What’s Included

  • .NET Core, C#, and Visual Studio Extensions
  • .NET Development with Visual Studio
  • .NET Overview: Windows, Web, and the Cloud
  • 1Z0-816 - Java SE 11 Programmer II: Arrays & Program Flow Control
  • 1Z0-816 - Java SE 11 Programmer II: Class Concepts & Managing Exceptions
  • 1Z0-816 - Java SE 11 Programmer II: Concurrency Management
  • 1Z0-816 - Java SE 11 Programmer II: Core Java Libraries
  • 1Z0-816 - Java SE 11 Programmer II: Core JVM Enhancements and Features
  • 1Z0-816 - Java SE 11 Programmer II: Database Applications
  • 1Z0-816 - Java SE 11 Programmer II: Functional Programming in Java
  • 1Z0-816 - Java SE 11 Programmer II: Fundamental Language Enhancements
  • 1Z0-816 - Java SE 11 Programmer II: Fundamentals
  • 1Z0-816 - Java SE 11 Programmer II: Generics & Collections in Java
  • 1Z0-816 - Java SE 11 Programmer II: Implementing NIO.2
  • 1Z0-816 - Java SE 11 Programmer II: Java Migration & Service Management
  • 1Z0-816 - Java SE 11 Programmer II: Lambda Operations & Streams
  • 1Z0-816 - Java SE 11 Programmer II: Localization in Java
  • 1Z0-816 - Java SE 11 Programmer II: Object-oriented Programming in Java
  • 1Z0-816 - Java SE 11 Programmer II: Secure Coding in Java SE 11 Applications
  • 1Z0-816 - Java SE 11 Programmer II: Streams & Pipelines
  • 4G Communication Systems
  • A/B Testing, Bayesian Networks, and Support Vector Machine
  • ABAP Fundamentals
  • ABAP Programming I
  • Access Control in Windows Server 2008 R2
  • Accessibility and Design
  • Accessing Data with Spark: An Introduction to Spark
  • Accessing Data with Spark: Data Analysis using Spark SQL
  • Accessing Data with Spark: Data Analysis Using the Spark DataFrame API
  • Accessing Windows Networks Remotely in Windows Server 2008
  • Active Directory Administration in Microsoft Windows Server 2008
  • Active Directory Certificate Services in Windows Server 2008
  • Active Directory Domain Services in Windows Server 2008 R2
  • Active Directory Objects in Windows Server 2008
  • Activities and Tools Used for Business Analysis
  • Adaptive AI, Graphics, and Animation
  • Adaptive App Design
  • Adaptive UI Layout and Caching Strategy
  • Additional Active Directory Server Roles in Windows Server 2008
  • Additional Malware Protection
  • Administer vRealize Automation Components
  • Administer vRealize Orchestrator and Troubleshoot Automation Implementation
  • Administering a SQL Database Infrastructure Expert Live with Encore
  • Administering and Deploying System Center 2012 Configuration Manager Expert Live with Encore
  • Administering Microsoft SQL Server 2012 Databases Expert Live with Encore
  • Administering Microsoft Windows Server 2012 Expert Encore
  • Administering Microsoft Windows Server 2012 R2 Expert Live with Encore
  • Administering System Center Configuration Manager 2012 R2
  • Administrating XenDesktop 7.5 and Hypervisor Management
  • Adobe Captivate 8: Getting Started
  • Adobe Captivate 8: Media and Interactivity
  • Adobe Captivate 9: Getting Started
  • Adobe Captivate 9: Media and Recording
  • Adobe Captivate 9: Publishing and Actions
  • Adobe Captivate 9: Questions and Pools
  • Adobe ColdFusion 10 Fundamentals
  • Adobe Dreamweaver CC 2015 Browsers and HTML
  • Adobe Dreamweaver CC 2015 Fundamentals
  • Adobe Dreamweaver CC 2015 Web Design
  • Adobe Edge Animate CC: Creating and Animating Artwork
  • Adobe Edge Animate CC: Exploring the Interface
  • Adobe Edge Animate CC: Importing Artwork, Text Animation and Typeface Properties
  • Adobe Edge Animate CC: Interactive Compositions
  • Adobe Edge Animate CC: Publishing Compositions
  • Adobe Edge Animate CC: Transitions, Symbols, and Synchronizing Motion
  • Adobe Edge Animate CC: Working with Video and Audio
  • Adobe Flash Professional CC 2015 Animations
  • Adobe Flash Professional CC 2015 Fundamentals
  • Adobe Flash Professional CC 2015 Programming
  • Adobe Flash Professional CC 2015 Tools
  • Adobe Illustrator CC 2015 Advanced Tools and Effects
  • Adobe Illustrator CC 2015 Fundamentals
  • Adobe Illustrator CC 2015 Gradients and Bitmap Images
  • Adobe Illustrator CC 2015 Introduction and New Features
  • Adobe Illustrator CC 2015 Tools
  • Adobe Illustrator CC 2015 Working with the Pen Tools and Objects
  • Adobe InDesign CC 2015 Basic Navigation and Tools
  • Adobe InDesign CC 2015 Fundamentals
  • Adobe Photoshop CC 2015 Basics
  • Adobe Photoshop CC 2015 Cloning and Editing
  • Adobe Photoshop CC 2015 Enhancement Tools and Techniques
  • Adobe Photoshop CC 2015 Paths and Techniques
  • Adobe Photoshop CC 2015: File Types and Color Editing
  • Adobe Photoshop CC 2015: Layers and Type
  • Adobe Photoshop CC 2015: Selection Tools and Techniques
  • Adobe Premiere Elements 13 Essentials
  • Adobe Premiere Elements 13: Adding Video Effects
  • Adobe Premiere Elements 13: Exporting & Sharing Videos
  • Adobe Premiere Elements 13: Getting Started
  • Adobe Premiere Elements 13: Importing Files & Setting Up a Project
  • Adobe Premiere Elements 13: Project Audio Settings
  • Adobe Premiere Elements 13: Trimming & Editing a Video
  • Adobe Premiere Pro CC 2015 Fundamentals
  • Adobe Premiere Pro CC 2015 Movies and Application Extensibility
  • Adobe Premiere Pro CC 2015 Panels and Effects
  • Adobe Reader X
  • Adopting IT Automation
  • Adopting PRINCE2® for your Project Environment (2017 Update)
  • Adopting the DevOps CI/CD Paradigm
  • Adopting the DevOps Mindset
  • Advanced Agile: Software Development Concepts
  • Advanced Agile: Software Project Management
  • Advanced Architecting on Amazon Web Services: Cloud Migration and Architecture
  • Advanced Architecting on Amazon Web Services: Costing
  • Advanced Architecting on Amazon Web Services: Data Storage Architecture
  • Advanced Architecting on Amazon Web Services: Deployment Management
  • Advanced Architecting on Amazon Web Services: HA and Business Continuity
  • Advanced Configuration Options
  • Advanced CSS
  • Advanced Data Access with EF Core
  • Advanced Database Security Development
  • Advanced Deployment
  • Advanced Entity Framework
  • Advanced Features of Akka
  • Advanced Features of JavaScript, CSS3 and HTML5
  • Advanced HR Management: Competencies for Senior HR Professionals Part I
  • Advanced HR Management: Competencies for Senior HR Professionals Part II
  • Advanced HTML5
  • Advanced HTML5
  • Advanced HTML5 and JavaScript
  • Advanced Human Resources Management: People and Organization
  • Advanced Human Resources Management: Workplace and HR Strategy
  • Advanced Input Validation
  • Advanced JsRender Features
  • Advanced Knockout Techniques
  • Advanced Lean, Agile, & Scrum Concepts
  • Advanced LoopBack
  • Advanced Microservices Architecture
  • Advanced Microservices Patterns
  • Advanced Options, Responsive Web Design, and Management with CSS3
  • Advanced PowerShell Desired State Configuration: Advanced Configuration
  • Advanced PowerShell Desired State Configuration: Writing Custom Resources
  • Advanced Prototyping in iRise
  • Advanced Provisioning in Vagrant
  • Advanced Python
  • Advanced Python Topics: Exceptions & Command Line Arguments
  • Advanced Python Topics: File Operations in Python
  • Advanced Python Topics: Migrating from Python 2 to Python 3
  • Advanced Python Topics: Python Modules & Virtual Environments
  • Advanced Querying in Java Hibernate
  • Advanced Rails
  • Advanced Reinforcement Learning: Implementation
  • Advanced Reinforcement Learning: Principles
  • Advanced Scrum for Project Management
  • Advanced Scrum Metrics
  • Advanced Scrum: Addressing Sprint Execution Challenges
  • Advanced Scrum: Developing the Product and Sprint Backlogs
  • Advanced Scrum: Integrating and Customizing Scrum
