Discover the knowledge you need

IT & Cybersecurity Courses.

ACI Learning Exclusive Content
MOST POPULAR IT Certification Training:
CiscoCompTIALinuxMicrosoftPython

Filter

Showing all 314 IT courses
The AWS Certified Big Data - Specialty exam has been retired by AWS. The content is still relevant for users looking to know more about Big Data. The Amazon Big Data Specialty takes a deeper dive into the AWS services that help collect, store, process, and analyze data. During this course, we will expand on our knowledge of S3 and DynamoDB. Additionally, we will explore data collection services such as IoT and Kinesis, data processing services such as Elastic Map Reduce, Lambda, and Glue, analysis and visualization of that data using Athena, Kinesis, and QuickSight, and utilize and discuss security practices when using these services. If you are looking to power up your Big Data knowledge, then we will see you there!
On Demand
16h 47m
The AWS (Amazon Web Services) Cloud Practitioner certification serves as the ideal starting point for technical and non-technical professionals to build expertise in the AWS cloud. This course provides a foundational introduction to AWS's most popular cloud services, including EC2, Lambda, S3, EBS, VPC, and RDS. You'll learn the core concepts of cloud computing and see how billing and pricing strategies can save companies money on their IT infrastructure. The course also explores cloud security and compliance solutions, covering every objective and service listed on the Cloud Practitioner exam objectives Course Learning Objectives: 1) Explain foundational cloud concepts. 2) Use popular AWS services, including EC2, Lambda, S3, EBS, and VPC. 3) Apply fundamental security best practices in AWS. 4) Use pricing models and information resources to manage cloud costs.
On Demand
18h 18m
Includes
Skill Lab
Practice Test
The AWS Certified DevOps Engineer – Professional show validates technical expertise in provisioning, operating, and managing distributed application systems on the AWS platform.
On Demand
14h 30m
Often the first technical AWS certification exam attempted by IT professionals, the AWS Solutions Architect - Associate certification addresses the skills and knowledge required to design secure, resilient, high-performing, and cost-optimized architectures in AWS. Focus on that one word: "design." Everything you'll learn in this course will help you choose the components needed to design an AWS deployment according to the pillars of the Well-Architected Framework. Learn how to answer questions such as, "Which compute service will best serve this workload?" and "Which storage configuration will provide optimal security and resilience at an affordable rate?" In this course, you'll start to see how the pieces fit together and why one piece might be a better fit than another. The name of this game is nuance. With hundreds of services and configuration options available in AWS, this course is your next step to understanding the big picture of architecting solutions in AWS.
On Demand
16h 30m
Includes
Practice Test
The Amazon Web Services Certified SysOps Administrator (ACSA) certification is designed for professionals responsible for supporting deployments running in the AWS cloud. Topics covered include managing cloud based database instances, implementing security in the cloud and supporting virtual servers. The ACSA is an associate level certification intended as a starting point for technicians seeking AWS certification.
On Demand
14h 29m
Harness the power of simplified cost management and unrivaled customer support with AWS Cloud Billing & Support. AWS's cost monitoring tools, like AWS Cost Explorer and AWS Budgets, allow you to easily manage and track your AWS costs, empowering you to make the most of your budget. AWS's repository of invaluable information resources offers detailed insights into optimizing costs, managing resources, and troubleshooting issues. Furthermore, AWS Support Services are committed to ensuring a seamless cloud experience. From a wide variety of premium support plans to a comprehensive knowledge center and highly responsive customer service, AWS has got you covered. Additionally, AWS Support offers tools like AWS Trusted Advisor, which inspects your AWS environment and provides real-time guidance to help you provision your resources following best practices. With AWS Cloud Billing & Support, navigate your cloud journey with ease and confidence, knowing you have the best tools and support to optimize your costs and enhance your user experience.
On Demand
1h 36m
Unlock the true potential of your business with AWS Cloud Compute, the lifeblood of your cloud-based operations. AWS Compute services, such as EC2 (Elastic Compute Cloud), provide flexible and scalable virtual servers -or VMs- in the cloud that cater to your diverse workload requirements, be it occasional bursting or persistent workloads. These VMs ensure robust performance, cost-effectiveness, and maximum uptime. Beyond this, AWS takes data management to the next level with its popular Database Services. Offering both relational and non-relational database services, AWS ensures efficient and secure data storage. Services like RDS (Relational Database Service) simplify setting up, operating, and scaling relational databases in the cloud. Whether it's launching an application, running a large-scale project, or managing databases, AWS Cloud Compute has your back with its spectrum of world-class compute and database services.
On Demand
3h 13m
Redefine connectivity with AWS Cloud Networking, the backbone of your cloud infrastructure. AWS provides carefully engineered networking services designed to facilitate reliable and highly secure network traffic control. Key among these is Amazon VPC (Virtual Private Cloud), providing on-demand, scalable virtual network solutions. VPC allows you to launch AWS resources, such as EC2 instances, into a virtual network tailored to your specific use case, thereby offering robust isolation and security. Furthermore, VPC security groups function as virtual firewalls controlling inbound and outbound traffic, enhancing your network's security profile. To top it off, AWS's exceptional Edge Services, including Amazon CloudFront, a fast content delivery network, ensure you achieve the low-latency and high transfer speeds that today's digital landscape demands. With AWS Cloud Networking, create an optimized, secure, and high-performing environment for your business's cloud operations.
On Demand
1h 21m
Fortify your digital landscape with AWS Cloud Security, a reliable and comprehensive suite designed to protect your data, accounts, and workloads from threats. At the heart of AWS security is the Shared Responsibility Model, which delineates the security tasks between AWS and its clients, allowing for steadfast protection while maintaining operational performance. AWS's range of security services like Amazon GuardDuty, Amazon Inspector, and AWS Shield provide proactive protection and detailed vulnerability assessments. Enhance visibility and traceability with Monitoring and Logging services like AWS CloudTrail and Amazon CloudWatch, enabling you to record, store, and monitor activity related to your AWS resources. Maintain granular control over user access with AWS Identity and Access Management (IAM), which facilitates secure management of resources in your AWS environment. Furthermore, AWS provides extensive security documentation, detailing best practices, whitepapers, and guides to help understand and implement AWS security measures. With AWS Cloud Security, create a secure, vigilant, and resilient cloud environment that stands the test of time.
On Demand
3h 39m
Step into the realm of advanced solutions with AWS Cloud Specialized Services, a suite of sophisticated tools designed to cater to your unique business needs. Tap into the power of Artificial Intelligence (AI) and Machine Learning (ML) services, such as Amazon SageMaker, enabling you to build, train, and deploy machine learning models at scale. Furthermore, boost your productivity with seamless application integration services that allow different software systems to communicate and interact seamlessly. Elevate your business engagement with AWS's suite of customer relationship tools and analytics. Revolutionize your user experience with innovative front-end, mobile, and IoT services, ensuring rapid, dynamic content delivery across devices. Lastly, dive into the world of Infrastructure as Code (IaC) and automation, empowering you to manage and provision your infrastructural resources efficiently. With AWS Cloud Specialized Services, accelerate your digital transformation journey towards seamless automation, enhanced productivity, and business innovation.
On Demand
2h 36m
Experience the future of data storage with AWS Cloud Storage, offering a suite of robust storage solutions to fit your specific needs. AWS's popular storage services, such as Amazon S3 (Simple Storage Service), revolutionize how you store and retrieve data. With object storage in S3, you can manage and retrieve any amount of data, at any time, from anywhere on the web. For more extensive data operations, AWS provides block storage via Amazon EBS (Elastic Block Store), which offers high-performance block-level storage for use with Amazon EC2 instances. Additionally, Amazon EFS (Elastic File System) provides scalable file storage for use with AWS Cloud services and on-premises resources. To further cement your data's security, AWS's versatile backup services and lifecycle policies promise regular, automated backups and seamless data lifecycle management. With AWS Cloud Storage, navigate the data-heavy landscape of today confidently, knowing your data is secure, accessible, and easily manageable.
On Demand
1h 26m
The Microsoft Azure Virtual Desktop course is an excellent way for you to be up and running successfully and quickly with the Azure Virtual Desktop solution of Microsoft Azure. This course is also excellent preparation for Exam AZ-140: Configuring and Operating Microsoft Azure Virtual Desktop. During this course, you will learn critical concepts such as how to plan and prepare the Azure Virtual Desktop infrastructure, how to plan for and implement identity and security, how to handle users and apps, and how to engage in effective Azure Virtual Desktop monitoring and diagnostic troubleshooting.
On Demand
8h 29m
This course will prepare learners that implement, manage and monitor security for Azure, hybrid and multi-cloud environments. In this course we will explore managing identity and access in Azure, planning and implementing and securing networking. We will explore and prepare the learner to securing, Azure Compute, Azure Storage and Azure Databases.
On Demand
15h 6m
Includes
Practice Test
The AZ-800 Administering Windows Server Hybrid Core Infrastructure show is for information technology (IT) professionals who want to prepare for Microsoft's AZ-800 Administering Windows Server Hybrid Core Infrastructure exam. This course specifically covers the five domains of the AZ-800 exam, The five domains include: 1. Deploy and manage AD DS in on-premises and cloud environments (30–35%) 2. Manage Windows Servers and workloads in a hybrid environment (10–15%) 3, Manage virtual machines and containers (15–20%) 4, Implement and manage an on-premises and hybrid networking infrastructure (15–20%) 5. Manage storage and file services (15–20%)
On Demand
28h 24m
Includes
Practice Test
Get ready to learn about Windows Server management and security, from securing your Windows on-premises and hybrid infrastructures to managing high availability with failover clusters. This comprehensive AZ-801 course guides you in fortifying a Windows Server against internal and external threats, integrating with Azure AD for unified identification, and implementing robust networking, securing storage , and learning data recovery tactics. You'll delve into managing backups, using Azure Site Recovery service for disaster recovery, and take a deep dive into Hyper-V Replicas for real-time VM protection. Turning your attention towards the cloud, you'll be learning the process of smoothly migrating on-prem Windows servers to Azure, upgrading your Active Directory infrastructure, and moving web applications from IIS to Azure. Finally, you'll also hands-on strategies for diagnosing and resolving issues with Windows Server VMs in Azure, and learn to monitor and troubleshoot your server's health, performance, and security. Whether you're a seasoned professional or new to server management, these courses will empower you with the know-how you need to manage and secure your Windows Server environment effectively.
On Demand
14h 55m
Includes
Practice Test
In this series, we will take a look at creating functions as a way to collect logic into a reusable chunk. If you want to explore how to create and utilize functions to make your code more readable and maintainable, then join us there!
On Demand
3h 7m
Access is the database application within the Microsoft Office suite. Many businesses, large and small, use Access to store large amounts of information. Just like building a strong house, you must have a solid foundation. We start from the very beginning discussing how to plan a database, introducing basic terminology and key concepts of relational database design, and exploring the Access Interface. Then we dive more in depth into each object in an Access databases - tables, queries, forms, and reports. This series is targeted for users who want to get started in Access or users that want a refresher on Access essentials. Access is a Windows only product and only available as a local installation.
On Demand
12h 54m
Accredited Axelos Course Overviews
On Demand
3h 12m
In this series we explore the concepts of Agile project management and prepare for the Agile Foundation examination accredited by BCS. We start with a downloadable introduction to the services which outlines the contents of the syllabus.
On Demand
11h 2m
In this series Jo and Cherokee look at the specific responsibilities and common activities of the Product Owner role in an Agile project. Check out our overview for full content details.
On Demand
4h 41m
In this series we expand on our Agile Foundation qualification and look at the specific role of the Scrum Master in Agile project management. We also prepare for the EXIN accredited Agile Scrum Master certification.
On Demand
13h 3m
In this series we explore the concepts of the AgileSHIFT approach to transformational project management and prepare for the AgileSHIFT examination accredited by Axelos.
On Demand
8h 37m
In this accredited EXIN DevOps Professional series, you’ll learn how to apply the key concepts and principles of DevOps including the Three Ways and the Simian Army. Whether you are a DevOps Engineer, Agile or Scrum practitioner, Lean IT Professional, developer, or project manager, the skills and practices in this training will equip you to participate and lead in the DevOps environment. Combined with sample papers and discussion, this course will help you prepare for the DevOps Professional certification exam.
On Demand
7h 37m
This accredited series follows the EXIN DevOps Professional syllabus and prepares candidates for the DevOps Professional certification. Learn about the concepts and principles of DevOps including the Three Ways and the Simian Army. Run through the DevOps Professional sample exam and prepare for your “live” exam.
On Demand
13h 10m
ISO/IEC 20000, often referred to simply as ISO 20000, is the international IT service management (ITSM) standard that enables IT organizations (whether in-house, outsourced, or external) to ensure that their ITSM processes are aligned both with the needs of the business and with international best practice. In this training, you will learn how ISO 20000 helps organizations benchmark the delivery of their managed services, measure service levels, and assess their performance. The training is broadly aligned with and draws strongly on ITIL®. ITIL®. Foundation is a strongly recommended prerequisite for understanding and applying the content and requirements of the ISO/IEC 20000: IT Service Management.
On Demand
8h 30m
This series covers the Foundation sylabus for ITIL 4.
On Demand
16h 16m
Includes
Practice Test
ITIL 4 Foundation is designed as an introduction to ITIL 4 and enables students to look at IT service management through an end-to-end operating model for the creation, delivery and continual improvement of tech-enabled products. This course prepares you for the ITIL 4 Foundation Certification. Access to select content requires an exam voucher
On Demand
12h 56m
Companies are moving at the "speed of tech" in this new millennium. ITIL 4: High Velocity IT is an intermediate level course aimed at addressing the specifics of digital transformation. It helps organizations, and their leaders, evolve towards a convergence of business and technology or even establish a new digital organization. This course will not only help prepare you for the ITIL 4 Specialist certification in HVIT, it will also give you the framework necessary to truly help move your organization forward through digital transformation. Access to select content requires an exam voucher
On Demand
14h 49m
This course is designed to give you best practice guidance on: - How to use the capabilities offered by the cloud - Identify and pursue opportunities - Manage risks - Achieve desired business outcomes This course also gives you the practical skills and knowledge necessary to create, align and integrate key concepts of the ITIL framework to the cloud consumer journey. In addition you will have the information you need to successfully pass the ITIL 4 AMCS certification exam. Access to select content requires an exam voucher
On Demand
15h 23m
One of the ITIL 4 Specialist certifications, Drive Stakeholder Value is intended to provide learners with an understanding of all types of engagement and interactions between a service provider and their customers, users, suppliers and partners, including key CX, UX and journey mapping concepts. Access to select content requires an exam voucher
On Demand
9h 27m
The ITIL 4 Create, Deliver and Support qualification is one of the pre-requisites for the designation of ITIL 4 Managing Professional which assesses the candidate’s practical and technical knowledge about how to run successful, modern IT-enabled services, teams and workflows. Access to select content requires an exam voucher
On Demand
19h 23m
The Direct, Plan and Improve (DPI) course provides essential knowledge and capabilities that a service management professional should acquire beyond Foundation level. The module – which is applicable to both ITIL Strategic Leader and Managing Professional streams – supports anyone involved in directing or planning action based on a defined strategy and in continual improvement. This material is not about leadership skills existing only at the top; wherever a person is in their organization or career, there is something they need to plan, direct and improve.
On Demand
31h 34m
ITIL 4 Leader: Digital and IT Strategy, or DITS for short, is the last course to be released in a series of five intermediate ITIL levels. This course is designed for Digital Leaders who are seeking to pursue the ITIL 4 Strategic Leader certification. It provides insight into what the best digital organizations get right as well as the pitfalls to avoid when approaching a digital transformation. Regardless of your role within an organization, there are lots of ideas, tools, and techniques contained within the DITS course that will help you, your team, and your organization improve how products and services are designed, developed, delivered, and improved. Access to select content requires an exam voucher
On Demand
17h 3m
Management of Risk (M_o_R)® is a route map for risk management. It can help organizations identify, assess and control risks and put in place effective frameworks for making informed decisions.
