.0: Routing Protocol Types
ROUTE 2.0: Security Features
ROUTE 2.0: SLAs & Object Tracking
ROUTE 2.0: SNMP & NTP
ROUTE 2.0: TCP & UDP Operations
ROUTE 2.0: Using VRF Lite
TestPrep: Implementing Cisco IP Routing (ROUTE)
Cisco SWITCH 2.0 LAB: Implementing Cisco IP Switched Networks (SWITCH)
SWITCH 2.0: DHCP Snooping, IPSG, & DAI
SWITCH 2.0: EtherChannel
SWITCH 2.0: Hot Standby Router Protocol
SWITCH 2.0: L2 Attacks & Port Security
SWITCH 2.0: Layer 2 Network Discovery
SWITCH 2.0: Layer 3 Switching
SWITCH 2.0: Rapid & Multiple Spanning Tree
SWITCH 2.0: SPAN, RSPAN, & StackWise Clustering
SWITCH 2.0: Spanning Tree & Per VLAN Spanning Tree
SWITCH 2.0: Storm Control & Port-Based Authentication
SWITCH 2.0: STP Enhancements
SWITCH 2.0: STP Timers & Failover
SWITCH 2.0: Switch Overview & Administration
SWITCH 2.0: Trunking Using DTP, Dot1Q, & ISL
SWITCH 2.0: Trunking Using VTP
SWITCH 2.0: Virtual LANs
SWITCH 2.0: VLAN ACLs & Private VLANs
SWITCH 2.0: VLAN Trunk Protocol Pruning
SWITCH 2.0: VRRP & GLBP
TestPrep: Implementing Cisco IP Switched Networks (SWITCH)

Cisco Routing

Cisco ROUTE 2.0 LAB: Implementing Cisco IP Routing (ROUTE)
ROUTE 2.0: Access Control
ROUTE 2.0: Administrative Distance & Passive Interfaces
ROUTE 2.0: Authentication, Authorization, & Accounting
ROUTE 2.0: BGP Attributes
ROUTE 2.0: BGP Loopback & Propagation
ROUTE 2.0: Border Gateway Protocol Introduction
ROUTE 2.0: Configure Static Routing
ROUTE 2.0: Default Routes
ROUTE 2.0: Device Management
ROUTE 2.0: DHCP Server
ROUTE 2.0: DHCP Stateless Server
ROUTE 2.0: Dynamic Multipoint, Easy VPN, & IPsec
ROUTE 2.0: EIGRP Authentication
ROUTE 2.0: EIGRP Load Balancing & Metrics
ROUTE 2.0: EIGRP Neighbors
ROUTE 2.0: EIGRP Over IPv6
ROUTE 2.0: EIGRP Stubs
ROUTE 2.0: Frame Relay Configuration
ROUTE 2.0: Generic Routing Encapsulation Tunnels
ROUTE 2.0: Introduction to EIGRP
ROUTE 2.0: Introduction to Networking
ROUTE 2.0: IP Addressing & DHCP
ROUTE 2.0: IP Operations
ROUTE 2.0: IPv4 Addressing Types
ROUTE 2.0: IPv6 Addresses
ROUTE 2.0: IPv6 Addressing & DHCP
ROUTE 2.0: Logging & Debugging
ROUTE 2.0: Loop Prevention Using Built-In Mechanisms
ROUTE 2.0: Loop Prevention Using Route Tags & Maps
ROUTE 2.0: Multiprotocol BGP
ROUTE 2.0: NetFlow
ROUTE 2.0: Network Address Translation
ROUTE 2.0: Network Migration
ROUTE 2.0: OSPF Area Types
ROUTE 2.0: OSPF Configuration
ROUTE 2.0: OSPF IPv6 Routing
ROUTE 2.0: OSPF Network & LSA Types
ROUTE 2.0: OSPF Packet Types
ROUTE 2.0: OSPF Route Types
ROUTE 2.0: OSPF Virtual Links and Paths
ROUTE 2.0: Point-to-Point Networking
ROUTE 2.0: Route Filtering
ROUTE 2.0: Route Filtering for EIGRP, OSPF, & BGP
ROUTE 2.0: Route Redistribution Using OSPF
ROUTE 2.0: Route Redistribution with RIP & EIGRP
ROUTE 2.0: Router Summarization for EIGRP & OSPF
ROUTE 2.0: Router Summarization Using RIP
ROUTE 2.0: Routing Information Protocol
ROUTE 2.0: Routing Policies
ROUTE 2.0: Routing Protocol Types
ROUTE 2.0: Security Features
ROUTE 2.0: SLAs & Object Tracking
ROUTE 2.0: SNMP & NTP
ROUTE 2.0: TCP & UDP Operations
ROUTE 2.0: Using VRF Lite
TestPrep: Implementing Cisco IP Routing (ROUTE)

Cisco Security

Cisco  IINS 3.0 IINS 3.0: Firewall Features
IINS 3.0: Network Time Protocol
Cisco  SECFND SECFND: Interpreting Log Data
SECFND: Network Monitoring
SECFND: Security Attack Concepts
Cisco IINS 3.0 IINS 3.0: AnyConnect VPN Using ASDM
IINS 3.0: ASA Security & Policies
IINS 3.0: Attack Mitigation
IINS 3.0: AutoSecure
IINS 3.0: Clientless SSL VPN & ASDM
IINS 3.0: Configuring Cisco IPS
IINS 3.0: Control Plane Policing
IINS 3.0: Cryptographic Key Exchange
IINS 3.0: Encryption Methods
IINS 3.0: Firewall Technology
IINS 3.0: Introduction to Cisco Security
IINS 3.0: Introduction to Network Attacks
IINS 3.0: IPS Deployment Configuration
IINS 3.0: IPsec & VPN
IINS 3.0: IPSec Site-to-Site VPN
IINS 3.0: Malware and Data Loss
IINS 3.0: Management Plane Access
IINS 3.0: Network Access Control
IINS 3.0: Network Address Translation
IINS 3.0: Network Topologies
IINS 3.0: OSPF & EIGRP Authentication
IINS 3.0: Port-based Access Control, BYOD, & MDM
IINS 3.0: PVLANs & VLAN Security
IINS 3.0: SCP & AAA Technologies
IINS 3.0: Secure CLI Access
IINS 3.0: Secure Device Management
IINS 3.0: SIEM Technology & Security Terminology
IINS 3.0: Simple Network Management Protocol
IINS 3.0: Specific Network Attacks
IINS 3.0: TACACS+
IINS 3.0: Threat Mitigation for Email, Web, & Endpoints
IINS 3.0: Zone-Based Firewall Configuration
LAB: Implementing Cisco Network Security (IINS)
TestPrep: Implementing Cisco Network Security (IINS)
Cisco SECFND SECFND: ACLs & Filtering
SECFND: Attack & Evasion
SECFND: Basic Networking Protocols
SECFND: Basic Networking Services
SECFND: Cryptographic Encryption Algorithms
SECFND: Cryptographic Hashing Algorithms
SECFND: Cryptography
SECFND: Data Loss & Defense-in-Depth
SECFND: Digital Signatures
SECFND: Endpoint Security
SECFND: Filtering & Packet Capture
SECFND: Linux Host Terminology
SECFND: Monitoring Network Protocols
SECFND: Network & Web Attacks
SECFND: Network Addressing
SECFND: Network Data Types
SECFND: Network Data Types & Security Monitoring
SECFND: Network Devices Operations & Security
SECFND: Network Models
SECFND: Next-Generation IPS Events
SECFND: Overview & Network Models
SECFND: Packet Analysis
SECFND: Security Concepts
SECFND: Security Management Part 1
SECFND: Security Management Part 2
SECFND: SSL/TLS Components
SECFND: VLANS & Data Visibility
SECFND: Windows Host Terminology
Cisco SECOPS SECOPS: Analyzing Intrusion Impact
SECOPS: Categorize & Classify Intrusions
SECOPS: CSIRT Goals & Cybersec Elements
SECOPS: Data Normalization & 5-Tuple Correlation
SECOPS: Examining Intrusion Events
SECOPS: Firepower Management Console & Analysis Methods
SECOPS: Handling Incident Events & Evidence
SECOPS: HTTP Headers
SECOPS: ICMP Intrusion
SECOPS: ICMP Intrusion Part 2
SECOPS: Identifying Forensic Evidence
SECOPS: Identifying NetFlow v5 Records
SECOPS: Interpreting Regular Expressions
SECOPS: IP Header Security
SECOPS: Protocol Header Security
SECOPS: Responding to Incidents
SECOPS: Scoring with CVSS 3.0
SECOPS: Securing File Systems
SECOPS: Transport Layer Headers
SECOPS: Using Intrusion Event Technologies
Cisco SENSS 1.0 SENSS 1.0: ASA Firewall Access Control
SENSS 1.0: ASA Firewall Configuration & Access Control
SENSS 1.0: Centralized Logging & Device Management
SENSS 1.0: Cisco Port-Based Traffic Control
SENSS 1.0: DHCP Snooping & IP Source Guard
SENSS 1.0: High Availability & Private VLANs
SENSS 1.0: IOS Security Configuration
SENSS 1.0: IPv6 Support & Traffic Inspection
SENSS 1.0: Role-Based Access Control
SENSS 1.0: Traffic & Device Monitoring
SENSS 1.0: Transparent Firewalls & Security Contexts
SENSS 1.0: Twice NAT & Network Object NAT
SENSS 1.0: Zone-Based Firewalls

Cisco Switching

Cisco SWITCH 2.0 LAB: Implementing Cisco IP Switched Networks (SWITCH)
SWITCH 2.0: DHCP Snooping, IPSG, & DAI
SWITCH 2.0: EtherChannel
SWITCH 2.0: Hot Standby Router Protocol
SWITCH 2.0: L2 Attacks & Port Security
SWITCH 2.0: Layer 2 Network Discovery
SWITCH 2.0: Layer 3 Switching
SWITCH 2.0: Rapid & Multiple Spanning Tree
SWITCH 2.0: SPAN, RSPAN, & StackWise Clustering
SWITCH 2.0: Spanning Tree & Per VLAN Spanning Tree
SWITCH 2.0: Storm Control & Port-Based Authentication
SWITCH 2.0: STP Enhancements
SWITCH 2.0: STP Timers & Failover
SWITCH 2.0: Switch Overview & Administration
SWITCH 2.0: Trunking Using DTP, Dot1Q, & ISL
SWITCH 2.0: Trunking Using VTP
SWITCH 2.0: Virtual LANs
SWITCH 2.0: VLAN ACLs & Private VLANs
SWITCH 2.0: VLAN Trunk Protocol Pruning
SWITCH 2.0: VRRP & GLBP
TestPrep: Implementing Cisco IP Switched Networks (SWITCH)

Cisco Troubleshooting

Cisco TSHOOT 2.0 LAB: Troubleshooting and Maintaining Cisco IP Networks (TSHOOT)
TestPrep: Troubleshooting and Maintaining Cisco IP Networks (TSHOOT)
TSHOOT 2.0: BGP IPv6 Troubleshooting
TSHOOT 2.0: BGP Troubleshooting Part 1
TSHOOT 2.0: BGP Troubleshooting Part 2
TSHOOT 2.0: EIGRP Troubleshooting Part 1
TSHOOT 2.0: EIGRP Troubleshooting Part 2
TSHOOT 2.0: EIGRP Troubleshooting Part 3
TSHOOT 2.0: EtherChannel & Spanning Tree Troubleshooting
TSHOOT 2.0: HSRP Troubleshooting
TSHOOT 2.0: Layer 2 Troubleshooting Part 1
TSHOOT 2.0: Layer 2 Troubleshooting Part 2
TSHOOT 2.0: Layer 2 Troubleshooting Part 3
TSHOOT 2.0: Layer 3 Troubleshooting
TSHOOT 2.0: Logging & Path Verification
TSHOOT 2.0: Miscellaneous Troubleshooting
TSHOOT 2.0: Network Traffic Viewing, Reporting, & Monitoring
TSHOOT 2.0: OSPF Troubleshooting Part 1
TSHOOT 2.0: OSPF Troubleshooting Part 2
TSHOOT 2.0: OSPF Troubleshooting Part 3
TSHOOT 2.0: Response Automation & Backups
TSHOOT 2.0: Routing Troubleshooting Part 1
TSHOOT 2.0: Routing Troubleshooting Part 2
TSHOOT 2.0: Troubleshooting Basics
TSHOOT 2.0: VRRP Troubleshooting

Citrix

Citrix XenDesktop 7 Administration & Virtual Machines
Diagnostics Using Auditing & Logs
Director & Database Fault Tolerance
Environment Configuration
Environment Monitoring
Maintaining Services
NetScaler
Policies & Profiles
Provisioning & Troubleshooting
Receiver & Policy Implementation
Resource Assignment & Environment Monitoring
Troubleshooting Virtual Desktop Settings
Troubleshooting XenDesktop Components
Troubleshooting XenDesktop Configurations

Clean Coding

Clean Coding Techniques: Architecture & Testable Code
Clean Coding Techniques: Defensive Programming, MVC, & DDD
Clean Coding Techniques: Functions, Type Checking, Error Handling, & Testing
Clean Coding Techniques: Implementation
Clean Coding Techniques: Introduction
Clean Coding Techniques: Introduction to SOLID
Clean Coding Techniques: Syntax, Variables, Objects, & Classes

Clojure

Clojure 0.1.346 Pipelines, Error Handling, & Techniques
Ports & Channels
The core.async Library
Clojure 1.5.1 Data & State Management
Data-driven & Web Application Fundamentals
Functions & Namespaces
Macros, DataTypes, & Performance
Optimizing Clojure Projects
Primitives, Collections, & Sequences
Program Flow

Cloud / IaaS / PaaS

Amazon Web Services 2017 Amazon ECS & OpsWorks
AWS CodeDeploy
Deployment and Delivery
Source Control
Azure 2017 Active Directory
AD Authentication
App Services
Automation
Azure Active Directory & Collaboration
Azure Blob Storage
Azure Functions & API Management
Azure Service Fabric Apps
Azure SQL Database & Caching
Azure Storage Tables & Queues
Azure VM Monitoring
Azure VM Scaling & Storage
Backup & Recovery
Configuring Azure VM Networking
Cosmos DB and Azure Search
Creating Virtual Machines & Workloads
DB & ARM Templates
Designing & Implementing Azure Apps
Designing Web Apps
High Availability
Implementing Communication & Messaging Strategies
Managing & Monitoring Azure Storage
Managing Azure Virtual Machines
Monitoring
Network Connectivity
Security
Storage
The Azure Environment
Virtual Machine Management
Virtual Machine Overview
Virtual Networking
Web App Deployment
Cloud Foundry 2018 Architecture
Command Line Interface
Logging, Scaling, & High Availability
Managed & User-provided Services
Overview
Google Cloud 2017 CLI Cloud Resource Management
Cloud Basics
Cloud Design
Cloud Identity Management
Cloud Solution Management & Testing
Container, Compute, & App Engine
Data Storage
Google Cloud: Getting Started
Monitoring & Logging
Network Components
Programmatic Access
Security
Storage Solutions
Troubleshooting
Virtual Machine Configuration
Virtual Machine Deployment
Web Applications & Name Resolution
OpenStack 2014 Cloud Deployment
Compute Configuration
Networking Service
Object Storage
Services & Components
The OpenStack Dashboard

Cloud Architect

Google Cloud 2017 CLI Cloud Resource Management
Cloud Basics
Cloud Design
Cloud Identity Management
Cloud Solution Management & Testing
Data Storage
Monitoring & Logging
Network Components
Programmatic Access
Security
Troubleshooting
Virtual Machine Configuration
Virtual Machine Deployment
Web Applications & Name Resolution

Cloud Basics

Cloud Business Continuity: Cloud Integration
Cloud Access Control
Cloud Computing Basics
Cloud Computing Considerations
Cloud Presence & Privacy
Cloud Protocols & Standards
Cloud Risk Management
Cloud Security
Cloud Service Models & Benefits and Issues
Cloud Virtualization and Data Centers
Hybrid Cloud Architecture & Deployment: Adopting Migration Strategies
Hybrid Cloud Architecture & Deployment: AWS Data & Service Migration
Hybrid Cloud Architecture & Deployment: AWS Migration Management
Hybrid Cloud Architecture & Deployment: AWS Services & Application Migration
Hybrid Cloud Architecture & Deployment: Azure IaaS & Data Migration tools
Hybrid Cloud Architecture & Deployment: Azure Migration Tools & Best Practices
Hybrid Cloud Architecture & Deployment: Cloud Migration Essentials
Hybrid Cloud Architecture & Deployment: Implementing Migration in Azure
Migrating to the Cloud
Moving to the Cloud
Storing & Managing Cloud Data
Cloud Architecture Cloud Data Architecture: Cloud Architecture & Containerization
Cloud Data Architecture: Data Management & Adoption Frameworks
Architecting Balance: Designing Hybrid Cloud Solutions
Architecting Balance: Hybrid Cloud Implementation with AWS & Azure
Business Continuity: Secure Cloud Computing
Cloud System Patching & Maintenance
Disaster Recovery
LAB: CompTIA Cloud+ CV0-002
Performance Management
Planning Cloud Compute Resources
Planning Cloud Deployments
Planning Cloud Migrations & Extensions
Planning Cloud Networking
Planning Cloud Storage Resources
Security Configurations & Compliance Controls
Security Technologies & Automation Techniques
Troubleshooting Deployments

Cloud Security

Cloud Application Security Awareness & Validation
Cloud Computing & Reference Architecture
Cloud Data Security
Cloud Infrastructure & Risk Analysis
Cloud Infrastructure Management
Cloud Presence & Privacy
Cloud Risk Management
Cloud Security
Data Center Design
Data Rights Management, Policies, & Event Tracing
Legal Requirements & Compliance
Operations Management
Risk Management & Outsourcing Design
Secure Application Architecture & IAM
Secure Cloud Computing & Trusted Cloud Services
Security Controls & Business Continuity
Software Development Security & Life Cycle
Cloud Security Cloud Management
Cloud Security Fundamentals: Architectural & Design Concepts
Cloud Security Fundamentals: Basics of Cloud Operations
Cloud Security Fundamentals: Cloud Application Security
Cloud Security Fundamentals: Cloud Data Security
Cloud Security Fundamentals: Cloud Infrastructure Security
Cloud Security Fundamentals: Legal & Compliance
CCSP 2019: Application Development & Security
CCSP 2019: Cloud Infrastructure
CCSP 2019: Cloud System Architecture Design
CCSP 2019: Data Center Security
CCSP 2019: Data Retention & Events
CCSP 2019: Data Security Technologies
CCSP 2019: Identity & Access Management
CCSP 2019: Implementing Data Discovery & Classification
CCSP 2019: Operational Controls & Standards
CCSP 2019: Secure Cloud Computing

COBIT

COBIT 5 Architecture & Enterprise Governance
Implementation
Principles
Stakeholder Needs & Framework Integration

Collaboration Tools

JIRA 6.4.3 Introducing the JIRA Platform
Leveraging the JIRA Platform for Development Projects
Team Foundation Server 2015 Configuring Team Foundation Server
Installing Team Foundation Server
Managing Collections & Health
Managing Connectivity & Workspaces
Managing Security & Reporting
Managing Team Builds
Managing Templates & Settings
Managing Versions, Recovery, & Labs
Managing Work Items
Team Foundation Server 2017 .NET Development with Visual Studio
Administration & Configuration
Building the Environment
Continuous Integration & Deployment
Java Development with Eclipse

CompTIA A+

A+ 2017 TestPrep: CompTIA A+ 220-901
Adding Hardware to Windows & Storage
BIOS & Motherboards
Broadband Routers
CLI, Troubleshooting, & Batteries
Common Troubleshooting & Security
CompTIA A+ (220-901): Networking
CompTIA A+ (220-901): Troubleshooting Printers
CompTIA A+ (220-902): Operational Procedures
CompTIA A+ (220-902): Troubleshooting
CompTIA A+ (220-902): Windows Networking
CompTIA A+: Accessories & Mobile Device Synchronization
CompTIA A+: Application Installation, Networking, & Tools
CompTIA A+: Basic Cable Types
CompTIA A+: Cloud Computing
CompTIA A+: Common Devices
CompTIA A+: Comparing Common Operating Systems
CompTIA A+: Configuring a Wired/Wireless Network
CompTIA A+: Connectors
CompTIA A+: Critical Security Concepts
CompTIA A+: Custom PC configuration
CompTIA A+: Implementing Network Concepts
CompTIA A+: Installing Hardware & Display Components
CompTIA A+: Laptops Features & Mobile Device Types
CompTIA A+: Microsoft Command Line Tools
CompTIA A+: Microsoft Operating System Installation & Upgrade
CompTIA A+: Mobile Device Network Connectivity & Application Support
CompTIA A+: MS Operating System Administrative Tools
CompTIA A+: Network Hosts
CompTIA A+: Network Types
CompTIA A+: Networking
CompTIA A+: Networking Tools
CompTIA A+: Operational Procedures
CompTIA A+: Operational Procedures Best Practices
CompTIA A+: Power Supplies
CompTIA A+: Printers
CompTIA A+: Random Access Memory
CompTIA A+: Resolving Problems
CompTIA A+: Security Fundamentals
CompTIA A+: Software Troubleshooting
CompTIA A+: SOHO Devices
CompTIA A+: Storage Solutions
CompTIA A+: System Utilities
CompTIA A+: TCP & UDP ports
CompTIA A+: Troubleshooting
CompTIA A+: Troubleshooting Printers
CompTIA A+: Virtualization
CompTIA A+: Windows Control Panel Utilities
CompTIA A+: Windows Networking
CompTIA A+: Wireless Networking Protocols
CompTIA A+: Working with Motherboards, CPUs, & Add-On Cards
CompTIA A+: Working with Peripheral Devices
Computer Form Factors
Computer Hardware Troubleshooting
Configuring Windows Networking
Connectors & Cables
Connectors & Connections
Desktop Security
Display Devices
Exploring RAM
Internet Connections
Internet Connectivity
Introduction to Basic Security
Introduction to CPUs
Introduction to Mobile Computing
Introduction to Mobile Operating Systems
Introduction to Networking
Introduction to Other OSs
Introduction to Printers
Introduction to Virtualization
Introduction to Windows
LAB: CompTIA A + 220-902
LAB: CompTIA A+ 220-1002
Laptops
Mac OS X & Linux
Memory & Storage
Mobile Computing Hardware
Mobile Devices
Mobile Troubleshooting
Monitoring the Windows OS
Monitors, Cables, & Devices
Motherboards
Network Cabling
Network Protocols
Networking Hardware
Non-desktop Technologies
Non-Windows Operating Systems
Optical Storage, Flash Memory, & RAID
PC Components
Peripheral Devices
Portable Computer Hardware
Power Supplies & Connectors
Practical Mobile Troubleshooting
Practical PC Troubleshooting
Printer Maintenance
Printer Networking
Printers
Safety Procedures
Shell Commands for Linux & Mac OS X
Startup
Startup Monitoring & Security
Storage Maintenence
TestPrep: CompTIA A+ 220-1001
TestPrep: CompTIA A+ 220-1002
TestPrep: CompTIA A+ 220-902
Troubleshooting Networking Devices
Using & Managing Windows
Windows Applications & Features
Windows Features & Tools
Windows Installation
Windows Interaction & Personalization
Windows Management
Windows Overview
Windows Security & Account Management
Windows Security Features
Windows Threat Management
Windows Utilities
Wireless Networking

CompTIA CASP+

Applying Research Methods for Trend & Impact Analysis
Business and Industry Influences and Risks
Conducting Security Assessments
Implementing Cryptographic Techniques
Implementing Incident Response & Recovery
Implementing Security Activities across the Technology Life Cycle
Integrating & Troubleshooting Advanced AAA Technologies
Integrating Cloud & Virtualization Technologies in the Enterprise
Integrating Controls for Mobile & Small Form Factor Devices
Integrating Hosts, Storage , & Applications in the Enterprise
Integrating Network and Security Components, Concepts, and Architectures
Integrating Security Controls for Host Devices
Interacting across Diverse Business Units
LAB: CompTIA Advanced Security Practitioner (CASP+) CAS-003
Organizational Security and Privacy Policies
Risk Metric Scenarios for Enterprise Security
Risk Mitigation Strategies and Controls
Secure Communication & Collaboration Solutions
Selecting Software Security Controls
TestPrep: CompTIA Advanced Security Practitioner (CASP+) CAS-003

CompTIA Cloud+

Cloud System Patching & Maintenance
Disaster Recovery
LAB: CompTIA Cloud+ CV0-002
Performance Management
Planning Cloud Compute Resources
Planning Cloud Deployments
Planning Cloud Migrations & Extensions
Planning Cloud Networking
Planning Cloud Storage Resources
Security Configurations & Compliance Controls
Security Technologies & Automation Techniques
Troubleshooting Deployments

CompTIA CySA+

Cyber Security CompTIA Cybersecurity Analyst+: Cloud Computing
CompTIA Cybersecurity Analyst+: Exploits & Security Practices
CompTIA Cybersecurity Analyst+: Firewalls, IDS, & IPS
CompTIA Cybersecurity Analyst+: Identifying & Reducing Vulnerabilities
CompTIA Cybersecurity Analyst+: Malware & Digital Forensics
CompTIA Cybersecurity Analyst+: Monitoring Tools & Analytics
CompTIA Cybersecurity Analyst+: Network Concepts
CompTIA Cybersecurity Analyst+: Network Reconnaissance & Security Policies
CompTIA Cybersecurity Analyst+: Protecting Network Resources
CompTIA Cybersecurity Analyst+: Security Frameworks & Security Controls
CompTIA Cybersecurity Analyst+: Threat Management Documentation
CompTIA Cybersecurity Analyst+: Threat Management Incident Planning & Response
CompTIA Cybersecurity Analyst+: Threat Mitigation
LAB: CompTIA Cybersecurity Analyst
TestPrep: Cybersecurity Analyst+

CompTIA IT Fundamentals+

LAB: CompTIA IT Fundamentals
LAB: CompTIA IT Fundamentals+ FC0-U61
TestPrep: CompTIA IT Fundamentals FC0-U61

CompTIA Linux+

Linux Advanced GNU & Unix Commands
CompTIA Linux+: Backup & Restore
CompTIA Linux+: Boot Process & Kernel
CompTIA Linux+: Bourne-again Shell & Scripting
CompTIA Linux+: File Access & Permissions
CompTIA Linux+: Git Version Control
CompTIA Linux+: Graphical User Interfaces
CompTIA Linux+: Installing & Managing Software
CompTIA Linux+: Installing CentOS
CompTIA Linux+: Installing Software from Source Code
CompTIA Linux+: Installing Ubuntu
CompTIA Linux+: Introduction to Linux & the Command Line
CompTIA Linux+: Locating & Manipulating Files
CompTIA Linux+: Logical Volumes & Filesystem Hierarchy
CompTIA Linux+: Managing & Configuring Hardware
CompTIA Linux+: Managing Services
CompTIA Linux+: Managing Users & Groups
CompTIA Linux+: Network Firewall & Traffic Filtering
CompTIA Linux+: Scheduling Tasks
CompTIA Linux+: Searching& Manipulating File Contents
CompTIA Linux+: SELinux & AppArmor
CompTIA Linux+: TCP/IP & Networking
CompTIA Linux+: Troubleshooting Network Connections
CompTIA Linux+: Troubleshooting Services
CompTIA Linux+: Using vi/vim to Edit Files
Essential System Services
File Permissions & Links
GNU & Unix Commands
GUIs & Configuration
Introduction to Devices & File Systems
Introduction to System Architecture
LAB: CompTIA Linux + LX0-103
LAB: CompTIA Linux + LX0-104
LAB: CompTIA Linux+ XK0-004
Linux Installation
Network Services Management
Networking Fundamentals
Package Management
Scripting & Administrative Tasks
System Booting & Shutdown
TestPrep: CompTIA Linux+ LX0-103
TestPrep: CompTIA Linux+ LX0-104
TestPrep: CompTIA Linux+ XK0-004
Unix Input, Output, & Piping
Users, Groups, & Environment Variables
linux CompTIA Linux+: Security Best Practices
CompTIA Linux+: Disk Partitions & File Systems

CompTIA Network+

Additional Network Services.
Advanced Networking Devices
Cabling Solutions
Cloud Concepts & Network Services
Concepts & Characteristics of Networking
Documentation and Diagrams & Business Continuity
IP Addressing
LAB: CompTIA Network+ N10-007
Mitigation Techniques
Network Attacks
Network Device Hardening
Network Monitoring & Remote Access Methods
Network Storage, Virtualization, & WAN Technologies
Network Topologies & Technologies
Networking Devices
Policies and Best Practices
Ports, Protocols, & the OSI Model
Security Devices, Wireless Security, & Access Control
TestPrep: CompTIA Network+
Troubleshooting Common Network Service Issues
Troubleshooting Connectivity & Performance Issues
Troubleshooting Methodology & Tools

CompTIA PenTest+

Avg PSVs CompTIA PenTest+: Network-Based Exploits
CompTIA PenTest+: Social Engineering & Specialized System Attacks
CompTIA PenTest+ PT0-001
CompTIA PenTest+: Analyzing Tool & Script Output
CompTIA PenTest+: Application-Based Vulnerabilities
CompTIA PenTest+: Information Gathering
CompTIA PenTest+: Local Host Vulnerabilities
CompTIA PenTest+: Penetration Testing Tools
CompTIA PenTest+: Planning for an Engagement
CompTIA PenTest+: Post-Exploitation & Facilities Attacks
CompTIA PenTest+: Reporting & Communication
CompTIA PenTest+: Scoping an Engagement
CompTIA PenTest+: Vulnerability Identification