  • Advanced Selecting, Theming, and Plugins
  • Advanced Solutions of Microsoft Exchange Server 2013 Expert Live with Encore
  • Advanced Solutions of Microsoft SharePoint Server 2013 Expert Live with Encore
  • Advanced TIBCO Spotfire
  • Advanced Windows Store Apps with C# in Visual Studio 2013: Data Management
  • Advanced Windows Store Apps with C# in Visual Studio 2013: Media and Devices
  • Advanced Windows Store Apps with C# in Visual Studio 2013: Security & Optimizing
  • Advanced Windows Store Apps with C# in Visual Studio 2013: Testing & Deployment
  • Advanced Windows Store Apps with C# in Visual Studio 2013: The UI, Printing, WNS
  • Adversarial Problems
  • Aggregating Data in SQL Server 2016
  • Agile and DevOps: Adopting Agile Methodology
  • Agile Architecture, Design, & Collaboration
  • Agile Hybrid Approaches
  • Agile Key Exam Concepts
  • Agile Planning
  • Agile Principles and Methodologies
  • Agile Principles, Methodologies, and Mindset
  • Agile Programming & Testing
  • Agile Project Planning
  • Agile Project Scheduling and Monitoring
  • Agile Software Development - Scrum
  • Agile Software Development - Test-driven Development
  • Agile Software Development Methodologies
  • Agile Software Testing: Methodologies and Testing Approaches
  • Agile Software Testing: Techniques and Tools
  • Agile Stakeholder Engagement and Team Development
  • AI and ML Solutions with Python: Deep Learning and Neural Network Implementation
  • AI and ML Solutions with Python: Implementing ML Algorithm Using scikit-learn
  • AI and ML Solutions with Python: Implementing Robotic Process Automation
  • AI and ML Solutions with Python: Machine Learning and Data Analytics
  • AI and ML Solutions with Python: Supervised, Unsupervised and Deep Learning
  • Ajax API Essentials
  • Ajax Applications and Server Communication
  • Ajax Basics
  • Ajax: Requesting Data and Retrieving Responses
  • Akka Essentials
  • Alexa Architecture and Components
  • Amazon ECS and OpsWorks
  • An Executive's Guide to Security: Protecting Your Information
  • An Executive's Guide to Security: Understanding Security Threats
  • An Overview of Apache Cassandra
  • Analytical Techniques Used for Business Analysis
  • Analytics by Function
  • Analyzing Risk (PMBOK® Guide Sixth Edition)
  • Android Architecture, Protection, and Development Best Practices
  • Android Cardboard and Unity VR
  • Android For .NET Developers: Advanced Design, Build, Android Wear, and Emulator
  • Android For .NET Developers: Android OS
  • Android For .NET Developers: Android User Interface Elements
  • Android For .NET Developers: Different Approaches to Development
  • Android For .NET Developers: Introduction to Xamarin For .NET
  • Android For .NET Developers: Java, Garbage Collection, Debugging, and Runtime
  • Android Lollipop New Features For Developers
  • Android Security Vulnerabilities, Testing, and Enterprise Considerations
  • Angular 2 Template Syntax, Directives, and Pipes
  • Angular 4: Animation
  • Angular 4: Components and Bindings
  • Angular 4: Creating an Application
  • Angular 4: Directives
  • Angular 4: Form Management
  • Angular 4: Model-driven Forms
  • Angular 4: NativeScript
  • Angular 4: Pipes
  • Angular 4: Routing
  • Angular 4: Services, Promises, and Route Protection
  • Angular 5 Features and Changes
  • Angular 5 Material and Universal Components
  • Angular 6 Development: Angular Material and Angular Elements
  • Angular 6 Development: Dependency Injection and ng-bootstrap
  • Angular 6 Development: Introduction
  • Angular 6 Development: Libraries
  • Angular 6 Development: Reactive Programming
  • Angular 6 Development: Testing & TDD
  • Angular and ngrx
  • Angular Security and the Angular CLI
  • Angular, Reactive, and Observable
  • AngularJS and ASP.NET 5 MVC 6: Creating an SPA
  • AngularJS and ASP.NET 5 MVC 6: Data Persistence, Validation, and Security
  • AngularJS and TypeScript
  • AngularJS Security Considerations
  • AngularUI Companion Frameworks
  • AngularUI Utilities and Modules
  • Animation and Internationalization
  • Anomaly Detection: Aspects of Anomaly Detection
  • Anomaly Detection: Network Anomaly Detection
  • ANSI C Language Fundamentals
  • ANTS Performance Profiler
  • Apache Cordova: Exploring the Advanced Features
  • Apache Cordova: Exploring the Basic Features
  • Apache Hadoop
  • Apache Hadoop on Amazon EMR
  • Apache HBase Fundamentals: Access Data through the Shell and Client API
  • Apache HBase Fundamentals: Advanced API, Administration, and MapReduce
  • Apache HBase Fundamentals: Installation, Architecture, and Data Modeling
  • Apache Kafka Development
  • Apache Kafka Operations
  • Apache Solr - Query and Data Management
  • Apache Solr – Deployment and Configuration
  • Apache Spark SQL
  • Apache Storm Introduction - API and Topology
  • Apache Storm Introduction – Architecture and Installation
  • Apache Subversion Fundamentals: Getting to Know Subversion
  • Apache Web Services Advanced
  • API Gateways
  • API Management
  • API Management and DevOps
  • API Security
  • API Test Automation with SoapUI
  • APIs and Machine Learning
  • App Navigation
  • App-to-app Communication and File Storage
  • Appium Concepts with Mac OS X
  • Application Access and Delivery in Microsoft Windows Server 2008
  • Application Development with Node.js: Build Apps using Modules & MEAN Stack
  • Application Development with Node.js: Language Fundamentals
  • Application Development with Node.js: Managing Advanced Application Elements
  • Application Development with Node.js: Microservices
  • Application Development with Node.js: Microservices Frameworks, & Utilities
  • Application Development with Node.js: Node Clusters & Memory Optimizations
  • Application Development with Node.js: Process Managers
  • Application Development with Node.js: Real-time Applications
  • Application Development with Node.js: Security & Middleware Implementation
  • Application Development with Node.js: Working with Features
  • Application Life Cycle
  • Application Security in .NET
  • Application Skills in Microsoft Dynamics CRM 2013
  • Applications of Python
  • Applied Deep Learning: Generative Adversarial Networks and Q-Learning
  • Applied Deep Learning: Unsupervised Data
  • Applied Predictive Modeling
  • Applying Automation Using AWS Tools
  • Applying Design Patterns in DevOps & CloudOps Automation
  • Applying Machine Learning
  • Applying Scrum Development Practices
  • Apps and Gaming
  • Architecting Balance: Designing Hybrid Cloud Solutions
  • Architecting Balance: Hybrid Cloud Implementation with AWS & Azure
  • Architecting Microsoft Azure Solutions: Application Design and Messaging
  • Architecting Microsoft Azure Solutions: Automation with PowerShell, Chef, and Puppet
  • Architecting Microsoft Azure Solutions: Azure External Network Connectivity Design
  • Architecting Microsoft Azure Solutions: Azure Storage Design
  • Architecting Microsoft Azure Solutions: Compute Design Considerations
  • Architecting Microsoft Azure Solutions: Data Services Design
  • Architecting Microsoft Azure Solutions: Implement Azure Automation
  • Architecting Microsoft Azure Solutions: Managing Identities
  • Architecting Microsoft Azure Solutions: Monitoring Resources
  • Architecting Microsoft Azure Solutions: Network Design
  • Architecting Microsoft Azure Solutions: Plan Azure SQL-Compliant Database Usage
  • Architecting Microsoft Azure Solutions: Planning Artificial Intelligence Services
  • Architecting Microsoft Azure Solutions: Planning Azure NoSQL Deployments
  • Architecting Microsoft Azure Solutions: Securing the Azure Environment