On Demand
23h 1m
In the Management of Risk® Practitioner series we explore the application of Management of Risk® Foundation through a deeper understanding of context. Download the case study and exercises contained in the series to gain insight into how Risk Management is implemented and utilised. This series will prepare you for the Management of Risk® Practitioner exam through PeopleCert
On Demand
10h 57m
Service Integration and Management (SIAM) is a management methodology for environments where services are sourced from multiple service providers and not just a single service provider. In this series we explore the SIAM Eco-system including the business case for SIAM, the benefits of the methodology, the processes involved, and the challenges to implementing and maintaining the eco-system. This series also prepares you for the EXIN SIAM Foundation exam.
On Demand
18h 34m
With the VeriSM™ Professional series, you’ll gain the skills to implement VeriSM™ in your organization. In the series, you will explore the impact and implications of digital transformation – for teams, front-line managers, staff, customers, and stakeholders. In this training you’ll learn how to create, use and adapt the Management Mesh to ever-changing organization needs; accounting for an organization’s portfolio position, principles, and governance requirements. You will be able to guide products and services through the Define, Produce, Provide and Respond stages .With this training, you will be able to operationalize your strategic vision and be prepared to sit the VeriSM™ certification exam.
On Demand
14h 39m
The VeriSM™ Professional series focuses on the skills required to implement VeriSM™ in an organisation. The VeriSM™ Professional series will facilitate understanding of the impact of digital transformation on organisations and their teams, costomers, staff, and stakeholders. On completion of this series viewers should have the skills necessary to translate strategic direction into a successful operating environment. This series will also prepare students to sit the VeriSM Professional certification exam. The VeriSM™ Professional certification ensures that the successful student has proven their ability to create and use a Management Mesh that is based on the organisation’s portfolio, principles, and governance needs. The series also provides candidates with the skills to adapt the Management Mesh based on new requirements, and subsequently manage the product or service through the Define, Produce, Provide and Respond stages.
On Demand
19h 48m
When you first start programming, solving problems can be difficult. Since the entire impetus for learning programming is to solve a multitude of problems with a computer, the difficulties can lead to frustration. However, in this course, we are going to approach a problem with a method that can help alleviate those issues. Join us as we develop our problem-solving toolkit!
On Demand
4h 37m
In this course, you will learn all the details surrounding the parsing process in Splunk operations. This is a phase of operation where data masking, data rerouting, and data transformations can take place. This course teaches Splunk administrators to perform these (and other management tasks) with ease inside of Splunk. This course builds directly upon the other two Splunk courses here at ACI Learning.
On Demand
1h 39m
Apple Certified Support Professional (ACSP) certification confirms the candidate's understanding of macOS's core functionality as well as having the ability to configure key services, perform basic troubleshooting, and support multiple users with essential macOS capabilities. Candidates for this course may be in a role of help desk professional, technical coordinator, or power user who supports macOS users, manages networks, or provides technical support for the Mac.
On Demand
16h 39m
Apple Certified Support Professional (ACSP) certification confirms the candidate's understanding of macOS's core functionality as well as having the ability to configure key services, perform basic troubleshooting, and support multiple users with essential macOS capabilities. Candidates for this course may be in a role of help desk professional, technical coordinator, or power user who supports macOS users, manages networks, or provides technical support for the Mac.
On Demand
11h 58m
If you still are working on honing your programming skills, then building something simple can help that skill development along. In this series, we are going to build another simple game that allow you to flex your programming muscles. See you there!
On Demand
2h 41m
Learning a the fundamentals of programming is very empowering, but the next question is how can I use it? We are going to use some of the skills and knowledge that you have acquired to build a childhood game, Hangman, on in the command line environment. Let's get started!
On Demand
3h 34m
In this Asset Security module, students will learn the concepts associated with asset security in modern business environments. Students will learn about the classification of assets, data lifecycles, data security controls, and much more. This module prepares you for the Asset Security domain of the 2024 edition of the CISSP certification exam.
On Demand
2h 36m
In this Automation course, students will learn the basic concepts regarding automation and programmability in modern networks. While this module covers broad concepts and technologies like AI and machine learning, this module also does deep dives in specific technologies. For example, students learn about controller-based networks, REST-based APIs, and JSON.
On Demand
1h 10m
The Microsoft Azure Virtual Desktop Identity and Security course helps prepare you for success when it comes to implementing Azure Virtual Desktop. Specifically, this course ensures you are ready for the integration of security protections in the virtual desktop infrastructure. This course also ensures that you understand the various aspects of identity as it relates to Azure Virtual Desktop.
On Demand
1h 18m
The Microsoft Azure Virtual Desktop Monitoring course helps prepare you for success when it comes to implementing Azure Virtual Desktop. Specifically, this course ensures you are ready to support the careful monitoring and maintenance of the Azure Virtual Desktop environment. This includes critical concepts like log collection, Azure Advisor, Azure Monitor, and more. This course also focuses on business continuity (BC) factors for your deployment.
On Demand
1h 42m
The Microsoft Azure Virtual Desktop Users and Apps course helps prepare you for success when it comes to implementing Azure Virtual Desktop. Specifically, this course ensures you are ready to support various aspects of the user experience. This includes critical configurations such as user profiles and RDP settings. This course also helps to ensure that you can provide robust application access to end users of your Azure Virtual Desktop infrastructure.
On Demand
2h 3m
Becoming a Linux Power User is a technical skills course designed to elevate viewers to "Power User" status. Linux provides a very robust and powerful platform that enables users to achieve great things. Unfortunately, most users only scratch the surface of what Linux is capable of. This series explores some of the more powerful functions hidden away behind the graphical user interface. Topics cover using terminals and shells, managing processes and files, and writing simple shell scripts.
On Demand
8h 41m
The Becoming a Linux Server Administrator covers managing Linux servers in a business environment. Topics covered include installing Linux as a server, managing networking and troubleshooting the OS. Other episodes demonstrate how to configure a web server, a file server, and other common servers. The primary goal of the course is to help system administrators learn to deploy and support the Linux operating system as a server platform.
On Demand
12h 9m
Tech skills aren't the only skills IT Pros need to be successful in the workplace. In this course, Zach Memos and Jo Peacock will walk you through some of the most essential soft skills and their accompanying techniques that will help you become the most well-rounded IT Pro in your company.
On Demand
1h 15m
This is the 5th of 8 courses to help prepare you to take and pass the PMI-ACP exam. In this course you will learn how important it is to have a properly formed team no matter which Agile methodology you choose. The team is one of the core aspects of the Agile Manifesto and Guiding Principles.
On Demand
2h 29m
Planning, creating, maintaining and testing a Business Continuity Disaster Recovery plan can be a daunting task. If you have been assigned this responsibility, you are in the right place. We have Rob Carson from SemperSec in the studios to lend his considerable expertise. With 10+ years in the Information Security industry, Rob is able to provide guidance and real world examples to help you understand how to create and manage BCDR in your organization.
On Demand
5h 22m
This course will help you understand the requirements for passing ISACA's Certified Information Systems Auditor exam. The course is based on the five domains outlined by ISACA and gives you tools to research and study in your certification journey.
On Demand
26h 38m
This course is designed to prepare IT professionals for the CISSP certification exam and expand their knowledge and understanding of information security concepts and practices. You'll delve into essential domains including Security and Risk Management, Asset Security, Security Architecture, and Engineering, among others. Whether you're understanding secure communication channels, exploring identity management systems, or getting insights into secure software development, this course aligns with the latest CISSP curriculum to ensure you get the knowledge you need, not just to pass the exam, but also to excel in your career.
On Demand
39h 32m
Includes
Practice Test
COBIT provides the latest thinking in Enterprise Governance of Information & Technology (EGIT) and is a comprehensive source of guidance, tools, models, and resources to help business leaders achieve their objectives for effective IT governance. This course helps you prepare for the COBIT 2019 Foundation Certificate.
On Demand
6h 12m
The ISACA Certified in Risk and Information Systems Control certification is one of the top risk management certifications in the world. This course will help prepare you to be acknowledged as a Risk Management expert. Taking a proactive approach based on Agile methodology, you’ll learn how to enhance your company’s business resilience, deliver stakeholder value and optimize Risk Management across the enterprise. This course covers areas of risk governance, policies and controls. You will also learn and understand the risk management lifecycle with a focus on IT systems security and control.
On Demand
16h 27m
Includes
Practice Test
The CertNexus Certified Internet of Things Practitioner examination will prepare an individual with the skills necessary to evaluate, design, and create an internet of things solution. You will learn the overarching businesses that are available for developing internet of things technologies. Moreover, you will develop the steps that take an idea and develop a solution from the ground up.
On Demand
4h 26m
This course will help prepare students to take the new Certified Associate in Project Management exam that was updated in January 2023 to match the PMBOK Guide 7th edition as well as incorporate Agile and Business Analysis topics.
On Demand
15h 5m
Includes
Practice Test
The Certified Ethical Hacker(CEH) v12 course is designed to give the student a foundational knowledge base and skillset to be an asset to their current organization as a security analyst, or to become an effective member of a security team engaged in offensive security testing and vulnerability assessments.
On Demand
48h 17m
Includes
Skill Lab
Practice Test
This course covers the exam objectives of EC-Council's Certified Incident Handler v2 (E|CIH) program. It discusses the basic skills to handle and respond to security events and addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. The incident handling skills taught in E|CIH are complementary to the job roles below as well as many other cybersecurity jobs: Penetration Testers Vulnerability Assessment Auditors Risk Assessment Administrators Network Administrators Application Security Engineers Cyber Forensic Investigators/ Analyst and SOC Analyst System Administrators/Engineers Firewall Administrators and Network Managers/IT Managers
On Demand
19h 34m
The Certified Information Security Manager certification course is designed for those individuals seeking to enhance their skills and be recognized for their expertise in Information Security Management. The course promotes the best in security practices from around the world and identifies the individual’s knowledge and expertise in this area. The course is intended for individuals seeking to demonstrate mastery of security management skills in a global environment and prepare them for roles in advanced security management. The material contained covers all four of the Domains and associated Task and Knowledge Statements to adequately prepare the individual for passing the CISM exam.
On Demand
13h 49m
The Cisco CCNA show is produced to help candidates prepare for the 200-301 exam. The show examines the fundamentals of a variety of IT careers. It will prepare any one who achieves CCNA certification the knowledge and skills need to start any IT career he or she chooses. The show will cover networking fundamentals, network access, IP connectivity, IP services, security fundamentals, and automation and programmability. There are no formal prerequisites for CCNA certification, but you should have an thoroughly review each exam topic before taking the exam. CCNA candidates also are expected to have: * Hands-on experience implementing and administering Cisco solutions * Knowledge of basic IP addressing theory * A commanding knowledge of network fundamentals
On Demand
20h 12m
Includes
Skill Lab
This comprehensive CCNA 200-301 (v1.1) Certification Course is designed to prepare students for the Cisco Certified Network Associate (CCNA) exam, equipping them with essential networking knowledge and hands-on skills. Covering both foundational and advanced networking concepts, this course provides a thorough understanding of the latest industry trends and technologies, including IP connectivity, IP services, security fundamentals, automation, and programmability. Emphasis is placed on IPv4/IPv6 routing, switching, wireless LANs, network security, and automation techniques.
On Demand
21h 9m
Includes
Skill Lab
Practice Test
The DCCOR course helps you prepare for the CCNP Data Center and CCIE Data Center certifications for advanced-level data center roles. In this course, you will gain the skills and technologies you need to: Implement data center compute, LAN, and SAN resources, Understand the essentials of automation and security in data centers, Deploy Cisco Nexus and MDS Switches, Deploy the Cisco Unified Computing System, Describe the Cisco ACI solution in detail and Integrate other cutting edge Cisco data center solutions.
On Demand
8h 52m
The Cisco CCNP ENARSI (Exam 300-410) show was designed with the CCNP Enterprise candidate in mind. While this course will be laser-focused around the exam objectives, it will also greatly benefit those seeking to expand their Enterprise-level routing knowledge as well as their knowledge of key security and services of the infrastructure. Specifically, you will learn about the implementation and troubleshooting of advanced routing technologies and services including scalable routing protocols, VPN services, infrastructure security and automation. You will see various technologies demonstrated and explained, and oftentimes, you will be provided guidance on where you can easily obtain additional information. Our Cisco ENARSI show is also where students can be guided through some of the more complex solutions from Cisco Systems including the DMVPN and the L3 MPLS VPN.
On Demand
14h 39m
Includes
Practice Test
ITPro’s Cisco CCNP Enterprise ENCOR (350-401) will help you to learn and prepare for the associated exam—Implementing Cisco Enterprise Network Core Technologies v1.0 (ENCOR 350-401). This exam is the core exam for both the CCNP Enterprise and CCIE Enterprise certifications. In the show, you learn every topic covered in the official exam blueprint from Cisco. These areas include Architecture, Virtualization, Infrastructure, Network Assurance, Security and Automation. Though the show is exam oriented, the ultimate outcome of the show will be to fill you with the core knowledge and skillset you need to be successful in implementing cisco technologies while working in an Enterprise Network Environment. The show will be lead by Anthony Sequeira (CCIE #15626) and Ronnie Wong. They will bring their knowledge, experience and personalities to help you to learn the topics in a relaxed interactive format that is both engaging and filled with knowledge.
On Demand
16h 9m
Includes
Skill Lab
Practice Test
Cisco CCNP Security SCOR course at ITPro is ideal for any learner that wants to understand enterprise-level approaches to defense in depth security of systems and data. This course targets implementers and lead architects of security solutions with a bias toward the use of Cisco security hardware and software releases. From a certification perspective, this course prepares learners to pass exam 350-701 (SCOR). This exam is essential from a certification perspective as it serves as the core CCNP Security requirement, and is also the new CCIE Security written exam requirement.
On Demand
16h 50m
Includes
Practice Test
Are you ready to learn all about the Cisco Firepower devices from Cisco Systems? These devices have become very popular in Enterprise environments and this course will provide the details you seek. This course also completely prepares you for the SNCF 300-710 exam!
On Demand
10h 30m
The Cisco CCT Routing and Switching course is not for the complete novice to computing and networking but is designed to increase the level of competency in networking fundamentals, configuring devices remotely, basic troubleshooting (layer 1 and layer 2) and recognizing connectivity issues. Also the you will become familiar with Cisco devices and systems that a field technician will need to develop as they assist clients with their networking equipment.
On Demand
6h 35m
Includes
Practice Test
The Cisco Certified DevNet Associate (200-901) show is produced to help the software developer, networking professional and IT professional to achieve the latest Cisco certification offer, the Cisco Certified DevNet Associate certification. It will help you to learn about the core Cisco platforms used, Cisco Programmability strategies, working with applications and working with APIs. Though there are no formal prerequisites for the exam, it is recommended that you have one or more years of hands-on experience in developing and maintaining applications.
On Demand
15h 44m
This show will help aspiring or current IT professionals seeking the fulfill the job role as an entry or associate-level cybersecurity analyst. It will be valuable to the IT professional who desires to know more about cybersecurity operations in a SOC (Security Operations Center) and ultimately guide the certification seeker pursuing the Cisco Certified CyberOps Associate certification. You will learn about Security Concepts, Monitoring, host-based analysis, network intrusion analysis, and security policies and procedures used by a CyberOps Associate working within a SOC.
On Demand
13h 55m
Includes
Practice Test
In this Cloud Architecture module, students will learn the basic concepts regarding modern cloud implementations. Students will learn about cloud service models, service availability, and much more.