CompTIA Security+

Analyzing Output from Security Technologies
Application & Service Attacks
Business Impact Analysis & Risk Management
Cloud Computing, Virtualization, & Resiliency
Common Account Management Practices
Components Supporting Organizational Security
CompTIA Security+: Cryptography
Cryptographic & Wireless Attacks
Deploying Mobile Devices Securely
Frameworks, Guidelines, & Physical Security
Identity & Access Management Controls
Identity & Access Services
Impacts from Vulnerability Types
Implementing a Secure Network Architecture
Implementing Secure Protocols
Incident Response, Forensics, Recovery,  & Security Controls
LAB: CompTIA Security+ SY0-501
Penetration Testing & Vulnerability Scanning
Policies, Plans, & Procedures
Public Key Infrastructure
Secure System, Application Design, & Deployment
Security Assessment Using Software Tools
Social Engineering & Related Attacks
TestPrep: CompTIA Security+
The Present Threat Landscape
Troubleshooting Common Security Issues
Types of Malware
Wireless Security Settings

CompTIA Server+

CompTIA Server+ Disaster Recovery Planning & Backups
Introduction to Server Administration
Introduction to Server Architecture
Introduction to Server RAID
Introduction to Server Security
Introduction to Server Storage
Networking & Disaster Recovery
Ports, Protocols, & Cable Management
Server Maintenance, Protection, & VMs
Server Management & Maintenance
Server Policy, Planning, & Safety
Troubleshooting Methodology
Troubleshooting Security & Network Problems
Troubleshooting Storage, Software, & Networks
LAB: CompTIA Server + 2014
TestPrep: CompTIA Server+ 2014

Configuration & Provisioning

Ansible DevOps with Ansible: Introduction to Playbooks & Testing
DevOps with Ansible: Overview
DevOps with Ansible: Working with Ansible Features
Ansible 2.8 Ansible: Ansible for DevOps Provisioning
Ansible: Continuous Delivery and Monitoring Using Ansible Playbook and Tower
Chef 13.6.4 Chef: Getting Started
Community Cookbooks & Server Patterns
Server Basics
Test Driven Cookbooks
Chef 15.1 Chef for DevOps: Automate Infrastructure Using Chef Tools & Templates
Chef for DevOps: Managing Infrastructure Using Chef
Puppet Puppet Refactoring Patterns
Puppet 3.4.3 Configuring Puppet Environments & Managing Files
Puppet 5.0 Building the Puppet Environment
Configuring the Puppet Master & Puppet Agent
Puppet 6.x Puppet for DevOps: Installing & Working with Puppet Components
Puppet for DevOps: Working with Puppet Bolt & Continuous Delivery for PE
RabbitMQ 3.7 Configuration & Troubleshooting
Introduction to RabbitMQ
Message Handling & Clustering
SaltStack DevOps with Saltstack: Configuration & Components
DevOps with Saltstack: Overview
DevOps with Saltstack: Remote Execution & State System
Terraform 0.10.8 Configurations
Infrastructure
Introduction to Automation
Provisioning and Modules
Variables
Vagrant 1.7.2 Boxes & Plugins
Commands, Share, & VM Provisioning
Getting Started with Vagrant
Networking, Synced Folders, & Clusters
Vagrant 1.8 Advanced Administration
Advanced Provisioning
Configuration, Automation, & Provisioning
Customization & Managing Infrastructure

Configuration Management

Apache Subversion 1.9 Getting to Know Subversion
Git 2.16.1 Extension for Visual Studio
Introduction to Git
Working with Git
Working with GitHub

Containerization

Docker DevOps with Docker: Container Management
DevOps with Docker: Management in the Cloud
Docker 1.6 Architecture & Technical Concepts
Clustering & Swarm
Containers & Images
Custom Metadata & Compose
Installation & Usage
Linking & Managing Data in Containers
Docker 1.8 Containers & Configuration
Docker Configuration & Management
Docker Machine & Security
Docker Machine APIs & VMs
Docker 18.03.0-ce Docker Containers, Images, & Swarms
LAB: Mastering Docker for DevOps
Managing Stacks & Application Deployment
Docker 19.03 DevOps with Docker: Implementing DevOps Using Docker
Docker 19.03.1 Using Docker for DevOps: Configuring Docker for Continuous Delivery
Using Docker for DevOps: Introduction to Docker
Docker for Windows 17.09-ce Docker Installation and Management
Docker Integration
Docker Introduction
Docker Programmatic Access
Kubernetes 1.9 Kubernetes APIs & Components
Kubernetes Clusters
Kubernetes Concepts & Controllers
Kubernetes Introduction
Running Kubernetes on Google Cloud Platform

Continuous Integration

Jenkins 1.62 Jenkins: Getting Started
Jobs, Security, & Run Options
Jenkins 2.0 Administration
Creating Application Builds
Introduction
Testing & Continuous Integration
Jenkins 2.176 Jenkins for DevOps: Automated Testing & Advanced Jobs Using Jenkins
Jenkins for DevOps: Jenkins Configuration for DevOps
Visual Studio 2015 Automated Testing & Deployment
Code Quality, Testing, & Development
Feedback Management & Troubleshooting
Getting Started, Integrated ALM, & Fast Feedback
Management, Software Quality, & Planning
Managing Project Requirements
Process Roles & Microsoft Solution Framework
Quality Validation & Project Management
Release Planning & Project Management
Scrum/Agile Processes

Core & Foundation-Level Learning

Agile DevOps Agile Development: Agile Processes for DevOps
DevOps Agile Development: DevOps Methodologies for Developers
Agile Software Development Agile Architecture, Design, & Collaboration
Agile Programming & Testing
Agile Software Development – Scrum
Agile Software Development Methodologies
Agile Test-Driven Development
Introduction to Agile Software Development
Managing Agile Software Development
Planning an Agile Software Development Project
DevOps CI/CD Implementation for DevOps
Deployment Approaches
Development Approaches
Development Methodologies
DevOps Corporate Impacts
DevOps for Data Scientists: Data DevOps Concepts
DevOps for Data Scientists: Data Science DevOps
DevOps for Data Scientists: Deploying Data DevOps
DevOps Mindset: DevOps Implementation Using Tools
DevOps Mindset: DevOps Principles & Implementation Approach
Management
Testing & Delivery
The Language of DevOps: DevOps Principles & Practices
The Language of DevOps: DevOps Tools & Processes
DevOps DevOps Smart Failure: Fail Fast & DevOps
DevOps Tools: Selecting the Right Tools
DevOps Cloud Automation: AWS DevOps Tools
DevOps Collaboration Tools: Tools for Continuous Delivery
DevOps Collaboration Tools: Tools for Continuous Integration

Cross-Platform Development

PhoneGap 0.9.2 Basic & Advanced Native API Features
Build & Debugging
CLI, Plugins, & Hooks
Installation
Sencha Ext JS 4.2.1 Application Creation
Techniques
Sencha Touch 2.3.1a Introduction
Techniques
Titanium 5.1.1 Components, Services, & APIs
Configuration
Creating an Application
Location Services, Testing, & Debugging
Visual Studio 2013 Code Sharing Options & Web Services
Cross-Platform Solutions in Visual Studio
Getting Started with Xamarin.Forms
iOS Projects in Visual Studio

Cucumber

Cucumber 3.0.1 Beginning Cucumber and Behavior-driven Development
Cucumber Steps and Scenario Development
Deep Dive Cucumber

Cybersecurity

Cryptography Cryptography: Introduction to Cryptography Services
Cryptography: Introduction to PKI
Cyber Security CompTIA Cybersecurity Analyst+: Cloud Computing
CompTIA Cybersecurity Analyst+: Exploits & Security Practices
CompTIA Cybersecurity Analyst+: Firewalls, IDS, & IPS
CompTIA Cybersecurity Analyst+: Identifying & Reducing Vulnerabilities
CompTIA Cybersecurity Analyst+: Malware & Digital Forensics
CompTIA Cybersecurity Analyst+: Monitoring Tools & Analytics
CompTIA Cybersecurity Analyst+: Network Concepts
CompTIA Cybersecurity Analyst+: Network Reconnaissance & Security Policies
CompTIA Cybersecurity Analyst+: Protecting Network Resources
CompTIA Cybersecurity Analyst+: Security Frameworks & Security Controls
CompTIA Cybersecurity Analyst+: Threat Management Documentation
CompTIA Cybersecurity Analyst+: Threat Management Incident Planning & Response
CompTIA Cybersecurity Analyst+: Threat Mitigation
LAB: CompTIA Cybersecurity Analyst
TestPrep: Cybersecurity Analyst+
Cybersecurity An Executive’s Guide to Security: Understanding Security Threats
Auditing & Incident Response
Session & Risk Management
Forensics Ethics & Privacy: Digital Forensics
Cryptographic Methods
Defining Cryptography
Encryption Use & Analysis
Modes of Operation & Algorithms

Data Analyst to Data Scientist

Amazon Web Services 2019 Data Lake Framework & Design Implementation
Data Lake Sources, Visualizations, & ETL Operations
Data Lakes on AWS
Data Silos, Lakes, & Streams Introduction
Apache Airflow 1.10 Building Data Pipelines
Apache Hadoop 2.9 Advanced Operations Using Hadoop MapReduce
Developing a Basic MapReduce Hadoop Application
Filtering Data Using Hadoop MapReduce
Hadoop & MapReduce Getting Started
Hadoop HDFS File Permissions
Hadoop HDFS Getting Started
Hadoop MapReduce Applications With Combiners
Introduction to the Shell for Hadoop HDFS
Working with Files in Hadoop HDFS
Apache Hive 2.3.2 Bucketing & Window Functions with Hive
Getting Started with Hive
Loading & Querying Data with Hive
Optimizing Query Executions with Hive
Using Hive to Optimize Query Executions with Partitioning
Viewing & Querying Complex Data with Hive
Apache Spark 2.3 Apache Spark Getting Started
Data Analysis using Spark SQL
Data Analysis Using the Spark DataFrame API
Big Data Applied Data Analysis
Data Compliance Issues & Strategies
Data Lake Architectures & Data Management Principles
Implementing Governance Strategies
Securing Big Data Streams
Cloud Architecture Cloud Data Architecture: Cloud Architecture & Containerization
Confluence Web Configuring Spaces
Setting Up & Managing Spaces
Signing in & Navigating within Spaces
Working with Spaces
Working with Team Members
Data Analyst Final Exam: Data Analyst
Data Architecture Data Architecture Getting Started
Scalable Data Architectures: Getting Started
Scalable Data Architectures: Using Amazon Redshift
Scalable Data Architectures: Using Amazon Redshift & QuickSight
Data BCP Data Rollbacks: Transaction Management & Rollbacks in NoSQL
Data Rollbacks: Transaction Rollbacks & Their Impact
Data Engineering Data Engineering Getting Started
Data Ops Data Ops Final Exam
Data Pipeline Data Pipeline: Process Implementation Using Tableau & AWS
Data Pipeline: Using Frameworks for Advanced Data Management
Data Research Data Research Exploration Techniques
Data Research Statistical Approaches
Data Research Techniques
Data Science Common Approaches to Sampling Data
Data Architecture Deep Dive –  Design & Implementation
Data Architecture Deep Dive – Microservices & Serverless Computing
Data Driven Organizations
Data Science Statistics: Applied Inferential Statistics
Data Science Statistics: Using Python to Compute & Visualize Statistics
Data Science Tools
Data Scientist Final Exam
Data Sources: Implementing Edge Data on the Cloud
Data Sources: Integration from the Edge
Harnessing Data Volume & Velocity: Turning Big Data into Smart Data
Inferential Statistics
Raw Data to Insights: Data Ingestion & Statistical Analysis
Raw Data to Insights: Data Management & Decision Making
Simple Descriptive Statistics
Streaming Data Architectures: An Introduction to Streaming Data in Spark
Streaming Data Architectures: Processing Streaming Data with Spark
The Four Vs of Data
Data Visualization Advanced Visualizations & Dashboards: Visualization Using Python
Advanced Visualizations & Dashboards: Visualization Using R
Delivering Dashboards: Exploration & Analytics
Delivering Dashboards: Management Patterns
Storytelling with Data: Introduction
Storytelling with Data: Tableau & PowerBI
Data Wrangler Data Wrangler Final Exam
Machine Learning Data Insights, Anomalies, & Verification: Handling Anomalies
Data Insights, Anomalies, & Verification: Machine Learning & Visualization Tools
Machine & Deep Learning Algorithms: Data Preperation in Pandas ML
Machine & Deep Learning Algorithms: Imbalanced Datasets Using Pandas ML
Machine & Deep Learning Algorithms: Introduction
Machine & Deep Learning Algorithms: Regression & Clustering
Machine Learning & Deep Learning Tools in the Cloud
Technology Landscape & Tools for Data Management
MongoDB 4.0 MongoDB Aggregation
MongoDB Querying
Node.js 10.15.1 Creating Data APIs Using Node.js
Python LAB: Data Visualization with Python
LAB: Data Wrangling with Python
LAB: Implementing Data Ops with Python
Python 3 Python – Advanced Operations with NumPy Arrays
Python – Introduction to NumPy for Multi-dimensional Data
Python – Introduction to Pandas and DataFrames
Python – Manipulating & Analyzing Data in Pandas DataFrames
Python – Pandas Advanced Features
Python – Using Pandas for Visualizations and Time-Series Data
Python – Using Pandas to Work with Series & DataFrames
Python for Data Science: Advanced Data Visualization Using Seaborn
Python for Data Science: Basic Data Visualization Using Seaborn
Python 3.7.1 LAB: Analyzing Data with Python
Recommendation System Data Recommendation Engines
RStudio 1.1.4 Cleaning Data in R
Data Exploration using R
Importing & Exporting Data using R
R Classification & Clustering
R Data Structures
R for Data Science: Data Visualization
R Regression Methods
Six Sigma Yellow Belt Six Sigma Measurement System Analysis
Slack for iOS Using the iOS App
Slack Web Configuring Slack
Creating, Finding & Sharing Information
Private Messaging & Communication Tools
Signing In & Setting Up
Using Channels
Tableau Desktop Tableau Desktop: Real Time Dashboards
Trifacta Wrangler Data Wrangling with Trifacta
Building a Culture of Design Thinking
Capturing the Attention of Senior Executives
Choosing the Right Interpersonal Communication Method to Make Your Point
Communicating Vision to Your Employees
Data Access & Governance Policies: Data Access Governance & IAM
Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
Developing a Growth Mind-set
Developing Your Business Acumen
Enabling Business Process Improvement
Innovating with Lean Product Management
Reaching Sound Conclusions
The Essential Role of the Agile Product Owner
Using Active Listening in Workplace Situations
Using Strategic Thinking to Consider the Big Picture

Data Compliance

Big Data Data Compliance Issues & Strategies
Implementing Governance Strategies
Data Access & Governance Policies: Data Access Governance & IAM
Data Access & Governance Policies: Data Classification, Encryption, & Monitoring

Data Engineer

Google Cloud 2018 APIs & Machine Learning
Dataflow Autoscaling Pipelines
Dataproc
Dataproc Architecture
Dataproc Operations
Deeper through GCP Analytics & Scaling
Fundamentals of Big Query
GCP Big Data & Security
GCP Engineering & Streaming Architecture
GCP Network Data Processing Models
Implementations with BigQuery for Big Data
Machine Learning with TensorFlow & Cloud ML
Platform Fundamentals
Storage & Analytics
Streaming Pipelines & Analytics

Data Integration

EAI Patterns EAI Patterns: Language & Transformation Patterns
EAI Patterns: Message Routing Pattern Implementation
EAI Patterns: Overview of Apache Camel
Talend 6.4.1 Data Mapping
Installation & Introduction
Job Orchestrations &  Process Automation
Transforming Data
EAI Patterns: EAI Fundamentals & Environment Setup

Data Science Core Concepts

Amazon Web Services 2019 Data Lake Framework & Design Implementation
Automation Automation Design & Robotics
Big Data Applied Data Analysis
Data Lake Architectures & Data Management Principles
Data Pipeline Data Pipeline: Process Implementation Using Tableau & AWS
Data Pipeline: Using Frameworks for Advanced Data Management
Data Research Data Research Exploration Techniques
Data Research Statistical Approaches
Data Research Techniques
Data Science Clustering, Errors, & Validation
Data Analysis Concepts
Data Architecture Deep Dive –  Design & Implementation
Data Architecture Deep Dive – Microservices & Serverless Computing
Data Communication & Visualization
Data Driven Organizations
Data Exploration
Data Filtering
Data Gathering
Data Integration
Data Science Overview
Data Science Tools
Data Sources: Implementing Edge Data on the Cloud
Data Sources: Integration from the Edge
Data Transformation
Estimates & Measures
Harnessing Data Volume & Velocity: Turning Big Data into Smart Data
Machine Learning Introduction
Math for Data Science & Machine Learning
Raw Data to Insights: Data Management & Decision Making
Streaming Data Architectures: An Introduction to Streaming Data in Spark
Streaming Data Architectures: Processing Streaming Data with Spark
The Four Vs of Data
DevOps DevOps for Data Scientists: Data DevOps Concepts
DevOps for Data Scientists: Data Science DevOps
DevOps for Data Scientists: Deploying Data DevOps
DevOps DevOps for Data Scientists: Containers for Data Science
RStudio 1.1.x Data Wrangling
Debugging
Domain-Specific Tools
LAB: Data Science Using R Lab
Programming Techniques

Data Visualization Core Concepts

Data Visualization Advanced Visualizations & Dashboards: Visualization Using Python
Advanced Visualizations & Dashboards: Visualization Using R
Delivering Dashboards: Exploration & Analytics
Delivering Dashboards: Management Patterns
Storytelling with Data: Introduction
Storytelling with Data: Tableau & PowerBI
Data Visualization Essentials
Graph & Charts

Data Warehousing

Apache Hive 2.3.2 Bucketing & Window Functions with Hive
Getting Started with Hive
Loading & Querying Data with Hive
Optimizing Query Executions with Hive
Using Hive to Optimize Query Executions with Partitioning
Viewing & Querying Complex Data with Hive
Azure 2018 Data Warehousing with Azure: Analytics & Reporting
Data Warehousing with Azure: Architecture & Modeling Techniques
Data Warehousing with Azure: Data Lake Implementation Using Azure
Data Warehousing with Azure: Implementing Azure SQL Data Warehouse
Data Warehousing with Azure: Managing Azure Data Lake
Data Warehousing with Azure: Working with SQL Data Warehouse Objects
Data Architecture Scalable Data Architectures: Getting Started
Scalable Data Architectures: Using Amazon Redshift
Scalable Data Architectures: Using Amazon Redshift & QuickSight
Data Warehouse Data Warehouse Essential: Architecture Frameworks & Implementation
Data Warehouse Essential: Concepts

Database Backup & Recovery

Oracle 12c Assessing Recovery Requirements
Backup & Recovery Options
Backup Strategies
Configuring Flashback Technologies
Data Transportation
Duplicating Databases
Failure & Recovery Concepts
Performing & Managing Backups
Performing PITR
Recovery & Availability
Recovery After Loss
Recovery Configuration
Secure Backup
Tuning RMAN
Using Flashback Technologies
SQL Server 2014 Backup & Recovery Strategies
Recovery & Backup
Recovery Implementation

Database Business Intelligence

SQL Server 2014 Availability & Configuration
BI Data Model Partitions
BI Project Deployment
BI Reporting & Analysis
BI Reporting Strategies
Data Warehousing & Business Intelligence Deployment
Data Warehousing & Business Intelligence Implementation
Designing BI Data Models
Designing BI Infrastructure
Extract, Transform, & Load
Implementing BI Infrastructure
Integration, Features, & Installation
MDX Performance
MDX Queries
Planning & Configuration
Planning BI Infrastructure
Preparing for BI Data Models
Recovery & Backup
LAB: Designing Business Intelligence Solutions with Microsoft SQL Server

Database Core Concepts

Data Architecture Data Architecture Getting Started
Data BCP Data Rollbacks: Transaction Management & Rollbacks in NoSQL
Data Rollbacks: Transaction Rollbacks & Their Impact
Data Engineering Data Engineering Getting Started
SQL Server 2014 Advanced SQL Queries
Components, Procedures, & Functions
Database Design
Database Security
DML & Multi-table Queries
LAB: Database Administration Fundamentals
Multiple SQL Tables
Normalization & Indexes
SQL Concepts & Queries
SQL Security Architecture
SQL Selecting, Ordering, & Filtering
SQL Tables
SQL Transaction Locks
SQL Transactions
SQL Views
Table Design: Functions & Strings
Table Design: Tables, Columns, & Numbers
Working with Data
Architecture Concepts
Concepts & Conceptual Design
Creating a Conceptual Design
LAB: Administering Microsoft SQL Server 2012 Databases
LAB: Developing Microsoft SQL Server 2012 Databases
LAB: Querying Microsoft SQL Server 2012
Logical & Physical Design
Logical Design
Normalization Concepts
Normalization Concepts & Forms
Relational Algebra & Calculus
SQL & Concurrency Concepts

Database Performance Tuning

Apache Hadoop 1.0 Cluster Performance Tuning
Performance Tuning Best Practices
Oracle 12c ADDM & ASH
Application Monitoring
Automatic Workload Repository
Implementing Performance Tuning
Introduction to Performance Tuning
Maintaining SQL Performance
Measuring SQL Performance
Memory Tuning Techniques
Metrics & Monitoring
Performance Tuning
Performance Tuning Methodology
Performance Tuning Summary
Performance, Migration, & Compression
SQL Diagnostics
SQL Memory Usage Tuning
Tuning Instance Memory
Tuning Problem SQL Statements

Database Security

Mongo 3.4.3 Replication & Security
Oracle 12c User Security Features & Configuration
PostgreSQL 9.4.5 Security & Administration
SQL Server 2014 SQL Security Architecture
SSIS Security
SQL Server 2016 Data Security & Azure SQL Database Options
Teradata 14 Authentication & Security
Communication & Database Security

DevOps Core Concepts

Agile DevOps Agile Development: Agile Processes for DevOps
DevOps Agile Development: DevOps Methodologies for Developers
DevOps Deployment Approaches
Development Approaches
Development Methodologies
DevOps Corporate Impacts
Management
Testing & Delivery
DevOps DevOps Smart Failure: Fail Fast & DevOps

DevOps Tools

Ansible DevOps with Ansible: Introduction to Playbooks & Testing
DevOps with Ansible: Overview
DevOps with Ansible: Working with Ansible Features
Ansible 2.8 Ansible: Ansible for DevOps Provisioning
Ansible: Continuous Delivery and Monitoring Using Ansible Playbook and Tower
Apache Subversion 1.9 Getting to Know Subversion
Apache Tomcat 7.0 Alternative Deployments & Tools
Building REST Applications
Configuring & Controlling Services
Fundamentals of Web Services & CXF
Introduction to Services
Security & Advanced Configurations
Chef 13.6.4 Chef: Getting Started
Community Cookbooks & Server Patterns
Server Basics
Test Driven Cookbooks
Chef 15.1 Chef for DevOps: Automate Infrastructure Using Chef Tools & Templates
Chef for DevOps: Managing Infrastructure Using Chef
DevOps CI/CD Implementation for DevOps
Deployment Approaches
Development Approaches
Development Methodologies
DevOps Automation: Configuration Management
DevOps Corporate Impacts
Management
Software Testing for DevOps: DevOps Test Tools
Software Testing for DevOps: Testing & DevOps Overview
Testing & Delivery
DevOps DevOps Tools: Selecting the Right Tools
Docker 1.6 Architecture & Technical Concepts
Clustering & Swarm
Containers & Images
Custom Metadata & Compose
Installation & Usage
Linking & Managing Data in Containers
Docker 1.8 Containers & Configuration
Docker Configuration & Management
Docker Machine & Security
Docker Machine APIs & VMs
HP LoadRunner 12 Enhancing Vuser Scripts
The Controller & Executing and Analyzing Scenarios
Working with Graphs & Reports
Working with VuGen
Jenkins 2.0 Administration
Creating Application Builds
Introduction
LAB: Jenkins
Testing & Continuous Integration
JMeter 3.3 Comprehensive JMeter Operations
JMeter Architecture & Operations
Performance Testing & JMeter
Puppet Puppet Refactoring Patterns
Puppet 3.4.3 Configuring Puppet Environments & Managing Files
Puppet 5.0 Building the Puppet Environment
Configuring the Puppet Master & Puppet Agent
Puppet 6.x Puppet for DevOps: Installing & Working with Puppet Components
Puppet for DevOps: Working with Puppet Bolt & Continuous Delivery for PE
Selenium 2.9.1 Advanced Features & Debugging
Introduction to Automated Testing with Selenium
Locating, Verifying, & Testing Elements
Scripts & Commands
Splunk 6.2.4 Administration
Alerts & Capacity Planning
Dashboards
Data Models & Pivot Reports
Fundamental Concepts
Indexer Clusters & Advanced Search
Indexes & Storage
Searching for Data & Saving Reports
Splunk: Getting Started
Visualizations & Charts
Team Foundation Server 2015 Configuring Team Foundation Server
Installing Team Foundation Server
Managing Collections & Health
Managing Connectivity & Workspaces
Managing Security & Reporting
Managing Team Builds
Managing Templates & Settings
Managing Versions, Recovery, & Labs
Managing Work Items
Vagrant 1.7.2 Boxes & Plugins
Commands, Share, & VM Provisioning
Getting Started with Vagrant
Networking, Synced Folders, & Clusters
Vagrant 1.8 Advanced Administration
Advanced Provisioning
Configuration, Automation, & Provisioning
Customization & Managing Infrastructure
WebLOAD 10.3.1 Implementing WebLOAD Solutions
Testing with WebLOAD
Working with WebLOAD
DevOps Automation: Delivery Mechanisms
Software Testing for DevOps: DevOps Testing Pipeline

Docker

Docker DevOps with Docker: Container Management
DevOps with Docker: Management in the Cloud
Docker 1.6 Architecture & Technical Concepts
Clustering & Swarm
Containers & Images
Custom Metadata & Compose
Installation & Usage
Linking & Managing Data in Containers
Docker 1.8 Containers & Configuration
Docker Configuration & Management
Docker Machine & Security
Docker Machine APIs & VMs
Docker 18.03.0-ce Containerize Microservices
Docker Containers, Images, & Swarms
LAB: Mastering Docker for DevOps
Managing Microservices on Docker Using Compose
Managing Stacks & Application Deployment
Scaling Up & Managing Microservices
Working with Docker Components
Docker 19.03 DevOps with Docker: Implementing DevOps Using Docker
Docker 19.03.1 Using Docker for DevOps: Configuring Docker for Continuous Delivery
Using Docker for DevOps: Introduction to Docker
Docker for Windows 17.09-ce Docker Installation and Management
Docker Integration
Docker Introduction
Docker Programmatic Access

Domain-Driven Design

Domain-driven Design Components of Domain-driven Design
Expanding Design Patterns
Introduction to Domain-driven Design
Knowledge Crunching, Building Blocks, & Contexts

Drupal

Drupal 8 Blocks, Views, Image Settings, & Sidebars
Drupal Content Types
Installation & Users

Eclipse

Eclipse 4.4 Eclipse: Creating Projects & Programs
Eclipse: Expansion
Eclipse: Installation & Development Platforms
Eclipse: Introduction & Customization
Eclipse: Working with Features
Eclipse: Working with Languages & Code
Eclipse: Working with Subversive
LAB: Fundamentals of Eclipse

Elasticsearch

Elasticsearch 6.2 Data Management
ELK Operations on the Cloud
Kibana & Reporting Capabilities
Logstash for Data Ingestion
Visualization Using Kibana

Ember.js

Ember.js 1.3.2 Introduction to Ember.js
Routes, Resources, & Controllers

Enterprise Architecture

TOGAF® 9 ADM Application & Architecture Content Framework
ADM Guidelines & Techniques
Architectural Artifacts & the Enterprise Continuum
Architecture Capability Basics
Architecture Capability Framework
Architecture Development Method (ADM) Cycle
Content Framework
Enterprise Architecture Basics
Enterprise Architecture Planning & Implementation
Enterprise Continuum
Reference Models
Security Architecture
Service Oriented Architecture (SOA) Governance

Enterprise Developer to Full Stack Developer

Asana Web Creating & Managing Projects
Finding & Sharing Items
Running Reports & Configuring Projects
Signing in & Setting up a Team
Using the Conversation Tools
Basecamp 3 Managing your Project Tasks & Assets
Setting Up & Tracking Projects
Signing In & Setting Up
Using Basecamp for iOS
Using the Calendar Tools
Using the Team Communication Tools
Confluence Web Configuring Spaces
Setting Up & Managing Spaces
Signing in & Navigating within Spaces
Working with Spaces
Working with Team Members
Convo Communication Tools
Configuring Convo
Creating, Finding, & Sharing Information
Sign-in & Setup
The Convo iOS App
Working with Groups
Full Stack Deploying FSD Projects: Deployment Overview
FSD Development: Java Spring Framework
FSD Front-end Development: Build Tools
FSD Front-end Development: Server Tools
FSD Front-end Development: Testing Tools
FSD Front-End Development: Using JavaScript Functions
FSD Getting Started: Introduction to Full Stack Development
FSD Programming Languages: FSD Back End & Miscellaneous Tools
FSD Programming Languages: FSD Front-end Primer
FSD Software Testing: Full Stack Developer Software Testing
Full Stack End-to-End Testing
RESTful Services for FSD: Building & Testing RESTful Services
Secure Full Stack Developer Programming
HTML5/CSS3 FSD Front-end Development: Advanced CSS Browser Features
FSD Front-end Development: Features of HTML5 & CSS3
JIRA 6.4.3 Introducing the JIRA Platform
Leveraging the JIRA Platform for Development Projects
MEAN stack MEAN for FSD Development: Introduction to the MEAN Stack
MEAN Stack Development
MERN stack MERN: Advanced MERN Development
The MERN Stack & FSD
Microsoft Teams Call & Meeting Tools
Conversation Tools
Creating, Finding, & Sharing Information
Sign-in & Setup
Teams & Channels
Python 3.7 FSD Development with Python: API Development in Flask
Slack for iOS Using the iOS App
Slack Web Configuring Slack
Creating, Finding & Sharing Information
Private Messaging & Communication Tools
Signing In & Setting Up
Using Channels
Trello Web Creating Teams & Boards
Finding & Sharing Information
Managing Cards
Sign-in & Setup
Yammer Web Collaborating & Communicating
Configuring Networks
Posting & Reacting to Status Updates
Setting Up
Using Groups
Building a Culture of Design Thinking
Building the Foundation for an Effective Team
Choosing the Right Interpersonal Communication Method to Make Your Point
Contributing as a Virtual Team Member
Data Infrastructure: Databases in FSD Development
Developing Your Business Acumen
Effective Team Communication
Embracing an Agile Culture for Business Growth
FSD Front-End Development: Frameworks
FSD Front-End Development: UI Development with ReactJS
FSD Front-End Development: Writing Code with jQuery
Full Stack Developer CI/CD
Leading a Cross-functional Team
Reaching Sound Conclusions
SQL in FSD Development
Understanding Unconscious Bias
Using Active Listening in Workplace Situations