  • Architecting Microsoft Azure Solutions: Template and Runbook Automation
  • Architecting Microsoft Azure Solutions: Web Application Design
  • Architecting on Amazon Web Services: Databases and Application Services
  • Architecture and Testable Code
  • Architecture N-Tier/REST: Designing and Building Applications
  • Archiving and External Access
  • Artificial Intelligence: Basic AI Theory
  • Artificial Intelligence: Human-computer Interaction Methodologies
  • Artificial Intelligence: Human-computer Interaction Overview
  • Artificial Intelligence: Types of Artificial Intelligence
  • ASP.NET MVC Databases and Entity Framework
  • ASP.NET MVC Databases and the Entity Framework
  • ASP.NET MVC Web Applications: Adaptive UI Layout and Caching Strategy
  • ASP.NET MVC Web Applications: Asynchronous Tasks
  • ASP.NET MVC Web Applications: Authorization & Exception Handling
  • ASP.NET MVC Web Applications: Claims-Based Authentication
  • ASP.NET MVC Web Applications: Composing the UI Layout
  • ASP.NET MVC Web Applications: Configuring & Deploying
  • ASP.NET MVC Web Applications: Data & State Management
  • ASP.NET MVC Web Applications: Databases & Entity Framework
  • ASP.NET MVC Web Applications: Debugging Web Applications
  • ASP.NET MVC Web Applications: Deployment Architecture
  • ASP.NET MVC Web Applications: Design and Implement UI Behavior
  • ASP.NET MVC Web Applications: Designing Application Architecture
  • ASP.NET MVC Web Applications: Designing Build & Publishing Strategies
  • ASP.NET MVC Web Applications: Distributed Applications
  • ASP.NET MVC Web Applications: Globalization, Azure Events, & NuGet
  • ASP.NET MVC Web Applications: Host Options & WebApp Composition
  • ASP.NET MVC Web Applications: Implementing ASP.NET Authentication
  • ASP.NET MVC Web Applications: Implementing Secure Sites
  • ASP.NET MVC Web Applications: Introduction
  • ASP.NET MVC Web Applications: JSON & XML Data Formats
  • ASP.NET MVC Web Applications: Models and Unit Testing
  • ASP.NET MVC Web Applications: MVC Application Routes
  • ASP.NET MVC Web Applications: MVC Controllers & Actions
  • ASP.NET MVC Web Applications: Optimization & Encryption
  • ASP.NET MVC Web Applications: State & Configuration Management
  • ASP.NET MVC Web Applications: Troubleshooting, HTTP Modules, & Handlers
  • ASP.NET MVC Web Applications: Web API Routes & Controllers
  • Asynchronous Programming with Clojure's core.async Library
  • Asynchronous Tasks in ASP.NET MVC Web Application
  • Attack Vectors and Mitigations
  • Auditing, Logging, and Event Handling
  • Authentication & Encryption: Best Practices
  • Authentication and Identity Management
  • Authentication, Authorization, and App Deployment
  • Authoring Tool Accessibility Guidelines (ATAG)
  • Automated Software Testing
  • Automated Testing with Docker
  • Automating and Managing Databases
  • Automation and High Availability
  • Automation and Machine Learning
  • Automation Design & Robotics
  • Automation Testing for Python
  • Automation Using Bash and Expect
  • AWS Associate Solution Architect: Amazon CloudFront and Route 53
  • AWS Associate Solution Architect: Amazon Machine Images
  • AWS Associate Solution Architect: Architecting for the Cloud
  • AWS Associate Solution Architect: Architecture Security
  • AWS Associate Solution Architect: Auto Scaling
  • AWS Associate Solution Architect: AWS Primer
  • AWS Associate Solution Architect: AWS Storage Solutions
  • AWS Associate Solution Architect: Building and Managing AWS Solutions
  • AWS Associate Solution Architect: Caching
  • AWS Associate Solution Architect: Database Managed Services
  • AWS Associate Solution Architect: High Availability
  • AWS Associate Solution Architect: Loose Coupling
  • AWS Associate Solution Architect: Managing AWS
  • AWS Associate Solution Architect: Optimizing Compute Resources
  • AWS Associate Solution Architect: Optimizing Storage
  • AWS Associate Solution Architect: Scalability and Elasticity
  • AWS Associate Solution Architect: Virtual Private Cloud
  • AWS Associate Solutions Architect 2020: Application Scalability
  • AWS Associate Solutions Architect 2020: AWS Cost Management
  • AWS Associate Solutions Architect 2020: AWS Developer Options
  • AWS Associate Solutions Architect 2020: AWS Review Course 1
  • AWS Associate Solutions Architect 2020: AWS Review Course 2
  • AWS Associate Solutions Architect 2020: Database Solutions
  • AWS Associate Solutions Architect 2020: Identity & Access Management
  • AWS Associate Solutions Architect 2020: Monitoring
  • AWS Associate Solutions Architect 2020: Network Options
  • AWS Associate Solutions Architect 2020: Network Security & Name Resolution
  • AWS Associate Solutions Architect 2020: Security
  • AWS Associate Solutions Architect 2020: Stack Deployment and Caching
  • AWS Associate Solutions Architect 2020: Storage Security & Resiliency
  • AWS Associate Solutions Architect 2020: Storage Solutions
  • AWS Automated Testing: Environments & Services
  • AWS Certified Developer - Associate: Application Development
  • AWS Certified Developer - Associate: Code Management and Monitoring Tools
  • AWS Certified Developer - Associate: Plan Application and Infrastructure Security
  • AWS Certified Developer - Associate: Principles and Essential Services
  • AWS Certified Developer - Associate: Serverless Application and Container Management
  • AWS Certified Developer - Associate: Service Integration and Orchestration
  • AWS Certified SysOps Administrator: Application Infrastructure
  • AWS Certified SysOps Administrator: Compute Services
  • AWS Certified SysOps Administrator: Database Services
  • AWS Certified SysOps Administrator: High Availabilty
  • AWS Certified SysOps Administrator: Introduction
  • AWS Certified SysOps Administrator: Monitoring the AWS Environment
  • AWS Certified SysOps Administrator: Networking Services
  • AWS Certified SysOps Administrator: Preparing for Cloud Service Management
  • AWS Certified SysOps Administrator: Security and IAM Services
  • AWS Certified SysOps Administrator: Storage Services
  • AWS Cloud Practitioner 2019: Architecture Design Principles
  • AWS Cloud Practitioner 2019: AWS Access Management
  • AWS Cloud Practitioner 2019: AWS Cloud and the Value Proposition
  • AWS Cloud Practitioner 2019: AWS Cloud Deployment and Operation
  • AWS Cloud Practitioner 2019: Cloud Economics
  • AWS Cloud Practitioner 2019: Cloud Security & Compliance
  • AWS Cloud Practitioner 2019: Core AWS Services
  • AWS Cloud Practitioner 2019: Security Support Resources
  • AWS Cloud Practitioner 2019: Shared Responsibility
  • AWS Cloud Practitioner 2019: Technology Support Resources
  • AWS Infrastructure Services
  • AWS Lambda
  • AWS Professional Solution Architect: Business Continuity
  • AWS Professional Solution Architect: Cloud Migration
  • AWS Professional Solution Architect: Costing
  • AWS Professional Solution Architect: Data Replication
  • AWS Professional Solution Architect: Data Security
  • AWS Professional Solution Architect: Data Storage
  • AWS Professional Solution Architect: Deployment Management
  • AWS Professional Solution Architect: Hybrid Architecture
  • AWS Professional Solution Architect: Network Design
  • AWS Professional Solution Architect: Scalability and Elasticity
  • AWS Professional Solution Architect: Security Controls
  • AWS Professional Solutions Architect 2020: Account & Centralized Management
  • AWS Professional Solutions Architect 2020: AWS & Data Protection
  • AWS Professional Solutions Architect 2020: AWS Management
  • AWS Professional Solutions Architect 2020: Cryptography & PKI
  • AWS Professional Solutions Architect 2020: Data Processing & Analysis