On Demand
5h 2m
In this course, we will introduce you to many essential cloud security concepts, covering foundational principles and practices for protecting data and applications in cloud environments. Students will learn about cloud security frameworks, common attacks, and compliance requirements, along with strategies for safeguarding against common threats through security best-practices. Ideal for cloud-security beginners, this course equips learners with the knowledge needed to pursue advanced cloud security topics.
On Demand
3h 19m
In this course the learner will identify and communicate to stakeholders, the importance of vulnerability management and incident response reporting. The learner will also identify common metrics and key performance indicators used in these reporting processes.
On Demand
1h 35m
Communication and Network Security dives into secure design principles for networks, covering OSI/TCP/IP models, IPv4/IPv6, and protocols like IPSec, SSH, SSL/TLS. It explores network segmentation (physical, logical, micro), performance metrics, and traffic management. Topics include VoIP, wireless technologies, SDNs, and cloud networking with VPCs. The course also addresses secure network components, access control, endpoint security, and implementing secure communication channels for voice, video, and remote access. Essential for security professionals, it equips you with knowledge to design and manage secure networks effectively.
On Demand
5h 46m
CompTIA A+ certified professionals are proven, problem solvers. They support today’s core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today’s digital world.
On Demand
11h 26m
CompTIA A+ Core 2 continues this education. CompTIA A+ certified professionals are proven, problem solvers. They support today’s core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today’s digital world.
On Demand
12h 55m
Includes
Skill Lab
Those looking to complete the CompTIA Advanced Security Practitioner (CASP+) certification will find in this course an overview of the process in achieving the certification and a brief amount of details about the exam required to pass in order to receive the certification. CASP+ covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. The certification is designed for advanced security professionals that have knowledge of Security+, have a few years of experience in the field, and will go on to learn more advanced skills and need to understand things like risk management and incident response and is also approved by U.S. Dept. of Defense to meet IA technical and management certification requirements.
On Demand
26h 18m
Includes
Practice Test
CompTIA Cloud Essentials+ is for both IT and non-IT professionals with successful exam candidates demonstrating an understanding of how to make current cloud technology decisions for example identifying, managing, and reducing cost, mitigating security risks and operational impacts as well as comprehending new technology concepts and solutions.
On Demand
8h 15m
The CompTIA Cloud+ certification show introduce you to the concepts of cloud-based solutions as part of your IT infrastructure. You will need skills that will allow them to deploy, optimize and protect data within cloud environments. You will learn the fundamental skill to meet the challenges working in a multi-cloud environment.
On Demand
23h 6m
Includes
Skill Lab
Immerse yourself in the expansive world of cloud computing with our CompTIA Cloud+ course, designed to equip you with up-to-date skills and knowledge needed to excel in the 2024 CompTIA Cloud+ exam. This comprehensive course explores an array of topics, such as cloud configurations, deployments, security protocols, systems and network management, and disaster recovery strategies, among others. Each video is curated to offer in-depth insights on complex cloud concepts, simplifying them for your understanding. From operating various cloud models to strategizing effective business continuity plans, you'll be guided by experts in the field who share real-world examples and tips, providing you the practice and confidence to tackle any cloud computing scenario. By the end of this course, you won't just be prepared for the exam but equipped to excel in your cloud computing career.
On Demand
16h 53m
The CompTIA CySA+ is an industry recognized certification that aims to validate the skills and knowledge of cybersecurity analysts. This course is meant to help you prepare for the exam and covers a wide range of topics, including threat intelligence, vulnerability management, and incident response. Other topics covered includes: - Analyzing security logs and events - Identifying and responding to security incidents - Managing security vulnerabilities - Communicating security findings The skills validated by the CySA+ certification makes it a valuable asset for anyone looking to advance their career in cybersecurity.
On Demand
15h 11m
Includes
Skill Lab
The CompTIA IT Fundamentals+ Certification is an entry level certification designed to introduce users to basic computer principles. It covers basic IT literacy and ensures one understands the different terminology and the various concepts involved In the IT industry. It also serves as a great starting point if you are just getting started in computers and is designed to be the first step on your way to pursuing the CompTIA A+ certification or others similar. Topics covered include hardware basics, troubleshooting, software installation, security and networking.
On Demand
18h 9m
Includes
Skill Lab
Practice Test
Linux + introduces learners to Linux, an open-source operating system which is available to anyone seeking an alternative to mainstream operating systems. This course will cover Linux fundamentals such as; installing and configuring Linux, securing Linux, managing files and directories, configuring storage, scripting, containers, automating tasks, networking, and troubleshooting Linux. These topics are presented in a distribution agnostic manner which is suitable for all distributions of Linux. This course will prepare learners to pass the CompTIA, Linux + certification exam and prepare them to support Linux in the workplace.
On Demand
17h 39m
Includes
Skill Lab
Practice Test
In this course, the viewer will learn the following, design and implement functional networks as well as configuring, managing, and maintaining essential network devices. They will also look at various network devices such as routers and switches, as well as identifying benefits and drawbacks of existing network configurations. They will also look at common network security, standards, and protocols as well as troubleshooting common network issues.
On Demand
21h 44m
Includes
Skill Lab
This course provides the learner with a comprehensive exploration of networking, encompassing essential fundamental concepts, practical network implementations, and vital operational strategies. Learners will explore how to troubleshoot various network issues effectively. The course will examine critical aspects of network security necessary to protect against a wide range of threats.
On Demand
34h 9m
Includes
Skill Lab
PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks.
On Demand
17h 49m
Includes
Skill Lab
The CompTIA Project+ show is for information technology (IT) professionals who need to assist in coordinating projects or manage small projects. A viewer of the show in addition to personal study will gain knowledge and skills required to assist in planning and managing a small-to-medium-size project. He or she will understand the project life cycle, learn steps to establish a communication plan, manage resources and stakeholders, maintain project documentation and artifacts, and support the completion of larger projects within an information technology (IT) environment.. The show helps prepare CompTIA Project+ candidates with at least 6–12 months of hands-on experience managing projects in an IT environment.
On Demand
15h 28m
Includes
Practice Test
This course is designed to equip you with the knowledge and skills required to excel in the dynamic field of cybersecurity and achieve the CompTIA Security+ certification. In this course, you will learn how to assess the security posture of an enterprise environment, enabling you to recommend and implement appropriate security solutions. You will delve into the intricacies of monitoring and securing hybrid environments, covering cloud, mobile, and Internet of Things (IoT) technologies. Our expert instructors will guide you through the essential principles of governance, risk, and compliance, ensuring you operate with a keen awareness of applicable regulations and policies. Moreover, you will gain proficiency in identifying, analyzing, and responding to security events and incidents, a crucial skillset in the ever-evolving world of cybersecurity. By the end of this course, you will not only be prepared to ace the CompTIA Security+ certification exam but also be well-equipped to tackle real-world security challenges and secure vital systems and data. Join us on this educational journey, and take the first step toward a fulfilling career in cybersecurity.
On Demand
30h 19m
Includes
Skill Lab
CompTIA Server+ is a global certification that validates the hands-on skills of IT professionals who install, manage and troubleshoot servers in data centers as well as on-premise and hybrid environments.
On Demand
13h 39m
Includes
Skill Lab
Practice Test
This course will show and help the learner to configure common TCP/IP settings in Windows clients. Following the course, the learner will be able to install, configure, manage as well as troubleshoot wired and wireless network settings on Windows clients.
On Demand
2h 35m
This course will show and help the learner to configure local storage in Windows clients. Following the course, the learner will be able to configure, manage and optimize storage drives, as well as format Windows volumes with file systems such as NTFS, FAT32, and ReFS. Finally, the learner will be able to configure and manage file and folder permissions in Windows.
On Demand
2h 57m
This course is for those implementing, managing and monitoring security for Azure, hybrid and multi-cloud environments hybrid (and) multi-cloud environments. This course will prepare the learner to administer governance for security, manage security posture, configure and manage threat protection and implement security monitoring and automation.
On Demand
3h 15m
This course will show and help the learner to configure security settings and control access to Windows clients. Following the course, the learner will be able to manage users, group and computers, Group Policy, BitLocker and the Windows Firewall as well as how to configure virus, threat, application and browser security in Windows environments.
On Demand
6h 2m
As the title suggests this series looks at customer service skills, specifically for those in a technical role. This series explores the world of interpersonal skills, as well as principles for effective communication and also takes a look at the most common issues reported to the Service Desk. This series is intented for those with a passion for good customer service; those who want to improve their communication skills, as well as those who are looking at a career in a service desk environment.
On Demand
10h 29m
Cyber Secure Coder will aid in developing an appropriate understanding of secure development practices and how those practices protect against various types of vulnerabilities. You will learn the types of vulnerabilities, the exploits that can occur from those vulnerabilities, and the programming practices that will help prevent exploitation in an application.
On Demand
9h 57m
CyberPatriot is an amazing free program. It is a National Youth Cyber Education Program with emphasis on the national competition. In this course you will be introduced to the program, competition and basic skills needed to compete. This course should be used as a supplement to tools provided by your Coach, Technical Mentor, and resources covered in these videos. There are a great deal resources available to prepare you. Please take advantage of them.
On Demand
11h 21m
This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. In addition, this course and subsequent certification meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines: - CSSP Analyst - CSSP Infrastructure Support - CSSP Incident Responder - CSSP Auditor
On Demand
13h 17m
Embark on your cybersecurity journey with Cybersecurity Fundamentals, a course designed for those new to the field. This course prepares you for the ISC2 Certified in Cybersecurity (CC) exam, covering fundamental topics such as security principles, incident response, business continuity, disaster recovery, access controls, network security, and security operations. Each episode is created with entry-level learners in mind, offering clear explanations and practical examples of cybersecurity concepts. You’ll gain the foundational knowledge needed to secure digital environments, manage incidents effectively, and maintain robust security operations. Previous technical knowledge is helpful, but not mandatory: guided by industry experts, you’ll be equipped with the skills to ace your CC exam and excel in a cybersecurity career.
On Demand
6h 54m
To become a well-rounded and effective cybersecurity professional you must have a good working knowledge of the common threats and vulnerabilities that affect today's computer networks and systems, so that you can better defend and mitigate against them. This series will equip you to list and define those threats and vulnerabilities such as Threat Actor types, Threat Vectors and Attack Surfaces. You'll also explore specific security vulnerabilities that affect Cloud, Application, Web, and Mobile as well as other common digital and hardware systems. This series will also train you to know the common indicators of malicious activities ranging from password-based attacks to application attacks and then explore many of the mitigation strategies that are used to defend against them.
On Demand
7h 57m
This series explores the practical application of DNS, the Domain Naming System. We demonstrate using DNS records to support websites, mail servers, and other services. Other topics addressed include DNS security, replication, and popular server software including BIND and Microsoft Windows DNS.
On Demand
13h 25m
In this series, we take a look at common formats for saving, reading, and shuffling data around such as Comma Separated Values (CSV), JavaScript Object Notation (JSON), YAML Ain't Markup Language (YAML), and eXtensible Markup Language (XML). If you want to know more about these data formats as well as how to interact with these different data representation using Python, then we will see you there!
On Demand
11h 1m
This is the third of eight courses in the path to achieving the PMI-Agile Certified Practitioner certification. In this course you will learn more of the principles of Agile that allow companies to produce software, applications and other high-risk, fluid technologies that are not conducive to the predictive Waterfall techniques of project management.
On Demand
2h 41m
This course specifically covers way to deploy and manage Active Directory Domains services  in on-premises and cloud environments. A viewer of the show in addition to personal study will gain knowledge and skills required to deploying and managing Active Directory Domain Services, including deploying and managing domain controllers; configuring and managing sites, domains, and forests; configuring and managing security principals; implementing and managing hybrid identities; and using group policies.
On Demand
9h 41m
This course will help the learner implement and configure Windows client deployments using various tools such as Autopilot, the Microsoft Deployment Toolkit and more. Following the course, the learner will be able to plan and implement Window operating system deployment, provisioning, configuration, and remote management.
On Demand
7h 36m
The Deploying and Managing a Microsoft 365 Tenant course at ACI Learning will walk you through all you need to know to be up and running successfully with a new (or established) MS 365 tenant. This course maps directly to the first domain of the MS-102 Microsoft 365 Administrator exam. This course covers all you need from initially implementing and managing a tenant and its domains to managing users and groups as well as roles in Microsoft 365. You will be able to carefully monitor service health and license allocations and keep your Microsoft 365 environment running smoothly.
On Demand
2h 38m
The Microsoft Certified: Azure Solutions Architect Expert certification is a way to validate your knowledge & expertise in designing cloud and hybrid solutions that run on Microsoft Azure in areas that include implementing, securing, managing, and monitoring identity, governance, storage, compute, and virtual networks. This course will cover the objectives outlined by Microsoft to prepare you to take the Designing Microsoft Azure Infrastructure Solutions exam.
On Demand
18h 45m
Includes
Practice Test
All projects will have problems, and Agile projects are no different. What IS different will be the way Agile methodologies process and handle problems. I’m this course you will see how Scrum, XP, etc work through this process.
On Demand
1h 29m
In this course on DevOps Fundamentals in the Cloud, students will examine key concepts central to the DevOps methodology. The course will cover essential topics such as version control concepts, CI/CD pipelines, system integration in DevOps, and the tools commonly used in DevOps environments. By the end of the course, students will be to explain the core principles of DevOps and how they contribute to the efficient delivery of high-quality software products.
On Demand
2h 1m
The Microsoft Certified: Azure Developer Associate certification is a way to validate your knowledge & expertise in developing cloud and hybrid solutions that leverage Azure SDKs, data storage options, data connections, APIs, app authentication and authorization, compute, and container deployment, debugging, performance tuning, and monitoring, using Azure-supported languages and the Azure CLI, Azure PowerShell, and other tools. This course will cover the objectives outlined by Microsoft to prepare you to take the Developing Solutions for Microsoft Azure exam.
On Demand
14h 25m
Includes
Practice Test
This is a non-technical course designed for every end user. Our experts explain very common security topics that are critical to be aware of in today’s work environment, but explains in the “end-users” non-technical language, so everyone can understand. Many stories are told as examples for easier understanding. One might think this is super easy and doesn’t go deep on topics, but you would be wrong, this course is a perfect fit for everyone to understand and prevent security risk.
On Demand
3h 4m
This course offers a fundamental introduction to cloud deployment and migration. Learners will explore different cloud deployment models, such as public, private, hybrid, and multi-cloud, and develop effective deployment strategies. The course includes planning and executing cloud migrations, assessing infrastructure readiness, and utilizing tools for seamless data and application migration. Additionally, students will acquire practical knowledge in code-based cloud deployment and configuration, applying Infrastructure as Code (IaC). They will also learn to efficiently provision and manage cloud resources, optimize performance, and ensure security and cost control.
On Demand
2h 32m
This course is designed for IT professionals seeking to learn the essentials of cloud operations. Learn to monitor and analyze cloud environments, adapt resources to meet demand, and safeguard data with backup and recovery methods. The learner will gain insights into provisioning, maintaining, and decommissioning cloud resources, providing a solid foundation for managing cloud environments effectively.
On Demand
3h 2m
This course covers essential security operations and management, including compliance with investigations, logging, and monitoring. Learn configuration management and foundational security concepts, along with resource protection and incident management. Skills in operating and maintaining detection and preventive measures are developed, alongside implementing patch and vulnerability management. You will also gain proficiency in recovery strategies, disaster recovery processes, and testing DR plans. The course includes business continuity planning and exercises, and managing physical security, preparing you to effectively support and enhance organizational security measures.
On Demand
3h 46m
Excel 2016 Advanced explores ways to enhance Excel workbooks with topics in analyzing data, collaborating and workbook security, and adding graphical elements. This series covers important Excel functionality such as format as table, conditional formatting, shared workbooks and tracked changes, and data validation. While Excel 2016 Advanced is a continuation from the Excel 2016 Essentials series, it can be viewed as a standalone show for users looking to excel to the next level of skills. This series is specifically for locally installed Excel 2016 on Windows operating system.