Entity Framework

Microsoft Entity Framework 6.1.1 Advanced Entity Framework
Entity Data Models & Hierarchies
Entity Framework & LINQ to Entities
Entity Framework Tuning & Integration
Working with Entity SQL

Ethical Hacking

Certified Ethical Hacker v10 Ethical Hacker: Covert Data Gathering
Ethical Hacker: Password Attacks Part 2
Ethical Hacker: Privilege Escalation
Ethical Hacker: Cloud Computer Attacks
Ethical Hacker: Cloud Computing Concepts
Ethical Hacker: Common Web App Threats
Ethical Hacker: Common Web App Threats Part 2
Ethical Hacker: Cracking & Mobile Hacking
Ethical Hacker: Cryptography Attacks
Ethical Hacker: Cryptography Concepts
Ethical Hacker: Cryptography Concepts Part 2
Ethical Hacker: Cryptography Concepts Part 3
Ethical Hacker: Denial of Service
Ethical Hacker: Evading IDS, Firewall, & Honeypots
Ethical Hacker: Evading IDS, Firewall, & Honeypots Part 2
Ethical Hacker: Evading IDS, Firewall, & Honeypots Part 3
Ethical Hacker: Footprinting
Ethical Hacker: Hacking Concepts
Ethical Hacker: Hacking Web Servers
Ethical Hacker: Hidden Files & Covering Tracks
Ethical Hacker: Host Discovery & Scanning with Nmap
Ethical Hacker: IoT Attacks
Ethical Hacker: IoT Concepts
Ethical Hacker: IoT Hacking & Countermeasures
Ethical Hacker: Malware Distribution
Ethical Hacker: Malware Threats
Ethical Hacker: Network Sniffing
Ethical Hacker: Overview & Threats
Ethical Hacker: Password Attacks
Ethical Hacker: Pentesting, Laws, & Standards
Ethical Hacker: Practical Web App Hacking
Ethical Hacker: ProxyChains & Enumeration
Ethical Hacker: Security Controls
Ethical Hacker: Security Controls Part 2
Ethical Hacker: Session Hijacking
Ethical Hacker: Social Engineering
Ethical Hacker: SQL Injection
Ethical Hacker: SQL Injection Types & Tools
Ethical Hacker: Vulnerability Analysis Concepts & Tools
Ethical Hacker: Wireless Hacking Common Threats
Ethical Hacker: Wireless Hacking Concepts
Ethical Hacker: Wireless Hacking Tools
LAB: Certified Ethical Hacker v9
TestPrep: Certified Ethical Hacker

Exchange Server

Exchange  2016 Permissions, Configuration, & Collaboration
Exchange 2013 AD RMS and Security Solutions
Advanced Security Solutions
Compliance Solutions
Configuring Unified Messaging
DAG Networks & Datacenter Activation Coordination
Discovery Solutions
High Availability & Site Resilience
Introduction to Unified Messaging
LAB: Advanced Solutions of Microsoft Exchange Server 2013
Migrating Mailboxes & Public Folders
Migration & Federation
Site-resilience Planning & Configuration
Site-resilience Solutions
TestPrep: Advanced Solutions of Exchange Server 2013
Troubleshooting Mail Flow, Autodiscover, & Cmdlets
Troubleshooting Security, Connectivity, & Certificates
Exchange 2016 Client Access Services
Configuring Security
Deploying Mailbox Servers
Designing  Remote Access & Multiple Namespaces
LAB: Designing and Deploying Microsoft Exchange Server 2016
Mail Flow Architecture, Redundancy, & Resilience
Mail Flow Rules & Auditing
Message Records Planning & Configuration
Message Records Policies, Archiving, & Journaling
Migration & Federation
Migration & Sharing
Planning for Mailbox Servers
Planning Security Strategies
Planning, Configuration, & Collaboration
Recovery Strategies
Securing Remote Access
LAB: Core Solutions of Microsoft Exchange Server 2013

Express

Express 4.13.3 Installation, Express-generator, & API
Middleware & Sessions
Middleware, Routes, & HTTPS
Routing, Jade, & Views

F#

Visual Studio 2015 Asynchronous and Message-based apps & Data Visualization
Data, Workflows, & Charting
F#: Getting Started
Functional Types & Mutability
Interfaces, Inheritance, Classes, & Methods
Match Expressions, Records, & Data Queries
Object Oriented Programming

Full Stack Developer

Full Stack Deploying FSD Projects: Deployment Overview
FSD Development: Java Spring Framework
FSD Front-end Development: Build Tools
FSD Front-end Development: Server Tools
FSD Front-end Development: Testing Tools
FSD Front-End Development: Using JavaScript Functions
FSD Programming Languages: FSD Back End & Miscellaneous Tools
FSD Programming Languages: FSD Front-end Primer
FSD Software Testing: Full Stack Developer Software Testing
Full Stack Development: Business Logic & Persistence Layers
Full Stack Development: Introduction
Full Stack Development: Web Communications Layer
Full Stack End-to-End Testing
LAB: Full Stack Developer
RESTful Services for FSD: Building & Testing RESTful Services
Secure Full Stack Developer Programming
HTML5/CSS3 FSD Front-end Development: Advanced CSS Browser Features
FSD Front-end Development: Features of HTML5 & CSS3
MEAN stack MEAN for FSD Development: Introduction to the MEAN Stack
MEAN Stack Development
MERN stack MERN: Advanced MERN Development
The MERN Stack & FSD
Python 3.7 FSD Development with Python: API Development in Flask
Data Infrastructure: Databases in FSD Development
FSD Front-End Development: Frameworks
FSD Front-End Development: UI Development with ReactJS
FSD Front-End Development: Writing Code with jQuery
Full Stack Developer CI/CD
SQL in FSD Development

Full Stack Developer Bootcamps

Full Stack Full Stack Developer Bootcamp: Session 1 Replay
Full Stack Developer Bootcamp: Session 2 Replay
Full Stack Developer Bootcamp: Session 3 Replay
Full Stack Developer Bootcamp: Session 4 Replay
LAB: Full Stack Developer
Full Stack Development Full Stack Developer Bootcamp: Live Session 1
Full Stack Developer Bootcamp: Live Session 2
Full Stack Developer Bootcamp: Live Session 3
Full Stack Developer Bootcamp: Live Session 4

G Suite Administrator

G Suite 2016 Email & Calendar Management
Group & OU Management
Security, Service, & Mobile Device Management
Service Configuration & Management
User Management

GitHub

Git 2.16.1 Extension for Visual Studio
Introduction to Git
Working with Git
Working with GitHub
Git 2.22.0 Using Git for DevOps: Managing Conflict & Effectively Using Git Workflow
Using Git for DevOps: Using Git Effectively

Go

Go 1.5 Functions in Go
Go Language Basics

Google Cloud

G Suite 2016 Email & Calendar Management
Group & OU Management
Security, Service, & Mobile Device Management
Service Configuration & Management
User Management
Google Cloud 2017 CLI Cloud Resource Management
Cloud Basics
Cloud Design
Cloud Identity Management
Cloud Solution Management & Testing
Container, Compute, & App Engine
Data Storage
Google Cloud: Getting Started
Monitoring & Logging
Network Components
Programmatic Access
Security
Storage Solutions
Troubleshooting
Virtual Machine Configuration
Virtual Machine Deployment
Web Applications & Name Resolution
Google Cloud 2018 APIs & Machine Learning
Dataflow Autoscaling Pipelines
Dataproc
Dataproc Architecture
Dataproc Operations
Deeper through GCP Analytics & Scaling
Fundamentals of Big Query
GCP Big Data & Security
GCP Engineering & Streaming Architecture
GCP Network Data Processing Models
Implementations with BigQuery for Big Data
Machine Learning with TensorFlow & Cloud ML
Platform Fundamentals
Storage & Analytics
Streaming Pipelines & Analytics
Google Cloud SQL 2016 Connecting to Instances
Instance Creation
Instance Management
Interaction, Connections, & Management

Grunt

Grunt 4 Getting Started with Grunt
Grunt Performance, Plugins, & Tasks
Managing Visual Assets
Testing & Site Performance
Using Grunt

Gulp.js

Gulp.js 3.9 Introduction & Preparing the Environment
Managing HTML Assets, Servers, & Browsers
Preparing the Build Folder & Testing
Using Gulp.js Plugins for JavaScript Analysis

HP LoadRunner

HP LoadRunner 12 Enhancing Vuser Scripts
The Controller & Executing and Analyzing Scenarios
Working with Graphs & Reports
Working with VuGen

HTML5 & CSS3

CSS 3 Advanced Options & Responsive Web Design
Creating Styles & Styling Text
Extending CSS3 with Less
Extending CSS3 with Sass
Managing CSS with Scripts
Navigation Elements & Animations
Positioning & Layout
Styling Page Elements & Data
Working with Elements
Working with Forms
HTML5 Advanced Features of JavaScript, CSS3, & HTML5
Advanced HTML5 Techniques
Canvas Manipulation
Coding, Links, & Styling
CSS3 Navigation & Manipulation
CSS3 Selectors & Graphics
Date and Time, Text, Storage, & Objects
Events, Listeners, & Progress Tags
HTML5 & CSS3 Manipulation
HTML5 & JavaScript Manipulation
HTML5 and Advanced CSS3
HTML5 Form Data & Manipulation
HTML5 Forms
HTML5 Graphics & Canvas
HTML5 Layout
HTML5 Layout with CSS3
Images, Text, Tags, & Media
Introduction to HTML5
Introduction to HTML5 & CSS3
Introduction to HTML5 & JavaScript
Introduction to HTML5 APIs
Introduction to HTML5 Media
LAB: Introduction to Programming Using HTML and CSS
Visual Studio 2017 HTML5 with JavaScript & CSS3: Adaptive AI, Graphics, & Animation
HTML5 with JavaScript & CSS3: Advanced CSS
HTML5 with JavaScript & CSS3: Advanced HTML5 & CSS3
HTML5 with JavaScript & CSS3: Advanced Input Validation
HTML5 with JavaScript & CSS3: APIs &  Data Storage
HTML5 with JavaScript & CSS3: Data Flow, Consuming, & Transmitting Data
HTML5 with JavaScript & CSS3: HTML5 & Javascript
HTML5 with JavaScript & CSS3: Introduction
HTML5 with JavaScript & CSS3: Styling HTML5 & JavaScript
HTML5 with JavaScript & CSS3: WebSockets & Asynchronous Processing
LAB: Programming in HTML5 with JavaScript and CSS3

IBM BigInsights

IBM Big Insights Apache Hadoop 4.1 Analyzing, Querying, & Extracting Big Data
Architecture & Features
Fundamentals

IBM WebSphere

WebSphere 8.0.3.1 Business Logic & WebSphere Management Center
Commerce Basics
Commerce Development
Customization
Managing WebSphere Commerce
Search & Application Development
Testing Fundamentals
Troubleshooting, Performance, & Security
WebSphere Commerce Installation
WebSphere Structure & JSP Programming

Information Security Manager

CISM Information Risk Management Part I
Information Risk Management Part II
Information Security Governance Part I
Information Security Governance Part II
Information Security Incident Management Part I
Information Security Incident Management Part II
Information Security Program Development Part I
Information Security Program Development Part II
TestPrep: Certified Information Security Manager

Information Security Operations

CISSP 2015 LAB: Certified Information Systems Security Professional (CISSP)
(ISC)² & Security Fundamentals
Access Controls
CISSP: Risk Management
CISSP: Security
Communication & Network Security
Conducting Incident Management
Configuring Cloud Security
Cryptographic Client-based Systems
Identity and Access Management (IAM)
Incident Response & Recovery
Monitoring & Reporting
Network & Communications Security
Security Administration
Security Architecture and Engineering
Security Assessment & Testing
Security Operations
Security Operations
Site & Facility Security Controls
Software Development Security
SSCP: Cryptography
SSCP: Risk Management
System Security Certified Practitioner (SSCP 2018): Asset & Change Management
System Security Certified Practitioner (SSCP 2018): Business Continuity
System Security Certified Practitioner (SSCP 2018): Controlling Resource Access
System Security Certified Practitioner (SSCP 2018): Cryptography Primer
System Security Certified Practitioner (SSCP 2018): Digital Forensics
System Security Certified Practitioner (SSCP 2018): Identity Management
System Security Certified Practitioner (SSCP 2018): Malware & Endpoint Security
System Security Certified Practitioner (SSCP 2018): Network Fundamentals
System Security Certified Practitioner (SSCP 2018): Network Security
System Security Certified Practitioner (SSCP 2018): Public Key Infrastructure
System Security Certified Practitioner (SSCP 2018): Risk Management
System Security Certified Practitioner (SSCP 2018): Securing Environments
System Security Certified Practitioner (SSCP 2018): Security Assessments
System Security Certified Practitioner (SSCP 2018): Security Concepts
System Security Certified Practitioner (SSCP 2018): Security Controls
Systems & Application Security
Vulnerability Assessment & Mitigation

Information Systems Auditing

CISA 2016 Benefits, Practices, & Business Application Systems
Control Self-assessment (CSA) & Finalizing an Audit
Development, Maintenance, & Auditing
Governance, Strategy, Value, & Policies
Information Asset Security
Information Security Management
Information Systems Maintenance & Service Management
Information Systems Operations Management
IS Auditing
IS Controls
IT Governance & Management
Network Infrastructure Security
Performing an Audit
Protection of Information Assets
Risk & IT Management
TestPrep: Certified Informations Systems Auditor (CISA 2016)
Certified Information Systems Auditor (CISA) 2019: BCP & Network Security
Certified Information Systems Auditor (CISA) 2019: Continuous Monitoring
Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk
Certified Information Systems Auditor (CISA) 2019: Data Storage & Malware
Certified Information Systems Auditor (CISA) 2019: Digital Asset Protection
Certified Information Systems Auditor (CISA) 2019: Digital Evidence Gathering
Certified Information Systems Auditor (CISA) 2019: IAM & Data Classification
Certified Information Systems Auditor (CISA) 2019: Information System Auditing
Certified Information Systems Auditor (CISA) 2019: IT Management Frameworks
Certified Information Systems Auditor (CISA) 2019: Performance & Management
Certified Information Systems Auditor (CISA) 2019: PKI & Data Protection
Certified Information Systems Auditor (CISA) 2019: Scenario-Based Practice
Certified Information Systems Auditor (CISA) 2019: System Design & Analysis
Certified Information Systems Auditor (CISA) 2019: Testing & Vulnerability
Certified Information Systems Auditor (CISA) 2019: Virtualization & Cloud

Internet of Things

Internet of Things Arduino Language
Azure IoT Hub
Cloud Implementation Using Azure IoT
MicroPython & Security
MicroPython Board
Principles of IoT & Python Basics
Raspi-config & GPIO
Using Raspberry Pi & OpenCV
Internet of Things Applications
Internet of Things Hardware
Internet of Things Hardware Overview
Internet of Things Overview

Ionic

Ionic 1.2 Advanced Features of Ionic JavaScript & CLI
Exploring Ionic JavaScript Basics, Layouts, & Navigation
Fundamentals of the Ionic Framework
Working with CSS Layouts & the Ionic Framework CLI

iOS Development

iOS Fuzzing, Defense, & Return-oriented Programming
iOS Architecture & Data Protection
iOS Sandbox & Enterprise Security
Security, Access Control, Provisioning, & Code Signing
iOS 10 App Settings, Data Persistence, iCloud, & CloudKit
App Structure & State Transitions
Background Processing
Controls & Images
Creating a Basic App
Deployments, Multitasking, Localizing, & Testing
Extending an App
Graphics, Animation, Gaming, & Media
iOS 10 Features
Layout & Controls
Responders, Delegates, Playgrounds, & Projects
Sharing, Connecting, & Searching
Siri, Speech Recognition, Search, & Proactive Suggestions
Touch, Motion, & the Core Location API
Working with Storyboards
Working with Views & Collections
iOS 12 iOS 12 Development: Augmented Reality & HealthKit
iOS 12 Development: Best Practices in iOS Security
iOS 12 Development: Testing & Error Handling
iOS 12 Development: Working With Data & Gestures
iOS 12 Development: Working With Layout & Controls in iOS
iOS SDK 8.3 Developing Basic Apps
Interface Customization & Advanced Features
Navigation, WatchKit Guidelines, & User Input
Working with Glances & Notifications
iOS 12 Development: Getting Started with Xcode & iOS

iRise

iRise 8.12 Conditional Logic & Reusable Content
Dynamic Simulations
Editor Basics
Prototyping
Reusable Components & iRise Administration
Screens & Data Tables

ISTQB Agile Tester Foundation Level Extension

Agile Methodologies
Techniques & Tools
Testing Approaches
TestPrep: Agile Tester Foundation Extension

ISTQB Agile Tester Foundation Level Extension (CTFL)

Agile Methodologies
Techniques & Tools
Testing Approaches
TestPrep: Agile Tester Foundation Extension

ISTQB Certified Tester Foundation Level

Software Testing Foundation 2018: Black-box & White-box Testing Techniques
Software Testing Foundation 2018: Fundamentals
Software Testing Foundation 2018: Risk & Defect Management
Software Testing Foundation 2018: Static Testing
Software Testing Foundation 2018: Test Management
Software Testing Foundation 2018: Test Monitoring & Control
Software Testing Foundation 2018: Test Process Fundamentals
Software Testing Foundation 2018: Test Tool Support
Software Testing Foundation 2018: Test Types & Maintenance Testing
Software Testing Foundation 2018: Testing & the Software Development Lifecycle
Software Testing Foundation 2018: Testing Techniques

ISTQB Certified Tester Foundation Level (CTFL)

Software Testing Foundation 2018: Black-box & White-box Testing Techniques
Software Testing Foundation 2018: Fundamentals
Software Testing Foundation 2018: Risk & Defect Management
Software Testing Foundation 2018: Static Testing
Software Testing Foundation 2018: Test Management
Software Testing Foundation 2018: Test Monitoring & Control
Software Testing Foundation 2018: Test Process Fundamentals
Software Testing Foundation 2018: Test Tool Support
Software Testing Foundation 2018: Test Types & Maintenance Testing
Software Testing Foundation 2018: Testing & the Software Development Lifecycle
Software Testing Foundation 2018: Testing Techniques

IT Hardware Technician

A+ 2017 TestPrep: CompTIA A+ 220-901
BIOS & Motherboards
Broadband Routers
CLI, Troubleshooting, & Batteries
CompTIA A+ (220-901): Networking
CompTIA A+ (220-901): Troubleshooting Printers
CompTIA A+: Accessories & Mobile Device Synchronization
CompTIA A+: Basic Cable Types
CompTIA A+: Cloud Computing
CompTIA A+: Common Devices
CompTIA A+: Configuring a Wired/Wireless Network
CompTIA A+: Connectors
CompTIA A+: Custom PC configuration
CompTIA A+: Implementing Network Concepts
CompTIA A+: Installing Hardware & Display Components
CompTIA A+: Laptops Features & Mobile Device Types
CompTIA A+: Mobile Device Network Connectivity & Application Support
CompTIA A+: Network Hosts
CompTIA A+: Network Types
CompTIA A+: Networking
CompTIA A+: Networking Tools
CompTIA A+: Power Supplies
CompTIA A+: Printers
CompTIA A+: Random Access Memory
CompTIA A+: Resolving Problems
CompTIA A+: SOHO Devices
CompTIA A+: Storage Solutions
CompTIA A+: TCP & UDP ports
CompTIA A+: Troubleshooting
CompTIA A+: Troubleshooting Printers
CompTIA A+: Virtualization
CompTIA A+: Wireless Networking Protocols
CompTIA A+: Working with Motherboards, CPUs, & Add-On Cards
CompTIA A+: Working with Peripheral Devices
Computer Form Factors
Computer Hardware Troubleshooting
Connectors & Cables
Connectors & Connections
Display Devices
Exploring RAM
Internet Connections
Internet Connectivity
Introduction to CPUs
Introduction to Mobile Computing
Introduction to Networking
Introduction to Printers
Laptops
Memory & Storage
Mobile Computing Hardware
Mobile Devices
Monitors, Cables, & Devices
Motherboards
Network Cabling
Network Protocols
Networking Hardware
Optical Storage, Flash Memory, & RAID
PC Components
Peripheral Devices
Portable Computer Hardware
Power Supplies & Connectors
Printer Maintenance
Printer Networking
Printers
Startup
Startup Monitoring & Security
Storage Maintenence
Troubleshooting Networking Devices
Wireless Networking

IT Software Technician

Adding Hardware to Windows & Storage
Common Troubleshooting & Security
CompTIA A+ (220-902): Operational Procedures
CompTIA A+ (220-902): Troubleshooting
CompTIA A+ (220-902): Windows Networking
CompTIA A+: Application Installation, Networking, & Tools
CompTIA A+: Comparing Common Operating Systems
CompTIA A+: Critical Security Concepts
CompTIA A+: Microsoft Command Line Tools
CompTIA A+: Microsoft Operating System Installation & Upgrade
CompTIA A+: MS Operating System Administrative Tools
CompTIA A+: Operational Procedures
CompTIA A+: Operational Procedures Best Practices
CompTIA A+: Security Fundamentals
CompTIA A+: Software Troubleshooting
CompTIA A+: System Utilities
CompTIA A+: Windows Control Panel Utilities
CompTIA A+: Windows Networking
Configuring Windows Networking
Desktop Security
Introduction to Basic Security
Introduction to Mobile Operating Systems
Introduction to Other OSs
Introduction to Virtualization
Introduction to Windows
LAB: CompTIA A + 220-902
LAB: CompTIA A+ 220-1002
Mac OS X & Linux
Mobile Troubleshooting
Monitoring the Windows OS
Non-desktop Technologies
Non-Windows Operating Systems
Practical Mobile Troubleshooting
Practical PC Troubleshooting
Safety Procedures
Shell Commands for Linux & Mac OS X
TestPrep: CompTIA A+ 220-902
Using & Managing Windows
Windows Applications & Features
Windows Features & Tools
Windows Installation
Windows Interaction & Personalization
Windows Management
Windows Overview
Windows Security & Account Management
Windows Security Features
Windows Threat Management
Windows Utilities

ITIL®

ITIL® 2011 ITIL® Continual Service Improvement
ITIL® Service Design Concepts
ITIL® Service Design Processes
ITIL® Service Operation Concepts
ITIL® Service Operation Processes
ITIL® Service Strategy Concepts
ITIL® Service Strategy Processes
ITIL® Service Transition Concepts and Processes
Overview of the ITIL® Service Lifecycle
TestPrep: ITIL Foundation
ITIL® 4 ITIL® 4 Foundation: General Management Practices
ITIL® 4 Foundation: Introduction
ITIL® 4 Foundation: Key Concepts
ITIL® 4 Foundation: Key Concepts of Service Management
ITIL® 4 Foundation: Service Management Practices (Part 1)
ITIL® 4 Foundation: Service Management Practices (Part 2)
ITIL® 4 Foundation: The Guiding Principles
ITIL® 4 Foundation: The Service Value Chain
ITIL® 4 Foundation: The Service Value System

ITIL® Foundation

ITIL® 2011 ITIL® Continual Service Improvement
ITIL® Service Design Concepts
ITIL® Service Design Processes
ITIL® Service Operation Concepts
ITIL® Service Operation Processes
ITIL® Service Strategy Concepts
ITIL® Service Strategy Processes
ITIL® Service Transition Concepts and Processes
Overview of the ITIL® Service Lifecycle
TestPrep: ITIL Foundation
ITIL® 4 ITIL® 4 Foundation: General Management Practices
ITIL® 4 Foundation: Introduction
ITIL® 4 Foundation: Key Concepts
ITIL® 4 Foundation: Key Concepts of Service Management
ITIL® 4 Foundation: Service Management Practices (Part 1)
ITIL® 4 Foundation: Service Management Practices (Part 2)
ITIL® 4 Foundation: The Guiding Principles
ITIL® 4 Foundation: The Service Value Chain
ITIL® 4 Foundation: The Service Value System
TestPrep: ITIL® 4 Foundation

Jasmine

Jasmine 2.3.4 Deploying & Using Jasmine
Working with Jasmine Spies & Using Jasmine with Node.js

Java

Java 11 REST API with Java: Java APIs with JSON, Maven, & Spring
REST API with Java: REST APIs with POSTMAN & CRUD
REST API with Java: Spring Boot with Java
REST API with Java: Spring JPA & Apache Derby
Java EE 7 Back-end Apps: : Bean Validation
Back-end Apps: : Java Persistence
Back-end Apps: Concurrency
Back-end Apps: Contexts & Dependency Injection (CDI)
Back-end Apps: Getting Started
Back-end Apps: Java Message Service (JMS)
Back-end Apps: JNDI & EJB
Back-end Apps: Message-driven Beans
Back-end Apps: Security
Back-end Apps: SOAP Web Services with JAX-WS
Back-end Apps: Timers & Batch Processing
Back-end Apps: Transactions Overview
Back-end Apps: XML Programming with JAXB
Front-end Apps: Data Persistence
Front-end Apps: HTML5 Applications with JavaScript
Front-end Apps: JAX-RS Web Services
Front-end Apps: POJO, EJB, & EJB Lite
Front-end Apps: Presentation with JSF
Front-end Apps: RESTful Services & Clients
Front-end Apps: Servlets & JavaServer Pages
Front-end Apps: Transaction Support
Front-end Apps: Web Components
Front-end Apps: WebSockets & Security
Java Beans, Logging, Annotations, & Method Chaining
Java EE 7: Getting Started
Packaging Applications & Logging
Java Hibernate 4.3 Advanced Querying in Java Hibernate
Basic Querying in Java Hibernate
Customized Mapping in Java Hibernate
Debugging in Java Hibernate
Getting Started with Java Hibernate
Mapping Data
Java Hibernate 5 Java Hibernate: Getting Started
Java Hibernate: Queries & Oracle Manipulations
Java Hibernate: Working with Hibernate
Java ME 8.3 Programming in the IoT Arena
Java SE 11 Java SE 11 Programmer II: Class Concepts & Managing Exceptions
Java SE 11 Programmer II: Concurrency Management
Java SE 11 Programmer II: Core Java Libraries
Java SE 11 Programmer II: Database Applications
Java SE 11 Programmer II: Functional Programming in Java
Java SE 11 Programmer II: Fundamental Language Enhancements
Java SE 11 Programmer II: Fundamentals
Java SE 11 Programmer II: Generics & Collections in Java
Java SE 11 Programmer II: Implementing NIO.2
Java SE 11 Programmer II: Lambda Operations & Streams
Java SE 11 Programmer II: Localization in Java
Java SE 11 Programmer II: Object-oriented Programming in Java
Java SE 11 Programmer II: Secure Coding in Java SE 11 Applications
Java SE 11 Programmer II: Streams & Pipelines
Java SE 11: Encapsulation
Java SE 11: Exception Handling
Java SE 11: Expressions, Arrays, & Loops
Java SE 11: Flow Control & Debugging
Java SE 11: Inheritance, Lists, Inference, & Lambda Expressions
Java SE 11: Inheritance, Polymorphism, & Abstraction
Java SE 11: Introduction to Java SE & the NetBeans IDE
Java SE 11: JDK Objects & Nested Loops
Java SE 11: JShell
Java SE 11: Modular Design
Java SE 11: Objects & Classes
Java SE 11: Strings & Primitive Data Types
Java SE 11: Variables & Operators
Java SE11 Programmer II: Arrays & Program Flow Control
Java SE 6 Classes, Objects, & Packages
Exceptions, Utilities, I/O, & JDBC
Generics, Annotations, Reference Types, & Threading
Operators & Flow Control
Java SE 7 Exceptions, Assertions, Utilities, & File I/O
Generics, Annotations, & Reference Types
Java Building Blocks
Operators & Flow Control
The JDBC API & Localization
Java SE 8 Class Structure & Encapsulation
Classes & Objects
Classes, Data Types & Regular Expressions
Classes, Interfaces, & Lambda Expressions
Concurrency & Parallelism
Conditions & Arrays
Data Manipulation
Deployment & Application Enhancement
Encapsulation & Overloaded Constructors
Exceptions & Deployment
Inheritance, Interfaces, & Deployment
Interfaces, Lambda Expressions, Collections, & Generics
Introduction to Java
Methods & Conditionals
Operators & Conditionals
Path Interface, Files Class, & Stream API
Polymorphism & Abstraction
The JDBC API & Localization
Working with Exceptions
Working with File I/O
Working with Inheritance
Working with Interfaces
Working with the Date/Time API
Working with Variables
Java Spring 3.6 Annotations
Autowiring
Basic Database Operations
Component Scanning & Java-Based Configuration
Configuring XML
Creating Web Applications with MVC
Data Access Using JDBC
Designators
Exceptions, Updates, Transactions, & SimpleJdbc Classes
Introduction to AOP
MVC Application Features
MVC Controller Handler Methods
MVC Web Forms
Pointcuts
Security Using JSP Tags & Expressions
Spring Application Basics
Spring Expression Language
Spring Security & Database Security
Working with Advice
Oracle WebLogic 12.2.1.1 Configuring Multi Tenancy
Java Multi-Tenant Cloud Application Programming
RxJava 2.1.9 Introduction to Reactive Programming
Reactive Programming Methods
LAB: Developing Microservices Using Java and Spring Cloud