  • AWS Professional Solutions Architect 2020: Database Solutions
  • AWS Professional Solutions Architect 2020: Desktop & Cost Management
  • AWS Professional Solutions Architect 2020: Developer Managed Services
  • AWS Professional Solutions Architect 2020: Development Strategies
  • AWS Professional Solutions Architect 2020: EC2 Instance Deployment
  • AWS Professional Solutions Architect 2020: High Availability
  • AWS Professional Solutions Architect 2020: IAM Configurations
  • AWS Professional Solutions Architect 2020: IAM Users & Groups
  • AWS Professional Solutions Architect 2020: Migration Strategies
  • AWS Professional Solutions Architect 2020: Name Resolution Solutions
  • AWS Professional Solutions Architect 2020: Network Security & Disaster Recovery
  • AWS Professional Solutions Architect 2020: Resource Monitoring & Performance
  • AWS Professional Solutions Architect 2020: Review Course 1
  • AWS Professional Solutions Architect 2020: Review Course 2
  • AWS Professional Solutions Architect 2020: S3 Management
  • AWS Professional Solutions Architect 2020: S3 Security
  • AWS Professional Solutions Architect 2020: VPC Connectivity
  • AWS Professional Solutions Architect 2020: VPC Management & Peering
  • AWS Serverless Architecture
  • AWS Serverless Monitoring & Security
  • AWS Serverless Storage
  • AWS SysOps Associate: Monitoring, Metrics, Analysis, and Deployment
  • AWS: Cloud Primer
  • AWS: Management Tools
  • AWS: Networking
  • AWS: Other Services
  • AWS: Storage
  • AWS: Virtual Machines and Identity and Access Management
  • AWS: WorkDocs
  • AZ-103 - Microsoft Azure Administrator: Azure Active Directory
  • AZ-103 - Microsoft Azure Administrator: Azure AD Objects
  • AZ-103 - Microsoft Azure Administrator: Azure Backup and Recovery
  • AZ-103 - Microsoft Azure Administrator: Azure Hybrid Identities
  • AZ-103 - Microsoft Azure Administrator: Azure Import/Export
  • AZ-103 - Microsoft Azure Administrator: Azure Load Balancer
  • AZ-103 - Microsoft Azure Administrator: Azure Monitoring
  • AZ-103 - Microsoft Azure Administrator: Azure Multi-Factor Authentication
  • AZ-103 - Microsoft Azure Administrator: Azure Name Resolution & Network Security
  • AZ-103 - Microsoft Azure Administrator: Azure Network Monitoring
  • AZ-103 - Microsoft Azure Administrator: Azure Policies
  • AZ-103 - Microsoft Azure Administrator: Azure Resource Groups
  • AZ-103 - Microsoft Azure Administrator: Azure Storage Accounts
  • AZ-103 - Microsoft Azure Administrator: Azure Storage Accounts
  • AZ-103 - Microsoft Azure Administrator: Azure Virtual Machine Templates
  • AZ-103 - Microsoft Azure Administrator: Azure Virtual Machines (VMs)
  • AZ-103 - Microsoft Azure Administrator: Azure Virtual Network Connectivity
  • AZ-103 - Microsoft Azure Administrator: Azure Virtual Networks
  • AZ-103 - Microsoft Azure Administrator: Integrating Azure On-Premise & Virtual Networks
  • AZ-103 - Microsoft Azure Administrator: Managing Azure Virtual Machines
  • AZ-103 - Microsoft Azure Administrator: Subscriptions
  • AZ-104 - Microsoft Azure Administrator: Availability Solutions
  • AZ-104 - Microsoft Azure Administrator: Azure App Service & Batch Jobs
  • AZ-104 - Microsoft Azure Administrator: Azure Policies
  • AZ-104 - Microsoft Azure Administrator: Manage Azure AD Groups & Devices
  • AZ-104 - Microsoft Azure Administrator: Manage Azure AD Subscriptions and Costs
  • AZ-104 - Microsoft Azure Administrator: Manage Azure AD Users
  • AZ-104 - Microsoft Azure Administrator: Managing Azure DNS & Network Security
  • AZ-104 - Microsoft Azure Administrator: Managing Azure Files
  • AZ-104 - Microsoft Azure Administrator: Managing Azure Network Solutions
  • AZ-104 - Microsoft Azure Administrator: Managing Azure Roles & Tags
  • AZ-104 - Microsoft Azure Administrator: Managing Azure Storage Accounts
  • AZ-104 - Microsoft Azure Administrator: Managing Azure Virtual Machines
  • AZ-104 - Microsoft Azure Administrator: Monitoring Azure Resources
  • AZ-300 - Microsoft Azure Architect Technologies: Architect Azure Networking
  • AZ-300 - Microsoft Azure Architect Technologies: Architecting Azure Solutions I
  • AZ-300 - Microsoft Azure Architect Technologies: Architecting Azure Solutions II
  • AZ-300 - Microsoft Azure Architect Technologies: Architecting Azure Storage
  • AZ-300 - Microsoft Azure Architect Technologies: Azure AD Connect
  • AZ-300 - Microsoft Azure Architect Technologies: Azure AD MFA
  • AZ-300 - Microsoft Azure Architect Technologies: Azure Monitoring
  • AZ-300 - Microsoft Azure Architect Technologies: Azure Roles and Policies
  • AZ-300 - Microsoft Azure Architect Technologies: Azure Virtual Machines
  • AZ-300 - Microsoft Azure Architect Technologies: Azure Web Apps
  • AZ-300 - Microsoft Azure Architect Technologies: DevOps & Azure
  • AZ-300 - Microsoft Azure Architect Technologies: High Availability
  • AZ-300 - Microsoft Azure Architect Technologies: Managing Azure
  • AZ-300 - Microsoft Azure Architect Technologies: Managing Azure Costs
  • AZ-301 - Microsoft Azure Architect Design: Azure AD & RBAC Design
  • AZ-301 - Microsoft Azure Architect Design: Azure AD Connect, MFA, & SSO Design
  • AZ-301 - Microsoft Azure Architect Design: Azure AD Permissions Design
  • AZ-301 - Microsoft Azure Architect Design: Azure App Design
  • AZ-301 - Microsoft Azure Architect Design: Azure Compute Design
  • AZ-301 - Microsoft Azure Architect Design: Azure Cost Management
  • AZ-301 - Microsoft Azure Architect Design: Azure DevOps Planning
  • AZ-301 - Microsoft Azure Architect Design: Azure Key Vault and Key Design
  • AZ-301 - Microsoft Azure Architect Design: Azure Migration Planning
  • AZ-301 - Microsoft Azure Architect Design: Azure Network Design
  • AZ-301 - Microsoft Azure Architect Design: Azure Policy Planning
  • AZ-301 - Microsoft Azure Architect Design: Azure Service Design Part 1
  • AZ-301 - Microsoft Azure Architect Design: Azure Service Design Part 2
  • AZ-301 - Microsoft Azure Architect Design: Azure Site Recovery Design
  • AZ-301 - Microsoft Azure Architect Design: Azure Storage Design
  • AZ-301 - Microsoft Azure Architect Design: Azure VPN Design
  • AZ-400 - MS Azure DevOps Solutions: Application Configuration & Secrets
  • AZ-400 - MS Azure DevOps Solutions: Azure DevOps Infrastructure
  • AZ-400 - MS Azure DevOps Solutions: Dependency Management & Security Compliance
  • AZ-400 - MS Azure DevOps Solutions: Design & Implement Agile Work Management Approach
  • AZ-400 - MS Azure DevOps Solutions: Design a Quality Strategy & Secure Development Process
  • AZ-400 - MS Azure DevOps Solutions: Design and Set Up Release Strategy & Workflow
  • AZ-400 - MS Azure DevOps Solutions: Implement Continuous Feedback
  • AZ-400 - MS Azure DevOps Solutions: Implement Deployment Patterns
  • AZ-400 - MS Azure DevOps Solutions: Implement Infrastructure as Code
  • AZ-400 - MS Azure DevOps Solutions: Infrastructure as Code & Security Compliance
  • AZ-400 - MS Azure DevOps Solutions: Manage Code Quality & Security Policies
  • AZ-400 - MS Azure DevOps Solutions: Migration & Consolidation Strategy for Tools
  • AZ-400 - MS Azure DevOps Solutions: Tool Integration
  • AZ-400 - MS Azure DevOps Solutions: Version & Source Control
  • AZ-500 - Microsoft Azure Security Technologies: Application Containers
  • AZ-500 - Microsoft Azure Security Technologies: Azure AD Connect
  • AZ-500 - Microsoft Azure Security Technologies: Azure AD Group Management
  • AZ-500 - Microsoft Azure Security Technologies: Azure AD User Management
  • AZ-500 - Microsoft Azure Security Technologies: Azure Key Vault
  • AZ-500 - Microsoft Azure Security Technologies: Azure RBAC & Policies