On Demand
9h 11m
Excel 2016 Advanced for Mac explores ways to enhance Excel workbooks with topics in analyzing data, collaborating and workbook security, and adding graphical elements. This series covers important Excel functionality such as format as table, conditional formatting, shared workbooks and tracked changes, and data validation. While Excel 2016 Advanced for Mac is a continuation from the Excel 2016 Essentials for Mac series, it can be viewed as a standalone show for users looking to take their Excel skills to the next level. This series is specifically for locally installed Excel 2016 on Mac OS.
On Demand
10h 52m
Excel 2016 is the powerful spreadsheet application in the Office suite. It seems every organization, large and small, uses Excel to organize and analyze data. However, many users are intimidated by Excel and confused by how it behaves as an application. The Excel 2016 Essentials series strives to empower users by learning the foundations to conquer this program. We begin with basic skills such as navigating the interface, identifying items in a spreadsheet, selecting cells, and inputting data. The series also covers formatting text and numbers, modifying a worksheet layout, printing and page layout, and managing worksheets in a workbook. While this series is designed for beginner users, it has lots of great tips and tricks for experienced users as well. This series is specifically for locally installed Excel 2016 on Windows operating system.
On Demand
8h 24m
Excel 2016 for Mac is the powerful spreadsheet application in the Office suite. It seems every organization, large and small, uses Excel to organize and analyze data. However, many users are intimidated by Excel and confused by how it behaves as an application. The Excel 2016 Essentials for Mac series strives to empower users by learning the foundations to conquer this program. We begin with basic skills such as navigating the interface, identifying items in a spreadsheet, selecting cells, and inputting data. The series also covers formatting text and numbers, modifying a worksheet layout, printing and page layout, and managing worksheets in a workbook. While this series is designed for beginner users, it has lots of great tips and tricks for experienced users as well. This series is specifically for locally installed Excel 2016 on Mac OS.
On Demand
10h 0m
Can you create a chart from the Excel data for our report? Can you make a dashboard? Oh, we also need a pivot table. These are requests that can make Excel users quiver in fear. In this series, we simplify how to create charts, PivotTables, and PivotCharts. We start from the beginning with identifying terminology used with charts and advance to creating complex PivotTables and PivotCharts. This series is specifically for locally installed Excel 2016 on Windows operating system.
On Demand
3h 28m
Excel is more than just columns and rows of data. Excel can perform calculations from simple addition to complex formulas with its vast library of named functions. In this series, we cover everything you need to know about crunching numbers in Excel. There are multiple sections ranging from the very basics to more advanced data analysis to a reference guide of the different Excel functions by category. This series is for beginners as well as advanced users of Excel. Functions are demonstrated on locally installed Excel 2016 on Windows operating system.
On Demand
15h 54m
GIAC is a registered trademark of the Escal Institute of Advanced Technologies, Inc. SANS is not affiliated with these courses. GIAC has been an industry leader in information security certifications for years. The GIAC Security Essentials (GSEC) is designed for Security Professionals who want to demonstrate that they are qualified for IT systems hands-on roles with respect to security tasks. GSEC is one of the DoDD Approved 8140 / 8570 Baseline Certifications for IAT Level II.
On Demand
10h 44m
Includes
Practice Test
In this course, we will explore various security concepts, such as security controls & fundamentals, change management and cryptographic solutions. We will examine concepts such as confidentiality, integrity, and availability, as well as access control, zero trust and more.
On Demand
5h 23m
In this series, we are going to learn the basics of using the command-line interface. If you have ever been scared when the cursor shows up on a seemingly blank screen or wondered what the Terminal or cmd application can accomplish, then stay tuned to learn the basics and increase your productivity.
On Demand
2h 4m
In this course, Getting your Data into Splunk Effortlessly, you will learn about the many ways there are to configure data inputs into your Splunk Enterprise deployment. These methods include monitoring folders or files, using network inputs (UDP/TCP), using scripted inputs, and even using agentless solutions like the HTTP Event Collector. This course is critical to your understanding and use of Splunk as clearly Splunk is only as valuable as it is complete with its data from your organization. With a wealth of data options that we might want to Splunk today, thank goodness Splunk is so flexible when it comes to ingesting data from a wide variety of sources and technologies.
On Demand
1h 54m
The Google Cloud Platform - Associate Cloud Engineer course targets those individuals looking to learn to deploy applications in the Google Cloud Platform. The course also assists learners in how to monitor operations and manage enterprise-scale solutions. This course also ensures the learner understands how to use both the Google Cloud Console as well as the command-line interface to perform solution deployment, maintenance, and monitoring. While it thoroughly prepares its students for the Google Certified Associate Cloud Engineer certification, it is also a valuable guide for your production cloud workloads.
On Demand
8h 3m
In this course you will learn how governance and management of IT are integral parts of enterprise. You will also learn about how effective governance deals with the way an organization is structured, how the enterprise strategy and objectives are held in close alignment, and how important it is to an IS auditor to understand IT governance.
On Demand
4h 31m
Governance provides the ability to meet stakeholder needs by providing value. In this first of four courses to prepare you for the CRISC exam, you will learn about Organizational Governance and how it relates to overall Risk Governance.
On Demand
4h 47m
HTML5 Canvas elements bring art and animation to the browser. In this series, we explore the capabilities of the HTML5 Canvas element in conjunction with JavaScript. This includes simple "pen" drawings, image displaying, image manipulation, and animations. Knowing HTML5 Canvas provides a great way to start with in-browser games as well as expressing those artistic desires. Hope to see you there!
On Demand
10h 48m
This course is designed for those looking to gain skills related to penetration testing web applications. We start by covering topics that will help you understand some of the basics of web technologies which are the foundation of modern web applications. Next we will gain familiarity with common web app pentesting tools as well as information gathering skills and methods. Finally, we will explore and attack common web application vulnerabilities.
On Demand
9h 55m
BGP is the protocol that routes the internet. This show will introduce you to BGP as the protocol of the internet, how to get it up and running and then verify that you have BGP working. Though the configuration is simple. The choices you have to route are all dependent upon policy decisions you make.
On Demand
8h 10m
To become a well-rounded Ethical Hacker and/or Penetration Tester, not only must you be familiar with the appropriate tools and techniques, but you must also craft your methodology for applying said skills. One of the best ways of accomplishing that goal is by way of practical application. In this series, you'll be instructed on how to apply your hacking skills and tools to successfully scan, enumerate, access, and escalate privilege against multiple purposely vulnerable, virtual machines(VM). Each VM will present similarities and differences, offering unique challenges that your tools and techniques will need to be applied to overcome. This practical experience can be useful for those looking to obtain certifications such as EC-Council's Certified Ethical Hacker(C|EH), CompTIA's Pentest+, Offensive-Security Certified Professional(OSCP), etc.
On Demand
14h 20m
In this series you will take a journey through the process of building a personal computer. You will discover how to determine which PC build is right for you as well as how to define and adhere to a budget and acquire the individual components for the build. You will see step by step how to assemble the components such as the motherboard, processor, RAM that make up the system unit. There are no prerequisites for this series past basic computing terminology. If you have ever wondered what it takes to build your own PC, join us for this adventure.
On Demand
3h 36m
When you are planning, creating, and managing networks, some of the tasks can be repetitive and time consuming. Scripting allows you to automate these tasks to allow for reproducibility, scaling to larger systems, and collaborating with others use versioning. In this series, we will see how to utilize Python to make your life as a networking professional a little easier. See you there.
On Demand
2h 59m
Cisco Meraki wireless is a cloud-based managed enterprise wireless solution. This show will introduce you to implementing Cisco Meraki enterprise access points. You will see and learn what is included when you purchase a Meraki access point. You see the physical installation of the access point and learn how to configure it to work with the Dashboard.
On Demand
2h 21m
The Cisco Modeling Labs 2 (CML2) is a redevelopment and rebranding of their VIRL1.x (Virtual Internet Routing Lab). This show is meant for those who may be familiar with VIRL 1.x or are brand new to it. From it, you will learn how to install and configure this networking simulation tool into your VMware platform--VMware Workstation (Windows), VMware Fusion (macOS) or VMware ESXi. Also, you will see how to accomplish operations in the CML2 after a brief introduction to the UI--building a lab using the UI and through the API using Python, how to remotely access the CML and then how to connect your labs to the outside world.
On Demand
3h 13m
The GNS3 Essentials short series that will help you to get GNS3 up and running so that you get networking devices virtualized so that you can simulate a lab environment or a production scenario. You will learn what is required, as well as how to install it for your best use. Using Dynamips images (Cisco IOS) and Cisco VIRL images, you'll see how to add devices to make GNS3 more functional.
On Demand
2h 22m
The Hands-on with TEAMS show is designed for Enterprise Administrators who take part in evaluating, planning, deploying, and managing Microsoft Teams. Microsoft Teams is an integrated communication and collaboration solution for enabling all of your users to create and share content, as well as schedule meetings and interact with each other. Microsoft now brings together the most important collaboration capabilities that your enterprise needs in order to enable you to invite everyone you work with to chat, meet, call, and collaborate all in one place, no matter where you are. This show assumes that you have a working knowledge of Microsoft Services and workloads such as the Azure Active Directory, DNS, and O365/Microsoft365. You should also have a working knowledge of networking, Windows 10 client administration, and PowerShell.
On Demand
18h 33m
The Hands-on with SCCM show is designed for Enterprise Administrators who take part in evaluating, planning, migrating, deploying, and managing Microsoft Infrastructure using the Microsoft Endpoint Manager product. Microsoft Endpoint Manager is an integrated solution for managing all of your devices. Microsoft now brings together Configuration Manager and Intune, without a complex migration, and with simplified licensing, allowing you to manage your devices anytime and from anywhere, on-prem, in the cloud, or as a hybrid solution.
On Demand
17h 1m
Even though the MCSA and MCSE have been retired, many of us still manage on-premises environments running Windows Server 2019. This course covers some of the basic administration tasks, updated for Windows Server 2019.
On Demand
7h 25m
Includes
Skill Lab
Are you a new Zoom user and wondering how exactly to use all of its capabilities and features? Zoom is an extremely useful and complex video conferencing and communication platform that is used by businesses and individuals around the world. In this course, Adam Gordon will walk you through both the Zoom basics and its more complex features like integrations, virtual backgrounds, and meeting templates.
On Demand
4h 15m
In this IP Connectivity module, students will learn the basic concepts regarding IP connectivity in modern networks. First, this module presents the components found in most routing tables. Once the modern routing table is fully understood, students learn how a router makes it forwarding decisions by default. This module then covers IPv4 and IPv6 static routing, the configuration of single area OSPF, and the role of FHRPs in the modern network.
On Demand
2h 37m
In this IP Services module, students will learn the basic concepts regarding some of the most popular IP services in use today. These services include NAT, NTP, DHCP, DNS, SNMP, syslog, QoS, SSH, and FTP/TFTP.
On Demand
3h 2m
ISO/IEC 27001 is an international standard that provides a framework for Information Security Management Systems (ISMS) to help organizations secure their information assets. It sets out the criteria for establishing, implementing, maintaining, and continually improving an ISMS, and includes aspects such as risk management, security controls, and compliance. This standard is important for organizations as it helps in protecting sensitive information, managing risk effectively, and building trust with stakeholders by demonstrating security best practices. This course provides a foundational overview of the ISO/IEC 27001 standard and what an organization would need to plan, execute and maintain an ISO/IEC 27001 certification. This course also provides a brief overview of some of the changes from the 2018 version to the 2022 version.
On Demand
4h 53m
Risk practitioners analyze and evaluate IT risk to determine the likelihood and impact on business objectives to enable risk-based decision making. In this second of four courses to prepare you for the CRISC exam, you will learn about IT Risk Identification and IT Risk Analysis/Evaluation.
On Demand
3h 46m
In this course on Identity and Access Management, students will learn the concepts associated with secure authentication and authorization for user principals. Students will learn about the design of identification and authentication strategies, federation, and the overall identity and access provisioning lifecycle. This module prepares you for the Identity and Access Management (IAM) domain of the 2024 edition of the CISSP certification exam.
On Demand
3h 27m
Ideal for IT professionals, and administrators responsible for organizational security, this course delves into Azure AD multifactor authentication, how to implement Conditional Access and manage its policies, and the way to configure application registration and consent. By exploring effective strategies for permissions, app integration, and OAuth2 authentication, you will acquire the necessary skills to effectively manage authentication and optimize access management in Azure environments for bolstering organizational security.
On Demand
4h 17m
The Implement Enterprise Splunk for your Business course seeks to get students up and running quickly with Splunk Enterprise. This course begins with a look at the fundamentals of Splunk as an important component in the business processes of a modern organization. We review the main components of Splunk and just how remarkable this product can become for your business. This course then dives deep into the configuration, maintenance, and support of Splunk operations for a modern company. This is one of three courses planned that center around the administration of Splunk Enterprise. NOTE: Many of these videos also are applicable to Splunk Cloud.
On Demand
2h 0m
The Implement a Hybrid Network Infrastructure show is for information technology (IT) professionals who want to prepare for Microsoft's AZ-800 Administering Windows Server Hybrid Core Infrastructure exam. This course specifically covers the fourth domain of the AZ-800 exam, Implement and manage an on-premises and hybrid networking infrastructure, which is 15-20% of the exam. A viewer of the show in addition to personal study will gain knowledge and skills required for implementing and managing an on-premises and hybrid networking infrastructure, including implementing on-premises and hybrid name resolution, managing IP addressing in on-premises and hybrid scenarios, and implementing on-premises and hybrid network connectivity.
On Demand
5h 18m
This course has been designed for IT professionals and administrators who manage identities and wish to deepen their understanding of Azure Active Directory (Azure AD). You’ll learn how to effectively implement and manage user accounts, handle Azure AD authentication, and configure self-service password reset. We’ll further explore the management of guest accounts, and we'll discuss the best practices around Azure AD object management. By the end of this course, you'll be equipped with the necessary skills to manage user identities efficiently and securely.
On Demand
4h 36m
Welcome to the course on "Implementing IAM Security in AWS." Hosted by Sophie Goodwin, this course promises to be an exciting journey into the world of AWS security. Sophie, your learner advocate, brings her experience hosting security-focused courses and her recent cybersecurity certification, while subject matter expert Jill West shares her extensive background in education and IT. The target audience for this course should have at least five years of experience in cybersecurity, including designing and implementing security solutions, along with at least two years of hands-on experience securing workloads in AWS. The course will focus on IAM (Identity and Access Management), covering topics such as access control, policies, federation, SSO, and more. Get ready to enhance your understanding of IAM security in AWS.
On Demand
2h 44m
The Implementing Identity in Azure AD course at ACI Learning will walk you through all you need to know to be up and running successfully in regard to identity topics relevant to Microsoft 365. This course maps directly to the second domain of the MS-102 Microsoft 365 Administrator exam. This course covers the implementation and management of identity synchronization with Azure AD and the implementation and management of authentication. The course also reviews the key principles of implementing and managing secure access to Microsoft 365 resources.
On Demand
2h 59m
Welcome to the course on "AWS Security in Logging, Monitoring, and Alerting." The hosts, Lauren Deal and Jill West, introduce themselves. Jill, an experienced instructor and cloud expert, discusses her background in education and IT, along with her certifications. The target audience for this course is individuals with knowledge equivalent to the CompTIA trifecta (A+, Network+, and Security+), as well as additional cybersecurity certification or equivalent knowledge. The course will cover logging, monitoring, and alerting in AWS, with sections dedicated to each topic, including overviews, system design, customization, and troubleshooting. Get ready to embark on a comprehensive learning journey with us!