JavaScript Core Concepts

ECMAScript 2017 JavaScript Front-end Development: Data, Decision Making, & Arrays
JavaScript Front-end Development: Development Basics
JavaScript Front-end Development: Errors, Events, Objects, & New Features
JavaScript Front-end Development: Frameworks
JavaScript Front-end Development: Functions & Objects
JavaScript Front-end Development: Fundamentals
Objects & Event Handlers
Operators, Arrays, & Functions
ECMAScript v5 LAB: Introduction to Programming Using JavaScript
JavaScript Frameworks Introduction to Popular Frameworks
jQuery & TypeScript
ReactJS & Grunt
Web Application Libraries
JSON 1.8 APIs & Output
JSON Essentials
Sencha Ext JS 4.2.1 Application Creation
Techniques
Sencha Touch 2.3.1a Introduction
Techniques
Visual Studio 2013 Adding Views and View Navigation in Durandal
Connecting to Data
Durandal Modules & Lifecycle events
EntityFramework & ASP.NET
JavaScript SPA: Getting Started
Managing Application Data
Managing Data
Retrieving, Querying, & Mapping Rich Application Data
Views & Routes
Working with Rich Application Data
Working With Validation
LAB: JavaScript Front End Development

Jenkins

Jenkins 1.62 Jenkins: Getting Started
Jobs, Security, & Run Options
Jenkins 2.0 Administration
Creating Application Builds
Introduction
LAB: Jenkins
Testing & Continuous Integration
Jenkins 2.176 Jenkins for DevOps: Automated Testing & Advanced Jobs Using Jenkins
Jenkins for DevOps: Jenkins Configuration for DevOps

JIRA

JIRA 6.4.3 Introducing the JIRA Platform
Leveraging the JIRA Platform for Development Projects

JQuery

jQuery 1.10.1 Advanced Features & Functions
Basic Setup and Features
Selecting in jQuery and Basic Animation
UI Features and Functions
Using Essential Features and Functions
Working with Events
jQuery 3.1.1 Advanced Features
Advanced Selecting & ThemeRoller
Advanced UI Widgets
Common Widgets & Animation
Creating Widgets
Element Manipulation & AJAX
Event Handling
Functions & Classes
Getting Started & Manipulating Elements
LAB: Advanced jQuery
LAB: jQuery Essentials
Working with Plugins
Jquery Mobile 1.4.2 jQuery Mobile: Working with PhoneGap APIs
Mobile API & Service Integration
Mobile App Basics
Mobile Forms
Mobile Lists, Sets & Tables
Mobile Styling & Themes
Mobile UI Control, Navigation Elements, & Page Optimization
PhoneGap App Deployment & the InAppBrowser API
PhoneGap Location, Notification, & Media APIs

JsRender

JsRender Allowing JavaScript & Data Binding
Custom Tags, Converters, & Helper Functions
Getting Started & Using Tags
Using Templates & jsRender Paths
Working with Data, AJAX, & External Templates

Juniper

Juniper Commands
Devices & Architecture
Firewall Filters
Initial Configuration
Junos OS Fundamentals
Maintenance & Troubleshooting
Network Devices
Networking Fundamentals
Routing Configuration
Routing Fundamentals
Routing Policies
User & Interface Configuration

Juniper Networks Certified Associate – Junos (JNCIA-Junos)

Juniper Commands
Devices & Architecture
Firewall Filters
Initial Configuration
Junos OS Fundamentals
Maintenance & Troubleshooting
Network Devices
Networking Fundamentals
Routing Configuration
Routing Fundamentals
Routing Policies
User & Interface Configuration

Junit

Junit 4 Fundamentals
Working with Tests

Justinmind

Justinmind 7.1.1 Account Creation & Navigation
Adding Elements & the Mobile Application
Complex Prototypes
Creating a Prototype & Using Menus
Installation & Configuration
Interface Elements

Kanban

Kanban Lean Concepts, Tools, & Strategies for Kanban Projects
Using Kanban in IT & Software Development

Kendo

Kendo HTML Helpers for ASP.NET MVC
Installation & Overview
Other HTML Helpers for ASP.NET MVC
The Mobile API
Working with the Web UI & Widgets

Knockout

Knockout 3.1.0 Advanced Knockout Techniques
Configuring Forms
Getting Started & Using Observables
HTML Controls, Bindings, & Collections
KO Mapping Plugin & AMD
Text & Flow Control
Working with Knockout

Kotlin

Kotlin 1.2 IDEs
Introduction
Loops & Functions
Objects & Classes
Syntax

Kubernetes

Kubernetes 1.9 Kubernetes APIs & Components
Kubernetes Clusters
Kubernetes Concepts & Controllers
Kubernetes Introduction
Running Kubernetes on Google Cloud Platform

LAMP

Linux Building Dynamic Web Sites with MySQLi
Building Dynamic Web Sites with PDO
Installing Linux & Apache
Installing MySQL & PHP Packages

Languages

ANSI C C11 Basics, Data Types, Constants, & Variables
Common Functions
Data Structures
Functions, Storage Classes, & Data Modifiers
Looping & Functions
Operators, Conditional Statements, & Branching
The C Preprocessor & Optimization
Unions & File Management
Go 1.5 Functions in Go
Go Language Basics
Python 3 Applications
Classes
Collections, Mapping, & Looping
Comprehensions
Data & Sequence Types
Data Processing
Data Science Fundamentals
Exceptions
Fundamentals
Iterables & Generators
LAB: Python Fundamentals
Modules & Functions
Python: Getting Started
Test-driven Development
The Django Framework
The TurboGears & Flask Frameworks
Web2py Overview
Working with Files
Ruby on Rails 4.2 Active Jobs & Action Mailer
ActiveRecords
API Advanced Features
APIs
Asset Pipelines, Caching, & Advanced Setup
Configuration, Scaffolding, & Routing
Helpers, Authentication, & Authorization
Migrations & ActionController
Testing
Validations, Scopes, & Callbacks

Linux Administration

Linux Advanced GNU & Unix Commands
CompTIA Linux+: Backup & Restore
CompTIA Linux+: Boot Process & Kernel
CompTIA Linux+: Bourne-again Shell & Scripting
CompTIA Linux+: File Access & Permissions
CompTIA Linux+: Git Version Control
CompTIA Linux+: Graphical User Interfaces
CompTIA Linux+: Installing & Managing Software
CompTIA Linux+: Installing CentOS
CompTIA Linux+: Installing Software from Source Code
CompTIA Linux+: Installing Ubuntu
CompTIA Linux+: Introduction to Linux & the Command Line
CompTIA Linux+: Locating & Manipulating Files
CompTIA Linux+: Logical Volumes & Filesystem Hierarchy
CompTIA Linux+: Managing & Configuring Hardware
CompTIA Linux+: Managing Services
CompTIA Linux+: Managing Users & Groups
CompTIA Linux+: Network Firewall & Traffic Filtering
CompTIA Linux+: Scheduling Tasks
CompTIA Linux+: Searching& Manipulating File Contents
CompTIA Linux+: SELinux & AppArmor
CompTIA Linux+: TCP/IP & Networking
CompTIA Linux+: Troubleshooting Network Connections
CompTIA Linux+: Troubleshooting Services
CompTIA Linux+: Using vi/vim to Edit Files
Essential System Services
File Permissions & Links
GNU & Unix Commands
GUIs & Configuration
Introduction to Devices & File Systems
Introduction to System Architecture
LAB: CompTIA Linux + LX0-103
LAB: CompTIA Linux + LX0-104
LAB: CompTIA Linux+ XK0-004
Linux Installation
Network Services Management
Networking Fundamentals
Package Management
Scripting & Administrative Tasks
System Booting & Shutdown
TestPrep: CompTIA Linux+ LX0-103
TestPrep: CompTIA Linux+ LX0-104
Unix Input, Output, & Piping
Users, Groups, & Environment Variables
linux CompTIA Linux+: Security Best Practices
Red Hat Enterprise Linux 7 Archiving
Bash Script Programming
Bash Scripting
Boot Process
Configuring Gnome
Directory Services
File Management
File Permissions
File Systems & Partitions
Firewalls
Installation
Job Scheduling
Kickstart & First-run Issues
Logging
Logical Volume Management
Network File Systems
Network Services
Networking
Package Management
Processes, Services, & Daemons
Remote Access
SELinux
Troubleshooting
User & Group Management
Using grep
Using Linux Shells
Using the Bash Shell
Virtualization
Ubuntu 14.04 Command Line Utilities
Tools & File Sharing
Ubuntu: Getting Started
Users & Permissions
Web Administration Tools
CompTIA Linux+: Disk Partitions & File Systems

Logging

Splunk 6.2.4 Administration
Alerts & Capacity Planning
Dashboards
Data Models & Pivot Reports
Fundamental Concepts
Indexer Clusters & Advanced Search
Indexes & Storage
Searching for Data & Saving Reports
Splunk: Getting Started
Visualizations & Charts
Splunk 7.03 Data Analysis

LoopBack

LoopBack 2 Built-in Models, Customization, & Validation
Data Sources, Models, & Authentication
Framework & APIs
Remote Methods, Events, & Filters

LPIC-1: System Administrator

Linux Advanced GNU & Unix Commands
Essential System Services
File Permissions & Links
GNU & Unix Commands
GUIs & Configuration
Introduction to Devices & File Systems
Introduction to System Architecture
LAB: CompTIA Linux + LX0-103
LAB: CompTIA Linux + LX0-104
LAB: CompTIA Linux+ XK0-004
Linux Installation
Network Services Management
Networking Fundamentals
Package Management
Scripting & Administrative Tasks
System Booting & Shutdown
TestPrep: CompTIA Linux+ LX0-103
TestPrep: CompTIA Linux+ LX0-104
Unix Input, Output, & Piping
Users, Groups, & Environment Variables

Lync Server

Lync Server 2013 Administration Features
Data Resiliency
Deployment & Configuration
Operations Management

Machine Learning

Bayesian statistics Bayesian Methods: Advanced Bayesian Computation Model
Bayesian Methods: Bayesian Concepts & Core Components
Implementing Bayesian Model and Computation with PyMC
Java SE 8 AI Fundamentals
Expert Systems & Reinforcement Learning
Machine Learning Implementation
Neural Network & Neuroph Framework
Neural Network & NLP Implementation
Keras 2.2.4 Deep Learning with Keras
Machine Learning Advanced Reinforcement Learning: Implementation
Advanced Reinforcement Learning: Principles
Applied Deep Learning: Generative Adversarial Networks and Q-Learning
Applied Deep Learning: Unsupervised Data
Applying Machine Learning
Building ML Training Sets: Introduction
Building ML Training Sets: Preprocessing Datasets for Classification
Building ML Training Sets: Preprocessing Datasets for Linear Regression
Convolutional and Recurrent Neural Networks
Enterprise Architecture: Architectural Principles & Patterns
Enterprise Architecture: Design Architecture for Machine Learning Applications
Enterprise Services: Enterprise Machine Learning with AWS
Enterprise Services: Machine Learning Implementation on Google Cloud Platform
Enterprise Services: Machine Learning Implementation on Microsoft Azure
Implementing Deep Learning: Optimized Deep Learning Applications
Implementing Deep Learning: Practical Deep Learning Using Frameworks & Tools
Introduction to Machine Learning & Supervised Learning
Machine & Deep Learning Algorithms: Data Preperation in Pandas ML
Machine & Deep Learning Algorithms: Imbalanced Datasets Using Pandas ML
Machine & Deep Learning Algorithms: Introduction
Machine & Deep Learning Algorithms: Regression & Clustering
Machine Learning & Deep Learning Tools in the Cloud
ML Algorithms: Machine Learning Implementation Using Calculus & Probability
ML Algorithms: Multivariate Calculation & Algorithms
ML/DL Best Practices: Building Pipelines with Applied Rules
ML/DL Best Practices: Machine Learning Workflow Best Practices
Model Management: Building & Deploying Machine Learning Models in Production
Model Management: Building Machine Learning Models & Pipelines
Neural Networks
NLP for ML with Python: Advanced NLP Using spaCy & Scikit-learn
NLP for ML with Python: NLP Using Python & NLTK
Refactoring ML/DL Algorithms: Refactor Machine Learning Algorithms
Refactoring ML/DL Algorithms: Techniques & Principles
Reinforcement Learning: Essentials
Reinforcement Learning: Tools & Frameworks
Research Topics in ML & DL
Supervised Learning Models
Technology Landscape & Tools for Data Management
Unsupervised Learning
Neural Networks Build & Train RNNs: Implementing Recurrent Neural Networks
Build & Train RNNs: Neural Network Components
Building Neural Networks: Artificial Neural Networks Using Frameworks
Building Neural Networks: Development Principles
ConvNets: Introduction to Convolutional Neural Networks
ConvNets: Working with Convolutional Neural Networks
Convo Nets for Visual Recognition: Computer Vision & CNN Architectures
Convolutional Neural Networks: Fundamentals
Convolutional Neural Networks: Implementing & Training
Fundamentals of Sequence Model: Artificial Neural Network & Sequence Modeling
Fundamentals of Sequence Model: Language Model & Modeling Algorithms
Getting Started with Neural Networks: Biological & Artificial Neural Networks
Getting Started with Neural Networks: Perceptrons & Neural Network Algorithms
Improving Neural Networks: Data Scaling & Regularization
Improving Neural Networks: Loss Function & Optimization
Improving Neural Networks: Neural Network Performance Management
Training Neural Networks: Advanced Learning Algorithms
Training Neural Networks: Implementing the Learning Process
Python 3.6.5 Deep Learning & Neural Network Implementation
Implementing ML Algorithm Using scikit-learn
Implementing Robotic Process Automation
Machine Learning & Data Analytics
Supervised, Unsupervised & Deep Learning
TensorFlow TensorFlow: Building Autoencoders
TensorFlow: Convolutional Neural Networks for Image Classification
TensorFlow: Deep Neural Networks & Image Classification Using Estimators
TensorFlow: Introduction to Machine Learning
TensorFlow: K-means Clustering
TensorFlow: Sentiment Analysis with Recurrent Neural Networks
TensorFlow: Simple Regression & Classification Models
TensorFlow: Word Embeddings & Recurrent Neural Networks
Convo Nets for Visual Recognition: Filters and Feature Mapping in CNN
Linear Algebra & Probability: Advanced Linear Algebra
Linear Algebra and Probability: Fundamentals of Linear Algebra

MATLAB

MATLAB R2015B Getting Started with MATLAB
MATLAB Fundamentals

MCSA: Machine Learning

Azure 2018 Azure AI Gallery & Azure Machine Learning
Consume Models & APIs Using Azure Machine Learning Studio
Data Cleanup with Azure Machine Learning Studio
Deploying Models with Azure Machine Learning Studio
Importing and Exporting in Azure Machine Learning Studio
Introduction to Azure Machine Learning
Microsoft Cognitive Toolkit & Azure Machine Learning
Optimize & Validate Models in Azure Machine Learning Studio
SQL Server & Azure Machine Learning
Summarize Data with Azure Machine Learning Studio
Transforming Data in Azure Machine Learning Studio
Using Algorithms in Azure Machine Learning Studio
Virtual Machines & HDInsight
Microsoft R Open  3.4.2 Packages and Data Types
Microsoft R Open 3.4.2 Cluster Analysis & Ensemble Learning
Data Visualization & Predictive Analytics
Decision Tree & Classification Analysis
Getting Started with Microsoft R
Importing & Manipulating Data
Modifying & Summarizing Data
Regression Analysis
The R Language & Big Data Processing

MCSA: SQL 2016 Database Administration

SQL  2016 Backup Management
Database Mail & Alerts
Database Restoration
File & Piecemeal Restores
Monitoring Database Activity
Monitoring Queries
Policy-based Management & Performance Monitoring
SQL Server 2016 Always Encrypted & Cell-level Encryption
Application Patterns
Architecture
Auditing
Configuring Operators & Alerts
Connection Strings & Traffic Manager
Data Access & Permissions
Data Security & Azure SQL Database Options
Database Performance Settings
Dynamic Data Masking
Encryption
Index & Statistical Management
Installation & Configuration
Instances & Storage Considerations
LAB: Administering a SQL Database Infrastructure
Log Shipping & High Availability
Managing Database Integrity
Migrating to Azure SQL Databases
Multiple Tenant Deployments
Performance Tuning & Availability Sets
Securing Azure SQL Databases
Service Tiers, Pools, & SQL Databases
SQL Platform & Installation Best Practices
TestPrep: Administering a SQL Database Infrastructure
Transparent Data Encryption
Upgrading to SQL Server 2016
Virtual Machines & Benchmark Data
Virtual Machines on Azure

MCSA: SQL 2016 Database Development

SQL  2016 Database Programmability Objects & Non-relational Data
Subqueries & the EXISTS Predicate
SQL Server 2016 Analyzing Query Plans
Azure SQL Database
Columnstore Indexes
Data Integrity & Constraints
Data Types & Normalization
Database Instance Performance
Designing & Implementing Views
Extended Events & SQL Trace
Filtering Data
Functions
Index Design Guidelines
Isolation Levels
LAB: Developing SQL Databases
LAB: Querying Data with Transact-SQL
Memory-optimized Tables & Native Stored Procedures
Modifying Data
Nonclustered, In-Memory, & XML Indexes
Operators & Expressions
Optimize Locking Behavior
Optimizing Statisitics & Indexes
Performance Metrics
Querying & Manipulating Data
Querying with Joins
Sets & Predicate Logic
SQL Tables
Stored Procedures
TestPrep: Developing SQL Databases
TestPrep: Querying Data with Transact-SQL
Transactions
Triggers
T-SQL Queries
Using Aggregate Functions
Using Functions
Using GROUP BY, PIVOT, & UNPIVOT

MCSA: SQL Server 2012/2014

SQL Server 2014 Auditing, Logging, & Event Handling
Connection Managers & Data Sources
Data Flow Implementation & ETL
Data Loading
Data Quality Projects
Data Quality Services (DQS) & Master Data Services (MDS)
Data Transformation & Flow
Designing & Implementing Dimensions
Designing a Fact Table
Designing Control Flow
Implementing Control Flow
LAB: Implementing a Data Warehouse with Microsoft SQL Server 2012/2014
Script Components
SSIS Components
SSIS Package Execution & Script Tasks
SSIS Packages
SSIS Security
SSIS Solutions
SSIS Variables
TestPrep: Implementing a Data Warehouse with Microsoft SQL Server 2012/2014
Troubleshooting Data Integration

MCSA: Universal Windows Platform

Visual Studio 2013 Programming in C#: Creating Types
Programming in C#: Debugging & Security Implementation
Programming in C#: Implementing Data Access
Programming in C#: IO Operations
Programming in C#: Managing Program Flow
Programming in C#: Manipulating & Retrieving Data
Programming in C#: Memory Management & String Operations
Programming in C#: Using Types
Visual Studio 2017 Adaptive App Design
App Navigation
Application Life Cycle
App-to-app Communication and File Storage
Authentication & Identity Management
Background Tasks & Reusable Components
Data Access & Binding in Apps
Introducing UWP & Basic App Layouts
Notifications with Toasts & Tiles
Programming in C#: Managing Multithreating
Speech Input and Cortana
Using Mouse, Touch, & Keyboard Input
Using Other Device Input Methods
XAML App Controls

MCSA: Web Applications

Visual Studio 2017 ASP.NET MVC Web Applications: Adaptive UI Layout & Caching Strategy
ASP.NET MVC Web Applications: Asynchronous Tasks
ASP.NET MVC Web Applications: Authorization & Exception Handling
ASP.NET MVC Web Applications: Claims-Based Authentication
ASP.NET MVC Web Applications: Composing the UI Layout
ASP.NET MVC Web Applications: Configuring & Deploying
ASP.NET MVC Web Applications: Data & State Management
ASP.NET MVC Web Applications: Databases & Entity Framework
ASP.NET MVC Web Applications: Debugging Web Applications
ASP.NET MVC Web Applications: Deployment Architecture
ASP.NET MVC Web Applications: Design & Implement UI Behavior
ASP.NET MVC Web Applications: Designing Application Architecture
ASP.NET MVC Web Applications: Designing Build & Publishing Strategies
ASP.NET MVC Web Applications: Distributed Applications
ASP.NET MVC Web Applications: Globalization, Azure Events, & NuGet
ASP.NET MVC Web Applications: Host Options & WebApp Composition
ASP.NET MVC Web Applications: Implementing ASP.NET Authentication
ASP.NET MVC Web Applications: Implementing Secure Sites
ASP.NET MVC Web Applications: Introduction
ASP.NET MVC Web Applications: JSON & XML Data Formats
ASP.NET MVC Web Applications: Models & Unit Testing
ASP.NET MVC Web Applications: MVC Application Routes
ASP.NET MVC Web Applications: MVC Controllers & Actions
ASP.NET MVC Web Applications: Optimization & Encryption
ASP.NET MVC Web Applications: State & Configuration Management
ASP.NET MVC Web Applications: Troubleshooting, HTTP Modules, & Handlers
ASP.NET MVC Web Applications: Web API Routes & Controllers
HTML5 with JavaScript & CSS3: Adaptive AI, Graphics, & Animation
HTML5 with JavaScript & CSS3: Advanced CSS
HTML5 with JavaScript & CSS3: Advanced HTML5 & CSS3
HTML5 with JavaScript & CSS3: Advanced Input Validation
HTML5 with JavaScript & CSS3: APIs &  Data Storage
HTML5 with JavaScript & CSS3: Data Flow, Consuming, & Transmitting Data
HTML5 with JavaScript & CSS3: HTML5 & Javascript
HTML5 with JavaScript & CSS3: Introduction
HTML5 with JavaScript & CSS3: Styling HTML5 & JavaScript
HTML5 with JavaScript & CSS3: WebSockets & Asynchronous Processing
LAB: Developing ASP.NET MVC Web Applications
LAB: Programming in HTML5 with JavaScript and CSS3

MCSA: Windows Server 2016

Server  2016 Windows Server 2016 – Install, Store, & Compute: Container Management & Migration
Windows Server 2016 Identity:  AD FS & Web Application Proxy
Windows Server 2016 Identity: Active Directory Maintenance & Recovery
Server 2016 LAB: Identity with Windows Server 2016
LAB: Installation, Storage, and Compute with Windows Server 2016
LAB: Networking with Windows Server 2016
TestPrep: Identity with Windows Server 2016
Testprep: Installation, Storage, and Compute with Windows Server 2016
TestPrep: Networking with Windows Server 2016
Windows Server 2016 – Install, Store, & Compute: Backups, Hyper-V, AD, & Monitoring
Windows Server 2016 – Install, Store, & Compute: Data Deduplication & Hyper-V Setup
Windows Server 2016 – Install, Store, & Compute: Disk & Volume Configuration
Windows Server 2016 – Install, Store, & Compute: Failover Clustering Strategies
Windows Server 2016 – Install, Store, & Compute: Hyper-V Networking Configuration
Windows Server 2016 – Install, Store, & Compute: Hyper-V Storage Configuration
Windows Server 2016 – Install, Store, & Compute: Image Deployment Management
Windows Server 2016 – Install, Store, & Compute: Installation Options
Windows Server 2016 – Install, Store, & Compute: Server Storage Solutions
Windows Server 2016 – Install, Store, & Compute: Storage Space Direct & Failover
Windows Server 2016 – Install, Store, & Compute: Upgrades & Migrations
Windows Server 2016 – Install, Store, & Compute: Virtual Machine (VM) Settings
Windows Server 2016 – Install, Store, & Compute: VM Motion & Network Load Balancing
Windows Server 2016 – Install, Store, & Compute: Windows Containers Deployment
Windows Server 2016 Identity: Active Directory Accounts & Permissions
Windows Server 2016 Identity: Active Directory Certificate Services
Windows Server 2016 Identity: Active Directory Domain Controllers
Windows Server 2016 Identity: Active Directory Group Policy Objects
Windows Server 2016 Identity: Active Directory Group Policy Preferences
Windows Server 2016 Identity: Active Directory Group Policy Processing
Windows Server 2016 Identity: Active Directory Group Policy Settings
Windows Server 2016 Identity: Active Directory Groups & Organizational Units
Windows Server 2016 Identity: Active Directory Rights Management Services
Windows Server 2016 Identity: Active Directory Service Accounts & Policies
Windows Server 2016 Identity: Active Directory Trusts & Sites
Windows Server 2016 Networking: Advanced Network Infrastructures
Windows Server 2016 Networking: DHCP Configuration
Windows Server 2016 Networking: DHCP Management
Windows Server 2016 Networking: Distributed File System & Branch Office Solutions
Windows Server 2016 Networking: DNS & DHCP Management Using IPAM
Windows Server 2016 Networking: DNS Configuration
Windows Server 2016 Networking: DNS Zones & Records
Windows Server 2016 Networking: IP Address Management Configuration
Windows Server 2016 Networking: IPv4 & IPv6 Address Management
Windows Server 2016 Networking: Network Connectivity & Remote Access
Windows Server 2016 Networking: Network Policy Server

MCSD: App Builder

Visual Studio 2013 Programming in C#: Creating Types
Programming in C#: Debugging & Security Implementation
Programming in C#: Implementing Data Access
Programming in C#: IO Operations
Programming in C#: Managing Program Flow
Programming in C#: Manipulating & Retrieving Data
Programming in C#: Memory Management & String Operations
Programming in C#: Using Types
Visual Studio 2017 Adaptive App Design
App Navigation
Application Life Cycle
App-to-app Communication and File Storage
ASP.NET MVC Web Applications: Adaptive UI Layout & Caching Strategy
ASP.NET MVC Web Applications: Asynchronous Tasks
ASP.NET MVC Web Applications: Authorization & Exception Handling
ASP.NET MVC Web Applications: Claims-Based Authentication
ASP.NET MVC Web Applications: Composing the UI Layout
ASP.NET MVC Web Applications: Configuring & Deploying
ASP.NET MVC Web Applications: Data & State Management
ASP.NET MVC Web Applications: Databases & Entity Framework
ASP.NET MVC Web Applications: Debugging Web Applications
ASP.NET MVC Web Applications: Deployment Architecture
ASP.NET MVC Web Applications: Design & Implement UI Behavior
ASP.NET MVC Web Applications: Designing Application Architecture
ASP.NET MVC Web Applications: Designing Build & Publishing Strategies
ASP.NET MVC Web Applications: Distributed Applications
ASP.NET MVC Web Applications: Globalization, Azure Events, & NuGet
ASP.NET MVC Web Applications: Host Options & WebApp Composition
ASP.NET MVC Web Applications: Implementing ASP.NET Authentication
ASP.NET MVC Web Applications: Implementing Secure Sites
ASP.NET MVC Web Applications: Introduction
ASP.NET MVC Web Applications: JSON & XML Data Formats
ASP.NET MVC Web Applications: Models & Unit Testing
ASP.NET MVC Web Applications: MVC Application Routes
ASP.NET MVC Web Applications: MVC Controllers & Actions
ASP.NET MVC Web Applications: Optimization & Encryption
ASP.NET MVC Web Applications: State & Configuration Management
ASP.NET MVC Web Applications: Troubleshooting, HTTP Modules, & Handlers
ASP.NET MVC Web Applications: Web API Routes & Controllers
Authentication & Identity Management
Background Tasks & Reusable Components
Data Access & Binding in Apps
Developing Azure & Web Services: Advanced Deployment
Developing Azure & Web Services: API Management & Monitoring
Developing Azure & Web Services: Azure Scalability
Developing Azure & Web Services: Azure Services
Developing Azure & Web Services: Azure Storage
Developing Azure & Web Services: Configuring Web Applications for Deployment
Developing Azure & Web Services: Consuming Services
Developing Azure & Web Services: Deployment Strategy
Developing Azure & Web Services: Diagnostics, Debugging, & ACS
Developing Azure & Web Services: Entity Framework
Developing Azure & Web Services: Hosting Web APIs
Developing Azure & Web Services: IIS & Web Services
Developing Azure & Web Services: Introduction
Developing Azure & Web Services: Managing Data
Developing Azure & Web Services: Messaging, Security, & Troubleshooting
Developing Azure & Web Services: Security and WCF Streams
Developing Azure & Web Services: WCF Transactions & Services
Developing Azure & Web Services: Web API Services
Developing Azure & Web Services: Working with Assemblies
HTML5 with JavaScript & CSS3: Adaptive AI, Graphics, & Animation
HTML5 with JavaScript & CSS3: Advanced CSS
HTML5 with JavaScript & CSS3: Advanced HTML5 & CSS3
HTML5 with JavaScript & CSS3: Advanced Input Validation
HTML5 with JavaScript & CSS3: APIs &  Data Storage
HTML5 with JavaScript & CSS3: Data Flow, Consuming, & Transmitting Data
HTML5 with JavaScript & CSS3: HTML5 & Javascript
HTML5 with JavaScript & CSS3: Introduction
HTML5 with JavaScript & CSS3: Styling HTML5 & JavaScript
HTML5 with JavaScript & CSS3: WebSockets & Asynchronous Processing
Introducing UWP & Basic App Layouts
Notifications with Toasts & Tiles
Programming in C#: Managing Multithreating
Speech Input and Cortana
Using Mouse, Touch, & Keyboard Input
Using Other Device Input Methods
XAML App Controls