  • AZ-500 - Microsoft Azure Security Technologies: Azure Security Center
  • AZ-500 - Microsoft Azure Security Technologies: Azure Storage Account Security
  • AZ-500 - Microsoft Azure Security Technologies: Data Classification
  • AZ-500 - Microsoft Azure Security Technologies: Database Security
  • AZ-500 - Microsoft Azure Security Technologies: Database User Access
  • AZ-500 - Microsoft Azure Security Technologies: Identity & Access Management
  • AZ-500 - Microsoft Azure Security Technologies: Monitoring, Logging, & Alerts
  • AZ-500 - Microsoft Azure Security Technologies: Network Security
  • AZ-500 - Microsoft Azure Security Technologies: Review Course 1
  • AZ-500 - Microsoft Azure Security Technologies: Review Course 2
  • AZ-500 - Microsoft Azure Security Technologies: VM Security
  • AZ-500 - Microsoft Azure Security Technologies: VPNs
  • AZ-500 - Microsoft Azure Security Technologies: Web Application Security
  • Azure Active Directory and Authentication
  • Azure Active Directory and Collaboration
  • Azure App Services
  • Azure Backup and Recovery
  • Azure Blob Storage
  • Azure Developer: Advanced Scalability Using Azure
  • Azure Developer: Advanced Security & Integration Using Azure Services
  • Azure Developer: Azure Batch & Scheduling Bulk Operations
  • Azure Developer: Azure Cloud Technology Solutions
  • Azure Developer: Blob Storage Solutions
  • Azure Developer: Caching & Content Delivery Solutions
  • Azure Developer: Common Application Design & Connectivity Patterns
  • Azure Developer: Cosmos DB Storage Solutions
  • Azure Developer: Creating Mobile Apps
  • Azure Developer: File Storage Solutions
  • Azure Developer: Implementing Authentication & Access Control
  • Azure Developer: Implementing Secure Data Solutions
  • Azure Developer: Kubernetes Service Solutions
  • Azure Developer: Media Services Solutions
  • Azure Developer: PaaS Web Applications
  • Azure Developer: Relational Database Solutions
  • Azure Developer: Storage Solutions
  • Azure Developer: Storage Tables
  • Azure Developer: Working With Azure Functions
  • Azure Developer: Working with Azure Logic Apps
  • Azure Developer: Working with Azure Service Fabric
  • Azure DevOps: Managing Agile Lifecycle
  • Azure DevOps: Repository & Pipeline Management
  • Azure Diagnostics, Debugging, and Access Control Service
  • Azure Functions and API Management
  • Azure Fundamentals: Azure Data Privacy
  • Azure Fundamentals: Azure Network Security
  • Azure Fundamentals: Azure Security Services
  • Azure Fundamentals: Big Data Analytics
  • Azure Fundamentals: Cloud Computing
  • Azure Fundamentals: Database Solutions
  • Azure Fundamentals: IoT & AI
  • Azure Fundamentals: Monitoring the Azure Environment
  • Azure Fundamentals: Network Components
  • Azure Fundamentals: Storage Components
  • Azure Fundamentals: The Ecosystem
  • Azure Fundamentals: Virtual Machines
  • Azure High Availability Solutions
  • Azure Networking
  • Azure Scalability
  • Azure Security and Monitoring
  • Azure Service Fabric Apps
  • Azure Services
  • Azure SQL Database and Caching
  • Azure SQL Database Encryption
  • Azure SQL Database Security
  • Azure SQL DB and ARM Templates
  • Azure Storage
  • Azure Storage and the Azure Environment
  • Azure Storage Tables and Queues
  • Azure Subscription Messages, Security, and Troubleshooting
  • Azure Virtual Machine Management
  • Azure Virtual Machines
  • Azure Virtual Machines
  • Azure VM Monitoring and Availability
  • Azure VM Scaling and Storage
  • Azure, Node.js, and SQL Server
  • Background Tasks and Reusable Components
  • Backing Up, Recovering, Importing, and Exporting Data in Oracle Database 12c
  • Balancing the Four Vs of Data: The Four Vs of Data
  • Base SAS 9 Programming: Creating Reports
  • Base SAS 9 Programming: Data Structures
  • Base SAS 9 Programming: Inputs and Outputs
  • Base SAS 9 Programming: Introduction to Data Sets
  • Base SAS 9 Programming: The SAS Environment
  • Base SAS 9 Programming: Working with Data Sets
  • Bash Advanced Scripting and File I/O
  • Bash Scripting Flow Control and Data Types
  • Basic Coding with Adobe Dreamweaver CC 2015
  • Basic Concepts of a Microservices Architecture
  • Basic Probability and Statistical Distributions in Six Sigma
  • Basic Programming in Force.com
  • Basic SCCM Maintenance and Managing Operating System Deployment
  • Basic Six Sigma Statistics
  • Basics of Hypothesis Testing and Tests for Means in Six Sigma
  • Basics of Six Sigma Project Management
  • Batch Solutions with Hive and Apache Pig
  • Bayesian Methods: Advanced Bayesian Computation Model
  • Bayesian Methods: Bayesian Concepts & Core Components
  • Bayesian Methods: Implementing Bayesian Model and Computation with PyMC
  • BDD Testing with Cucumber
  • Beginning AngularJS
  • Beginning Cucumber and Behavior-driven Development
  • Beginning Object-Oriented Design
  • Being an Effective Team Member
  • Being an Effective Team Member
  • Best Practices for DevOps Implementation
  • BI with QlikView: Application Deployment and Performance
  • BI with QlikView: Dashboards and Comparative Analysis
  • BI with QlikView: Data Governance and Metadata Management
  • BI with QlikView: Data Modeling
  • BI with QlikView: Getting Started
  • BI with QlikView: Macros and Properties
  • BI with QlikView: Scripting and Designing
  • BI with QlikView: Server
  • Big Data - The Legal Perspective
  • Big Data Corporate Leadership Perspective
  • Big Data Engineering Perspectives
  • Big Data Fundamentals
  • Big Data Interpretation
  • Big Data Marketing Perspective
  • Big Data Opportunities and Challenges
  • Big Data Sales Perspective
  • Big Data Strategic Planning
  • Bitcoin Internals and Wallet Configuration
  • Bitcoin Technology Fundamentals
  • Blockchain and Your Business
  • Blockchain Architectural Components and Platforms
  • Blockchain in Action and IoT
  • Blockchain Trust and Design
  • Blockchains & Ethereum: Introduction
  • Blockchains & Ethereum: Mining and Smart Contracts in Ethereum
  • Blockchains & Ethereum: Performing Transactions in Ethereum
  • Bootstrap and Dashboards with Angular 5
  • Bootstrap Environment, Requirements, and Setup
  • Bootstrap Forms and Layout
  • Build & Integrate React Applications with Redux Capabilities
  • Build and Test SPA Using React and Redux
  • Build Apps Using React: Advanced Features in React
  • Build Apps Using React: In Development & Production
  • Build Apps Using React: Introducing React for Web Applications
  • Build Apps Using React: Local Machine & Online Playgrounds
  • Build Apps Using React: Props & State
  • Build Apps Using React: Working with Events
  • Build Apps Using React: Working with Forms
  • Building & Implementing Test Automation Frameworks
  • Building a Microservice in .NET Core
  • Building an API Project in ASP.NET
  • Building Data Pipelines
  • Building Decentralized Applications for Ethereum: An Introduction to dApps
  • Building Decentralized Applications for Ethereum: Bespoke Ethereum Tokens
  • Building Decentralized Applications for Ethereum: Building the Back End
  • Building Decentralized Applications for Ethereum: Building the Front End
  • Building Dynamic Web Sites with MySQL and PHP
  • Building ML Training Sets: Introduction
  • Building ML Training Sets: Preprocessing Datasets for Classification
  • Building ML Training Sets: Preprocessing Datasets for Linear Regression
  • Building Simple Applications
  • Building Solutions using Kafka and HBase
  • Building the Foundation for an Effective Team
  • Building the Puppet Environment
  • Building the Team Foundation Server Environment
  • Building Web Apps Using Django: Building a Basic Website