On Demand
4h 1m
This course is the eighth of eight courses to help prepare you for the ACP exam. In this course you will learn how all Agile methodologies depend upon continuous improvement for success.
On Demand
44m
In this course you will learn the key processes and methodologies used by organizations in the areas of information systems acquisition, development and implementation. This includes testing methodologies, control identification and design, business case and feasibility analysis and system migration.
On Demand
4h 1m
In this course you will learn the key processes and methodologies used by organizations in the areas of information systems acquisition, development and implementation. This includes testing methodologies, control identification and design, business case and feasibility analysis and system migration.
On Demand
4h 39m
In this course you will see how IT service management is important in the development of Information Systems as well as its operations and the area of business resilience. You will learn about IS operations, performance management, problem and incident management, and other management practices that affect operations. You will also learn about resiliency topics of Business Continuity and Disaster Recovery.
On Demand
5h 29m
To be effective in the management of IT risk, the risk practitioner must have a working understanding of key principles and concepts of information technology and security. In this fourth of four courses to prepare you for the CRISC exam you will learn the foundational knowledge of risk when it comes in the form of computer hardware and software, networking concepts, secure system development and the importance of user training and awareness in the area of cybersecurity.
On Demand
3h 56m
Embark on your journey into the dynamic world of cybersecurity with our introductory course tailored for aspiring red team members or advanced penetration testers. Designed for those new to the realm of Antivirus (AV) and Endpoint Detection and Response (EDR) evasions, this course will provide a solid foundation in evasion and bypass techniques. Join us for this introductory course, where you will lay the groundwork for your journey into the fascinating world of AV and EDR evasion. Acquire the foundational skills necessary to navigate and understand these critical aspects of modern cybersecurity.
On Demand
4h 58m
The Amazon Web Services (AWS) Cloud platform revolutionizes the way individuals, businesses, and enterprises handle their digital needs. As the world's most comprehensive, scalable, and broadly adopted cloud platform, AWS provides over 175 fully-featured services from data centers across the globe. AWS Cloud empowers organizations with improved agility, lowered costs, and instant scalability. Whether you're an individual looking to innovate faster or a large corporation wanting to optimize operations, the AWS Cloud platform offers a suite of cloud-based products including computing power, storage options, networking, and databases, tailored per user needs. Learning the AWS Cloud's intricacies will position you at the forefront of the cloud computing revolution, enhancing your technical skills and opening avenues to new opportunities.
On Demand
4h 20m
Amazon Web Services is the leading cloud platform in the world today hosting services and resources to some of the largest companies and organizations. While Amazon provides the highest levels of security to their customers, security issues and data breaches still can and do occur. One of the best courses of action you can take to ensure your AWS resources and assets is to find security issues before they become incidents and Penetration Testing can help you do just that. This course is for the AWS admin, Security Admin, Penetration Tester, or anyone interested in gaining experience with finding and exploiting security flaws in the AWS environment at an introductory level. We will start by working through some of the relevant basic AWS concepts and skills. Next we will explore useful administrative and security tools specific to AWS. Finally, we will apply our skills and tools against a variety of AWS specific challenges, giving us a 'hands-on' experience with real-world AWS security issues.
On Demand
8h 47m
In this series, Justin takes a look at AngularJS, a web framework that has been around for a while. He demonstrates the use of the basics of AngularJS as well as discusses preferred practices for creating application code as well as organizing code. Some of the topics that he discusses are: the use of controllers, what is $scope and how to eliminate the use of $scope, using the built-in directives to render lists, handle events, and dynamically style your application. If you are interested in learning more about AngularJS, then join us!
On Demand
10h 29m
Administering and configuring infrastructure is a necessary but sometimes very difficult undertaking. Manual configuration of infrastructure is a full time job that takes away from other valuable activities that is prone to errors and difficulties in reproducing system state. Ansible allows one to create plans for managing infrastructure using an agentless (no outside system required) approach. During this show we will cover what Ansible is, how to set up Ansible, and use Ansible to create reproducible server configurations.
On Demand
13h 45m
Docker is a set of tools that provide a runtime for creating, managing and orchestrating containers. Docker provides the ability for developers, system admins, or hobbyists to provision a container that can be configured as similarly to a virtual machine without all of the resource intensity. This series introduces the usage of the Docker client to run containers, managing the Docker daemon, using Docker Machine for provisioning runtime environments for the Docker toolset, Docker Compose for orchestrating and managing multi-container applications, as well as Docker Swarm for distributing those containers across multiple nodes in a cluster of machines. Stay tuned to get started with Docker!
On Demand
9h 39m
Version control is a cryptic yet essential part of a software development team. Git is a distributed version control system that allows collaboration and management of large scale software products (as well as other types of projects). In this series, you will get started with Git. You will be shown how to create a repository, save changes in the repo, link to a remote server (GitHub), and finally a basic collaboration workflow. If you are just getting started in software development or you need to know more about the tools that your team is using, then join us as we 'git' started.
On Demand
3h 31m
The proliferation of IoT devices, both at home and in the office, has significantly expanded the attack vectors for bad actors trying to gain a foothold on your network. You may find some of these gadgets on your corporate network even though they don’t always have the same level of built-in security you’d require for your traditional endpoints. By penetration testing these devices, you’re able to more effectively assess potential vulnerabilities, thus improving your overall security posture. This course will guide you through the basic tradecraft and techniques specific to IoT devices so that you can see things from the attacker’s perspective, enabling you to take corrective measures increasing their security.
On Demand
9h 34m
NodeJS has brought JavaScript to the server as well as the desktop programming environments. With this escape from the browser, JavaScript provides the ability to leverage your understanding of JavaScript to create new and powerful applications. If you want to power up your understanding of JavaScript using the NodeJS platform then join us!
On Demand
10h 2m
In this series, we cover the basics of using NumPy for basic data analysis. Some of the things that are covered are as follows: installing NumPy using the Anaconda Python distribution, creating NumPy arrays in a variety of ways, gathering information about large datasets such as the mean, median and standard deviation, as well as utilizing Jupyter Notebooks for exploration using NumPy. If you are looking to get started with NumPy then join us!
On Demand
4h 52m
When it comes to developing websites, one of the most popular languages is PHP. Over 80% of the websites that you regularly visit are created using PHP. With popular frameworks, such as WordPress and Laravel, continuing to gain popularity, now is a great time to begin learning this fast, flexible, and easy to learn language.
On Demand
3h 57m
In this series, Justin and John walk through the beginning of learning ReactJS. John focuses on the prerequisite knowledge such as features of the JavaScript language that you should be familiar with, usage of build tools such as Webpack to develop and produce builds, as well as the nuance features of React. Over the course of the series, John takes a simple, plain JavaScript application and shows how to construct that same application using React.
On Demand
2h 18m
Redux is the implementation of the Flux pattern which is best know as a proposal by Facebook for organizing complex web applications. However, getting started with Redux in the context of building complex applications can be a little intimidating. In this series, Redux architecture will be treated from the ground up, starting with a simple Node application that demonstrates the use of a single reducer, a simple store, and a basic set of operations using the store. As the series progresses, we will explore the use of action creators, code organization patterns in the context of Redux, as well as how to manage increasing complex state objects. If you want to understand Redux without the complication of React or other additions, then tune in! Hope to see you there.
On Demand
2h 7m
Ruby on Rails is a web development framework built upon the Ruby programming language. This series covers the basics of Ruby on Rails including but not limited to: what is Ruby on Rails, getting the environment set up, creating a simple web application the Ruby on Rails way, and diving a little deeper into the methodology used in a Rails application. If you are looking to get started with Ruby on Rails, then we will see you there!
On Demand
8h 6m
WordPress powers over 29% of all the websites on the internet. WordPress powers everything from blogs and company sites to SAAS apps and mobile apps. With WordPress only growing in popularity each year, now is a great time to get started with this CMS and framework!
On Demand
18h 28m
In this series, we are going to take a look at programming using the Python programming language. If you have tried to start before and just spun your wheels, then you should give it a try again. The progression of this course follows the Practice Labs environment for the same certification so there are supplements to each of those labs. Some of the topics that we are going to cover are: using basic data types and assigning those to variables, learning operations that can be applied to each of the data types, collecting information into a list structure, iterating over lists using both for and while loops, adding logic to our programs to add capabilities to our programs, and much more. We hope to see you there!
On Demand
9h 41m
Includes
Skill Lab
The Juniper Junos OS Basics course is designed to provide participants with a comprehensive foundation in the Juniper Networks Junos operating system. Whether you are a networking novice or an experienced professional looking to expand your skills, this course will equip you with the knowledge and hands-on experience necessary to effectively manage and configure Juniper networking devices. In this course, you will delve into the fundamental concepts and practical skills required to work with Junos OS, which is renowned for its reliability, security, and scalability. Our expert instructors will guide you through a structured curriculum that covers the important topics like use of the CLI, configuration basics, operational monitoring, and routing and routing policy.
On Demand
3h 15m
The LPIC-1 Linux Administrator certification demonstrates a basic proficiency with the Linux operating system and the ability to perform real-world maintenance and administrative tasks. The 101-500 exam focuses on understanding the Linux system architecture, managing software, basic GNU commands, and the Linux file system hierarchy.
On Demand
12h 19m
The LPIC-1 Linux Administrator certification demonstrates a basic proficiency with the Linux operating system and the ability to perform real-world maintenance and administrative tasks. The 102-500 exam expands upon the topics covered in 101-500 with more detailed usage of many commands, scripting, troubleshooting and security.
On Demand
10h 39m
The LPIC-2 Linux Engineer certification demonstrates an advanced proficiency with the Linux operating system and the ability to perform real-world maintenance and administrative tasks. The 201-450 exam focuses on measuring and scaling system performance, configuring the Linux bootloader, advanced storage and network configurations, and other system maintenance tasks.
On Demand
10h 15m
The LPIC-2 Linux Engineer (202-450) course is designed for IT Professionals who are seeking the LPIC-2 certification. The course covers skills required of any intermediate to advanced systems administrator who is tasked with supporting Linux in a production environment. Topics covered configuring Linux to act as a web server, name server, email server, file server, or VPN server. This course is accompanied by the 201-450 course which combine to cover the LPIC-2 exam.
On Demand
12h 55m
This course is the second of eight in the path to acquire the PMI-Agile Certified Practitioner. You will learn how the fundamentals of the Agile Mindset of Project Management along with an introduction to most of the most used methodologies that follow this mindset.
On Demand
5h 4m
In this second of two courses preparing you for the Professional Scrum Master-1 exam, you will see how Scrum looks in action. You will cover the Sprint and how it produces a Minimum Viable Product (MVP) in 30 days or less.
On Demand
2h 7m
The Lean Six Sigma Greenbelt Certification offers many options when it comes to getting certified. This series covers everything you need to know from beginning to end. Cherokee Boose introduces Dr. Terra Vanzant Stern to explain the process and project ideology in detail. Exams and courseware are available at an additional cost thru SSD Global. http://ssdglobal.net/wp2/it-pro-tv-lean-six-sigma-training/
On Demand
10h 20m
Those looking to complete the Lean Six Sigma Yellow Belt certification will find in this course an overview of the process in achieving the certification and details about the exam required to pass in order to receive the certification. The certification is not just for IT professionals, but can be used in any industry and is best suited for those who want to increase their critical thinking skills. Viewers will hear an overview of what Lean Six Sigma (LSS) is, why it is important, how it applies to IT professionals, how it interfaces with other process improvement methodologies, and etc. Learn more about Dr. Terra Stern and Lean Six Sigma by visiting her site www.SSDGlobal.net. Exams and courseware are available at an additional cost thru SSD Global. http://ssdglobal.net/wp2/it-pro-tv-lean-six-sigma-training/
On Demand
7h 2m
Markdown is a alternative to other markup languages such as HTML. There is a version that is a little more 'fancy' called GitHub Flavored Markdown. In this series, you will find out what GitHub-Flavored Markdown is as well as how to accomplish quick format tasks that simplify creating structure and some styling.
On Demand
2h 49m
The Linux Command Line show is designed to introduce viewers to working on Linux based computers using only the command line interface. This is considered the first step in learning BASH scripting as most scripts are made up of a series of CLI commands.
On Demand
9h 12m
The Linux Essentials certification from the Linux Professional Institute is designed to showcase your foundation skills in working with the Linux operating system. Upon completing the course you will be familiarized with open source software, the Linux operating system and executing commands from the Linux command line. You will also gain foundation skills in Linux networking, security and administration. This course serves as a stepping stone to the LPIC-1 Linux Administrator certification.
On Demand
8h 38m
The Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions. Topics covered include data encryption, auditing access, SELinux and firewall configuration among others. The series also lightly covers penetration testing to ensure that each security technique is implemented properly.
On Demand
10h 47m
In this series, Daniel and Justin take a look at some of the more advanced scripting practices. Here they will empower your scripts by taking advantage of things like Functions, Libraries, creating graphical elements, sed (Stream EDitor), gawk, and Regular Expression.
On Demand
8h 13m
In this series, Daniel and Don walk you through the fundamentals of bash scripting in the Linux operating system. Watch here as they take you through the fundamentals like: Script file formats, running scripts, working with variables, performing arithmetic, conditional statements, loops, presenting data, taking user input, and script control.
On Demand
8h 45m
Linux for Beginners is a technical skills course designed to introduce new users to the Linux operating system. This course is intended for users who are interested in learning about Linux, but have no previous exposure to the operating system. The series starts with a description of Linux and its history and then moves on to cover the graphical user interface and basic operations of the OS.
On Demand
2h 0m
The Linux in the Cloud series focuses on implementing the Linux operating system in a virtualized environment. Companies are relying less and less on dedicated hardware and are instead turning to shared hardware to optimize resource utilization and increase deployment flexibility. The hosts demonstrate virtualizing Linux using technologies like KVM and Docker as well as public cloud deployments using Amazon EC2 and Microsoft Azure.
On Demand
5h 18m
The MD-102 – Endpoint Administrator course will show and help the learner to deploy, manage, and maintain Windows client operating systems. Following the course, the learner will be able to implement and manage device lifecycles, including enrollment, configuration, security, and compliance, using Microsoft Intune. Finally, the learner will be able to deploy, configure, and secure applications using Group Policy, Microsoft Intune and Microsoft 365.
On Demand
23h 14m
Includes
Skill Lab
Practice Test
Welcome to the Microsoft 365 Administrator (MS-102) course. This comprehensive program is designed to prepare you for the challenges and responsibilities of a Microsoft 365 Administrator role. As a Microsoft 365 Administrator, you will play a crucial role in managing and optimizing Microsoft 365 services and applications, ensuring seamless collaboration and productivity within organizations. The MS-102 certification course aims to provide you with a solid understanding of the following key areas: - Microsoft 365 Overview - Microsoft 365 Tenant Management - Microsoft 365 Identity and Access Management - Microsoft 365 Security and Compliance Upon completing the course, you should be prepared to take the Microsoft 365 Administrator Certification Exam (code: MS-102). This exam evaluates your expertise in administering Microsoft 365 services, security, compliance, and collaboration tools. The MS-102 certification course is designed for IT professionals aspiring to become Microsoft 365 Administrators. This includes individuals involved in deploying, configuring, and managing Microsoft 365 services and applications, as well as those seeking to validate their existing knowledge and skills in this domain.
On Demand
9h 39m
Includes
Practice Test
Detecting and analyzing malicious activity is essential for cybersecurity professionals to prevent data breaches, protect against cyber attacks, identify threat actors, improve security posture, and comply with regulatory requirements. Without these activities, organizations are at risk of cyber threats that can cause significant financial and reputational damage. In this series, you will learn to identify indicators of potentially malicious activity, become familiar with commonly used tools and techniques for determining malicious activity, explore the collection and utilization of Cyber Threat Intelligence(CTI) and Threat Hunting concepts, and how to improve efficiency and process of security operations.