MCSE: Cloud Platform and Infrastructure

Azure 2017 Automating & Managing Databases
Automation & Machine Learning
Azure High Availability Solutions
Azure SQL Database Security
Azure Virtual Machines
Data Warehousing
Designing Batch Processing & Data Security
Designing the Lambda Architecture & Real-time Processing
Hybrid SQL Server Solutions
Implementing a SQL Database
Ingesting Data & Computing for Batch Processing
Ingesting Data & Computing for Real-time Processing
Managing Activities & Data for Azure Big Data Analytics
Performance Monitoring
Provisioning an Azure Data Factory
Recovering SQL Databases
Scaling Cloud Solutions
SQL Databases
SQL Server Database Security
Troubleshooting SQL Database Errors
Server 2016 Additional Malware Protection
Implementing Disk Encryption
Implementing File Encryption
Implementing Workload-Specific Security
Managing Malware Solutions
Managing Privileged Identities Part I
Managing Privileged Identities Part II
Nano Server Deployment & Security
PAWs and LAPS
Securing a Network Infrastructure with Windows Firewalls
Securing a Virtualization Infrastructure
Securing Network Infrastructure Traffic
Server Patching & Updating
Threat Detection Solutions

MCSE: Data Management and Analytics

Azure 2018 Azure AI Gallery & Azure Machine Learning
Consume Models & APIs Using Azure Machine Learning Studio
Data Cleanup with Azure Machine Learning Studio
Deploying Models with Azure Machine Learning Studio
Importing and Exporting in Azure Machine Learning Studio
Introduction to Azure Machine Learning
Microsoft Cognitive Toolkit & Azure Machine Learning
Optimize & Validate Models in Azure Machine Learning Studio
SQL Server & Azure Machine Learning
Summarize Data with Azure Machine Learning Studio
Transforming Data in Azure Machine Learning Studio
Using Algorithms in Azure Machine Learning Studio
Virtual Machines & HDInsight
Azure HDInsight 2018 Azure HDInsight: Batch Solutions with Apache Hive & Pig
Azure HDInsight: Building Solutions using Kafka & HBase
Azure HDInsight: Create Spark Streaming Applications
Azure HDInsight: Data Analysis Using Spark SQL & Hive
Azure HDInsight: Develop Real-time Processing Solutions with Apache Storm
Azure HDInsight: Interactive Processing using Apache Phoenix on HBase
Azure HDInsight: Interactive Queries with Spark SQL & Interactive Hive
Azure HDInsight: Introduction
Azure HDInsight: Managing Data, Jobs, and Security
Azure HDInsight: Operationalize & Design with Spark
Azure HDInsight: Working with Clusters
SQL Server 2014 Backup & Recovery Strategies
Clustering & AlwaysOn
High Availability
Implementing & Testing Policy
Planning Infrastructure
Private Cloud Overview
Private Cloud Planning & Implementation
Recovery Implementation
Replication Overview
Windows Azure SQL Database
WSFC Clustering

MCSE: Productivity

Exchange  2016 Permissions, Configuration, & Collaboration
Exchange 2016 Client Access Services
Configuring Security
Deploying Mailbox Servers
Designing  Remote Access & Multiple Namespaces
LAB: Designing and Deploying Microsoft Exchange Server 2016
Mail Flow Architecture, Redundancy, & Resilience
Mail Flow Rules & Auditing
Message Records Planning & Configuration
Message Records Policies, Archiving, & Journaling
Migration & Federation
Migration & Sharing
Planning for Mailbox Servers
Planning Security Strategies
Planning, Configuration, & Collaboration
Recovery Strategies
Securing Remote Access
SharePoint 2016 Backup & Restore
Business Intelligence Tools
Designing a Logical Architecture
Enterprise Content Management (ECM)
Environment Monitoring & Optimization
Environment Troubleshooting
Farm & Web Application Security
High Availability & Disaster Recovery Solutions
Hybrid Deployments
Managing Solutions, Apps, & Productivity Services
On-premises Integration
Planning Installation
Search Management
Site Collection Security
Social Computing & Business Data Connectivity
Taxonomy & Managed Metadata Service (MMS)
Upgrading & Updating
Web Content Management (WCM)

MEAN.js

MEAN.js Deploying MEAN Applications
MEAN Applications with AngularJS & Node.js
MongoDB & AngularJS with Node.js Integration
Securing MEAN Applications
Testing MEAN Applications

Microservices

Microservices Microservices Architecture
Microservices Containers
Microservices Deployment and Continuous Integration
Microservices Testing Strategies, Scaling, Monitoring, and Security

Microservices Architecture

Microservices Basic Concepts of a Microservices Architecture
Core Concepts of a Service-Oriented Architecture
Current & Future Trends
Design Pattern Classification & Architectural Patterns
Design Thinking Process
Designing the Microservices Architecture
Managing Object Construction & Behavior Using Patterns
Microservice Refactoring Patterns
Microservices & Netflix
Microservices Architecture and Design Patterns
Microservices Deep Dive
Need for Design Patterns & the Principles Guiding Design Patterns
Prototyping Design Thinking
Simplifying Design Using Structural Pattern

Microservices Development

Microservices REST Advanced Data Access with EF Core
Building a Microservice in .NET Core
Building an API Project in ASP.NET
Deploying Your Microservice in Containers
Getting Started with REST & .NET Core
Securing Your Microservices
Spring Cloud  Finchley.M5 Advanced Microservices Architecture
Advanced Microservices Patterns
Introduction to Microservices
Managing Microservices and REST Architecture
Securing Microservices
SOAP & Development of Microservices
UI Patterns & Troubleshooting

Microsoft 365 Certified Fundamentals

Microsoft 365 Microsoft 365 Fundamentals: Cloud Benefits & Considerations
Microsoft 365 Fundamentals: Cloud Services & Principles
Microsoft 365 Fundamentals: Mobile Management & Security and Compliance
Microsoft 365 Fundamentals: Office 365 & Collaboration
Microsoft 365 Fundamentals: Protecting Your Information
Microsoft 365 Fundamentals: Skype for Business, Teams, & Collaboration
Microsoft 365 Fundamentals: Understanding Cloud Concepts
Microsoft 365 Fundamentals: Windows 10 Enterprise
Microsoft 365 Windows 10 Microsoft 365 Fundamentals: Deployment Planning, Azure, & Updates
Microsoft 365 Fundamentals: Microsoft 365, Exchange, & SharePoint
Microsoft 365 Fundamentals: Windows 10 & Admin Center
Microsoft 365 Windows 10 Microsoft 365 Fundamentals: Windows 10, Autopilot, & Azure

Microsoft 365 Certified: Enterprise Administrator Expert

Microsoft 365 Microsoft 365 Mobility & Security: Azure Information Protection
Microsoft 365 Mobility & Security: Cloud App Security
Microsoft 365 Mobility & Security: Data Loss Prevention
Microsoft 365 Mobility & Security: Devices & Apps
Microsoft 365 Mobility & Security: Implementing Mobile Device Management
Microsoft 365 Mobility & Security: Managing Device Compliance
Microsoft 365 Mobility & Security: Security Reports & Alerts
Microsoft 365 Mobility & Security: Threat Management
Microsoft 365 Mobility & Security: Windows 10 Deployment
Microsoft 365 Mobility & Security: Windows Defender Threat Protection
Microsoft 365 (August 2019) Microsoft 365 Mobility & Security: Auditing
Microsoft 365 Mobility & Security: Data Governance
Microsoft 365 Mobility & Security: eDiscovery
Microsoft 365 2019 Microsoft 365 Identity and Services: Application Deployment
Microsoft 365 Identity and Services: Authentication
Microsoft 365 Identity and Services: Designing a Hybrid Identity
Microsoft 365 Identity and Services: Identity Strategy
Microsoft 365 Identity and Services: Manage Azure AD Identities
Microsoft 365 Identity and Services: Migrating Users & Data
Microsoft 365 Identity and Services: Multi-Factor Authentication (MFA)
Microsoft 365 Identity and Services: Office 365 Workload Deployment
Microsoft 365 Identity and Services: Planning a Microsoft Implementation
Microsoft 365 Identity and Services: Subscription & Tenant Health
Microsoft 365 Identity and Services: Tenancy & Subscriptions
Microsoft 365 Identity and Services: Application Access
Microsoft 365 Identity and Services: External Users
Microsoft 365 Identity and Services: User Roles

Microsoft 365 Certified: Messaging Administrator Associate

Microsoft 365 2019 Configuring a Messaging Platform: Client Access
Configuring a Messaging Platform: Database Availability Groups
Configuring a Messaging Platform: Database Management
Configuring a Messaging Platform: Messaging Infrastructure Lifecycle
Configuring a Messaging Platform: Recipient Resources

Microsoft 365 Certified: Modern Desktop Administrator Associate

Windows  10 Managing Modern Desktops: Co-Management
Managing Modern Desktops: Monitoring Devices
Windows 10: Configure Remote Connectivity
Windows 10: Configure System & Data Recovery
Windows 10: Manage Devices & Data
Windows 10: Manage Updates
Windows 10 LAB: Windows 10 (MD-100)
Managing Modern Desktops: Conditional Access & Compliance
Managing Modern Desktops: Deploy & Update Applications
Managing Modern Desktops: Device Authentication
Managing Modern Desktops: Device Profiles
Managing Modern Desktops: Dynamic Deployments
Managing Modern Desktops: Intune Device Enrollment
Managing Modern Desktops: Managing Updates
Managing Modern Desktops: Mobile Application Management
Managing Modern Desktops: Upgrading Devices
Managing Modern Desktops: User Profiles
Managing Modern Desktops: Windows Autopilot
Managing Modern Desktops: Windows Defender
Windows 10: Active Directory Management
Windows 10: Configure Networking
Windows 10: Deployment
Windows 10: Monitor & Manage Windows
Windows 10: Perform Post-Installation Configuration
Windows 10: Policy-Based Management
Windows 10: Prepare for Deployment

Microsoft Certified Azure Fundamentals

Azure 2019 Azure Fundamentals: Azure Data Privacy
Azure Fundamentals: Azure Network Security
Azure Fundamentals: Azure Security Services
Azure Fundamentals: Big Data Analytics
Azure Fundamentals: Cloud Computing
Azure Fundamentals: Database Solutions
Azure Fundamentals: IoT & AI
Azure Fundamentals: Monitoring the Azure Environment
Azure Fundamentals: Network Components
Azure Fundamentals: Storage Components
Azure Fundamentals: The Ecosystem
Azure Fundamentals: Virtual Machines

Microsoft Certified: Azure Administrator Associate

Azure 2015 Microsoft Azure Administrator: Azure Resource Groups
Azure 2019 Microsoft Azure Administrator: Azure Active Directory
Microsoft Azure Administrator: Azure AD Objects
Microsoft Azure Administrator: Azure Backup and Recovery
Microsoft Azure Administrator: Azure Hybrid Identities
Microsoft Azure Administrator: Azure Import/Export
Microsoft Azure Administrator: Azure Monitoring
Microsoft Azure Administrator: Azure Multi-Factor Authentication
Microsoft Azure Administrator: Azure Name Resolution & Network Security
Microsoft Azure Administrator: Azure Network Monitoring
Microsoft Azure Administrator: Azure Policies
Microsoft Azure Administrator: Azure Storage Accounts
Microsoft Azure Administrator: Azure Virtual Machine Templates
Microsoft Azure Administrator: Azure Virtual Machines (VMs)
Microsoft Azure Administrator: Azure Virtual Network Connectivity
Microsoft Azure Administrator: Integrating Azure On-Premise & Virtual Networks
Microsoft Azure Administrator: Managing Azure Virtual Machines
Microsoft Azure Administrator: Subscriptions
Microsoft Azure Administrator: Azure Virtual Networks

Microsoft Certified: Azure Developer Associate

Azure 2018 Azure Developer: Advanced Scalability Using Azure
Azure Developer: Advanced Security & Integration Using Azure Services
Azure Developer: Azure Batch & Scheduling Bulk Operations
Azure Developer: Azure Cloud Technology Solutions
Azure Developer: Blob Storage Solutions
Azure Developer: Caching & Content Delivery Solutions
Azure Developer: Common Application Design & Connectivity Patterns
Azure Developer: Cosmos DB Storage Solutions
Azure Developer: Creating Mobile Apps
Azure Developer: File Storage Solutions
Azure Developer: Implementing Authentication & Access Control
Azure Developer: Implementing Secure Data Solutions
Azure Developer: Kubernetes Service Solutions
Azure Developer: Media Services Solutions
Azure Developer: PaaS Web Applications
Azure Developer: Relational Database Solutions
Azure Developer: Storage Solutions
Azure Developer: Storage Tables
Azure Developer: Working With Azure Functions
Azure Developer: Working with Azure Logic Apps
Azure Developer: Working with Azure Service Fabric

Microsoft Certified: Azure DevOps Engineer Expert

Azure 2019 MS Azure DevOps Solutions: Application Configuration & Secrets
MS Azure DevOps Solutions: Azure DevOps Infrastructure
MS Azure DevOps Solutions: Code Flow & Mobile DevOps
MS Azure DevOps Solutions: Dependency Management & Security Compliance
MS Azure DevOps Solutions: Design & Implement Agile Work Management Approach
MS Azure DevOps Solutions: Design a Quality Strategy & Secure Development Process
MS Azure DevOps Solutions: Design and Set Up Release Strategy & Workflow
MS Azure DevOps Solutions: Implement Continuous Feedback
MS Azure DevOps Solutions: Implement Deployment Patterns
MS Azure DevOps Solutions: Implement Infrastructure as Code
MS Azure DevOps Solutions: Infrastructure as Code & Security Compliance
MS Azure DevOps Solutions: Manage Code Quality & Security Policies
MS Azure DevOps Solutions: Migration & Consolidation Strategy for Tools
MS Azure DevOps Solutions: Tool Integration
MS Azure DevOps Solutions: Version & Source Control

Microsoft Certified: Azure Security Engineer Associate

Azure Microsoft Azure Security Technologies: Azure Storage Account Security
Azure 2019 Microsoft Azure Security Technologies:  Application Containers
Microsoft Azure Security Technologies: Azure AD Connect
Microsoft Azure Security Technologies: Azure AD Group Management
Microsoft Azure Security Technologies: Azure AD User Management
Microsoft Azure Security Technologies: Azure Database Security
Microsoft Azure Security Technologies: Azure Key Vault
Microsoft Azure Security Technologies: Azure RBAC & Policies
Microsoft Azure Security Technologies: Azure Security Center
Microsoft Azure Security Technologies: Data Classification
Microsoft Azure Security Technologies: Database User Access
Microsoft Azure Security Technologies: Identity & Access Management
Microsoft Azure Security Technologies: Monitoring, Logging, & Alerts
Microsoft Azure Security Technologies: Network Security
Microsoft Azure Security Technologies: Review Course 1
Microsoft Azure Security Technologies: Review Course 2
Microsoft Azure Security Technologies: VM Security
Microsoft Azure Security Technologies: VPNs
Microsoft Azure Security Technologies: Web Application Security

Microsoft Certified: Azure Solutions Architect Expert

Azure 2019 Microsoft Azure Architect Design: Azure AD & RBAC Design
Microsoft Azure Architect Design: Azure AD Connect, MFA, & SSO Design
Microsoft Azure Architect Design: Azure AD Permissions Design
Microsoft Azure Architect Design: Azure App Design
Microsoft Azure Architect Design: Azure Compute Design
Microsoft Azure Architect Design: Azure Cost Management
Microsoft Azure Architect Design: Azure DevOps Planning
Microsoft Azure Architect Design: Azure Key Vault and Key Design
Microsoft Azure Architect Design: Azure Migration Planning
Microsoft Azure Architect Design: Azure Network Design
Microsoft Azure Architect Design: Azure Policy Planning
Microsoft Azure Architect Design: Azure Service Design Part 1
Microsoft Azure Architect Design: Azure Service Design Part 2
Microsoft Azure Architect Design: Azure Site Recovery Design
Microsoft Azure Architect Design: Azure Storage Design
Microsoft Azure Architect Design: Azure VPN Design
Microsoft Azure Architect Technologies: Architect Azure Networking
Microsoft Azure Architect Technologies: Architecting Azure Storage
Microsoft Azure Architect Technologies: Azure Active Directory
Microsoft Azure Architect Technologies: Azure AD Connect & Authentication
Microsoft Azure Architect Technologies: Azure AD MFA
Microsoft Azure Architect Technologies: Azure Files & Databases
Microsoft Azure Architect Technologies: Azure Remote Connectivity
Microsoft Azure Architect Technologies: Azure Roles and Policies
Microsoft Azure Architect Technologies: Azure Virtual Machines
Microsoft Azure Architect Technologies: Load Balancing
Microsoft Azure Architect Technologies: Managing Azure

Microsoft Dynamics Administration

Microsoft Dynamics CRM 2013 Advanced Case Management
Business Process Automation
Business Rules, Process Flows, & Form Customization
Case Management
Charts & Dashboards
Configuring the Sales Module
Customization, Relationships, & Roles
Customization, Roles, Security, & Auditing
Customizing Entities & Views
Fields & Relationships
Forms, Marketing, Contacts, & Processes
Marketing Automation
Marketing Reports & Data Quality Management
Metrics, Sales Analysis, & Reporting
Microsoft Dynamics CRM 2013: Getting Started
Outlook Client & E-mail Management
Sales Management
Service Contracts & Scheduling

Microsoft IIS

Microsoft IIS 8.5 Installation, Configuration, & Management
Microsoft IIS Extensions & Certificates

Microsoft Specialist: Exchange

Exchange  2016 Permissions, Configuration, & Collaboration
Exchange 2016 Client Access Services
Configuring Security
Deploying Mailbox Servers
Designing  Remote Access & Multiple Namespaces
LAB: Designing and Deploying Microsoft Exchange Server 2016
Mail Flow Architecture, Redundancy, & Resilience
Mail Flow Rules & Auditing
Message Records Planning & Configuration
Message Records Policies, Archiving, & Journaling
Migration & Federation
Migration & Sharing
Planning for Mailbox Servers
Planning Security Strategies
Planning, Configuration, & Collaboration
Recovery Strategies
Securing Remote Access

Microsoft Specialist: Visual Studio

Visual Studio 2013 Programming in C#: Creating Types
Programming in C#: Debugging & Security Implementation
Programming in C#: Implementing Data Access
Programming in C#: IO Operations
Programming in C#: Managing Program Flow
Programming in C#: Manipulating & Retrieving Data
Programming in C#: Memory Management & String Operations
Programming in C#: Using Types
Visual Studio 2017 HTML5 with JavaScript & CSS3: Adaptive AI, Graphics, & Animation
HTML5 with JavaScript & CSS3: Advanced CSS
HTML5 with JavaScript & CSS3: Advanced HTML5 & CSS3
HTML5 with JavaScript & CSS3: Advanced Input Validation
HTML5 with JavaScript & CSS3: APIs &  Data Storage
HTML5 with JavaScript & CSS3: Data Flow, Consuming, & Transmitting Data
HTML5 with JavaScript & CSS3: HTML5 & Javascript
HTML5 with JavaScript & CSS3: Introduction
HTML5 with JavaScript & CSS3: Styling HTML5 & JavaScript
HTML5 with JavaScript & CSS3: WebSockets & Asynchronous Processing
LAB: Programming in HTML5 with JavaScript and CSS3
Programming in C#: Managing Multithreating

Microsoft System Center

Microsoft System Center Configuration Manager 2012 LAB: Administering and Deploying System Center 2012 Configuration Manager
Microsoft System Center Configuration Manager 2012 R2 Compliance Settings
Deploying Updates & Endpoint Protection
Maintenance & OS Deployment
Managing Boundaries
Managing Clients
Managing Inventory & Reporting
Overview & Prerequisite Setup
Performance & Health Monitoring
SCCM Administration
Security Considerations
Task Sequences & Application Deployment
Microsoft System Center Configuration Manager 2016 Deploy & Manage Orchestrator
Deploying Service Manager
DPM Introduction
Installing & Monitoring DPM
Installing SCOM
Installing System Center Configuration
Managing VMM
Orchestrator Introduction
SCOM Introduction
Service Manager
SMA Installation & Deployment
SMA Runbooks
System Center Configuration Manager Introduction & Planning
VMM Installation

Microsoft Technology Associate (MTA) : Developer

Databases, Rules, & Procedures
Flowcharts, Tables, & Conditional Statements
JavaScript Rules, Functions, & HTML Elements
LAB: Software Development Fundamentals
Programming Strings & Data Structures
Programming Structure, Methods, & Variables
Recursion, Exceptions, Randomization, & Sorting
Structures of Object-oriented Programming
Windows and Web Applications
Windows Forms Applications
Windows Store Applications

Microsoft Technology Associate (MTA): Database

SQL Server 2014 Components, Procedures, & Functions
Database Design
Database Security
DML & Multi-table Queries
LAB: Database Administration Fundamentals
Normalization & Indexes
Working with Data

Microsoft Technology Associate (MTA): IT Infrastructure

Windows  8 Data Management & Device Security
Device Configuration & Data Access
Device Configuration & Data Storage
Implementing Permissions, Shares, & Encryption in Windows
Using Microsoft Cloud Services
Using Microsoft Identity Management & BYOD Solutions
Authentication
Client & Email Security
Core Security
Encryption & Malware
Internet & Wireless Security
LAB: Security Fundamentals
Network Isolation
Password & Audit Policies
Permissions
Protocol Security
Security Fundamentals: Firewalls
Server Protection
TestPrep: Security Fundamentals

ML Programmer to ML Architect

Artificial Intelligence Planning AI Implementation
Automation Automation Design & Robotics
Bayesian statistics Bayesian Methods: Advanced Bayesian Computation Model
Bayesian Methods: Bayesian Concepts & Core Components
Implementing Bayesian Model and Computation with PyMC
Computational Theory Computational Theory: Language Principle & Finite Automata Theory
Computational Theory: Using Turing, Transducers, & Complexity Classes
Confluence Web Configuring Spaces
Setting Up & Managing Spaces
Signing in & Navigating within Spaces
Working with Spaces
Working with Team Members
Data Science Math for Data Science & Machine Learning
Keras 2.2.4 Deep Learning with Keras
Machine Learning Advanced Reinforcement Learning: Implementation
Advanced Reinforcement Learning: Principles
Applied Deep Learning: Generative Adversarial Networks and Q-Learning
Applied Deep Learning: Unsupervised Data
Building ML Training Sets: Introduction
Building ML Training Sets: Preprocessing Datasets for Classification
Building ML Training Sets: Preprocessing Datasets for Linear Regression
Enterprise Architecture: Architectural Principles & Patterns
Enterprise Architecture: Design Architecture for Machine Learning Applications
Enterprise Services: Enterprise Machine Learning with AWS
Enterprise Services: Machine Learning Implementation on Google Cloud Platform
Enterprise Services: Machine Learning Implementation on Microsoft Azure
Final Exam: ML Programmer
Implementing Deep Learning: Optimized Deep Learning Applications
Implementing Deep Learning: Practical Deep Learning Using Frameworks & Tools
Linear Regression Models: Building Models with Scikit Learn & Keras
Linear Regression Models: Introduction
Linear Regression Models: Introduction to Logistic Regression
Linear Regression Models: Multiple & Parsimonious
ML Algorithms: Machine Learning Implementation Using Calculus & Probability
ML Algorithms: Multivariate Calculation & Algorithms
ML/DL Best Practices: Building Pipelines with Applied Rules
ML/DL Best Practices: Machine Learning Workflow Best Practices
ML/DL in the Enterprise: Machine Learning Infrastructure & Metamodel
ML/DL in the Enterprise: Machine Learning Modeling, Development, & Deployment
Model Management: Building & Deploying Machine Learning Models in Production
Model Management: Building Machine Learning Models & Pipelines
NLP for ML with Python: Advanced NLP Using spaCy & Scikit-learn
NLP for ML with Python: NLP Using Python & NLTK
Refactoring ML/DL Algorithms: Refactor Machine Learning Algorithms
Refactoring ML/DL Algorithms: Techniques & Principles
Reinforcement Learning: Essentials
Reinforcement Learning: Tools & Frameworks
Research Topics in ML & DL
Simplifying Regression and Classification with Estimators
Neural Networks Build & Train RNNs: Implementing Recurrent Neural Networks
Build & Train RNNs: Neural Network Components
Building Neural Networks: Artificial Neural Networks Using Frameworks
Building Neural Networks: Development Principles
ConvNets: Introduction to Convolutional Neural Networks
ConvNets: Working with Convolutional Neural Networks
Convo Nets for Visual Recognition: Computer Vision & CNN Architectures
Convolutional Neural Networks: Fundamentals
Convolutional Neural Networks: Implementing & Training
Fundamentals of Sequence Model: Artificial Neural Network & Sequence Modeling
Fundamentals of Sequence Model: Language Model & Modeling Algorithms
Getting Started with Neural Networks: Biological & Artificial Neural Networks
Getting Started with Neural Networks: Perceptrons & Neural Network Algorithms
Improving Neural Networks: Data Scaling & Regularization
Improving Neural Networks: Loss Function & Optimization
Improving Neural Networks: Neural Network Performance Management
Training Neural Networks: Advanced Learning Algorithms
Training Neural Networks: Implementing the Learning Process
Predictive Analytics Applying Predictive Analytics
Predictive Modeling: Implementing Predictive Models Using Visualizations
Predictive Modeling: Predictive Analytics & Exploratory Data Analysis
Python 3.0+ LAB: DL Programmer
LAB: ML Architect
LAB: ML Engineer
LAB: ML Programmer
Python Anaconda 2018.12 Applied Predictive Modeling
Six Sigma Green Belt Six Sigma Performance Metrics
Slack for iOS Using the iOS App
Slack Web Configuring Slack
Creating, Finding & Sharing Information
Private Messaging & Communication Tools
Signing In & Setting Up
Using Channels
Architecting Balance: Designing Hybrid Cloud Solutions
Architecting Balance: Hybrid Cloud Implementation with AWS & Azure
Confronting Your Assumptions
Convo Nets for Visual Recognition: Filters and Feature Mapping in CNN
Cultivating Cross-functional Team Collaboration
Cultivating Relationships with Your Peers
Defining Alternative Solutions to a Problem
Embracing an Agile Culture for Business Growth
Getting to the Root of a Problem
Investigating Arguments
Leading a Cross-functional Team
Leading through Positive Influence
Linear Algebra & Probability: Advanced Linear Algebra
Linear Algebra and Probability: Fundamentals of Linear Algebra
Linear Models & Gradient Descent: Gradient Descent and Regularization
Linear Models & Gradient Descent: Managing Linear Models
Managing a Project to Minimize Risk and Maximize Quality
The Building Blocks of Building Trust
Thinking Strategically as a Manager
Trust Building through Effective Communication
Unleashing Personal and Team Creativity

Mobile Development Core Concepts

iOS 10 Creating a Basic App
Mobile Development Tips & Tricks for Developing Secure Mobile Apps
Visual Studio 2015 Creating an Android Application
Introduction to Xamarin For .NET

Mobile Security Administration

Configuring Enterprise-level Security
Containers & Wrappers
Infrastructure Security
Mobile Device Security & Handling
Mobile Security Technologies
Mobile Security Threat Mitigation
Mobile Security Threats

Mobility Core Concepts

Introduction to Mobile Computing
Introduction to Mobile Operating Systems
Mobile Computing Hardware
Portable Computer Hardware

MongoDB

Mongo 3.4.3 Backups, Monitoring, & Stats
Cloud & Hadoop Deployments
Indexes & Query Optimization
Installing MongoDB
Java ASYNC Interface
Java REST & GridFS
LAB: MongoDB Development
Map Reduce, Atomic Counters, & Binary Data
MongoDB with Python
MongoDB with Spark
Replication & Security
System Management
User Management
Write, Read, & Aggregate Data
MongoDB 4.0 MongoDB Aggregation
MongoDB Querying

MySQL

MySQL LAB: MySQL Database Development
MySQL 8.0 Database Design Fundamentals
DDL Statements
GIS, Cloud, & Connectors
Introduction
Manipulating Data
Query & Performance Optimization
SELECT Statement & Operators
Stored Routines, Triggers, & the InnoDB memcached Plugin
Working with Functions

Networking Core Concepts

IPv6 Benefits & Allocating Addresses
Decoding the Packet Header & Discovering ICMPv6
Exploring Addresses
Linux Networking Fundamentals
Advanced Networking Devices
Broadband Routers
Cabling Solutions
Cloud Concepts & Network Services
CompTIA A+: Windows Networking
Concepts & Characteristics of Networking
Configuring Firewalls
Configuring Windows Networking
Configuring Wired & Wireless Networks
Creating & Configuring Network Shares
Documentation and Diagrams & Business Continuity
Internet Connections
Introduction to Networking
IP Addressing
LAB: CompTIA Network+ N10-007
LAB: Networking Fundamentals
Mitigation Techniques
Network Attacks
Network Cabling
Network Device Hardening
Network Function Virtualization Fundamentals
Network Monitoring & Remote Access Methods
Network Protocols
Network Storage, Virtualization, & WAN Technologies
Network Topologies & Technologies
Networking Devices
Networking Hardware
Policies and Best Practices
Ports, Protocols, & the OSI Model
Remote Connections & Mac OS X Networking
Security Devices, Wireless Security, & Access Control
Software-Defined Networking Fundamentals
TestPrep: CompTIA Network+
Troubleshooting Common Network Service Issues
Troubleshooting Connectivity & Performance Issues
Troubleshooting Methodology & Tools
Wireless Networking