  • Building Web Apps Using Django: Generic Views
  • Building Web Apps Using Django: Implementing Login & Logout
  • Building Web Apps Using Django: Introduction to Web Frameworks & Django
  • Building Web Apps Using Django: Models & User Registration
  • Building Web Apps Using Django: Templates & User Administration
  • Business Analysis Activities and Tools
  • Business Analysis Analytical Techniques
  • Business Analysis and RADD: Design Definition
  • Business Analysis and RADD: Requirements Definition
  • Business Analysis and Requirements Life Cycle Management
  • Business Analysis and Solution Evaluation
  • Business Analysis and Strategy Analysis
  • Business Analysis Competencies: Personal Skills
  • Business Analysis Documentation and Criteria
  • Business Analysis Elicitation and Collaboration
  • Business Analysis for Project Management: Practices for Early Project Stages
  • Business Analysis for Project Management: Practices for Later Project Stages
  • Business Analysis Overview
  • Business Analysis Perspectives
  • Business Analysis Planning and Monitoring
  • Business Analysis Professional Effectiveness Competencies
  • Business Analysis Requirements Elicitation
  • Business Analysis Requirements Management and Communication
  • Business Analysis: Enterprise Analysis
  • Business Analysis: Introduction to Requirements Analysis
  • Business Analysis: Solution Assessment and Validation
  • Business Analysis: Verify and Validate Requirements
  • Business Continuity: Cloud Integration
  • Business Continuity: Secure Cloud Computing
  • Business Intelligence: Project Data Analysis
  • Business Management and Strategy: HR and the Strategic Planning Process
  • Business Management and Strategy: HR Functions and Roles
  • Business Management and Strategy: The HR Function and Business Environment
  • Business Orientation: Strategic Organizational Goals
  • Business Strategy: Managing Organizational Value
  • C++ Classes
  • C++ Classes and Object-oriented Programming
  • C++ Fundamentals
  • C++ Standard Template Library Algorithms and Operations
  • C++ Templates and Containers
  • C++11: Programming Fundamentals
  • Capacity Management for Hadoop Clusters
  • Capturing, Analyzing, and Using Project Lessons Learned
  • Cassandra vs. SQL
  • CCENT: Access Control Lists Part 1
  • CCENT: Access Control Lists Part 2
  • CCENT: Device Hardening
  • CCENT: Device Management
  • CCENT: DHCP Configuration
  • CCENT: Discovering Ethernet
  • CCENT: Discovery Protocols
  • CCENT: DNS Configuration
  • CCENT: Functions of Routing
  • CCENT: Initial Device Configuration
  • CCENT: Interswitch Connectivity
  • CCENT: InterVLAN Routing
  • CCENT: IPv4 Addressing Part 1
  • CCENT: IPv4 Addressing Part 2
  • CCENT: IPv4 Configuration
  • CCENT: IPv6 Addressing
  • CCENT: IPv6 Configuration
  • CCENT: NAT Configuration
  • CCENT: Network Cabling
  • CCENT: Network Components, Topologies, and Architecture
  • CCENT: NTP Configuration
  • CCENT: OSI Model
  • CCENT: Overview of Cisco Devices
  • CCENT: Overview of Networking
  • CCENT: Port Security
  • CCENT: RIPv2 Configuration
  • CCENT: Static Routing
  • CCENT: Subnetting Part 1
  • CCENT: Subnetting Part 2
  • CCENT: Subnetting Practice
  • CCENT: Switching Functions
  • CCENT: TCP/IP Model
  • CCENT: Troubleshooting Interfaces and Cables
  • CCENT: Troubleshooting Methodologies
  • CCENT: VLAN Configuration
  • CCNA 2020: AAA Security & VPN Types
  • CCNA 2020: APIs & Cisco DNA Center
  • CCNA 2020: Automation, Network Programmability, & SDN Architectures
  • CCNA 2020: Cisco Wireless Architecture & WLAN Components
  • CCNA 2020: Cisco WLC Configuration & Wireless Management Access
  • CCNA 2020: Configuration Management & JSON Encoded Data
  • CCNA 2020: Configuring & Verifying ACLs
  • CCNA 2020: Configuring & Verifying NAT
  • CCNA 2020: Configuring Port Security, DHCP Snooping, & DAI
  • CCNA 2020: Configuring SSH, FTP, & TFTP
  • CCNA 2020: Dynamic Routing
  • CCNA 2020: IP Addressing Basics & Configuration
  • CCNA 2020: IPv4 Subnetting
  • CCNA 2020: IPv6 Addressing & Configuration
  • CCNA 2020: IT Security Concepts
  • CCNA 2020: L2 Discovery Protocols & L2 and L3 EtherChannel Configuration
  • CCNA 2020: Layer 1 Interfaces & Cabling
  • CCNA 2020: Layer 1 Physical & Configuration Issues
  • CCNA 2020: Network Access, VLAN Configuration, & Interswitch Connectivity
  • CCNA 2020: Network Topology Architectures
  • CCNA 2020: Network Topology Architectures - WAN, Cloud, & SOHO
  • CCNA 2020: Networking Components
  • CCNA 2020: Networking Components - NGFW, NGIPS, & Cisco DNA Center
  • CCNA 2020: Networking Protocols
  • CCNA 2020: NTP, DNS, & DHCP
  • CCNA 2020: Security Program &Password Policy Components
  • CCNA 2020: SNMP, Syslog, & PHB for QoS
  • CCNA 2020: Spanning Tree Protocol
  • CCNA 2020: Static Routing
  • CCNA 2020: Virtualization Concepts
  • CCNA 2020: WLCs, Access Points, Servers, & Endpoints
  • CCSP 2019: Application Development & Security
  • CCSP 2019: Cloud Infrastructure
  • CCSP 2019: Cloud System Architecture Design
  • CCSP 2019: Data Center Security
  • CCSP 2019: Data Retention & Events
  • CCSP 2019: Data Security Technologies
  • CCSP 2019: Identity & Access Management
  • CCSP 2019: Implementing Data Discovery & Classification
  • CCSP 2019: Managing & Securing Cloud Infrastructure
  • CCSP 2019: Operational Controls & Standards
  • CCSP 2019: Secure Cloud Computing
  • CEHv10: Common Web App Threats
  • CEHv10: Denial of Service
  • CEHv10: Ethical Hacking Overview and Threats
  • CEHv10: Evading IDS, Firewalls, and Honeypots Part 2
  • CEHv10: Footprinting
  • CEHv10: Hacking Concepts
  • CEHv10: Hacking Web Servers
  • CEHv10: Hidden Files and Covering Tracks
  • CEHv10: Host Discovery and Scanning with Nmap
  • CEHv10: IoT Hacking and Countermeasures
  • CEHv10: Network Sniffing
  • CEHv10: Password Attacks
  • CEHv10: Password Attacks Part 2
  • CEHv10: Pentesting, Laws, and Standards
  • CEHv10: ProxyChains and Enumeration
  • CEHv10: Security Controls
  • CEHv10: Security Controls Part 2
  • CEHv10: SQL Injection
  • CEHv10: Vulnerability Analysis Concepts and Tools
  • CEHv10: Wireless Hacking Concepts
  • Certificate Services, SANs, and High Availability in Windows Server 2008
  • Certified Business Analysis Professional
  • Certified Ethical Hacker - CEHv10: Cloud Computer Attacks
  • Certified Ethical Hacker - CEHv10: Clouding Computing Concepts
  • Certified Ethical Hacker - CEHv10: Common Web App Threats Part 2
  • Certified Ethical Hacker - CEHv10: Covert Data Gathering
  • Certified Ethical Hacker - CEHv10: Cracking and Mobile Hacking
  • Certified Ethical Hacker - CEHv10: Cryptography Attacks
  • Certified Ethical Hacker - CEHv10: Cryptography Concepts
  • Certified Ethical Hacker - CEHv10: Cryptography Concepts Part 2
  • Certified Ethical Hacker - CEHv10: Cryptography Concepts Part 3
  • Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots
  • Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots Part 3
  • Certified Ethical Hacker - CEHv10: IoT Attacks
  • Certified Ethical Hacker - CEHv10: IoT Concepts
  • Certified Ethical Hacker - CEHv10: Malware Distribution
  • Certified Ethical Hacker - CEHv10: Malware Threats
  • Certified Ethical Hacker - CEHv10: Practical Web App Hacking
  • Certified Ethical Hacker - CEHv10: Privilege Escalation
  • Certified Ethical Hacker - CEHv10: Session Hijacking
  • Certified Ethical Hacker - CEHv10: Social Engineering
  • Certified Ethical Hacker - CEHv10: SQL Injection Types and Tools
  • Certified Ethical Hacker - CEHv10: Wireless Hacking Common Threats
  • Certified Ethical Hacker - CEHv10: Wireless Hacking Tools