On Demand
5h 41m
This course will help learners implement and configure Microsoft Intune and Microsoft 365 for mobile application management and endpoint administration. Following the course, the learner can deploy, configure, and secure apps using Microsoft Intune, Microsoft 365, and the Microsoft 365 Apps Admin Center. We will explore implementing the Office Deployment Tool, the Office Customization Tools, and Conditional Access in Intune.
On Demand
3h 31m
The Manage Hybrid Storage and File Servers show is for information technology (IT) professionals who want to prepare for Microsoft's AZ-800 Administering Windows Server Hybrid Core Infrastructure exam. This course specifically covers the fifth domain of the AZ-800 exam, Manage storage and file services, which is 15-20% of the exam. A viewer of the show in addition to personal study will gain knowledge and skills required for managing storage and file servers, including configuring and managing Azure File Sync, configuring and managing Windows Server file shares, and configuring Windows Server storage.
On Demand
4h 41m
The Manage Hybrid Virtual Machines and Containers show is for information technology (IT) professionals who want to prepare for Microsoft's AZ-800 Administering Windows Server Hybrid Core Infrastructure exam. This course specifically covers the third domain of the AZ-800 exam, Manage virtual machines and containers, which is 15-20% of the exam. A viewer of the show in addition to personal study will gain knowledge and skills required for managing virtual machines and containers, including managing Hyper-V and guest virtual machines, creating and managing containers, and managing Azure virtual machines that run Windows Server.
On Demand
5h 33m
This course will show and help the learner to install, deploy and the Windows client operating system. Following the course, the learner will be able to install, configure and manage Hyper-V on Windows clients as well as how to configure and customize Windows client settings.
On Demand
8h 10m
Dive into the critical world of high availability and disaster recovery with our upcoming course on managing Windows Failover Clusters. You’ll learn the art of implementing and configuring failover clusters to ensure your services remain uninterrupted, no matter the crisis. Also, you’ll explore the nitty-gritty of Failover Clustering management, from proactive health monitoring to seamless workload balancing, ensuring your systems remain resilient in the face of failure. But that's not all — you will also dive into the complexities of Storage Spaces Direct, Microsoft's innovative storage solution that combines cost-effectiveness with stellar performance. Learn how to harness this powerful feature to transform your local storage into highly scalable, software-defined storage. Whether you're guarding against data center failures or anticipating the unforeseen, our course will equip you with the knowledge to maintain business continuity with confidence.
On Demand
1h 56m
In the digital age, where data is the lifeline of business operations, a robust Windows Server recovery strategy is not just an option, it’s a necessity. In this course, you’ll delve into the critical tactics for managing backups and ensuring rapid recovery of Windows Server environments. You’ll be guided through the best practices for local and cloud backups, and how to leverage the powerful Azure Site Recovery service to orchestrate disaster recovery that keeps your data safe and your services running in the event of any disaster. But the safety net doesn't end there—you’ll also peel back the layers of Hyper-V Replicas, an essential tool for the real-time protection of your virtual machines. Discover how to implement replication strategies that minimize downtime and ensure that your VMs are resilient against disruptions. Whether you’re a seasoned IT professional or new to server management, our show will provide you with the insights to implement a fail-safe recovery plan, keeping your organization's digital heartbeat steady and secure.
On Demand
1h 53m
This course will show and help the learner to manage Windows client operating systems. Following the course, the learner will be able to configure, manage and recover the Windows client operating system, as well as configure Windows updates and remote management technologies. Finally, the learner will be able to examine performance monitoring, event logging, and automate tasks.
On Demand
4h 59m
The Managing Compliance using Microsoft Purview course at ACI Learning will walk you through all you need to know to be up and running successfully regarding the use of Microsoft Purview to help manage compliance in your organization. This course maps directly to the fourth domain of the MS-102 Microsoft 365 Administrator exam. This course covers the implementation of Microsoft Purview information protection and data lifecycle management. It also covers the implementation of Microsoft Purview for Data Loss Prevention (DLP).
On Demand
1h 13m
In this course, students will learn the concepts associated with vulnerability responses, incident responses, and the management of such cybersecurity concerns. This course also covers concepts related to attack methodology frameworks and the typical incident response activities by cybersecurity professionals in well-trained organizations.
On Demand
3h 5m
This course will help the learner manage an organization’s identities and compliance using the Microsoft Intune platform, and Microsoft Entra (formerly called Azure AD). Following the course, the learner will be able to implement and manage users, devices, and application compliance. The learner will explore and learn how to manage identities in Microsoft Intune and Entra.
On Demand
3h 34m
This course is for those implementing, managing and monitoring security for Azure, hybrid and multi-cloud environments hybrid. This course will examine managing identities from a security perspective in Azure. We explore securing users & groups, using and securing external identities, and implementing Azure AD Identity Protection.
On Demand
5h 33m
Welcome to the course on "Managing Incident Response in AWS." The hosts, Sophie Goodwin and Jill West, introduce themselves. Sophie, a learner advocate, shares her background in hosting security-focused courses and her recent cybersecurity certification. Jill, the subject matter expert, discusses her background in education and IT, along with her certifications. The target audience for the course is individuals with at least five years of experience in IT security, specifically designing and implementing security solutions, and at least two years of hands-on experience securing workloads in AWS. The course will cover incident response, incident response planning, compliance, and AWS best practices for preparing and responding to incidents. Get ready to enhance your knowledge and skills in managing incident response in AWS.
On Demand
1h 29m
The Managing Microsoft Teams course is designed for Microsoft Teams Administrators who take part in evaluating, planning, deploying, and managing Microsoft Teams. Microsoft Teams is an integrated communication and collaboration solution for enabling all of your users to create and share content, as well as schedule meetings and interact with each other. The Teams Administrator must be able to plan, deploy, and manage Teams chat, apps, channels, meetings, audio conferencing, live events, and calling. The Teams Administrator is also responsible for upgrading from Skype for Business to Teams.
On Demand
31h 3m
The Managing Security with Microsoft 365 Defender course at ACI Learning will walk you through all you need to know to be up and running successfully regarding the use of Microsoft 365 Defender to mitigate security threats. This course maps directly to the third domain of the MS-102 Microsoft 365 Administrator exam. This course covers the management of security reports and alerts using the Microsoft 365 Defender portal. In addition, this course covers email and collaboration protection using Microsoft Defender for Office 365. The course also covers endpoint protection using Microsoft Defender for Endpoint.
On Demand
2h 45m
This is the fourth of eight courses in the path to achieving the PMI-Agile Certified Practitioner certification. In this course you will learn how much of the stakeholder skills needed for traditional, predictive project management can be used to help manage and maintain stakeholders. You will also learn new techniques, such as Servant Leadership that are necessary in all Agile methodologies.
On Demand
3h 3m
This course will help the learner implement and configure Microsoft Intune for mobile device management and endpoint administration. Following the course, the learner will be able to manage device lifecycles and configuration, implement endpoint protection, and manage and monitor updates.
On Demand
8h 47m
Microsoft Endpoint Manager is a very powerful option for managing your end devices from a cloud-based management system. Microsoft Endpoint Manager houses two important platforms - Microsoft Endpoint Configuration Manager (formerly SCCM)  and Microsoft Intune. These two products can work together to provide co-management to all of your endpoint devices. Endpoint devices include desktops, laptops, phones, tablets, televisions, and more. Thanks to Microsoft Endpoint Manager and Microsoft Intune, system administrators can help deploy, manage, and protect the devices, data, and applications of the organization. This course walks you through the important planning and implementation that must take place.
On Demand
3h 7m
In this course, you will learn foundational-level knowledge of the considerations and benefits of adopting cloud services in general and the Software as a Service (SaaS) cloud model. You will also learn about available options and benefits gained by implementing Microsoft 365 cloud service offerings.
On Demand
12h 52m
Includes
Practice Test
The Azure Administrator Associate certification is a way to validate your knowledge in implementing, managing, and monitoring identity, governance, storage, compute, and virtual networks in a cloud environment. This course will cover the objectives outlined by Microsoft to prepare you to take the Microsoft Azure Administrator exam.
On Demand
27h 21m
Includes
Skill Lab
Practice Test
This series will help you prepare for the Exam AZ-900: Microsoft Azure Fundamentals. This exam is designed for candidates looking to demonstrate foundational-level knowledge of cloud services and how those services are provided with Microsoft Azure.
On Demand
6h 47m
Includes
Skill Lab
Practice Test
Power BI is a collection of software services, apps, and connectors that work together to turn your unrelated sources of data into coherent, visually immersive, and interactive insights. Your data may be an Excel spreadsheet, or a collection of cloud-based and on-premises hybrid data warehouses. Power BI lets you easily connect to your data sources, visualize and discover what's important, and share that with anyone or everyone you want. Want to learn more about how to use Power BI and the most important skills you need to be successful? Join Adam as he guides you through everything you want to know about Power BI.
On Demand
6h 0m
Microsoft Sentinel is a scalable, cloud-native, security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution. Microsoft Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for attack detection, threat visibility, proactive hunting, and threat response.
On Demand
5h 8m
Embark on a journey through the seamless transition of legacy systems to the forefront of innovation with our comprehensive course on migrating to Windows Server. You’ll learn to navigate the pivotal steps to elevate your on-prem storage to the enhanced capabilities of modern on-prem servers, ensuring a smooth and efficient upgrade path. As you pivot towards the cloud, discover the intricacies of lifting and shifting your on-prem servers into the expansive realm of Azure, unlocking agility, scalability, and global reach. You will delve deeper and tackle the specifics of migrating workloads from previous Windows Server versions, streamlining your transition with minimal disruption. For those leveraging Internet Information Services (IIS), you will Analyze the process of moving your web applications to Azure, enabling you to benefit from robust security, high availability, and dynamic scalability. Lastly, you learn to chart the course for upgrading your Active Directory infrastructure, as you hear expert insights on transitioning to Windows Server 2022 with confidence.
On Demand
3h 40m
Step into the control room of Windows Server management with our enlightening course dedicated to monitoring and troubleshooting the backbone of enterprise IT infrastructure. In this course, you‘ll discover the tools and techniques essential for keeping a vigilant eye on Windows Server health, performance, and security, ensuring you can respond to issues with precision. you’ll explore through the labyrinth of on-prem and hybrid networking, equipping you with the troubleshooting skills needed to swiftly navigate through common and complex network challenges. You will learn hands-on strategies for diagnosing and resolving issues with Windows Server VMs in Azure, turning potential disruptions into mere hiccups. Furthermore, gain deep insights into the art of Active Directory troubleshooting, understanding the ability to maintain uninterrupted identity management and authentication services. Whether you're confronting server slowdowns, network anomalies, or AD dilemmas, our show is the course to diagnosing and remedying the pulse points of your Windows Server environment.
On Demand
3h 55m
In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data. In this course, you will apply the NIST Cybersecurity and Risk Management Frameworks to better protect their infrastructure, detect possible cyber incidents and appropriately respond and recover should they occur. You'll become well-versed in the NIST CSF and RMF, how to implement them, and ways to effectively manage CSF & RMF processes for optimal security, privacy and compliance.
On Demand
21h 20m
In this Network Access module, students will learn the basic concepts regarding network access technologies found in the modern network infrastructure. Students will learn about VLANs, switch interconnects, Layer 2 discovery protocols, EtherChannel, Rapid PVST+, wireless, and much more.
On Demand
4h 5m
In this Network Implementation course, students will learn the concepts associated with routing and switching in modern networks. Students will also learn about wireless devices and technologies in addition to learning about important factors associated with physical installations. This course fully prepares you for the Network Implementation domain of the CompTIA Network+ N10-009 certification exam.
On Demand
4h 59m
In this Network Operations course, students will learn the concepts associated with network functions in modern network environments. Students will learn about organizational processes and procedures, network monitoring technologies, disaster recovery concepts, and more. This course fully prepares you for the Network Operations domain of the CompTIA Network+ N10-009 certification exam.
On Demand
4h 44m
In today's digitally connected world, network security is more important than ever before. This goal of this course is to provide you with a comprehensive introduction to the fundamentals of network security, including threats, vulnerabilities, and safeguards that are essential for protecting networks from cyberattacks.
On Demand
7h 2m
In this Network Security Fundamentals module, students will learn the basic concepts regarding network security today. While this module covers broad concepts and technologies like key security concepts and security program elements, this module also does deep dives in specific technologies. For example, students learn to configure technologies like access control lists, DHCP snooping, and more.
On Demand
2h 46m
This course with cover key areas such as implementing a network troubleshooting methodology, troubleshooting hardware connections and cabling. We'll also delve additional concepts such as troubleshooting IP addressing issues, network services, switching and routing issues, and more. Perfect for beginners, this series demystifies network troubleshooting concepts.
On Demand
5h 35m
This course is designed for learners eager to grasp the fundamentals of network communications. Covering key areas like the OSI and TCP/IP models, standards, hardware connections, and cabling, laying a solid foundation. We'll also delve into IP addressing, cloud technologies, and more, providing a comprehensive understanding of how networks operate and are constructed. Perfect for beginners, this series demystifies complex concepts with clear explanations and practical insights.
On Demand
12h 1m
In this Network Fundamentals module, students will learn the basic concepts regarding modern computer networks. Students will learn about the function of typical network components, the characteristics of network topologies, IPv4 and IPv6 addressing, and much more.
On Demand
7h 43m
In this series we will be covering the use of network mapper utility aptly called Nmap. This series aims to give the viewer a firm grasp of the concepts and applications inherent to Nmap, such as Host Discovery, Port Scanning, Service/OS/Version Detection, and the Nmap Scripting Engine(NSE) for the purposes of security and general network administration.
On Demand
7h 6m
This course is designed to teach you about the 2021 version of the OWASP Top 10 Web Application Vulnerabilities. The OWASP Top 10 is a list of the most critical security risks to web applications, and it is widely used by organizations to improve their web application security. This course will cover each of the OWASP Top 10 vulnerabilities in detail, including: What the vulnerability is Explanations of how it could be exploited Real-world examples of how the vulnerability has been exploited Possible detections and fixes of the vulnerability The course will also include demonstrations of each vulnerability so that you can see how they work in practice. Additionally, the course will explore possible fixes and/or mitigations for each vulnerability. By the end of this course, you will have a good understanding of the OWASP Top 10 Web Application Vulnerabilities and how to protect your web applications from them.
On Demand
7h 53m
In this series, Mark and Justin walk you through the hoops and hurdles of the Java syntax by providing examples and common mistakes and shortcuts you'll be faced with. By the end you'll have an understanding of all of the syntax as well as common Java tools. You will have built feature-filled programs to simplify your life and wrangle the challenges of junior programming jobs, so if you're ready to learn Java as a first or second programming language then join us!
On Demand
13h 32m
In this series, Vonne and Justin explore the intricate world of Object-Oriented Programming(OOP), particularly in the context of the Python programming language. Starting with the basics of OOP, Justin demonstrates the creation of classes and associated objects from those classes. Moreover, Justin demonstrates the use of Inheritance of classes to reduce code repetitiveness in an effort to adhere to the Don't Repeat Yourself (DRY) principle. Lastly, Justin builds a simple OOP centric text-based adventure. If you are ready to get into Object-Oriented Python, then join us!
On Demand
4h 33m
Microsoft's OneNote is the helpful note taking application in the Office suite to keep you organized for any project. Whether is it for working on a large project with co-workers to tracking recipes for dinner, OneNote is a great answer for keeping everything in one place. In this series, you will learn how to create and organize notebooks, add different types of content and stay on task with tags, use helpful features such as Linked Notes and the OneNote Web Clipper, share notebooks with others, and how OneNote interacts with other Office applications. The series specifically covers the OneNote 2016 application in the locally installed Office suite for the Windows operating system.