Node.js

Express 4.13.3 Installation, Express-generator, & API
Middleware & Sessions
Middleware, Routes, & HTTPS
Routing, Jade, & Views
Node.js LAB: Application Development with Node.js
Node.js 0.12 Creating Applications in Visual Studio
Getting Started with Edge.js
Node.js & Node.js Tools in Visual Studio
Running Node.js Applications in IIS
Using Node.js with Microsoft Azure
Using Node.js with Microsoft SQL Server
Node.js 10 Application Development with Node.js: Build Apps using Modules & MEAN Stack
Application Development with Node.js: Language Fundamentals
Application Development with Node.js: Managing Advanced Application Elements
Application Development with Node.js: Microservices
Application Development with Node.js: Microservices Frameworks, & Utilities
Application Development with Node.js: Node Clusters & Memory Optimizations
Application Development with Node.js: Process Managers
Application Development with Node.js: Real-time Applications
Application Development with Node.js: Security & Middleware Implementation
Application Development with Node.js: Working with Features

NoSQL

NoSQL Concepts & Background
CouchDB, cURL, & Futon
Distributed Systems & Big Data
Models & Applications
Models & Data Stores
NoSQL In-Depth
Programming Essentials

Object-Oriented Design

CQRS CQRS Architecture Basics
Introducing & Applying CQRS
Object-Oriented Programming Object-oriented Programming & Design Basics
SOLID & GRASP
SOLID Injection Principles & Applying SOLID Principles
Introduction to SOLID
SOLID Fundamentals
The Open/Closed Principle

Object-Relational Mapping

Java Hibernate 4.3 Advanced Querying in Java Hibernate
Basic Querying in Java Hibernate
Customized Mapping in Java Hibernate
Debugging in Java Hibernate
Getting Started with Java Hibernate
Mapping Data
Java Hibernate 5 Java Hibernate: Getting Started
Java Hibernate: Queries & Oracle Manipulations
Java Hibernate: Working with Hibernate
Microsoft Entity Framework 6.1.1 Advanced Entity Framework
Entity Data Models & Hierarchies
Entity Framework & LINQ to Entities
Entity Framework Tuning & Integration
Working with Entity SQL
Nhibernate 4.0.1 Advanced Features & Mapping
Best Practices, Web Projects, & Patterns
Getting Started & Creating Mappings
Querying & Managing Data

Office 365 Administration

Microsoft 365 Microsoft 365 Fundamentals: Cloud Benefits & Considerations
Microsoft 365 Fundamentals: Cloud Services & Principles
Microsoft 365 Fundamentals: Office 365 & Collaboration
Microsoft 365 Fundamentals: Skype for Business, Teams, & Collaboration
Microsoft 365 Fundamentals: Understanding Cloud Concepts
Microsoft 365 Fundamentals: Windows 10 Enterprise
Microsoft 365 Mobility & Security: Azure Information Protection
Microsoft 365 Mobility & Security: Cloud App Security
Microsoft 365 Mobility & Security: Data Loss Prevention
Microsoft 365 Mobility & Security: Devices & Apps
Microsoft 365 Mobility & Security: Implementing Mobile Device Management
Microsoft 365 Mobility & Security: Managing Device Compliance
Microsoft 365 Mobility & Security: Security Reports & Alerts
Microsoft 365 Mobility & Security: Threat Management
Microsoft 365 Mobility & Security: Windows 10 Deployment
Microsoft 365 Mobility & Security: Windows Defender Threat Protection
Microsoft 365 (August 2019) Microsoft 365 Mobility & Security: Auditing
Microsoft 365 Mobility & Security: Data Governance
Microsoft 365 Mobility & Security: eDiscovery
Microsoft 365 2019 Configuring a Messaging Platform: Client Access
Configuring a Messaging Platform: Database Availability Groups
Configuring a Messaging Platform: Database Management
Configuring a Messaging Platform: Messaging Infrastructure Lifecycle
Configuring a Messaging Platform: Recipient Resources
Microsoft 365 Identity and Services: Application Deployment
Microsoft 365 Identity and Services: Authentication
Microsoft 365 Identity and Services: Designing a Hybrid Identity
Microsoft 365 Identity and Services: Identity Strategy
Microsoft 365 Identity and Services: Manage Azure AD Identities
Microsoft 365 Identity and Services: Migrating Users & Data
Microsoft 365 Identity and Services: Multi-Factor Authentication (MFA)
Microsoft 365 Identity and Services: Office 365 Workload Deployment
Microsoft 365 Identity and Services: Planning a Microsoft Implementation
Microsoft 365 Identity and Services: Subscription & Tenant Health
Microsoft 365 Identity and Services: Tenancy & Subscriptions
Microsoft 365 Windows 10 Microsoft 365 Fundamentals: Deployment Planning, Azure, & Updates
Microsoft 365 Fundamentals: Microsoft 365, Exchange, & SharePoint
Microsoft 365 Fundamentals: Windows 10 & Admin Center
Microsoft 365 Windows 10 Microsoft 365 Fundamentals: Windows 10, Autopilot, & Azure
Office 365 2017 Azure AD Connect
Client Connectivity and Administrator Roles
Collaboration Solutions
Configuring & Managing Skype for Business Online
Configuring Domains
DNS Records & Rights Management
Enabling Telemetry
Exchange Online Addresses, Mailboxes, & Archiving
Exchange Online Policy, Migration, & Compliance
Managing AD FS Servers
Managing Identities
Managing Identities Using Azure AD Connect
Managing Identities with PowerShell
Managing User-driven & IT Deployments
Monitoring Availability & Usage
Pilot Deployment
Planning for Office Clients
SharePoint Online Sharing & Site Collections
Single Sign-On
Tenancy & Licensing
TestPrep: Microsoft 70-347 Enabling Office 365 Services
Troubleshooting Usage
Microsoft 365 Identity and Services: Application Access
Microsoft 365 Identity and Services: External Users
Microsoft 365 Identity and Services: User Roles

OpenStack

OpenStack 2014 Cloud Deployment
Compute Configuration
Networking Service
Object Storage
Services & Components
The OpenStack Dashboard

Oracle ATG Web Commerce

Oracle ATG Web Commerce Commerce Platform Overview
Core Commerce
Custom Properties & User Directory
Data Models
DSP Tag Library
Dynamo Servlet Beans & Server-side Java
Extending Oracle Commerce Applications
Form Handlers & Pipeline Architecture
Forms Handlers & JSP
Product Catalog & Profiles
Repository API & Derived Properties
Repository Architecture
REST Web Services & Beans
Standard & Custom Components
Transactions & Application Building
Versioned and Hierarchal Repositories & Caching

Oracle Certified Associate, Java SE Programmer

Java SE 11 Java SE 11: Encapsulation
Java SE 11: Exception Handling
Java SE 11: Expressions, Arrays, & Loops
Java SE 11: Flow Control & Debugging
Java SE 11: Inheritance, Lists, Inference, & Lambda Expressions
Java SE 11: Inheritance, Polymorphism, & Abstraction
Java SE 11: Introduction to Java SE & the NetBeans IDE
Java SE 11: JDK Objects & Nested Loops
Java SE 11: JShell
Java SE 11: Modular Design
Java SE 11: Objects & Classes
Java SE 11: Strings & Primitive Data Types
Java SE 11: Variables & Operators
Java SE 8 Classes & Objects
Classes, Data Types & Regular Expressions
Conditions & Arrays
Data Manipulation
Deployment & Application Enhancement
Encapsulation & Overloaded Constructors
Introduction to Java
Methods & Conditionals
Operators & Conditionals
TestPrep: 1Z0-808: Java SE 8 Programmer I
Working with Exceptions
Working with Inheritance
Working with Interfaces
Working with Variables

Oracle Certified Professional, Java SE Programmer

Java SE 11 Java SE 11 Programmer II: Class Concepts & Managing Exceptions
Java SE 11 Programmer II: Concurrency Management
Java SE 11 Programmer II: Core Java Libraries
Java SE 11 Programmer II: Database Applications
Java SE 11 Programmer II: Functional Programming in Java
Java SE 11 Programmer II: Fundamental Language Enhancements
Java SE 11 Programmer II: Fundamentals
Java SE 11 Programmer II: Generics & Collections in Java
Java SE 11 Programmer II: Implementing NIO.2
Java SE 11 Programmer II: Lambda Operations & Streams
Java SE 11 Programmer II: Localization in Java
Java SE 11 Programmer II: Object-oriented Programming in Java
Java SE 11 Programmer II: Secure Coding in Java SE 11 Applications
Java SE 11 Programmer II: Streams & Pipelines
Java SE11 Programmer II: Arrays & Program Flow Control
Java SE 8 Class Structure & Encapsulation
Classes, Interfaces, & Lambda Expressions
Concurrency & Parallelism
Exceptions & Deployment
Inheritance, Interfaces, & Deployment
Interfaces, Lambda Expressions, Collections, & Generics
Path Interface, Files Class, & Stream API
Polymorphism & Abstraction
The JDBC API & Localization
Working with File I/O
Working with the Date/Time API

Oracle Database 12c Administrator Certified Associate

Oracle 12c Aggregating Data
Auditing Features & Configuration
Backing Up & Recovering Data
Connecting to & Configuring a Database Instance
Connectivity & Space Management
Customizing Output
Data Conversion
Data Manipulation Language
Database Maintenance
Database Transactions
Importing & Exporting Data
Job Scheduling
LAB: Oracle Database 12c – Installation and Administration
LAB: Oracle Database 12c – SQL Fundamentals
Managing a Database Instance
Oracle Database Instance Overview
Performance Tuning
Relational Database Concepts
Resource Management
Restricting Output
SELECT Statement, Expressions, & Operators
SQL Developer
SQL Tuning
SQL*Plus Commands
Undo Feature Overview
User Security Features & Configuration
Working with DDL
Working with Joins
Working with SET Operators
Working with Subqueries
Working with Substitution
Oracle SQL 12c Oracle Database 12c R2 SQL: Controlling User Access
Oracle Database 12c R2 SQL: Conversion Functions & Conditional Expressions
Oracle Database 12c R2 SQL: Creating Other Schema Objects
Oracle Database 12c R2 SQL: Data Definition Language (DDL)
Oracle Database 12c R2 SQL: Data Manipulation Language & Transaction Control Language
Oracle Database 12c R2 SQL: Displaying Data from Multiple Tables
Oracle Database 12c R2 SQL: Managing Objects with Data Dictionary ViewsÂ
Oracle Database 12c R2 SQL: Managing Schema Objects   Â
Oracle Database 12c R2 SQL: Manipulating Data Using Advanced Queries
Oracle Database 12c R2 SQL: Reporting Aggregated Data Using Group Functions  Â
Oracle Database 12c R2 SQL: Restricting & Sorting Data
Oracle Database 12c R2 SQL: SQL*Plus
Oracle Database 12c R2 SQL: Using Basic SELECT statements
Oracle Database 12c R2 SQL: Using Single-Row Functions to Customize Output  Â
Oracle Database 12c R2 SQL: Using Structured Query Language (SQL)
Oracle Database 12c R2 SQL: Using Subqueries to Solve QueriesÂ
Oracle Database 12c R2 SQL: Using the Set Operators Â

Oracle Database 12c Administrator Certified Professional

Oracle 12c Assessing Recovery Requirements
Backup & Recovery Options
Backup Strategies
Configuring Flashback Technologies
Data Transportation
Duplicating Databases
Failure & Recovery Concepts
Performing & Managing Backups
Performing PITR
Recovery & Availability
Recovery After Loss
Recovery Configuration
Secure Backup
Tuning RMAN
Using Flashback Technologies

Oracle Database 12c: Performance Management and Tuning

Oracle 12c ADDM & ASH
Application Monitoring
Automatic Workload Repository
Implementing Performance Tuning
Introduction to Performance Tuning
Maintaining SQL Performance
Measuring SQL Performance
Memory Tuning Techniques
Metrics & Monitoring
Performance Tuning Methodology
Performance Tuning Summary
Performance, Migration, & Compression
SQL Diagnostics
SQL Memory Usage Tuning
Tuning Instance Memory
Tuning Problem SQL Statements

Oracle Database 12c: RAC and Grid Infrastructure Administration

Oracle 12c Application Failover & Continuity
Automatic Storage Management
Grid Infrastructure
High Availability
Quality of Service
RAC Administration
RAC Administration Services & Multitenant Architecture
RAC Architecture
RAC Backup & Recovery
RAC Configuration
RAC Global Resource Management
RAC Initialization Parameters
RAC Monitoring
RAC One Node
RAC Recovery Manager
RAC Service Management
RAC Tuning

Oracle Database Administration

Oracle 12c Aggregating Data
Assessing Recovery Requirements
Auditing Features & Configuration
Backing Up & Recovering Data
Backup & Recovery Options
Backup Strategies
Configuring Flashback Technologies
Connecting to & Configuring a Database Instance
Connectivity & Space Management
Customizing Output
Data Conversion
Data Manipulation Language
Data Transportation
Database Maintenance
Database Transactions
Duplicating Databases
Failure & Recovery Concepts
Importing & Exporting Data
Job Scheduling
LAB: Oracle Database 12c – Installation and Administration
LAB: Oracle Database 12c – SQL Fundamentals
Managing a Database Instance
Oracle Database Instance Overview
Performance Tuning
Performing & Managing Backups
Performing PITR
Recovery & Availability
Recovery After Loss
Recovery Configuration
Relational Database Concepts
Resource Management
Restricting Output
Secure Backup
SELECT Statement, Expressions, & Operators
SQL Developer
SQL Tuning
SQL*Plus Commands
Tuning RMAN
Undo Feature Overview
User Security Features & Configuration
Using Flashback Technologies
Working with DDL
Working with Joins
Working with SET Operators
Working with Subqueries
Working with Substitution
Oracle SQL 12c Oracle Database 12c R2 SQL: Controlling User Access
Oracle Database 12c R2 SQL: Conversion Functions & Conditional Expressions
Oracle Database 12c R2 SQL: Creating Other Schema Objects
Oracle Database 12c R2 SQL: Data Definition Language (DDL)
Oracle Database 12c R2 SQL: Data Manipulation Language & Transaction Control Language
Oracle Database 12c R2 SQL: Displaying Data from Multiple Tables
Oracle Database 12c R2 SQL: Managing Objects with Data Dictionary ViewsÂ
Oracle Database 12c R2 SQL: Managing Schema Objects   Â
Oracle Database 12c R2 SQL: Manipulating Data Using Advanced Queries
Oracle Database 12c R2 SQL: Reporting Aggregated Data Using Group Functions  Â
Oracle Database 12c R2 SQL: Restricting & Sorting Data
Oracle Database 12c R2 SQL: SQL*Plus
Oracle Database 12c R2 SQL: Using Basic SELECT statements
Oracle Database 12c R2 SQL: Using Single-Row Functions to Customize Output  Â
Oracle Database 12c R2 SQL: Using Structured Query Language (SQL)
Oracle Database 12c R2 SQL: Using Subqueries to Solve QueriesÂ
Oracle Database 12c R2 SQL: Using the Set Operators Â

Oracle RAC

Oracle 12c Application Failover & Continuity
Automatic Storage Management
Grid Infrastructure
High Availability
Quality of Service
RAC Administration
RAC Administration Services & Multitenant Architecture
RAC Architecture
RAC Backup & Recovery
RAC Configuration
RAC Global Resource Management
RAC Initialization Parameters
RAC Monitoring
RAC One Node
RAC Recovery Manager
RAC Service Management
RAC Tuning

Oracle SQL

Oracle 12c Aggregating Data
Customizing Output
Data Conversion
Data Manipulation Language
Database Transactions
LAB: Oracle Database 12c – SQL Fundamentals
Relational Database Concepts
Restricting Output
SELECT Statement, Expressions, & Operators
SQL Developer
SQL*Plus Commands
Working with DDL
Working with Joins
Working with SET Operators
Working with Subqueries
Working with Substitution

OWASP

OWASP A10 and A9: API and Component Attacks
A4 and A2: Broken Applications
A5 and A1: Security and Injection
A7 and A6: Leaky and Unprepared Applications
A8 and A3: Cross-Site Attacks
OWASP Overview
OWASP: Top 10 Item A10
OWASP: Top 10 Items A3, A2, & A1
OWASP: Top 10 Items A6, A5, & A4
OWASP: Top 10 Items A9, A8, & A7
Top 10 List Items
OWASP 2017 OWASP: Top 10 & Web Applications
OWASP: Web Application Security

Penetration Testing

Avg PSVs CompTIA PenTest+: Network-Based Exploits
CompTIA PenTest+: Social Engineering & Specialized System Attacks
IT Security Pen Testing Awareness: Results Management
Penetration Testing Fundamentals
CompTIA PenTest+: Analyzing Tool & Script Output
CompTIA PenTest+: Application-Based Vulnerabilities
CompTIA PenTest+: Information Gathering
CompTIA PenTest+: Local Host Vulnerabilities
CompTIA PenTest+: Penetration Testing Tools
CompTIA PenTest+: Planning for an Engagement
CompTIA PenTest+: Post-Exploitation & Facilities Attacks
CompTIA PenTest+: Reporting & Communication
CompTIA PenTest+: Scoping an Engagement
CompTIA PenTest+: Vulnerability Identification

Performance Engineering

Performance Engineering ANTS Performance Profiler
Application Performance Analyzer
Application Performance Engineering Elements
Application Performance Engineering Fundamentals
Heap & Thread and Monitor Dump Analyzers
IBM Memory Analyzer & Visualizer
IBM Pattern Modelling Analysis Tool (PMAT)
Java Application Performance Analysis Tools

Perl

Perl 5.0.1.0 Arrays, Operators, & Functions
Expressions, Modules, & Objects
Perl Language & Programming Control
Working with Files & Databases

PhoneGap

PhoneGap 0.9.2 Basic & Advanced Native API Features
Build & Debugging
CLI, Plugins, & Hooks
Installation

PHP

Zend 2.4 Controllers & Views
Databases & the Zend Framework
Frameworks & Modules
Layout, Navigation, & Advanced Functionality

Pivotal Cloud Foundry

Cloud Foundry 2018 Architecture
Command Line Interface
Logging, Scaling, & High Availability
Managed & User-provided Services
Overview

PMBOK® Guide

PMBOK® Guide Sixth Edition Analyzing Risk (PMBOK® Guide Sixth Edition)
Capturing, Analyzing, and Using Project Lessons Learned
Control the Project Schedule (PMBOK® Guide Sixth Edition)
Create Work Breakdown Structure (PMBOK® Guide Sixth Edition)
Creating a Project Budget (PMBOK® Guide Sixth Edition)
Define and Sequence Activities (PMBOK® Guide Sixth Edition)
Develop and Manage Resources (PMBOK® Guide Sixth Edition)
Develop the Project Schedule (PMBOK® Guide Sixth Edition)
Identifying Risk (PMBOK® Guide Sixth Edition)
Keeping Your Project on Budget (PMBOK® Guide Sixth Edition)
Manage and Control Quality (PMBOK® Guide Sixth Edition)
Managing Project Work (PMBOK® Guide Sixth Edition)
Managing Stakeholder Engagement (PMBOK® Guide Sixth Edition)
Monitor Project Communications (PMBOK® Guide Sixth Edition)
Plan and Acquire Resources (PMBOK® Guide Sixth Edition)
Plan and Define Project Scope (PMBOK® Guide Sixth Edition)
Plan and Manage Communications (PMBOK® Guide Sixth Edition)
Planning Quality Management (PMBOK® Guide Sixth Edition)
Planning Risk Management (PMBOK® Guide Sixth Edition)
Planning Stakeholder Engagement (PMBOK® Guide Sixth Edition)
Procurement Management (PMBOK® Guide Sixth Edition)
Procurement Planning (PMBOK® Guide Sixth Edition)
Project Changes and Closing (PMBOK® Guide Sixth Edition)
Project Fundamentals (PMBOK® Guide Sixth Edition)
Project Initiation and Planning (PMBOK® Guide Sixth Edition)
Project Management Introduction (PMBOK® Guide Sixth Edition)
Quality Methodologies and Standards for Project Management
Responding to Risk (PMBOK® Guide Sixth Edition)
Strategically Focused Project Management
The Process Groups (PMBOK® Guide Sixth Edition)
Validate and Control Scope (PMBOK® Guide Sixth Edition)
Ethical Standards and PMI® Core Values
Ethics and Project Management

PMI-ACP®

Agile Key Exam Concepts
Agile Principles and Methodologies
Agile Project Planning
Agile Project Scheduling and Monitoring
Agile Stakeholder Engagement and Team Development
TestPrep: PMI Agile Certified Practitioner

PMP®

PMBOK® Guide Sixth Edition Analyzing Risk (PMBOK® Guide Sixth Edition)
Capturing, Analyzing, and Using Project Lessons Learned
Control the Project Schedule (PMBOK® Guide Sixth Edition)
Create Work Breakdown Structure (PMBOK® Guide Sixth Edition)
Creating a Project Budget (PMBOK® Guide Sixth Edition)
Define and Sequence Activities (PMBOK® Guide Sixth Edition)
Develop and Manage Resources (PMBOK® Guide Sixth Edition)
Develop the Project Schedule (PMBOK® Guide Sixth Edition)
Identifying Risk (PMBOK® Guide Sixth Edition)
Keeping Your Project on Budget (PMBOK® Guide Sixth Edition)
Manage and Control Quality (PMBOK® Guide Sixth Edition)
Managing Project Work (PMBOK® Guide Sixth Edition)
Managing Stakeholder Engagement (PMBOK® Guide Sixth Edition)
Monitor Project Communications (PMBOK® Guide Sixth Edition)
Plan and Acquire Resources (PMBOK® Guide Sixth Edition)
Plan and Define Project Scope (PMBOK® Guide Sixth Edition)
Plan and Manage Communications (PMBOK® Guide Sixth Edition)
Planning Quality Management (PMBOK® Guide Sixth Edition)
Planning Risk Management (PMBOK® Guide Sixth Edition)
Planning Stakeholder Engagement (PMBOK® Guide Sixth Edition)
Procurement Management (PMBOK® Guide Sixth Edition)
Procurement Planning (PMBOK® Guide Sixth Edition)
Project Changes and Closing (PMBOK® Guide Sixth Edition)
Project Fundamentals (PMBOK® Guide Sixth Edition)
Project Initiation and Planning (PMBOK® Guide Sixth Edition)
Project Management Introduction (PMBOK® Guide Sixth Edition)
Quality Methodologies and Standards for Project Management
Responding to Risk (PMBOK® Guide Sixth Edition)
Strategically Focused Project Management
TestPrep: Project Management Professional (PMP) 6th Edition
The Process Groups (PMBOK® Guide Sixth Edition)
Validate and Control Scope (PMBOK® Guide Sixth Edition)
Ethical Standards and PMI® Core Values
Ethics and Project Management

PostgreSQL

PostgreSQL 9.4.5 Data Retrieval
DDL, DML, & Constraints
Objects & Retrieving Data
Security & Administration

Power BI

Microsoft Power BI 2.44 Data Modeling & Visualization
Data Preparation
Data Sourcing
Getting Started with Data Analytics

PowerShell

PowerShell 3 Database Management
Managing SQL Server
Policies & Jobs
Working with SQL PowerShell
PowerShell 4 Administration
Advanced DSC Resource Creation
Advanced DSC, Azure, & HyperV
Aliases & Providers
Commands & Cmdlets
Creating a DSC Pull Server & Improving DSC Configurations
Databases and Client Access
Desired State Configuration Fundamentals
Distribution Groups and Databases
Getting Started with PowerShell
Introduction to Desired State Configuration (DSC)
Linux & JEA
Mailbox Rules and Archives
Managing Mailboxes
Managing SharePoint
Managing Sites
Modules & Customization
Pipeline, Objects, & Formatting
PowerShell &  Exchange Server: Getting Started
PowerShell & Exchange Server: Message Distribution
PowerShell Remoting
Repositories & Resource Creation
Security & Search
Services & Databases
SharePoint configuration & PowerShell
Writing DSC Resources
PowerShell 5.1 Aliases, Providers, & Objects
Cmdlet Structure & Help
Configuration, Advanced Help, & Queries
Desired State Configuration (DSC)
DSC & Azure
DSC Resources
DSC with Linux & JEA
DSC, Configurations, & Repositories
Introduction
Local Configuration Manager (LCM)
Output Formatting, Modules, & Customization
Remote Management
Resource Creation & Configuration
Syntax, Help, & Conditionals

Predictive Analytics

Predictive Analytics Applying Predictive Analytics
Predictive Modeling: Implementing Predictive Models Using Visualizations
Predictive Modeling: Predictive Analytics & Exploratory Data Analysis
A/B Testing, Bayesian Networks, & Support Vector Machine
Clustering Techniques
Correlation & Regression
Data Collection & Exploration
Data Considerations in Analytics
Data Mining, Data Distributions, & Hypothethis Testing
Data Preprocessing
Data Reduction & Exploratory Data Analysis (EDA)
Key Statistical Concepts
K-Nearest Neighbor (k-NN) & Artificial Neural Networks
Linear & Logical Regression
Machine Learning, Propensity Score, & Segmentation Modeling
Model Development, Validation, & Evaluation
Model Life Cycle Management
Process & Applications
Random Forests & Uplift Models
Text Mining & Social Network Analysis
Time Series Modeling

PRINCE2®

PRINCE2® TestPrep: PRINCE2® 2017 Foundation
PRINCE2® 2017 Adopting PRINCE2® for your Project Environment (2017 Update)
PRINCE2® Control, Manage, and Close Projects (2017 Update)
PRINCE2® Project Management Overview (2017 Update)
PRINCE2® Project Planning and Risk Management (2017 Update)
PRINCE2® Project Quality and Control (2017 Update)
PRINCE2® Start, Direct, and Initiate Projects (2017 Update)

PRINCE2® Foundation

PRINCE2® TestPrep: PRINCE2® 2017 Foundation
PRINCE2® 2017 Adopting PRINCE2® for your Project Environment (2017 Update)
PRINCE2® Control, Manage, and Close Projects (2017 Update)
PRINCE2® Project Management Overview (2017 Update)
PRINCE2® Project Planning and Risk Management (2017 Update)
PRINCE2® Project Quality and Control (2017 Update)
PRINCE2® Start, Direct, and Initiate Projects (2017 Update)

Project Management Professional Certification (PMP) Bootcamp

PMBOK® Guide Sixth Edition TestPrep: Project Management Professional (PMP) 6th Edition
Project Management Professional (PMP) 6th Edition PMP Bootcamp: Live Session 1
PMP Bootcamp: Live Session 2
PMP Bootcamp: Live Session 3
PMP Bootcamp: Live Session 4
Project Management Professional(PMP) 6th Edition PMP Bootcamp: Live Session 5

Puppet

Puppet Puppet Refactoring Patterns
Puppet 3.4.3 Configuring Puppet Environments & Managing Files
LAB: Puppet
Puppet 5.0 Building the Puppet Environment
Configuring the Puppet Master & Puppet Agent
Puppet 6.x Puppet for DevOps: Installing & Working with Puppet Components
Puppet for DevOps: Working with Puppet Bolt & Continuous Delivery for PE

Python

Django 2.2 Building Web Apps Using Django: Building a Basic Website
Building Web Apps Using Django: Generic Views
Building Web Apps Using Django: Implementing Login & Logout
Building Web Apps Using Django: Introduction to Web Frameworks & Django
Building Web Apps Using Django: Models & User Registration
Building Web Apps Using Django: Templates & User Administration
Flask 1.1 Flask in Python: An Introduction to Web Frameworks & Flask
Flask in Python: Building a Simple Web Site Using Flask
Flask in Python: User Authentication in a Flask Application
Flask in Python: User Interactions in Flask Applications
PyCharm 2019.2.4 Introduction to Using PyCharm IDE
Python LAB: Data Visualization with Python
LAB: Data Wrangling with Python
Python 3 Applications
Classes
Collections, Mapping, & Looping
Comprehensions
Data & Sequence Types
Data Processing
Data Science Fundamentals
Exceptions
Fundamentals
IT Infrastructure Automation: Python Automation Programming
Iterables & Generators
LAB: Python Fundamentals
Modules & Functions
Python – Advanced Operations with NumPy Arrays
Python – Introduction to NumPy for Multi-dimensional Data
Python – Introduction to Pandas and DataFrames
Python – Manipulating & Analyzing Data in Pandas DataFrames
Python: Getting Started
Test-driven Development
The Django Framework
The TurboGears & Flask Frameworks
Web2py Overview
Working with Files
Python 3.0 Conditional Statements & Loops: Advanced Operations Using for Loops in Python
Conditional Statements & Loops: While Loops in Python
Python 3.0+ Advanced Python Topics: Migrating from Python 2 to Python 3
Advanced Python Topics: Modules & Virtual Environments
Functions in Python: Gaining a Deeper Understanding of Python Functions
Functions in Python: Introduction
Functions in Python: Working with Advanced Features of Python Functions
LAB: DL Programmer
Python Classes & Inheritance: Advanced Functionality Using Python Classes
Python Classes & Inheritance: Getting Started with Classes in Python
Python Classes & Inheritance: Introduction
Python Classes & Inheritance: Working with Inheritance in Python
Python Unit Testing: Advanced Python Testing Using the unittest Framework
Python Unit Testing: An Introduction to Python’s unittest Framework
Python Unit Testing: Testing Python Code Using doctest
Python Unit Testing: Testing Python Code Using pytest
Python 3.6 LAB: Introduction to Programming Using Python
Python 3.6.5 Deep Learning & Neural Network Implementation
Implementing ML Algorithm Using scikit-learn
Implementing Robotic Process Automation
Machine Learning & Data Analytics
Supervised, Unsupervised & Deep Learning
Python 3.7 Complex Data Types in Python: Shallow & Deep Copies in Python
Complex Data Types in Python: Working with Dictionaries & Sets in Python
Complex Data Types in Python: Working with Lists & Tuples in Python
Data Structures & Algorithms in Python: Fundamental Data Structures
Data Structures & Algorithms in Python: Implementing Data Structures
Data Structures & Algorithms in Python: Implementing Sorting Algorithms
Data Structures & Algorithms in Python: Implementing Trees & Graphs
Data Structures & Algorithms in Python: Sorting Algorithms
Data Structures & Algorithms in Python: Trees & Graphs
Excel with Python: Constructing Data Visualizations
Excel with Python: Performing Advanced Operations
Excel with Python: Working with Excel Spreadsheets from Python
Getting Started with Python: Introduction
Python Design Patterns: Principles of Good Design
Python Design Patterns: Working with Behavioral Design Patterns
Python Design Patterns: Working with Creational Design Patterns
Python Design Patterns: Working with Structural Design Patterns
Python Requests: HTTP Requests with Python
Socket Programming in Python: Advanced Topics
Socket Programming in Python: Introduction
Python 3.7.1 LAB: Analyzing Data with Python
Python 3+ Advanced Python Topics: Exceptions & Command Line Arguments
Advanced Python Topics: File Operations in Python
Python Anaconda 4+ LAB: Python for Data Science
Conditional Statements & Loops: If-else Control Structures in Python
Conditional Statements & Loops: The Basics of for Loops in Python