  • Certified Information Systems Auditor (CISA) 2019: BCP & Network Security
  • Certified Information Systems Auditor (CISA) 2019: Continuous Monitoring
  • Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk
  • Certified Information Systems Auditor (CISA) 2019: Data Storage & Malware
  • Certified Information Systems Auditor (CISA) 2019: Digital Asset Protection
  • Certified Information Systems Auditor (CISA) 2019: Digital Evidence Gathering
  • Certified Information Systems Auditor (CISA) 2019: IAM & Data Classification
  • Certified Information Systems Auditor (CISA) 2019: Information System Auditing
  • Certified Information Systems Auditor (CISA) 2019: IT Management Frameworks
  • Certified Information Systems Auditor (CISA) 2019: Performance & Management
  • Certified Information Systems Auditor (CISA) 2019: PKI & Data Protection
  • Certified Information Systems Auditor (CISA) 2019: Scenario-Based Practice
  • Certified Information Systems Auditor (CISA) 2019: System Design & Analysis
  • Certified Information Systems Auditor (CISA) 2019: Testing & Vulnerability
  • Certified Information Systems Auditor (CISA) 2019: Virtualization & Cloud
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Abuse Cases & RTMs
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Architectural Risk Assessment, Secure
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Data Classification
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Governance, Risk, & Compliance
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Privacy
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Design Principles
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Lifecycle Management
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Software Testing
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Architecture
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Design Principles
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Requirements
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Vulnerabilities
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Software Deployment & Management
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Supply Chain & Software Acquisition
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Technologies
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Testing for Security & Quality Assura
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Testing Types
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Threat Modeling
  • Changes to CISSP 2015
  • Chatting and Conferencing
  • Chef for DevOps: Automate Infrastructure Using Chef Tools & Templates
  • Chef for DevOps: Managing Infrastructure Using Chef
  • Chef Server Basics
  • CI/CD Best Practices: Applying Automated Testing
  • CI/CD Implementation for DevOps
  • CI/CD Pipelines: Full Stack Developer CI/CD
  • CISA Domain: The Process of Auditing Information Systems - Part 1
  • CISA: Governance and Management of IT - Part 1
  • CISA: Governance and Management of IT - Part 2
  • CISA: Information Systems Acquisition, Development, and Implementation
  • CISA: Information Systems Operations, Maintenance, and Service Management
  • CISA: Protection of Information Assets - Part 1
  • CISA: Protection of Information Assets - Part 2
  • CISA: The Process of Auditing Information Systems - Part 1
  • CISA: The Process of Auditing Information Systems - Part 2
  • Cisco SWITCH 2.0: Trunking Using VTP
  • CISM: Information Risk Management Part 1
  • CISM: Information Risk Management Part 2
  • CISM: Information Security Governance Part 1
  • CISM: Information Security Governance Part 2
  • CISM: Information Security Incident Management Part 1
  • CISM: Information Security Incident Management Part 2
  • CISM: Information Security Program Development and Management Part 1
  • CISM: Information Security Program Development and Management Part 2
  • CISSP 2013 Domain: Cryptography
  • CISSP 2013 Domain: Operations Security
  • CISSP 2018 : Communication and Network Security
  • CISSP 2018: (ISC)² and Security Fundamentals
  • CISSP 2018: Conducting Incident Management
  • CISSP 2018: Cryptographic Client-based Systems
  • CISSP 2018: Identity and Access Management (IAM)
  • CISSP 2018: Security and Risk Management (Part 1)
  • CISSP 2018: Security and Risk Management (Part 2)
  • CISSP 2018: Security Architecture and Engineering (Part 1)
  • CISSP 2018: Security Architecture and Engineering (Part 2)
  • CISSP 2018: Security Assessment and Testing
  • CISSP 2018: Security Operations (Part 1)
  • CISSP 2018: Security Operations (Part 2)
  • CISSP 2018: Site and Facility Security Controls
  • CISSP 2018: Software Development Security
  • CISSP: Asset Security
  • CISSP: Communication & Network Security Design
  • CISSP: Identity and Access Management
  • CISSP: Risk Management
  • CISSP: Security Assessment and Testing
  • CISSP: Security Engineering Part 1
  • CISSP: Security Engineering Part 2
  • CISSP: Security Operations Part 1
  • CISSP: Security Operations Part 2
  • CISSP: Security Operations Part 3
  • CISSP: Security Principles, Governance, and Guidelines
  • CISSP: Software Development Security
  • Classes, Functions, and Object-oriented Programming
  • Classifying and Collecting Data
  • CLDFND: Block & File Storage Access
  • CLDFND: Block & File Storage Access
  • CLDFND: Cisco Application Centric Infrastructure
  • CLDFND: Cisco Application Centric Infrastructure
  • CLDFND: Cisco Cloud Virtualization
  • CLDFND: Cisco Cloud Virtualization
  • CLDFND: Cisco CloudCenter
  • CLDFND: Cisco CloudCenter
  • CLDFND: Cisco CloudCenter Components
  • CLDFND: Cisco CloudCenter Components
  • CLDFND: Cisco UCS
  • CLDFND: Cisco UCS
  • CLDFND: Cisco Unified Fabric
  • CLDFND: Cisco Unified Fabric
  • CLDFND: Cloud Characteristics
  • CLDFND: Cloud Characteristics
  • CLDFND: Cloud Service Models
  • CLDFND: Cloud Service Models
  • CLDFND: Community & Hybrid Cloud
  • CLDFND: Community & Hybrid Cloud
  • CLDFND: IaaS, PaaS, & SaaS
  • CLDFND: IaaS, PaaS, & SaaS
  • CLDFND: Integrated Infrastructure & Cisco InterCloud Fabric
  • CLDFND: Integrated Infrastructure & Cisco InterCloud Fabric
  • CLDFND: Public & Private Cloud Deployment Models
  • CLDFND: Public & Private Cloud Deployment Models
  • CLDFND: SAN, NAS, & Cisco Storage Network Devices
  • CLDFND: SAN, NAS, & Cisco Storage Network Devices
  • CLDFND: Server & Infrastructure Virtualization
  • CLDFND: Server & Infrastructure Virtualization
  • CLDFND: Software-Defined Networking
  • CLDFND: Software-Defined Networking
  • CLDFND: Storage Access Technologies
  • CLDFND: Storage Access Technologies
  • CLDFND: Storage Provisioning
  • CLDFND: Storage Provisioning
  • CLDFND: Virtual Application Containers
  • CLDFND: Virtual Application Containers
  • CLDFND: Virtual Networking Services
  • CLDFND: Virtual Networking Services
  • CLDFND: VLANs & VXLANs
  • CLDFND: VLANs & VXLANs
  • CLI Cloud Resource Management
  • Client Configuration
  • Client Connectivity and Administrator Roles in Office 365
  • Client-side Routing and Using HTTP
  • Clojure Data-Driven and Web Application Fundamentals
  • Clojure Fundamentals
  • Cloud Application Security
  • Cloud Blockchains: An Introduction to Blockchain on the Cloud
  • Cloud Blockchains: Building Apps on the Azure Blockchain Workbench
  • Cloud Blockchains: Multi-Organization Networks on Amazon Managed Blockchain
  • Cloud Blockchains: Single Organization Networks on Amazon Managed Blockchain
  • Cloud Computing for the Business User: Concepts and Moving to the Cloud
  • Cloud Computing Fundamentals: Cloud Security
  • Cloud Computing Fundamentals: Identity, Presence, and Privacy
  • Cloud Computing Fundamentals: Migrating to the Cloud