On Demand
13h 40m
Microsoft's OneNote for Windows 10 is the helpful note taking application to keep you organized for any project. Whether is it for working on a large project with co-workers to tracking recipes for dinner, OneNote is a great answer for keeping everything in one place. In this series, you will learn how to create and organize notebooks, add different types of content, stay on task with tags, use helpful features such as the OneNote Web Clipper, and share notebooks with others. This series specifically covers the OneNote application that is part of the Windows 10 operating system.
On Demand
8h 9m
Whether using for personal email or work email as large business organization, this course covers everything one needs to become a skilled and informed user of Microsoft Outlook 2016. Our hosts start with explaining the basic terminology and setup of email accounts and continue on to all areas of Outlook including managing email, contacts, calendars, and tasks. This series is specifically for locally installed Outlook 2016 on Windows operating system.
On Demand
13h 37m
Whether using for personal email or work email as large business organization, this course covers everything one needs to become a skilled and informed user of Microsoft Outlook on the Web. Our hosts start with explaining the basic terminology and setup of email accounts and continue on to all areas of Outlook including managing email, contacts, calendars, and tasks. This course is specifically for using Outlook through a web browser with either a paid subscription to Office 365 or a free mail account with Outlook.com.
On Demand
12h 14m
The PC Maintenance 2020 course is designed with the average non-technical user in mind. The goal of this course is to demystify the language of basic PC maintenance, while empowering the viewer with the ability to perform basic tasks to help maintain their PC without all of the technical jargon that is usually associated computing technology. The viewer will look at maintaining storage devices, reducing dust and debris, firmware updates, component replacement, startup and networking issues and more.
On Demand
3h 34m
Take the time to increase your knowledge of Agile principles and your skills with agile techniques here at ACI Learning. The PMI-ACP is evidence of real-world, hands-on experience and skill as part of an agile team. This course spans many approaches to agile such as Scrum, Kanban, Lean, extreme programming (XP), and test-driven development (TDD), among many others.  In this course you will learn the foundational aspects of the Agile philosophy and different forms of this amazing project management collection of methodologies. You will also learn what you need to prepare for the PMI-ACP certification exam. So join PMP and PMI-ACP certified instructor Chris Ward along with his hosts Lauren Deal and Anthony Sequeira on this journey through Agile methodologies.
On Demand
17h 38m
Organisational Change Management is the approach to managing people in a project management environment. In this series Jo Peacock investigates the relevance of OCM in the project environment, approaches to OCM, and impacts of under-performing OCM. This series will also contribute toward preparation for the PMI certification.
On Demand
5h 15m
The Palo Alto Networks Certified Cybersecurity Associate show is produced for anyone who want to learn the fundamentals of cybersecurity so that they have the knowledge for an entry-level network security career. They will be introduced to the context of cybersecurity knowledge and the palo alto technologies that can stop those attacks. There is no pre-requisite required only a desire to learn more about cybersecurity and Palo Alto Security solutions. This exam has been retired but the skills may still be relevant.
On Demand
6h 47m
A hands on primer for Soft Skills/People Skills in general communications, and public speaking. Get excited! In this course you will see and explore practical techniques, demonstrations and exercises to help you become a more engaging communicator!
On Demand
2h 16m
Designed for IT professionals and administrators, this course explores the core concepts of identity governance, including planning and implementing access reviews, privileged access, and entitlement management. By understanding how to use Azure AD roles for governance, you'll learn how to create access packages, manage privileged identity strategies, and efficiently handle identities. With an emphasis on real-world applications, you'll leave this course with a strong command of identity governance in your Azure environment, equipped to ensure maximum security and efficiency.
On Demand
4h 13m
Curated for IT professionals and administrators looking to enhance their understanding of Azure workloads, this course will walk you through the essentials of designing and implementing workload identities. You will learn to configure Azure services that use managed identities, manage the life cycle of managed identities, and understand how to plan for Azure AD roles for governance of Azure resources. Explore real-world scenarios and practical applications of these concepts, equipping you to effectively manage workload identities within your Azure environment.
On Demand
3h 23m
This is the 6th of 8 courses that will help you prepare for the PMI-ACP exam. In this course you will learn about what planning looks like in Agile projects and how it is both the same and different to predictive methodologies.
On Demand
1h 33m
This course is for those implementing, managing and monitoring security for Azure, hybrid and multi-cloud environments hybrid (and) multi-cloud environments. This course will prepare the learner to plan for and secure Azure network environments. We will explore securing public and private access to Azure resources.
On Demand
3h 22m
In this PowerPoint 2016 Advanced series, users will be shown more advanced topics such as the slide master, audio and video, link and embed external content, comments and compare, and custom shows . The series will also cover collaborating with others using OneDrive, rehearse timings, action buttons and hyperlinks, advanced file properties, Zoom, drawing, and best practices for effective presentations. While PowerPoint 2016 Advanced is a continuation from the PowerPoint 2016 Essentials series, it can be viewed as a standalone show for users looking to enhance their PowerPoint skills. This series is specifically for the Windows operating system with PowerPoint 2016 locally installed.
On Demand
9h 6m
In this PowerPoint 2016 Advanced for Mac series, users will be shown more advanced topics such as the slide master, audio and video, and custom shows. The series will also cover collaborating with others using OneDrive, rehearse timings, animate as background, action buttons and hyperlinks, advanced file properties, and best practices for effective presentations. While PowerPoint 2016 Advanced for Mac is a continuation from the PowerPoint 2016 Essentials for Mac series, it can be viewed as a standalone show for users looking to enhance their PowerPoint skills. This series is specifically for locally installed PowerPoint 2016 on Mac OS.
On Demand
6h 19m
PowerPoint 2016 is the popular application within the Office suite to create on-screen presentations. This series starts at the very beginning by exploring the PowerPoint environment, how to add slides to a presentation, insert text and images into slides, and create tables and charts. The series continues by enhancing a presentation with design themes, animation, and transitions, then concludes with preparing and delivering a robust presentation. This series is specifically for the Windows operating system with PowerPoint 2016 locally installed.
On Demand
14h 45m
PowerPoint 2016 is the popular application within the Office suite for Mac to create on-screen presentations. This series starts at the very beginning by exploring the PowerPoint environment, how to add slides to a presentation, insert text and images into slides, and create tables and charts. The series continues by enhancing a presentation with design themes, animation, and transitions, then concludes with preparing and delivering a robust presentation. This series is specifically for locally installed PowerPoint 2016 on Mac OS.
On Demand
14h 2m
This course is for anyone wanting to learn how to write PowerShell scripts to automate tasks. We will start with the basics, getting PowerShell installed and configured. Then we will cover basic PowerShell scripting concepts and various PowerShell statements make up the foundational knowledge needed to write PowerShell scripts. After this we will apply the skills you've learned in some practical applications.
On Demand
7h 30m
In this series, Daniel and Brad will take a look at what a pentesting engagement looks like through the lens of Brad's experience as a pentester. Here they will cover all the important and requisite activities from pre-engagement to delivering the final report. You'll see what it takes to properly pre-engage for an assessment, explore the necessary legal documents, scope the client's systems, build the right engagement toolkit, perform vulnerability assessment and exploitation, collaborate and document with team members, and create an effective report.
On Demand
7h 19m
In this overview Cherokee introduces Dr. Terra Vanzant Stern. Dr.Stern explains how she has developed this curriculum to share years of successful experience to help improve your professional growth. Self-management, interviewing skills, lean meetings, lean strategic planning, lean negotiations and what to expect within the first 45 days of employment are introduced as episode topics.
On Demand
6h 10m
In this overview Cherokee introduces Dr. Terra Vanzant Stern. Dr.Stern explains how she has developed this curriculum to share years of successful experience to help improve your professional growth. Self-management, interviewing skills, lean meetings, lean strategic planning, lean negotiations and what to expect within the first 45 days of employment are introduced as episode topics.
On Demand
6h 10m
Scrum is the number one Agile project methodology in the world for a good reason. It is simple yet effective in its production of valuable products and services in a speedy and efficient manner.  This course will prepare you for the Professional Scrum Master-1 exam, you will learn about the basic principles, events and artifacts that make up the Scrum framework, and see how Scrum looks in action. You will cover the Sprint and how it produces a Minimum Viable Product (MVP) in 30 days or less.
On Demand
6h 5m
Have you wanted to see what this programming thing is all about? Do you have issues figuring out where to start? Well, this course will show you how to get things set up and start with the basics of programming using the Python programming language. If you want to set up your machine, understand the basics of Python, and start understanding the basic tenets of programming, then please join us!
On Demand
11h 36m
Thinking of taking the latest PMP exam? This course is custom designed to help you prepare for the latest edition of the Project Management Professional exam released in 2021. Learn the Domains, Tasks, and Enablers for both Predictive and Agile projects to help you be successful.
On Demand
21h 59m
Includes
Practice Test
You’ve heard the terms “service management” and “project management”, but do you really understand what they are? In this episode Jo briefly explains the concepts to Justin and they explore the difference between the two.
On Demand
7m
Sophie Goodwin and Jill West. Sophie discusses her background and recent certification in cybersecurity, while Jill shares her experience in education and IT, particularly in cloud computing. The target audience for the course is described as individuals with a solid IT background, equivalent to CompTIA A+, Network+, and Security+ knowledge, along with additional cybersecurity certification. AWS recommends at least five years of IT security experience and two years of hands-on experience securing AWS workloads. The course will cover data encryption in AWS, including topics such as data classification, encrypting data at rest and in transit, and key management.
On Demand
2h 31m
In this course you will look at the key components that ensure the CIA triangle (confidentiality, integrity, availability) of Information Security is maintained. You will learn the proper design and application of logical and physical access controls, network infrastructure security, and the role of the IS auditor in regard to these procedures.
On Demand
8h 2m
Python has a set of protocols that the language internally adhere to which provides the functionality for features such as iteration, context manager behavior, string representation of an object, and many other things. When you create custom classes in Python and make use of these protocols then you can create custom behavior in the context of iterations, types, comparison of objects, operator overloading, and much more. Knowing about these will help level up your Python skills. If you are ready to progress forward in your Python prowess, then join us to learn more about the Python data model.
On Demand
12h 44m
In this series, Daniel and Justin walk you through an in-depth primer on the Python programming language. Whether you have some other programming experience or you are completely new to coding, you will be given the tools necessary to get started writing programs with Python. They cover topics like printing output to the screen, assigning and utilizing variables, getting input from the user, decision making, iteration/loops, creating lists, dictionaries, and tuples, using and creating functions, slicing, and more. If you're looking for an easy programming language to get started, or you want to add another language to your repertoire, Python is a great choice.
On Demand
6h 19m
Python is a great language for learning, writing web applications, and manipulating data. However, Python can be used for security testing as well. In this series, we will explore the use of Python in such concepts as brute force password cracking, making SSH connections programmatically, creating socket connections and port scanner a particular host, banner grabbing from open ports, and more. If that sounds interesting to you, then please join us!
On Demand
5h 44m
In this series, we creates a RESTful API using the Express web application framework. Justin review the process of setting up a Node-based project as well as installing the Express Node module. After that, Justin discusses important concepts and processes that are key in developing a RESTful API such as creating routes that correspond to data resources, data modeling of those resources, use of middleware to make the API a little more robust, and adding a persistence layer to the API. RESTful APIs are abound when developing software, so if that sounds like something interesting to you, then join us!
On Demand
5h 7m
A staple of programming is manipulating data, particularly data saved in files. In this series, we will explore the facilities that Python provides for reading and writing files. If you want to get going with file-based fun, then we will see you there.
On Demand
3h 0m
The Red Hat Enterprise Linux 8 (RHEL 8) course on ITPro is designed to introduce the viewer to the RHEL operating system. In this course you will learn how to install RHEL, manage networking, configure services like NFS, harden security through features like SELinux, and support virtual machines all on top of the RHEL platform. The course is targeted towards systems administrators tasked with supporting Linux and expects the viewer to already have a working understanding of the Linux operating system.
On Demand
9h 15m
Welcome to the Red Team Blue Team Fundamentals Practice Lab. After completing this title, you will have gained an understanding of cybersecurity fundamentals and how to protect IT systems from common cyberattacks. This knowledge will also help you prepare for Capture the Flag, or CTF, events using cyber ranges. This title covers topics like: Nmap Network Scanning Techniques; Man-in-the-Middle Exploits; Malware Protection; and more. During the first 15 modules, you will gain practical experience in applying fundamental Red Team Blue Team cybersecurity. The final 5 modules will introduce specific exploits. Each module consists of two exercises. During the first RED TEAM exercise, you will perform an exploit; and in the second BLUE TEAM exercise, you will apply countermeasures to prevent that exploit from happening. You can then repeat the initial Red Team exploit to check whether your countermeasures are successful. The Practice Lab Environment can be reset multiple times so you can test what works and what doesn't. Once you’re feeling confident, you can practice without following the steps outlined within the lab.
On Demand
1m
Includes
Skill Lab
By identifying and analyzing risk, enterprises become aware of what forces within and beyond their control might threaten their operations and how the effects of internal and external factors might manifest as impacts to production. In this third of four courses to prepare you for the CRISC exam, you will learn about Risk Response, Control Design and Implementation and Risk Monitoring and Reporting.
On Demand
4h 8m
This course is specifically tailored to equip you with the knowledge and skills required to successfully pass the SC-200 Microsoft Security Operations Analyst exam and become a certified security operations analyst. Throughout this course, you will delve into various domains, including threat management, vulnerability management, security monitoring and incident response, and governance, risk, and compliance. Anthony Sequeira will guide you through real-world scenarios, practical exercises, and in-depth discussions to enhance your understanding of security operations and Microsoft's security solutions. By the end of the course, you will have the confidence and expertise to tackle the SC-200 exam and excel in the field of security operations analysis. 
On Demand
8h 37m
Join Charles and Sophia as they prepare you for the SC-300 exam, Microsoft Identity and Access Administrator. Throughout this course, you'll gain a deep understanding of implementing and managing identity and access in Azure Active Directory (Azure AD), planning and designing an identity strategy, implementing and managing hybrid identities, and managing application access, data governance, and protection in Microsoft 365.
On Demand
16h 1m
The main objective of this certification is to validate your skills and knowledge in building and deploying security solutions in the AWS Cloud. Furthermore, this certification also confirms that you understand the specialized data classifications and AWS data protection mechanisms, data-encryption techniques and how to implement them using AWS mechanisms, as well as secure internet protocols and how to implement them using AWS mechanisms. Overall, taking this exam will help you demonstrate your expertise in the field of AWS security, which is essential for any IT professional working on AWS infrastructure.
On Demand
18h 18m
In today's fast-paced IT landscape, securing your Windows on-premises and hybrid infrastructures is paramount. This course will provide guidance and process to provide a robust security strategy that begins with fortifying the Windows Server operating system against both internal and external threats, ensuring that only authorized users have access and that their actions are monitored and controlled. For organizations leveraging a hybrid Active Directory infrastructure, synchronizing and securing identity management becomes critical, with Azure AD offering seamless integration to provide a unified identity across on-premises and cloud services. Azure services bring to the table advanced security remediation tools that proactively protect, detect, and respond to threats in real-time, keeping your infrastructure one step ahead of malicious actors. Moreover, securing Windows Server networking is about more than just safeguarding data in transit; it's about implementing robust access controls, encrypting traffic with up-to-date protocols, and continuously monitoring for unusual activity. Lastly, Windows Server storage solutions must be locked down with encryption, resilient file systems, and access policies that protect data at rest.