Python for Data Science

Data Science Streaming Data Architectures: An Introduction to Streaming Data in Spark
Streaming Data Architectures: Processing Streaming Data with Spark
Python LAB: Data Visualization with Python
LAB: Data Wrangling with Python
LAB: Implementing Data Ops with Python
Python 3 Python – Advanced Operations with NumPy Arrays
Python – Introduction to NumPy for Multi-dimensional Data
Python – Introduction to Pandas and DataFrames
Python – Manipulating & Analyzing Data in Pandas DataFrames
Python – Pandas Advanced Features
Python – Using Pandas for Visualizations and Time-Series Data
Python – Using Pandas to Work with Series & DataFrames
Python for Data Science: Advanced Data Visualization Using Seaborn
Python for Data Science: Basic Data Visualization Using Seaborn
Python Anaconda 2018.12 Applied Predictive Modeling
Python Anaconda 4+ LAB: Python for Data Science

Python Novice to Pythonista

Confluence Web Configuring Spaces
Setting Up & Managing Spaces
Signing in & Navigating within Spaces
Working with Spaces
Working with Team Members
Flask 1.1 Flask in Python: An Introduction to Web Frameworks & Flask
Flask in Python: Building a Simple Web Site Using Flask
Flask in Python: User Authentication in a Flask Application
Flask in Python: User Interactions in Flask Applications
PyCharm 2019.2.4 Introduction to Using PyCharm IDE
Python 3.0 Conditional Statements & Loops: Advanced Operations Using for Loops in Python
Conditional Statements & Loops: While Loops in Python
Python 3.0+ Advanced Python Topics: Migrating from Python 2 to Python 3
Advanced Python Topics: Modules & Virtual Environments
Functions in Python: Gaining a Deeper Understanding of Python Functions
Functions in Python: Introduction
Functions in Python: Working with Advanced Features of Python Functions
Python Classes & Inheritance: Advanced Functionality Using Python Classes
Python Classes & Inheritance: Getting Started with Classes in Python
Python Classes & Inheritance: Introduction
Python Classes & Inheritance: Working with Inheritance in Python
Python Concurrent Programming: Asynchronous Executions in Python
Python Concurrent Programming: Introduction to Concurrent Programming
Python Concurrent Programming: Multiprocessing in Python
Python Concurrent Programming: Multithreading in Python
Python Unit Testing: Advanced Python Testing Using the unittest Framework
Python Unit Testing: An Introduction to Python’s unittest Framework
Python Unit Testing: Testing Python Code Using doctest
Python Unit Testing: Testing Python Code Using pytest
Python 3.7 Complex Data Types in Python: Shallow & Deep Copies in Python
Complex Data Types in Python: Working with Dictionaries & Sets in Python
Complex Data Types in Python: Working with Lists & Tuples in Python
Data Structures & Algorithms in Python: Fundamental Data Structures
Data Structures & Algorithms in Python: Implementing Data Structures
Data Structures & Algorithms in Python: Implementing Sorting Algorithms
Data Structures & Algorithms in Python: Implementing Trees & Graphs
Data Structures & Algorithms in Python: Sorting Algorithms
Data Structures & Algorithms in Python: Trees & Graphs
Excel with Python: Constructing Data Visualizations
Excel with Python: Performing Advanced Operations
Excel with Python: Working with Excel Spreadsheets from Python
Getting Started with Python: Introduction
Python Design Patterns: Principles of Good Design
Python Design Patterns: Working with Behavioral Design Patterns
Python Design Patterns: Working with Creational Design Patterns
Python Design Patterns: Working with Structural Design Patterns
Python Requests: HTTP Requests with Python
Socket Programming in Python: Advanced Topics
Socket Programming in Python: Introduction
Python 3+ Advanced Python Topics: Exceptions & Command Line Arguments
Advanced Python Topics: File Operations in Python
Slack for iOS Using the iOS App
Slack Web Configuring Slack
Creating, Finding & Sharing Information
Private Messaging & Communication Tools
Signing In & Setting Up
Using Channels
Conditional Statements & Loops: If-else Control Structures in Python
Conditional Statements & Loops: The Basics of for Loops in Python
Contributing as a Virtual Team Member
Developing a Growth Mind-set
Developing a Successful Team
Developing and Supporting an Agile Mind-set
Encouraging Team Communication and Collaboration
Getting to the Root of a Problem
Reaching Sound Conclusions
The Essential Role of the Agile Product Owner
Unleashing Personal and Team Creativity
Using Strategic Thinking to Consider the Big Picture

QlikView

QlikView 11 QlikView: Application Deployment
QlikView: Dashboards & Comparative Analysis
QlikView: Data Governance & Metadata Management
QlikView: Data Modeling
QlikView: Design & Security
QlikView: Dimensional Modeling
QlikView: Extract, Transform, & Load (ETL)
QlikView: Getting Started
QlikView: Macros & Properties
QlikView: Performance & Scalability
QlikView: Scripting
QlikView: Server
QlikView: Sheets, Charts, & Tables

R for Data Science

RStudio 1.1.4 Cleaning Data in R
Data Exploration using R
Importing & Exporting Data using R
R Classification & Clustering
R Data Structures
R for Data Science: Data Visualization
R Regression Methods
RStudio 1.1.x LAB: Data Science Using R Lab

R Programming

Microsoft R Open  3.4.2 Packages and Data Types
Microsoft R Open 3.4.2 Cluster Analysis & Ensemble Learning
Data Visualization & Predictive Analytics
Decision Tree & Classification Analysis
Getting Started with Microsoft R
Importing & Manipulating Data
Modifying & Summarizing Data
Regression Analysis
The R Language & Big Data Processing
RStudio 0.98.994 Introduction
Statistics & Data Visualization

RabbitMQ

RabbitMQ 3.7 Configuration & Troubleshooting
Introduction to RabbitMQ
Message Handling & Clustering

RavenDB

RavenDB 3 Creating Documents
Deployment & Scaling
Indexes
MVC & Server Management
RavenDB: Getting Started
Updating & Patching Documents

React

React LAB: Reactive Programming with Redux VM Requirements
React  16.3.2 Build & Integrate React Applications with Redux Capabilities
Build and Test SPA Using React & Redux
Enhance Reactive Applications with Advanced React
Reactive Programming Using Redux
React 15.4.0 Configuring a Developer Machine
Configuring Components
LAB: App Development with React and Flux
Router Configuration
Web Development Concepts
Working with Flux
Working with Forms

Red Hat Certified System Administrator (RHCSA)

Red Hat Enterprise Linux 7 Archiving
Bash Script Programming
Bash Scripting
Boot Process
Configuring Gnome
Directory Services
File Management
File Permissions
File Systems & Partitions
Firewalls
Installation
Job Scheduling
Kickstart & First-run Issues
Logging
Logical Volume Management
Network File Systems
Network Services
Networking
Package Management
Processes, Services, & Daemons
Remote Access
SELinux
Troubleshooting
User & Group Management
Using grep
Using Linux Shells
Using the Bash Shell
Virtualization

REST

REST Architecture & Databases Deployment
Exploring the Basic Features
Security & Advanced Features
Working with Methods & Formatters
Visual Studio 2012 N-Tier Architecture: Designing & Building Applications
REST Architecture: Designing & Building Applications

Ruby

Ruby 2.5 Ruby Full Stack Development: Flow Control & Data Types
Ruby Full Stack Development: Introduction
Ruby Full Stack Development: Object-Oriented Programming
Ruby Full Stack Development: RegEx & I/O with Ruby
Ruby Full Stack Development: Threads & Security
Ruby Full Stack Development: Unit Testing & Behavior Driven Development
Ruby on Rails 4.2 Active Jobs & Action Mailer
ActiveRecords
API Advanced Features
APIs
Asset Pipelines, Caching, & Advanced Setup
Configuration, Scaffolding, & Routing
Helpers, Authentication, & Authorization
Migrations & ActionController
Testing
Validations, Scopes, & Callbacks

Salesforce Development

SalesForce 2015 Basic Programming in Force.com
Creating Apps
Data, Layouts, & Views
Developing GUIs
Intermediate Programming in Force.com
Mobile, Security, & Users
Reports & Dashboards
Workflow Rules & Dashboards
Workflows, Logic, & Testing

SAS

SAS 9 Creating & Reading Data Sets
Creating Reports
Creating Summary Reports & Charts
Data Errors & Validation
Data Manipulation
Data Manipulation & Debugging
Inputs & Outputs
Introduction to Data Sets
The SAS Environment
Working with Arrays & Restructuring and Merging Data Sets
Working with DO Loops & Proc SQL

SAS® Certified Base Programmer

SAS 9 Creating & Reading Data Sets
Creating Reports
Creating Summary Reports & Charts
Data Errors & Validation
Data Manipulation
Data Manipulation & Debugging
Inputs & Outputs
Introduction to Data Sets
The SAS Environment
Working with Arrays & Restructuring and Merging Data Sets
Working with DO Loops & Proc SQL

Scala

Scala 2.11.7 Collections & Strings
Concurrency
Constructors, Fields, Objects, & Inheritance
Expressions & Parallel Computation
Functional Programming
Operations & Operators
Overview & Syntax Basics
Pattern Matching & Java Interoperability
Simple Build Tool (SBT) & Scala.js
Scalding 0.13.9 Basic Scalding Programming
Components, Functions, & MapReduce

Scrum

SCRUM SCRUM Meetings: On-target Daily Meetings
Transition to Scrum: Agile Foundation to Scrum
Transitioning to Scrum
Addressing Sprint Execution Challenges
Agile Philosophy
Developing the Product & Sprint Backlogs
Distributed Scrum & Done Challenges
Integrating & Customizing Scrum
Project Management: Scrum Framework for Software Development
Release & Sprint Planning
Scrum Artifacts and Investment Guidelines
SCRUM Meetings
SCRUM Roles
Scrum Team Velocity: Exploring Team Velocity
Team Velocity and User Stories

Secure Programming

Android Defensive Programming Input
Defensive Programming Methods
Defensive Programming Standards
Errors & Exceptions
Errors & Testing
Java Defensive Techniques
Network Access
Preconditions & Design by Contract
Defensive Coding C# Defendable Code and Errors for C#
Defensive Coding for C#
Defensive Coding Fundamentals for C#
Securing WCF Applications
Defensive Coding C/C++ Defendable Code and Errors
Defensive Coding Best Practices for C/C++
Defensive Coding for C/C++
Defensive Coding Fundamentals for C/C++
Defensive Coding iOS Managing Network Interaction
Managing Upload & Download in iOS
Protecting Data in iOS Apps
Protecting Data through Encryption & Decryption
TCP Connections & Network Availability
Testing Methodology & Automation
Thinking Defensively about Functions & Methods
Thinking Defensively about Input, Constants, & Conditionals
Working with Errors & Exceptions
Java 8 Classes, Objects, Method and Loop
Data Handling and Concurrency
Data Security and Access Control
Defending Attacks
Fundamentals
LAB: Defensive Programming in Java
JavaScript Defensive Coding for JavaScript and HTML5
Defensive Coding Fundamentals for JavaScript and HTML5
Defensive Coding, APIs, and Security
Error Handling for JavaScript and HTML5
Visual Studio 2015 Role Based Security
Securing .NET Programming

Secure Programming Core Concepts

Application Security in .NET
Code Access Security & Cryptography in .NET
Creating Secure C/C++ Code
Defensive Programmer: Advanced Concepts
Defensive Programmer: Code Samples
Defensive Programmer: Cryptography
Defensive Programmer: Defensive Concepts
Defensive Programmer: Defensive Techniques
Defensive Programmer: Secure Testing
Introduction to Secure Programming
Secure Programmer: Attacks
Secure Programmer: Coding Practices
Secure Programmer: Encryption
Secure Programmer: Intro to Programming Standards
Secure Programmer: Resiliency Coding
Secure Programmer: Security Concepts
Secure Programmer: Software Design Techniques
Secure Programmer: Software Modeling Techniques
Secure Programmer: Software Testing
Secure Programmer: Vulnerabilities
Secure Programming for C/C++
Securing Attacks & User Input in C/C++ Applications
Security Architect: Secure Coding Concepts

Secure Software Lifecycle

Certified Secure Software Lifecycle Professional (CSSLP) 2019: Abuse Cases & RTMs
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Data Classification
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Privacy
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Design Principles
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Requirements
Secure Concepts
Secure Design
Secure Implementation & Coding
Secure Requirements
Secure Risk, Vulnerabilities, & Exposure
Secure Testing
Secure Versioning & Analysis
Software Acceptance, Deployment, Operations, & Maintenance
Software Acquisition
Software Design Technologies
Supply Chain & Software Acquisition

Security Analyst to Security Architect

Asana Web Creating & Managing Projects
Finding & Sharing Items
Running Reports & Configuring Projects
Signing in & Setting up a Team
Using the Conversation Tools
Basecamp 3 Managing your Project Tasks & Assets
Setting Up & Tracking Projects
Signing In & Setting Up
Using Basecamp for iOS
Using the Calendar Tools
Using the Team Communication Tools
Convo Communication Tools
Configuring Convo
Creating, Finding, & Sharing Information
Sign-in & Setup
The Convo iOS App
Working with Groups
Cryptography Cryptography: Introduction to Cryptography Services
Cryptography: Introduction to PKI
Cybersecurity An Executive’s Guide to Security: Protecting Your Information
An Executive’s Guide to Security: Understanding Security Threats
Auditing & Incident Response
Session & Risk Management
Forensics Ethics & Privacy: Digital Forensics
IT Security Information Security: APT Defenses
Information Security: Continual Infrastructure Testing
Information Security: Hardened Security Topologies
Information Security: Honeypots
Information Security: NACs & Gateways
Information Security: Pen Testing
Information Security: Securing Networking Protocols
Information Security: Subnetting & DNS for Security Architects
Intrusion Prevention: Best Practices
Risk Analysis: Security Risk Management
JIRA 6.4.3 Introducing the JIRA Platform
Leveraging the JIRA Platform for Development Projects
Microsoft Teams Call & Meeting Tools
Conversation Tools
Creating, Finding, & Sharing Information
Sign-in & Setup
Teams & Channels
Security Anomaly Detection: Network Anomaly Detection
End-User Security: Securing End Users against Attackers
End-User Security: The End-User Perspective
End-User Security: The Security Administrator Perspective
Six Sigma Yellow Belt Data Analysis and Root Cause Analysis in Six Sigma
Slack for iOS Using the iOS App
Slack Web Configuring Slack
Creating, Finding & Sharing Information
Private Messaging & Communication Tools
Signing In & Setting Up
Using Channels
Trello Web Creating Teams & Boards
Finding & Sharing Information
Managing Cards
Sign-in & Setup
Yammer Web Collaborating & Communicating
Configuring Networks
Posting & Reacting to Status Updates
Setting Up
Using Groups
Anomaly Detection: Aspects of Anomaly Detection
Authentication & Encryption: Best Practices
Confronting Your Assumptions
Developing and Supporting an Agile Mind-set
Digital Forensic Techniques & Investigative Approaches
Enabling Business Process Improvement
Identifying Risks in Your Organization
Information Security: Security Governance
Intrusion Detection Best Practices
Listening Even When it’s Difficult to Listen
Managing a Project to Minimize Risk and Maximize Quality
Managing for Operational Excellence
Security Architect: Secure Coding Concepts
Security Vulnerabilities: Managing Threats & Vulnerabilities
Taking Your Team to the Next Level with Delegation
Understanding Unconscious Bias

Security Core Concepts

Cybersecurity An Executive’s Guide to Security: Protecting Your Information
An Executive’s Guide to Security: Understanding Security Threats
IT Security Incident Tracking & Response
Information Security: APT Defenses
Information Security: Continual Infrastructure Testing
Information Security: Hardened Security Topologies
Information Security: Honeypots
Information Security: NACs & Gateways
Information Security: Pen Testing
Information Security: Securing Networking Protocols
Information Security: Subnetting & DNS for Security Architects
Intrusion Prevention: Best Practices
IT Security Fundamentals
Secure Corporate Communications & Networking
Using Corporate Devices Securely
Security Anomaly Detection: Network Anomaly Detection
End-User Security: Securing End Users against Attackers
End-User Security: The End-User Perspective
End-User Security: The Security Administrator Perspective
Account Changes & Attack Mitigation
Analyzing Output from Security Technologies
Anomaly Detection: Aspects of Anomaly Detection
Application & Service Attacks
Authentication & Encryption: Best Practices
Authorization & Registration
Business Impact Analysis & Risk Management
Cloud Computing, Virtualization, & Resiliency
Common Account Management Practices
Components Supporting Organizational Security
CompTIA Security+: Cryptography
Cryptographic & Wireless Attacks
Deploying Mobile Devices Securely
Digital Forensic Techniques & Investigative Approaches
Frameworks, Guidelines, & Physical Security
Fundamental Security Concepts
Identity & Access Management Controls
Identity & Access Services
Impacts from Vulnerability Types
Implementing a Secure Network Architecture
Implementing Secure Protocols
Incident Response, Forensics, Recovery,  & Security Controls
Information Security: Security Governance
Intrusion Detection Best Practices
LAB: CompTIA Security+ SY0-501
LAB: Practice Labs Introduction to Wireshark
Logon, Logoff & Password Policies
Password Security Requirements
Penetration Testing & Vulnerability Scanning
Policies, Plans, & Procedures
Public Key Infrastructure
Secure System, Application Design, & Deployment
Security Assessment Using Software Tools
Security Vulnerabilities: Managing Threats & Vulnerabilities
Social Engineering & Related Attacks
TestPrep: CompTIA Security+
The Present Threat Landscape
Troubleshooting Common Security Issues
Types of Malware
Understanding Attacks & Prevention Practices
Wireless Security Settings

Security Trends

Attack Vectors & Mitigations
Vulnerabilities and Exploits

Selenium

Selenium 2.9.1 Advanced Features & Debugging
Introduction to Automated Testing with Selenium
Locating, Verifying, & Testing Elements
Scripts & Commands

Server Core Concepts

CompTIA Server+ Disaster Recovery Planning & Backups
Introduction to Server Administration
Introduction to Server Architecture
Introduction to Server RAID
Introduction to Server Security
Introduction to Server Storage
Networking & Disaster Recovery
Ports, Protocols, & Cable Management
Server Maintenance, Protection, & VMs
Server Management & Maintenance
Server Policy, Planning, & Safety
Troubleshooting Methodology
Troubleshooting Security & Network Problems
Troubleshooting Storage, Software, & Networks
Server 2016 Nano Server First Look
LAB: Administering Windows Server 2012
LAB: CompTIA Server + 2014
LAB: Configuring Advanced Windows Server 2012 Services
LAB: Installing and Configuring Windows Server 2012
LAB: Windows Server Administration Fundamentals – Windows 10 Update
TestPrep: CompTIA Server+ 2014

Service-Oriented Architecture

SOA SOA & WCF
SOA Basics

SharePoint Server

SharePoint 2013 Application Solutions
Backups, Verification, & Troubleshooting
Content Support Solutions
Continuity Planning & Strategies
Continuity Solutions
Core Solutions & Business Processes
Core Solutions & Customization
Core Solutions & Office App Creation
Core Solutions & User Experience
Data Management Configuration & Credential Storage
Data Management Queries & Selection
Deploying & Managing Apps
Farm & Sandbox Solutions
Implementing Security Solutions
Integration & Project Server Deployment
LAB: Advanced Solutions of Microsoft SharePoint Server 2013
Managing Objects, Features, & Solutions
Managing Sandboxes, Validators, & Code
Planning Sites: Lists, Templates, & Collections
Planning Sites: Schema, Content, & Policies
Search Planning, Relevancy, Templates, & Reports
Search Services Solutions
Secure Store, BCS, & Service Applications
Support Services
TestPrep: Advanced Solutions of Microsoft SharePoint Server 2013
Upgrading Solutions
SharePoint 2016 Backup & Restore
Business Intelligence Tools
Designing a Logical Architecture
Enterprise Content Management (ECM)
Environment Monitoring & Optimization
Environment Troubleshooting
Farm & Web Application Security
High Availability & Disaster Recovery Solutions
Hybrid Deployments
Managing Solutions, Apps, & Productivity Services
On-premises Integration
Planning Installation
Search Management
Site Collection Security
Social Computing & Business Data Connectivity
Taxonomy & Managed Metadata Service (MMS)
Upgrading & Updating
Web Content Management (WCM)
LAB: Core Solutions of SharePoint Server 2013

Shell Scripting

Unix Automation Using Bash & Expect
Bash Advanced Scripting & File I/O
Bash Scripting Flow Control & Data Types
Introduction to Bash Scripting
LAB: Shell Scripting Essentials

Sinatra

Sinatra 1.4.6 Sinatra Fundamentals
Working with Content & Configuration
Working with Modular Applications & Rack
Working with Sinatra

Skype Administration

Skype for Business 2015 Archiving & External Access
Chat Room Configuration
Client Configuration Settings
Conferencing Deployment
Configuring Enterprise Voice
High Availability & Disaster Recovery
Planning, Installing, Upgrading, & Migrating
Troubleshooting Skype for Business

Software Automation

Automation IT Infrastructure Automation: Automated Monitoring
IT Infrastructure Automation: Automation & Scalability
IT Infrastructure Automation: Getting Started
IT Infrastructure Automation: Text File Processing & RegEx
IT Infrastructure Automation: Version Control & GIT
Chef 13.6.4 Chef: Getting Started
Community Cookbooks & Server Patterns
Server Basics
Test Driven Cookbooks
Chef 15.1 Chef for DevOps: Automate Infrastructure Using Chef Tools & Templates
Chef for DevOps: Managing Infrastructure Using Chef
Jenkins 1.62 Jenkins: Getting Started
Jobs, Security, & Run Options
Jenkins 2.0 Administration
Creating Application Builds
Introduction
LAB: Jenkins
Testing & Continuous Integration
Puppet Puppet Refactoring Patterns
Puppet 3.4.3 Configuring Puppet Environments & Managing Files
Puppet 5.0 Building the Puppet Environment
Configuring the Puppet Master & Puppet Agent
Python 3 IT Infrastructure Automation: Python Automation Programming
Vagrant 1.7.2 Boxes & Plugins
Commands, Share, & VM Provisioning
Getting Started with Vagrant
Networking, Synced Folders, & Clusters
Vagrant 1.8 Advanced Administration
Advanced Provisioning
Configuration, Automation, & Provisioning
Customization & Managing Infrastructure

Software Development Core Concepts

Microsoft Enterprise Library 6 Microsoft Enterprise Library
Classes & Inheritance
Data Protection & File Management
Databases, Rules, & Procedures
Design and Development Best Practices
Development Models & Version Control
Errors, Testing, & Debugging
Flowcharts, Tables, & Conditional Statements
Getting Started with Hello, World!
Introduction to Algorithms & Standard Containers
Introduction to Binary Trees & Sorting
Introduction to Graphs & Hashed Data Structures
JavaScript Rules, Functions, & HTML Elements
LAB: Software Development Fundamentals
Maintaining Code
Programming Strings & Data Structures
Programming Structure, Methods, & Variables
Recursion, Exceptions, Randomization, & Sorting
Software Development Concepts: Software Development Glossary
Software Security Best Practices
Source Coding Best Practices
Structures of Object-oriented Programming
Windows and Web Applications
Windows Forms Applications
Windows Store Applications

Software Project Analyst to Senior Software Project Manager

Agile Agile for Software Development: Lean, Agile, & Scrum Methodologies
Agile Hybrid Approaches
Agile Software Development: Agile Development Life Cycle
Value-driven Delivery: Delivering Value in Agile Projects
Agile Software Development Agile Software Development: Agile Project Management Techniques
Asana Web Creating & Managing Projects
Finding & Sharing Items
Running Reports & Configuring Projects
Signing in & Setting up a Team
Using the Conversation Tools
Basecamp 3 Managing your Project Tasks & Assets
Setting Up & Tracking Projects
Signing In & Setting Up
Using Basecamp for iOS
Using the Calendar Tools
Using the Team Communication Tools
Confluence Web Configuring Spaces
Setting Up & Managing Spaces
Signing in & Navigating within Spaces
Working with Spaces
Working with Team Members
Convo Communication Tools
Configuring Convo
Creating, Finding, & Sharing Information
Sign-in & Setup
The Convo iOS App
Working with Groups
JIRA 6.4.3 Introducing the JIRA Platform
Leveraging the JIRA Platform for Development Projects
Microsoft Teams Call & Meeting Tools
Conversation Tools
Creating, Finding, & Sharing Information
Sign-in & Setup
Teams & Channels
Project Management Project Management Tools: Understanding PM Tools
Project Management Tools: Understanding the Collaboration Tools
Slack for iOS Using the iOS App
Slack Web Configuring Slack
Creating, Finding & Sharing Information
Private Messaging & Communication Tools
Signing In & Setting Up
Using Channels
Trello Web Creating Teams & Boards
Finding & Sharing Information
Managing Cards
Sign-in & Setup
Yammer Web Collaborating & Communicating
Configuring Networks
Posting & Reacting to Status Updates
Setting Up
Using Groups
Advanced Agile: Leadership Techniques
Advanced Agile: Tools & Techniques
Agile Project Planning
Business Analysis for Project Management: Practices for Early Project Stages
Business Analysis for Project Management: Practices for Later Project Stages
Business Orientation: Strategic Organizational Goals
Decision Making for Software Project Managers
Developing and Supporting an Agile Mind-set
Embracing an Agile Culture for Business Growth
Encouraging Team Communication and Collaboration
Getting to the Root of a Problem
Improving Your Technical Writing Skills
Leading a Cross-functional Team
Leading through Positive Influence
Managing a Project to Minimize Risk and Maximize Quality
Managing and Engaging Stakeholders
Project Evaluation: Defining Success Metrics
Project Management Needs vs. Expectations
Project Meetings: Agile Project Meetings
Risk Management: Project Risk Assessment
Running Meetings in Better Directions
Skills for Project Analysts: Negotiation Skills
Software Data Analysis: Project Management Metrics
Software Development Concepts: Software Development Glossary
Software Project Management Communication Skills
Software Projects: Recruiting the Project Team
Software Requirements Planning
Stakeholder Communication: Software Projects & Stakeholder Communication
Strategies for Managing Technical Teams
Using Strategic Thinking to Consider the Big Picture

Software Testing

DevOps Software Testing for DevOps: Testing & DevOps Overview
Visual Studio 2013 Debugging Concepts
Debugging Environments & Dumps
Debugging in Windows 8
Debugging Tools
Debugging Tools & Best Practices
Introduction to Debugging
Software Debugging in Windows
Visual Studio Online & Debugging Tips
Visual Studio 2015 Creating Test Plans
Managing Test Cases
Managing Test Execution
Shared Steps & Requirements
Test Environments & Reports
Test Suites & Configurations
Navigating Software Testing Tools: Types of Software Testing Tools
Social Media App Development Trends & Mobility Testing
Social Media Usage Trends & App Risks
Software Testing Foundation 2018: Black-box & White-box Testing Techniques
Software Testing Foundation 2018: Fundamentals
Software Testing Foundation 2018: Risk & Defect Management
Software Testing Foundation 2018: Static Testing
Software Testing Foundation 2018: Test Management
Software Testing Foundation 2018: Test Monitoring & Control
Software Testing Foundation 2018: Test Process Fundamentals
Software Testing Foundation 2018: Test Tool Support
Software Testing Foundation 2018: Test Types & Maintenance Testing
Software Testing Foundation 2018: Testing & the Software Development Lifecycle
Software Testing Foundation 2018: Testing Techniques
Static, Dynamic, Black-box, & White-box Testing
Test Planning & Management
Testing Methods
Testing throughout the Software Life Cycle
Testing Tool Support
TestPrep: Certified Tester Foundation

Software Testing Automation

Automated Software Testing
Exploring CI: Continuous Integration & CI Tools
Software Quality Assurance
Test Automation: Automated Software Testing

Splunk

Splunk 6.2.4 Administration
Alerts & Capacity Planning
Dashboards
Data Models & Pivot Reports
Fundamental Concepts
Indexer Clusters & Advanced Search
Indexes & Storage
Searching for Data & Saving Reports
Splunk: Getting Started
Visualizations & Charts
Splunk 7.03 Data Analysis

SQL Database Administration

SQL  2016 Backup Management
Database Mail & Alerts
Database Programmability Objects & Non-relational Data
Database Restoration
File & Piecemeal Restores
Monitoring Database Activity
Monitoring Queries
Policy-based Management & Performance Monitoring
Subqueries & the EXISTS Predicate
SQL Server 2014 Advanced SQL Queries
Auditing, Logging, & Event Handling
Backup & Recovery Strategies
Clustering & AlwaysOn
Connection Managers & Data Sources
Data Flow Implementation & ETL
Data Loading
Data Quality Projects
Data Quality Services (DQS) & Master Data Services (MDS)
Data Transformation & Flow
Designing & Implementing Dimensions
Designing a Fact Table
Designing Control Flow
High Availability
Implementing & Testing Policy
Implementing Control Flow
LAB: Implementing a Data Warehouse with Microsoft SQL Server 2012/2014
Multiple SQL Tables
Planning Infrastructure
Private Cloud Overview
Private Cloud Planning & Implementation
Recovery Implementation
Replication Overview
Script Components
SQL Concepts & Queries
SQL Security Architecture
SQL Selecting, Ordering, & Filtering
SQL Tables
SQL Transaction Locks
SQL Transactions
SQL Views
SSIS Components
SSIS Package Execution & Script Tasks
SSIS Packages
SSIS Security
SSIS Solutions
SSIS Variables
Table Design: Functions & Strings
Table Design: Tables, Columns, & Numbers
TestPrep: Implementing a Data Warehouse with Microsoft SQL Server 2012/2014
Troubleshooting Data Integration
Windows Azure SQL Database
WSFC Clustering
SQL Server 2016 Always Encrypted & Cell-level Encryption
Application Patterns
Architecture
Auditing
Configuring Operators & Alerts
Connection Strings & Traffic Manager
Data Access & Permissions
Data Security & Azure SQL Database Options
Database Performance Settings
Dynamic Data Masking
Encryption
Filtering Data
Index & Statistical Management
Installation & Configuration
Instances & Storage Considerations
LAB: Administering a SQL Database Infrastructure
LAB: Database Fundamentals – SQL Server 2016 Update
LAB: Querying Data with Transact-SQL
Log Shipping & High Availability
Managing Database Integrity
Migrating to Azure SQL Databases
Modifying Data
Multiple Tenant Deployments
Operators & Expressions
Performance Tuning & Availability Sets
Querying & Manipulating Data
Querying with Joins
Securing Azure SQL Databases
Service Tiers, Pools, & SQL Databases
Sets & Predicate Logic
SQL Platform & Installation Best Practices
TestPrep: Querying Data with Transact-SQL
Transparent Data Encryption
T-SQL Queries
Upgrading to SQL Server 2016
Using Aggregate Functions
Using Functions
Using GROUP BY, PIVOT, & UNPIVOT
Virtual Machines & Benchmark Data
Virtual Machines on Azure

SQL Database Development & Design

SQL Server 2014 Creating Tabular Data Models
Design & Install Analysis Services
Design & Install Analysis Tools
Designing Dimensions
Designing Multidimensional Data Sources
Designing Multidimensional Models
Designing Reports & Creating Data Sources
Designing Reports & Creating Datasets
Implementation, Creation, & Troubleshooting
Implementing & Configuring Cubes
Implementing Custom Logic
Implementing Dimensions
Implementing Partitions
LAB: Implementing Data Models and Reports with Microsoft SQL Server
Managing & Maintaining SSAS
Managing Reporting Services
Managing Tabular Data Models
MDX Queries & Database Deployment
Optimization & Troubleshooting
Process Models & Database Deployment
Processing Reports & Creating Subscriptions and Schedules
Report Formatting
Report Interactivity
Troubleshooting SSAS
SQL Server 2016 Analyzing Query Plans
Azure SQL Database
Columnstore Indexes
Data Integrity & Constraints
Data Types & Normalization
Database Instance Performance
Designing & Implementing Views
Extended Events & SQL Trace
Functions
Index Design Guidelines
Isolation Levels
LAB: Developing SQL Databases
Memory-optimized Tables & Native Stored Procedures
Nonclustered, In-Memory, & XML Indexes
Optimize Locking Behavior
Optimizing Statisitics & Indexes
Performance Metrics
SQL Tables
Stored Procedures
TestPrep: Developing SQL Databases
Transactions
Triggers
Visual Studio 2013 Getting Started with LINQ
Concepts & Conceptual Design
Creating a Conceptual Design
Logical & Physical Design
Logical Design
Normalization Concepts & Forms

Statistics

Computational Theory Computational Theory: Language Principle & Finite Automata Theory
Computational Theory: Using Turing, Transducers, & Complexity Classes
Data Research Data Research Exploration Techniques
Data Research Statistical Approaches
Data Research Techniques
Data Science Common Approaches to Sampling Data
Data Science Statistics: Applied Inferential Statistics
Data Science Statistics: Using Python to Compute & Visualize Statistics
Inferential Statistics
Raw Data to Insights: Data Ingestion & Statistical Analysis
Simple Descriptive Statistics
Using Data to Find Data: Correction & Categorization
Using Data to Find Data: Data Discovery & Exploration
Machine Learning Building ML Training Sets: Introduction
Building ML Training Sets: Preprocessing Datasets for Classification
Building ML Training Sets: Preprocessing Datasets for Linear Regression
Data Insights, Anomalies, & Verification: Handling Anomalies
Data Insights, Anomalies, & Verification: Machine Learning & Visualization Tools
Linear Regression Models: Building Models with Scikit Learn & Keras
Linear Regression Models: Introduction
Linear Regression Models: Introduction to Logistic Regression
Linear Regression Models: Multiple & Parsimonious
Simplifying Regression and Classification with Estimators
Recommendation System Data Recommendation Engines
Trifacta Wrangler Data Wrangling with Trifacta
Linear Algebra & Probability: Advanced Linear Algebra
Linear Algebra and Probability: Fundamentals of Linear Algebra
Linear Models & Gradient Descent: Gradient Descent and Regularization
Linear Models & Gradient Descent: Managing Linear Models

Swift

Swift 2 Advanced Language Features
Collections & Control Flow
Data Types & Operators
Functions, Access Control, & Frameworks
Functions, Enumerations, Structures, & Classes

Systems Security Certified Practitioner (SSCP)

System Security Certified Practitioner (SSCP 2018): Asset & Change Management
System Security Certified Practitioner (SSCP 2018): Business Continuity
System Security Certified Practitioner (SSCP 2018): Controlling Resource Access
System Security Certified Practitioner (SSCP 2018): Cryptography Primer
System Security Certified Practitioner (SSCP 2018): Digital Forensics
System Security Certified Practitioner (SSCP 2018): Identity Management
System Security Certified Practitioner (SSCP 2018): Malware & Endpoint Security
System Security Certified Practitioner (SSCP 2018): Network Fundamentals
System Security Certified Practitioner (SSCP 2018): Network Security
System Security Certified Practitioner (SSCP 2018): Public Key Infrastructure
System Security Certified Practitioner (SSCP 2018): Risk Management
System Security Certified Practitioner (SSCP 2018): Securing Environments
System Security Certified Practitioner (SSCP 2018): Security Assessments
System Security Certified Practitioner (SSCP 2018): Security Concepts
System Security Certified Practitioner (SSCP 2018): Security Controls
TestPrep: Systems Security Certified Practitioner (SSCP) 2018

Tableau

Tableau 10 Advanced Visualizations
Calculations
Charts
Connecting & Working with Data
Dashboards & Data Organization
Interface & Sharing
Maps
Scripting
Time Dimensions
Visualization Design
Tableau Desktop Tableau Desktop: Opening & Connecting Data Sources
Tableau Desktop: Preparing & Cleaning Data
Tableau Desktop: Real Time Dashboards

Team Foundation Server

Team Foundation Server 2015 Configuring Team Foundation Server
Installing Team Foundation Server
Managing Collections & Health
Managing Connectivity & Workspaces
Managing Security & Reporting
Managing Team Builds
Managing Templates & Settings
Managing Versions, Recovery, & Labs
Managing Work Items
Team Foundation Server 2017 .NET Development with Visual Studio
Administration & Configuration
Building the Environment
Continuous Integration & Deployment
Java Development with Eclipse

Teradata

Teradata 14 Authentication & Security
Client Communication
Communication & Database Security
Introducing SELECT Statement Queries
Locking & Data Protection
Performing Joins
Performing Subqueries & Correlated Subqueries
Primary & Partitioned Indexes
Relational Database & Data Warehouse Basics
Relational Database Management System (RDBMS)
Secondary & Join Indexes
Working with Clauses, Operators, Expressions, & Aggregates
Working with Data Conversions & SET Operations
Working with Data Definition Language (DDL)
Working with DML, Optimization, & Temporal Concepts
Working with Functions, Times, Dates, & Intervals

Terraform

Terraform 0.10.8 Configurations
Infrastructure
Introduction to Automation
Provisioning and Modules
Variables

Testing

Cucumber 3.0.1 Beginning Cucumber and Behavior-driven Development
Cucumber Steps and Scenario Development
Deep Dive Cucumber
DevOps Software Testing for DevOps: DevOps Test Tools
Software Testing for DevOps: Testing & DevOps Overview
HP LoadRunner 12 Enhancing Vuser Scripts
The Controller & Executing and Analyzing Scenarios
Working with Graphs & Reports
Working with VuGen
Jasmine 2.3.4 Deploying & Using Jasmine
Working with Jasmine Spies & Using Jasmine with Node.js
JMeter 3.3 Comprehensive JMeter Operations
JMeter Architecture & Operations
Performance Testing & JMeter
Junit 4 Fundamentals
Working with Tests
Selenium 2.9.1 Advanced Features & Debugging
Introduction to Automated Testing with Selenium
Locating, Verifying, & Testing Elements
Scripts & Commands
TestNG For Eclipse Annotations, Groups & Dependencies
Complex Integrations & Implementations
Exploring TestNG
Software Testing for DevOps: DevOps Testing Pipeline

TestNG

TestNG For Eclipse Annotations, Groups & Dependencies
Complex Integrations & Implementations
Exploring TestNG

TIBCO Spotfire

TIBCO Spotfire 7.6 Advanced TIBCO Spotfire
Automation, Analyzation, & Visualization
Complex Visualizations & Analytics
Data Combinations
Diving into the World of Spotfire
More Visualization Techniques
Scripting
Spotfire Basics
Spotfire Visualizations & Relationships

TOGAF®

TOGAF® 9 ADM Application & Architecture Content Framework
ADM Guidelines & Techniques
Architectural Artifacts & the Enterprise Continuum
Architecture Capability Basics
Architecture Capability Framework
Architecture Development Method (ADM) Cycle
Content Framework
Enterprise Architecture Basics
Enterprise Architecture Planning & Implementation
Enterprise Continuum
Reference Models
Security Architecture
Service Oriented Architecture (SOA) Governance

TOGAF® 9 Certified

TOGAF® 9 ADM Application & Architecture Content Framework
ADM Guidelines & Techniques
Architectural Artifacts & the Enterprise Continuum
Architecture Capability Basics
Architecture Capability Framework
Architecture Development Method (ADM) Cycle
Content Framework
Enterprise Architecture Basics
Enterprise Architecture Planning & Implementation
Enterprise Continuum
Reference Models
Security Architecture
Service Oriented Architecture (SOA) Governance

TOGAF® 9 Foundation

TOGAF® 9 Architectural Artifacts & the Enterprise Continuum
Architecture Capability Basics
Content Framework
Enterprise Architecture Basics
Enterprise Architecture Planning & Implementation
Security Architecture
Service Oriented Architecture (SOA) Governance

Troubleshooting Hardware

CompTIA A+: Troubleshooting Printers
Storage Maintenence

Troubleshooting Software

Common Troubleshooting & Security
Practical Mobile Troubleshooting
Practical PC Troubleshooting

TypeScript

TypeScript 2.2.1 Advanced Features
Functions, Objects, & Modules
Node.js, External Modules, & Operators
TypeScript Essentials: Getting Started

UI/UX Design

Designing with Flexibility & Efficiency in Mind
Exploring Chatbots
Internet of Things & UI/UX
Introduction To UI/UX
UI/UX for Chatbot & Voice Interface AIs
Voice User Interfaces
Wearable Technology & UI/UX

Underscore.js

Underscore.js 1.6 Utility & Object Functions
Working with Arrays
Working with Collections
Working with Functions

Universal Windows Platform

Visual Studio 2017 Adaptive App Design
App Navigation
Application Life Cycle
App-to-app Communication and File Storage
Authentication & Identity Management
Background Tasks & Reusable Components
Data Access & Binding in Apps
Introducing UWP & Basic App Layouts
Notifications with Toasts & Tiles
Speech Input and Cortana
Using Mouse, Touch, & Keyboard Input
Using Other Device Input Methods
XAML App Controls

Unix

FreeBSD 11 Configuring Network Services
Creating and Managing Unix File Systems
Installing Unix
Securing Unix Systems
Shell Scripting
The Unix Command Line & GUI
Unix Hardening & Maintenance
Unix Software Management
Users, Groups, and Authentication

UX Design

Content Design
Design Guidelines and Patterns
Design Principles
Navigation and Layout
Techniques and Tools

Vagrant

Vagrant 1.7.2 Boxes & Plugins
Commands, Share, & VM Provisioning
Getting Started with Vagrant
Networking, Synced Folders, & Clusters
Vagrant 1.8 Advanced Administration
Advanced Provisioning
Configuration, Automation, & Provisioning
Customization & Managing Infrastructure

Virtual Reality (VR)

Virtual Reality Using GoogleVR and Unreal
Android Cardboard & Unity VR
Creating a VR App with Unity
Exploring Virtual Reality: Introduction
Manipulating the Environment
Optimizing for Unity VR
User Interfaces

Visual Studio

Team Foundation Server 2015 Configuring Team Foundation Server
Installing Team Foundation Server
Managing Collections & Health
Managing Connectivity & Workspaces
Managing Security & Reporting
Managing Team Builds
Managing Templates & Settings
Managing Versions, Recovery, & Labs
Managing Work Items
Visual Studio 2013 Controls, Data, Deployment, Graphics, & Multimedia
WPF & XAML
Visual Studio 2015 Application Life Management & Web Development
Automated Testing & Deployment
Client & Mobile Development
Code Quality, Testing, & Development
Cross-platform Development & Data Access
Developing New Projects & Solutions
Feedback Management & Troubleshooting
Getting Started, Integrated ALM, & Fast Feedback
Introduction & Personalization
Management, Software Quality, & Planning
Managing Project Requirements
Process Roles & Microsoft Solution Framework
Quality Validation & Project Management
Release Planning & Project Management
Scrum/Agile Processes
Visual Studio 2017 .NET Core & Visual Studio Extensions
C# Updates in Visual Studio 2017
C++ Updates
Developing Azure & Web Services: Advanced Deployment
Developing Azure & Web Services: API Management & Monitoring
Developing Azure & Web Services: Azure Scalability
Developing Azure & Web Services: Azure Services
Developing Azure & Web Services: Azure Storage
Developing Azure & Web Services: Configuring Web Applications for Deployment
Developing Azure & Web Services: Consuming Services
Developing Azure & Web Services: Deployment Strategy
Developing Azure & Web Services: Diagnostics, Debugging, & ACS
Developing Azure & Web Services: Entity Framework
Developing Azure & Web Services: Hosting Web APIs
Developing Azure & Web Services: IIS & Web Services
Developing Azure & Web Services: Introduction
Developing Azure & Web Services: Managing Data
Developing Azure & Web Services: Messaging, Security, & Troubleshooting
Developing Azure & Web Services: Security and WCF Streams
Developing Azure & Web Services: WCF Transactions & Services
Developing Azure & Web Services: Web API Services
Developing Azure & Web Services: Working with Assemblies
Installation & New Features
Tool Updates
Visual Studio Code 1.8 Introduction
Languages & Tasks
Visual Studio Mobile Center Introduction & New Features
SDKs for Android & iOS
SDKs for Xamarin & React Native
Tools
Transitions, Identity Management, & Crashes

VMware Core Concepts

VMware 6 Business Mobility Solutions
Cloud Services Solutions: Benefits & Features
Cloud Services Solutions: vCloud Air
Data Center Virtualization: vCenter Server
Data Center Virtualization: vSphere & ESXi
Desktop Virtualization Planning with VMware
VMware Desktop Virtualization Management

VMware Platforms

VMware LAB: VMware Certified Professional 6 – Data Center Virtualization
VMware 6 Business Mobility Solutions
Cloud Services Solutions: Benefits & Features
Cloud Services Solutions: vCloud Air
Data Center Virtualization: vCenter Server
Data Center Virtualization: vSphere & ESXi
Desktop Virtualization Planning with VMware
VMware Desktop Virtualization Management
VMware 6.5 Overview
VMware NSX 6.0 Auditing, Logging, & Troubleshooting
Configuration & Deployment
Configuring Logical Routers
Configuring Logical Switches, VXLAN, & Layer 2 Bridging
Configuring User Roles & Monitoring VMware NSX
Load Balancing & VPNs
Network & Security
Network Services & NSX Edge HA
NSX Benefits & Architecture
NSX Integration
NSX Network Security
Physical Infrastructure Requirements
Upgrading & Transport Zone
vSphere Switches
vSS & vDS Policies
Vmware Workstation 11 Configuring Network Settings
Configuring Virtual Machine Settings
Configuring Workstation
Creating, Cloning, & Importing VMs
Installing & Upgrading Workstation
Managing Devices & Advanced Settings
Managing VM Files & Relocating VMs
Remote Connectivity & Shared VMs
VMware Tools, Power Options, & Snapshots
vRealize 6 Application Services Appliance & Blueprints
Blueprint & Service Catalog Management
Business Groups & Tenant Management
Business Standard Appliance
Cloud Management Components
Cloud Overview
Components & Features
Creating & Administering Cloud Networking
Fabric Groups & Reservations Management
NSX Integration
Orchestrator Integration
Property Definition, Build Profile, & Custom Services
Troubleshooting, Auditing, & Resource Mapping
User Roles & Identity Stores Management
vCloud Connector & vCenter Site Recovery Manager
vRealize Automation
vRealize Operations Manager
vSphere Products & Business Challenges
vSphere 6 Basic Design Principles
Clustering
DRS & Cluster Resource Management
ESXi Server Installation
Fault Tolerance & HA
Host Profiles
Monitoring & Alarm Configuration
Resource Management
Storage Considerations
Update Management Options
Update Manager
Upgrading vSphere
vCenter Server Installation
Virtual Machine Management
Virtual Networks
Virtual Switch Configuration
Virtualization Benefits & Components
VMware Licensing Options
vSphere 6.5 Clustering with VMWare 6.5
Distributed Resource Scheduler (DRS)
ESXi Features
High Availability Clusters
Installation
Monitoring & Compliance
Networking
Resource Management
Storage
Update Manager
vCenter
Virtual Machine Creation
Virtual Machine Management
Virtual Machines

Vue.js

Vue.js 2.6 Vue.js: Component Communication & Routing
Vue.js: Getting Started
Vue.js: Working with Components
Vue.js: Working With Forms & Unit Testing
Vue.js: Working with Vue State & Data

Waterfall

Waterfall The Sequential, Iterative, & Agile Software Models
The Waterfall Software Development Model

WCF

Visual Studio 2017 Building Clients
Contracts
Distributed Applications
Hosting
Interoperability & Integration
Introduction to the Framework
Managing Transactions
Queues & Reliable Sessions
Services
Tools

Web Accessibility

Accessibility & Design
Authoring Tool Accessibility Guidelines (ATAG)
HTML5 & Accessibility
Introduction to Web Accessibility
OSs, Regulations, & Laws
WCAG 2.0 Accessibility Standards

Web Design

Responsive Web Design Animation, Devices, & Performance
Flexible Data & Uis
Flexible Images & Media Queries
Responsive Web Design
Wed Design Databases, Bootstrap, & jQuery in Web Design
Designing & Building a Basic Web Page
Web Design Basics
Web Design Enhancements

WebLOAD

WebLOAD 10.3.1 Implementing WebLOAD Solutions
Testing with WebLOAD
Working with WebLOAD

Windows Client

Windows  10 Managing Modern Desktops: Co-Management
Managing Modern Desktops: Monitoring Devices
Windows 10: Configure Remote Connectivity
Windows 10: Configure System & Data Recovery
Windows 10: Manage Devices & Data
Windows 10: Manage Updates
Windows 10 Configuring Core Services
Configuring New Features
Configuring Windows 10 Devices: Authentication
Configuring Windows 10 Devices: Bitlocker, Recovery, & Maintenance
Configuring Windows 10 Devices: Data Protection
Configuring Windows 10 Devices: Deployment Tools & Procedures
Configuring Windows 10 Devices: Devices & Disks
Configuring Windows 10 Devices: Installing & Managing Applications
Configuring Windows 10 Devices: Introduction to Deployment
Configuring Windows 10 Devices: Introduction to Windows 10
Configuring Windows 10 Devices: Maintaining Windows 10
Configuring Windows 10 Devices: Managing Devices
Configuring Windows 10 Devices: Networking
Configuring Windows 10 Devices: Remote Connections
Configuring Windows 10 Devices: Secure Identities
Configuring Windows 10 Devices: The Start Menu, Personalization, & Multitasking
Configuring Windows 10 Devices: Threat Resistance & UAC
Configuring Windows 10 Devices: Threat Resistance Technologies
Configuring Windows 10 Devices: Universal Windows Apps
Configuring Windows 10 Devices: User Data
Configuring Windows 10 Devices: Virtualization Technologies
Implementing Windows
LAB: Configuring Windows Devices
LAB: Installing and Configuring Windows 10
LAB: Windows 10 (MD-100)
LAB: Windows Operating System Fundamentals
Managing & Maintaining Windows
Managing Modern Desktops: Conditional Access & Compliance
Managing Modern Desktops: Deploy & Update Applications
Managing Modern Desktops: Device Authentication
Managing Modern Desktops: Device Profiles
Managing Modern Desktops: Dynamic Deployments
Managing Modern Desktops: Intune Device Enrollment
Managing Modern Desktops: Managing Updates
Managing Modern Desktops: Mobile Application Management
Managing Modern Desktops: Upgrading Devices
Managing Modern Desktops: User Profiles
Managing Modern Desktops: Windows Autopilot
Managing Modern Desktops: Windows Defender
Supporting Authentication
Supporting Client Compliance & Managing Clients
Supporting Connectivity & Data Storage
Supporting Hardware, Performance, & Mobile Devices
Supporting Operating System & App Installation
Supporting Permissions & Data Security
TestPrep: Configuring Windows 10 Devices
TestPrep: Installing and Configuring Windows 10
The New Interface & Features
Windows 10: Active Directory Management
Windows 10: Configure Networking
Windows 10: Deployment
Windows 10: Monitor & Manage Windows
Windows 10: Perform Post-Installation Configuration
Windows 10: Policy-Based Management
Windows 10: Prepare for Deployment
Windows 10 (Creators Update) Apps & Gaming
Introduction
Web Browsing & Cortana
Windows Ink & Paint 3D
Windows Store, Security, & Edge
Windows Embedded 8.1 Deployment & Configuration
Introduction
Windows Performance Collecting & Analyzing Historical Data
Low-level Metrics & Best Practices
Perfmon and Task Manager
Performance Monitoring Basics
Performance Monitoring Tools for Windows 10
Performance Monitoring Tools for Windows 7
Performance Monitoring Tools for Windows 8.1
LAB: IC3 Digital Literacy Certification – Global Standard 5

Windows Mobile Administration

Windows  8 Data Management & Device Security
Device Configuration & Data Access
Device Configuration & Data Storage
Implementing Permissions, Shares, & Encryption in Windows
Using Microsoft Cloud Services
Using Microsoft Identity Management & BYOD Solutions
Windows 10 Designing for Cloud & Hybrid Identity
Designing for Data Access & Protection
Designing for Device Access & Protection
Managing RemoteApp & Planning App Support and Compatibility
Planning Updates & Recovery
Remote Access & Mobility
Windows 8.1 Assessment Strategies
Boundaries & Resource Discovery
Client Deployment & Configuration
Compatibility
Configuring & Monitoring Software Updates
Content Distribution Management
Creating & Managing Applications
Deploying & Managing Applications
Deploying Office 2013
Deployment Phases & Strategies
Endpoint Protection & Compliance
Exchange Connector, Collections, & Role-based Administration
Inventory Collection Management
Management with SCCM, Intune, & Azure
MDT Images
Mobile App Support & Windows Intune Integration
Monitoring & Querying
Perform ZTI
PXE & WDS
Site Management
Software Metering & Asset Intelligence
Strategies for MDT, LTI, & ZTI
User State Migration
Using SCCM
Volume Activation
Working with Images

Windows Server

Server  2016 Windows Server 2016 – Install, Store, & Compute: Container Management & Migration
Windows Server 2016 Identity:  AD FS & Web Application Proxy
Windows Server 2016 Identity: Active Directory Maintenance & Recovery
Server 2016 Additional Malware Protection
Implementing Disk Encryption
Implementing File Encryption
Implementing Workload-Specific Security
LAB: Identity with Windows Server 2016
LAB: Installation, Storage, and Compute with Windows Server 2016
LAB: Networking with Windows Server 2016
Managing Malware Solutions
Managing Privileged Identities Part I
Managing Privileged Identities Part II
Nano Server Deployment & Security
Nano Server First Look
PAWs and LAPS
Securing a Network Infrastructure with Windows Firewalls
Securing a Virtualization Infrastructure
Securing Network Infrastructure Traffic
Server Patching & Updating
TestPrep: Identity with Windows Server 2016
Testprep: Installation, Storage, and Compute with Windows Server 2016
TestPrep: Networking with Windows Server 2016
Threat Detection Solutions
Windows Server 2016 – Install, Store, & Compute: Backups, Hyper-V, AD, & Monitoring
Windows Server 2016 – Install, Store, & Compute: Data Deduplication & Hyper-V Setup
Windows Server 2016 – Install, Store, & Compute: Disk & Volume Configuration
Windows Server 2016 – Install, Store, & Compute: Failover Clustering Strategies
Windows Server 2016 – Install, Store, & Compute: Hyper-V Networking Configuration
Windows Server 2016 – Install, Store, & Compute: Hyper-V Storage Configuration
Windows Server 2016 – Install, Store, & Compute: Image Deployment Management
Windows Server 2016 – Install, Store, & Compute: Installation Options
Windows Server 2016 – Install, Store, & Compute: Server Storage Solutions
Windows Server 2016 – Install, Store, & Compute: Storage Space Direct & Failover
Windows Server 2016 – Install, Store, & Compute: Upgrades & Migrations
Windows Server 2016 – Install, Store, & Compute: Virtual Machine (VM) Settings
Windows Server 2016 – Install, Store, & Compute: VM Motion & Network Load Balancing
Windows Server 2016 – Install, Store, & Compute: Windows Containers Deployment
Windows Server 2016 Identity: Active Directory Accounts & Permissions
Windows Server 2016 Identity: Active Directory Certificate Services
Windows Server 2016 Identity: Active Directory Domain Controllers
Windows Server 2016 Identity: Active Directory Group Policy Objects
Windows Server 2016 Identity: Active Directory Group Policy Preferences
Windows Server 2016 Identity: Active Directory Group Policy Processing
Windows Server 2016 Identity: Active Directory Group Policy Settings
Windows Server 2016 Identity: Active Directory Groups & Organizational Units
Windows Server 2016 Identity: Active Directory Rights Management Services
Windows Server 2016 Identity: Active Directory Service Accounts & Policies
Windows Server 2016 Identity: Active Directory Trusts & Sites
Windows Server 2016 Networking: Advanced Network Infrastructures
Windows Server 2016 Networking: DHCP Configuration
Windows Server 2016 Networking: DHCP Management
Windows Server 2016 Networking: Distributed File System & Branch Office Solutions
Windows Server 2016 Networking: DNS & DHCP Management Using IPAM
Windows Server 2016 Networking: DNS Configuration
Windows Server 2016 Networking: DNS Zones & Records
Windows Server 2016 Networking: IP Address Management Configuration
Windows Server 2016 Networking: IPv4 & IPv6 Address Management
Windows Server 2016 Networking: Network Connectivity & Remote Access
Windows Server 2016 Networking: Network Policy Server
Server 2019 Updating to Server 2019 : Windows Server 2019 Features
Updating to Server 2019: PowerShell for Windows Server
Updating to Server 2019: Server Configuration
Updating to Server 2019: Server Roles
Updating to Server 2019: Storage, Failover Clustering, & Application Platform
Updating to Server 2019: Windows Server Installations

Windows Virtualization

Windows  8.1 App Virtualization & MAP Toolkit
App-V Client & Connection Groups
Create & Deploy Application Packages
Deploying Office 2013 with App-V
Installing App-V Server
Planning for Resilient Virtualized Apps
RemoteApps
Session-based RDS
VDI Infrastructure
VM-based RDS

WordPress

WordPress 2015 Creating Themes
Increasing Security & Configuring Theme and Plugin Files
Managing Themes, Administration, & Site Transfers
Setting Up Multisite Networks
Themes & Plugins
WordPress Installation & Configuration
Working with Content

Yeoman

Yeoman Advanced Usage of Generator & Polymer
Application Development
Essential Development Tools
Managing the Environment for Productivity
Working with NPM & Adopting Testing Strategies

Želite više informacija prilagođenih baš za vas?