On Demand
3h 38m
When you're ready to delve into the depths of security techniques, tools, and services in AWS, studying for and taking the AWS Certified Security - Specialty exam is the perfect way to help guide your studies and explorations. In this course, you'll learn about AWS services designed to help you secure your resources, network spaces and connections, data, and accounts. You'll also learn about security best practices and mechanisms built into various AWS services, such as EC2, VPC, edge, and databases. Along the way, you'll get to practice answering sample exam questions as we discuss how to analyze the questions and understand the relevant technologies.
On Demand
1h 43m
This course is for those implementing, managing and monitoring security for Azure, hybrid and multi-cloud environments hybrid (and) multi-cloud environments. This course will prepare the learner to secure Azure resources such as Azure Compute, Azure Storage and Azure Databases.
On Demand
2h 56m
Sophie Goodwin and Jill West. Jill, the subject matter expert, discusses her background in education and IT, as well as her certifications. The target audience for the course is described as individuals with CompTIA trifecta knowledge and experience in IT security, specifically designing and implementing security solutions. The course will cover securing hosts, network, and the edge in AWS, with each topic broken down into overview, detailed, and troubleshooting episodes.
On Demand
5h 33m
Welcome to the Security Architecture course here at ACI Learning. In this course, you will learn about many different enterprise architectures and the security implications of those architectures. You will also learn about how you can apply security principles directly or indirectly to these enterprise architectures. This course also discusses various strategies you may use to protect your enterprise data. Finally, this course also explains the importance of resiliency and recovery in modern enterprise environments. Note that this course maps to the Security Architecture domain of the CompTIA Security+ SY0-701 examination.
On Demand
5h 2m
Security Architecture and Engineering is a comprehensive course delving into essential principles and practices of cybersecurity. Participants will explore the fundamentals of secure design, ranging from security models and the selection of appropriate security controls to the identification and mitigation of vulnerabilities. The course also encompasses cryptographic solutions and explore related attacks, as well as secure facility and site design considerations. The learner will also gain insights into managing information systems across their lifecycle, ensuring robust security throughout. This course is ideal for individuals seeking a solid foundation in the strategic and technical aspects of cybersecurity architecture and engineering.
On Demand
10h 12m
In this Security Assessment Testing module, students will learn the concepts associated with strong security assessment and testing procedures followed by modern organizations today. Students will learn about the design and validation of assessment, test, and audit strategies. Students will also learn about the typical components involved in conducting security control testing. This module prepares you for the Security Assessment and Testing domain of the 2024 edition of the CISSP certification exam.
On Demand
1h 22m
This course is designed to help bring new employees up to speed on the various IT security issues facing companies to day. Its primary use is intended to be as an instructional video shown during the new-hire on-boarding process. By increasing a new-hire's IT security awareness, companies can help to avoid security incidents before they happen.
On Demand
39m
In this series the learner will be introduced to concepts in cybersecurity, such as the core principles of security, wired and wireless network security. The learner will explore topics like operating system security and security software and more.
On Demand
7h 2m
Knowledge of cybersecurity infrastructure and operations is essential for a cybersecurity analyst to effectively assess risks, detect threats, respond to incidents, and develop appropriate security controls. Without this knowledge, analysts may struggle to effectively protect an organization's IT environment. In this series, you will be introduced to cybersecurity infrastructure and operations concepts such as Log Ingestion, IAM, Encryption, and others.
On Demand
2h 15m
In this course, we will explore various security concepts, securing computing resources, asset and vulnerability management, enterprise security, identity and access management (IAM) and more.
On Demand
8h 18m
Welcome to the Security Program Management and Oversight course here at ACI Learning. In this course, you will learn about many of the important elements of effective security governance, including guidelines, policies, standards, and procedures. This course also covers the elements of the risk management process as well as the risks associated with 3rd party risk assessment and management. Audits and assessments are also covered in this detailed class. Note that this course maps to the Security Program Management and Oversight domain of the CompTIA Security+ SY0-701 examination.
On Demand
3h 49m
Governance, risk, and compliance are important parts of every organization. Understanding governance, risk, and compliance concepts are key for any security professionals. This course delves into security concepts, security governance, laws, regulations, standards, security documentation, personnel management, business continuity, and risk management. It sets the foundation for any security endeavors organizations may require.
On Demand
6h 26m
The development of software is an important part of every organization. Doing it securely is the goal of every organization. This course delves into how to guide and lead your team to consider software development security. We'll begin with the need for it, then discuss the SDLC, and also the uses of standards and best practices. Though it will not make you a software developer, it will help you to understand the security needs and lead your team to consider a secure approach to software development.
On Demand
5h 58m
The Splunk Enterprise Administration Fundamentals course is designed to provide participants with a comprehensive understanding of the core concepts and best practices for effectively administering Splunk Enterprise. Through hands-on exercises and real-world scenarios, students will learn key administrative tasks such as configuring data inputs, managing user access and permissions, optimizing search performance, monitoring the Splunk environment, and troubleshooting common issues. This course equips administrators with the essential skills to deploy, maintain, and maximize the value of Splunk Enterprise for their organizations' data analysis and operational intelligence needs.
On Demand
5h 31m
What kind of activities do data scientists do? What roles are there are what skills do they require? This overview gives you a high level introduction to the terms, tools and activities used in data science as well as a description of the job roles open to a data scientist in the workplace.
On Demand
8h 42m
ATTENTION ... This is an ACCELERATED VERSION of our SSCP course. What that means for you is that we assume that you have a certain level of prior knowledge, and we move faster through the material We encourage you to try this format and see if it works well for you. The Systems Security Certified Practitioner (SSCP) is ideal for IT administrators, managers, directors and network security professionals responsible for the hands-on operational security of their organization’s critical assets. The certification demonstrates that the holder has been working in IT Security for at least one year, has a broad range of knowledge in seven domains related to creating, supporting, and maintaining a secure IT infrastructure and can implement things like risk management and risk identification.
On Demand
27h 4m
Includes
Practice Test
The Azure Virtual Desktop Infrastructure course helps you plan and implement the required infrastructure for a successful AVD deployment. This course assists you with the most key elements you should be concerned with including network connectivity, user data storage, host pools and session hosts, and your ability to easily manage session host images. All of these elements are critical for a smooth and successful Azure Virtual Desktop implementation.
On Demand
3h 37m
In this series we will seek to prepare you for troubleshooting basic cloud deployment, network, and security issues. We will examine common concepts, tools, and techniques used for addressing each of these types of issues to help keep your cloud environment working and available to your users.
On Demand
1h 9m
This course specifically covers how to manage Windows Servers and workloads in a hybrid environment. A viewer of the show in addition to personal study will gain knowledge and skills required for administering Azure services to manage workloads and servers, including deploying and configuring Windows Admin Center (WAC), configuring PowerShell Remoting, and integrating and managing Azure Arc and other Azure services.
On Demand
3h 27m
This course seeks to prepare students for a role as a Microsoft security operations analyst. This role collaborates with organizational stakeholders to secure information technology systems for the organization. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the security operations analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies.
On Demand
2h 31m
This course seeks to educate students on Microsoft Defender for Cloud. This new Microsoft application is a cloud-native application protection platform that seeks to assist with security in multi-cloud environments. This product is unique from Microsoft in many ways, one of them being the fact that the platform fulfills many roles within the context of cloud security. Defender for Cloud functions as the following product categories: - CNAPP (Cloud Native Application Protection Platform) - CSPM (Cloud Security Posture Management) - CWPP (Cloud Workload Protection Platform) This course focuses on the use of Microsoft Defender for Cloud to help protect cloud applications and the data they contain.
On Demand
2h 31m
This course focuses on the use of Microsoft Sentinel to help mitigate security threats in the organization. Microsoft Sentinel is a cloud-based security information and event management (SIEM) system that helps organizations monitor and respond to potential security threats in real-time. It uses artificial intelligence and machine learning to analyze data from various sources, such as logs, network traffic, and cloud services, to identify unusual activity that could indicate a security breach. Sentinel then provides alerts to security teams, who can investigate and take appropriate action. The system also includes automated response capabilities that can help contain and mitigate potential threats. Overall, Microsoft Sentinel helps organizations better protect their data and systems against cyberattacks.
On Demand
3h 39m
Part of the power of Python is the array of tools that come built into the language, known as the Python Standard Library. In this series, we take a look at the Standard Library, import from the Standard Library, as well as take a view of some of the more common modules, or parts, of the Standard Library. If you want to dive a little deeper, then we will see you there.
On Demand
5h 59m
In this series, we will explore the use of community code, or code written by others that to solve a particular problem or provide a particular functionality. We will explore how you can obtain these created solutions to increase your problem solving speed. In order to do so, we will explore the use of tools like pip, pipenv, and conda which are solutions to the fetching and managing of outside dependency requirements. If you are looking to solve bigger and bigger problems or just explore something of interest, then you will need help from others. Want to learn more? Join us as we dive in to the wonderful world of Python!
On Demand
8h 13m
This course takes you from introductory to advanced VMware vSphere management skills. Starting with the knowledge required to install and configure, you will also develop the advanced skills needed to manage and maintain a highly available and scalable virtual infrastructure. You will explore the features that build a foundation for a truly scalable infrastructure, and discuss when and where these features have the greatest effect. This course prepares you to administer a vSphere infrastructure for an organization of any size using vSphere 7.0, which includes VMware ESXi 7.0 and VMware vCenter Server 7.0.
On Demand
18h 29m
In this series, we take a look what version control is as well as the use of version control when creating software. After an overview of various software
On Demand
6h 56m
Vulnerability assessments and management are critical for cybersecurity professionals to identify vulnerabilities, prioritize remediation efforts, reduce the attack surface, comply with regulatory requirements, and continuously improve an organization's security posture. Without these activities, organizations are at risk of cyber threats that can cause significant financial and reputational damage. In this series, you will learn about various vulnerability scanning concepts and methods. You will also, learn how to analyze the output and data in order to better prioritize and mitigate vulnerabilities.
On Demand
2h 46m
In this series, Justin is going to combine the powers of the Express web framework with the power of AngularJS on the front end to create a weather forecast web application. Express will be used to proxy the request from the front end to the DarkSky API that is being consumed as a measure of hiding the credentials that are necessary for making the request. Moreover, Angular will interact with the proxy in order to obtain the information needed to render the application. If you want to see how this application comes together, then join us!
On Demand
9h 33m
Windows Admin Center is the modern evolution of "in-box" management tools. It is a locally deployed, browser-based management tool used to manage your on-premises Windows Servers, Windows 10 PCs, Failover clusters, and Azure VMs. Learn how to install, configure, and manage your environment using Windows Admin Center in this series of videos.
On Demand
3h 15m
Welcome to 4 Practice Labs Server Environments. These sandbox solutions can be used to practice and teach Windows server configuration, administration and enhance vulnerability testing skills in a safe, secure environment. After completing a session, the environment will reset to its original state.
On Demand
1m
Includes
Skill Lab
This course will acquaint learners with the new Windows Terminal Application. Learners will be provided with an overview of the application and its functionality. Learners will explore how to install, configure, and customize the Windows Terminal Application to suit their needs through various settings and actions.
On Demand
2h 50m
Word 2016 advanced explores ways to enhance Word documents with graphical elements that include images, shapes, tables, and charts. The series also demonstrates different techniques for users to automate tasks by using QuickParts, templates, macros, and mail merge. While Word 2016 Advanced is a continuation from the Word 2016 Essentials series, it can be viewed as a standalone show for users looking to go beyond just adding and formatting text. This series is specifically for locally installed Word 2016 on Windows operating system.
On Demand
8h 56m
Word 2016 Advanced for Mac explores ways to enhance Word documents with graphical elements that include images, shapes, tables, and charts. The series also demonstrates different techniques for users to automate tasks by using templates, macros, and mail merge. While Word 2016 Advanced for Mac is a continuation from the Word 2016 Essentials for Mac series, it can be viewed as a standalone course for users looking to go beyond just adding and formatting text. This series is specifically for locally installed Word 2016 on Mac OS.
On Demand
9h 30m
As one of the cornerstones of the Office suite, Word 2016 is a powerful word processor that allows users to create both simple and sophisticated documents. This series explores the essentials to getting started with Word 2016. We begin with basic skills such as navigating a document, selecting text, inputting basic text, and document proofing. The series also explores all aspects of character and paragraph formatting as well as page formatting and layout. While this series is designed for beginner users, it has lots of great tips and tricks experienced users as well. This series is specifically for locally installed Word 2016 on Windows operating system.
On Demand
9h 58m
As one of the cornerstones of the Office suite, Word 2016 for Mac is a powerful word processor that allows users to create both simple and sophisticated documents. This series explores the essentials to getting started with Word 2016 for Mac. We begin with basic skills such as navigating a document, selecting text, inputting basic text, and proofing a document. The series also explores all aspects of character and paragraph formatting as well as page formatting and layout. While this series is designed for beginner users, it has lots of great tips and tricks for experienced users as well. This series is specifically for locally installed Word 2016 on Mac OS.
On Demand
10h 51m
Word 2016 Expert explores how to enhance long documents with episodes that include: creating a table of contents, generating an index, adding footnotes and endnotes, inserting bookmarks and cross references, labeling figures with captions, and citing references for a bibliography. Also covered is how to create a master document and add sub documents for large projects. Other topics in this series include how to collaborate in Word and through Office 365 online, secure your documents, and add or edit document properties. While Word 2016 Expert is a continuation from the Word 2016 Advanced and Essentials series, episodes can be viewed individually for specific topics or enjoyed in sequence. This series is specifically for locally installed Word 2016 on Windows operating system.
On Demand
6h 28m
Word 2016 Expert for Mac explores how to enhance long documents with episodes that include: creating a table of contents, generating an index, adding footnotes and endnotes, inserting bookmarks and cross references, labeling figures with captions, and citing references for a bibliography. Also covered is how to create a master document and add sub documents for large projects. Other topics in this series include how to collaborate in Word and through Office 365 online, secure your documents, and add or edit document properties. While Word 2016 Expert for Mac is a continuation from the Word 2016 Advanced and Essentials for Mac series, episodes can be viewed individually for specific topics or enjoyed in sequence. This series is specifically for locally installed Word 2016 on Mac OS.
On Demand
6h 24m
This course takes a deep dive into mail merge within Word 2016. Mail merge is a powerful function to batch process personalized letters or emails as well as create mailing labels and envelopes. The hosts take extra time to explain the different types of data sources that can be used, how to create letters and emails, how to add images to envelopes and labels, and apply rules to extend the capabilities of the mail merge process. This series is specifically for locally installed Word 2016 on Windows operating system.
On Demand
7h 10m
This course takes a deep dive into mail merge within Word 2016 for Mac. Mail merge is a powerful function to batch process personalized letters or emails as well as create mailing labels and envelopes. The hosts take extra time to explain the different types of data sources that can be used, how to create letters and emails, how to add images to envelopes and labels, and apply rules to extend the capabilities of the mail merge process. This series is specifically for locally installed Word 2016 on Mac OS.
On Demand
6h 54m
Scrum is the number one Agile project methodology in the world for a good reason. It is simple yet effective in its production of valuable products and services in a speedy and efficient manner. In this first course of two to prepare you for the Professional Scrum Master-1 exam, you will learn about the basic principles, events and artifacts that make up the Scrum framework.
On Demand
4h 0m
Whether you've just started working from home or you've been doing so for quite some time now, this course will provide you will both technical and non-technical tips to make your remote working more efficient and enjoyable.
On Demand
1h 36m
The Working with SSH show aims to remove the intimidation of using the Secure Shell protocol on your network. SSH allows for encrypting network communications to protect from eavesdropping and man-in-the-middle attacks. This series demonstrates how to configure and use SSH to securely manage your systems.
On Demand
33m
This show covers the basics of pfSense, the "World's Most Trusted Open Source Firewall". It will help IT professionals to install, configure and manage & maintain the rich features in pfSense 2.4.4 for a production environment. It will also be helpful to the novice IT professional who needs to start working with a firewall
On Demand
14h 46m