  • Cloud Computing Fundamentals: Overview
  • Cloud Computing Fundamentals: Storing and Managing Cloud Data
  • Cloud Computing Fundamentals: Virtualization and Data Centers
  • Cloud Computing Security: Cloud Management
  • Cloud Data Platform Solutions: SQL Databases
  • Cloud Data Science: Azure AI Gallery and Azure Machine Learning
  • Cloud Data Science: Consume Models and APIs Using Azure Machine Learning Studio
  • Cloud Data Science: Data Cleanup with Azure Machine Learning Studio
  • Cloud Data Science: Deploying Models with Azure Machine Learning Studio
  • Cloud Data Science: Importing and Exporting in Azure Machine Learning Studio
  • Cloud Data Science: Introduction to Azure Machine Learning
  • Cloud Data Science: Microsoft Cognitive Toolkit and Azure Machine Learning
  • Cloud Data Science: Optimize and Validate Models in Azure Machine Learning Studio
  • Cloud Data Science: SQL Server & Azure Machine Learning
  • Cloud Data Science: Summarize Data with Azure Machine Learning Studio
  • Cloud Data Science: Transforming Data in Azure Machine Learning Studio
  • Cloud Data Science: Using Algorithms in Azure Machine Learning Studio
  • Cloud Data Science: Virtual Machines & HDInsight
  • Cloud Data Security
  • Cloud Foundry Architecture
  • Cloud Foundry Command Line Interface
  • Cloud Foundry Overview
  • Cloud Identity Management
  • Cloud Security Administration: Introduction
  • Cloud Service – Legal and Compliance
  • Cloud Service – Operations Management
  • Cloud Services and Enterprise Mobility
  • Cloud Services: Cloud Computing Concepts
  • Cloud Solution Management & Testing
  • Cloud System Architecture – Concepts and Design
  • Cloud System Security - Platform and Infrastructure
  • Cloudera Manager and Hadoop Clusters
  • CloudOps with Azure DevOps Tools
  • CloudOps with Google Cloud Platform Tools
  • CloudOps with Infrastructure as Code
  • Cluster Analysis and Ensemble Learning
  • Clustering Techniques
  • Clustering with Kafka
  • Clustering with VMWare 6.5
  • COBIT 5 Principles and Implementation
  • Code Access Security and Cryptography in .NET
  • Collaboration in Exchange 2016
  • Columnstore Indexes
  • Common DFSS Methodologies, Design for X, and Robust Designs
  • Common Widgets and Animation
  • Communicating Effectively with Customers
  • Communicating with WebSockets and Utilizing Asynchronous Processing
  • Communication Skills
  • Communication, Changes, and Documentation
  • Communications and Security in Windows Server 2008
  • Community Cookbooks and Chef Server Patterns
  • Comparing Manual & Automated Testing
  • Compensation and Benefits: Managing Policies, Programs, and Activities
  • Compensation and Benefits: Organizational Responsibilities
  • Compensation and Benefits: Regulations, Strategies, and Needs Assessment
  • Complex Application Development with Backbone.js
  • Complex Data Types in Python: Shallow & Deep Copies in Python
  • Complex Data Types in Python: Working with Dictionaries & Sets in Python
  • Complex Data Types in Python: Working with Lists & Tuples in Python
  • Complex TestNG Integrations and Implementations
  • Complex Visualizations and Analytics
  • Compliance Issues and Strategies: Data Compliance
  • Components of a SQL Server 2016 Installation
  • Components of Domain-driven Design
  • Composing the UI Layout of an Application
  • Composing the UI Layout of an Application
  • Comprehensive JMeter Operations
  • CompTIA A+ 220-1001: Accessories and Mobile Device Synchronization
  • CompTIA A+ 220-1001: Basic Cable Types
  • CompTIA A+ 220-1001: Cloud Computing
  • CompTIA A+ 220-1001: Common Devices
  • CompTIA A+ 220-1001: Configuring a Wired/Wireless Network
  • CompTIA A+ 220-1001: Connectors
  • CompTIA A+ 220-1001: Custom PC configuration
  • CompTIA A+ 220-1001: Implementing Network Concepts
  • CompTIA A+ 220-1001: Installing Hardware and Display Components
  • CompTIA A+ 220-1001: Installing Hardware and Display Components
  • CompTIA A+ 220-1001: Laptops Features and Mobile Device Types
  • CompTIA A+ 220-1001: Laptops Features and Mobile Device Types
  • CompTIA A+ 220-1001: Mobile Device Network Connectivity and Application Support
  • CompTIA A+ 220-1001: Network Hosts
  • CompTIA A+ 220-1001: Network Types
  • CompTIA A+ 220-1001: Networking
  • CompTIA A+ 220-1001: Networking Tools
  • CompTIA A+ 220-1001: Power Supplies
  • CompTIA A+ 220-1001: Printers
  • CompTIA A+ 220-1001: Random Access Memory
  • CompTIA A+ 220-1001: Resolving Problems
  • CompTIA A+ 220-1001: SOHO Devices
  • CompTIA A+ 220-1001: Storage Solutions
  • CompTIA A+ 220-1001: TCP and UDP ports
  • CompTIA A+ 220-1001: Troubleshooting
  • CompTIA A+ 220-1001: Troubleshooting Printers
  • CompTIA A+ 220-1001: Virtualization
  • CompTIA A+ 220-1001: Wireless Networking Protocols
  • CompTIA A+ 220-1001: Working with Motherboards, CPUs, & Add-On Cards
  • CompTIA A+ 220-1001: Working with Peripheral Devices
  • CompTIA A+ 220-1002: Comparing Common Operating Systems
  • CompTIA A+ 220-1002: Critical Security Concepts
  • CompTIA A+ 220-1002: Microsoft Command Line Tools
  • CompTIA A+ 220-1002: Microsoft Operating System Installation & Upgrade
  • CompTIA A+ 220-1002: MS Operating System Administrative Tools
  • CompTIA A+ 220-1002: Operational Procedures Best Practices
  • CompTIA A+ 220-1002: Security Fundamentals
  • CompTIA A+ 220-1002: System Utilities
  • CompTIA A+ 220-1002: Windows Control Panel Utilities
  • CompTIA A+ 220-801 Expert Encore
  • CompTIA A+ 220-801: BIOS and Motherboards
  • CompTIA A+ 220-801: Laptops
  • CompTIA A+ 220-801: Network Cabling, IP Addressing, Ports, and Protocols
  • CompTIA A+ 220-801: Networking Technologies
  • CompTIA A+ 220-802 Expert Encore
  • CompTIA A+ 220-802: Mobile Devices
  • CompTIA A+ 220-802: System Troubleshooting
  • CompTIA A+ 220-901 Expert Encore
  • CompTIA A+ 220-901: Computer Hardware Troubleshooting
  • CompTIA A+ 220-901: Internet Connectivity
  • CompTIA A+ 220-901: Laptops
  • CompTIA A+ 220-901: Memory and Storage
  • CompTIA A+ 220-901: Mobile Devices
  • CompTIA A+ 220-901: Monitors and Output Devices
  • CompTIA A+ 220-901: Networking
  • CompTIA A+ 220-901: PC Components
  • CompTIA A+ 220-901: Printers
  • CompTIA A+ 220-901: Troubleshooting Networking Devices
  • CompTIA A+ 220-901: Troubleshooting Printers
  • CompTIA A+ 220-902 Expert Encore
  • CompTIA A+ 220-902: A Practical Approach to Troubleshooting
  • CompTIA A+ 220-902: Adding Hardware to Windows and Storage Options
  • CompTIA A+ 220-902: Common Troubleshooting and Security Practices
  • CompTIA A+ 220-902: Desktop Security
  • CompTIA A+ 220-902: Introduction to Mobile Operating Systems
  • CompTIA A+ 220-902: Introduction to Virtualization and Basic Security Concepts
  • CompTIA A+ 220-902: Introduction to Windows
  • CompTIA A+ 220-902: Mac OSX Features and an Introduction to Linux
  • CompTIA A+ 220-902: Mobile Troubleshooting
  • CompTIA A+ 220-902: Monitoring the Windows OS and an Introduction to Other OSs
  • CompTIA A+ 220-902: Networking with the Windows Operating System
  • CompTIA A+ 220-902: Operational Procedures
  • CompTIA A+ 220-902: Safety
  • CompTIA A+ 220-902: Shell and Terminal Commands for Linux or Mac OSX
  • CompTIA A+ 220-902: Various Features and Requirements of Microsoft OS
  • CompTIA A+ 220-902: Windows Applications and Features
  • CompTIA A+ 220-902: Windows Interaction and Personalization
  • CompTIA A+ 220-902: Windows Overview and Installation
  • CompTIA A+ 220-902: Windows Security Features and Management
  • CompTIA A+ 220-902: Windows Utilities and Management
  • CompTIA A+ Exam 220-901: BIOS and Startup
  • CompTIA A+ Exam 220-901: BIOS Motherboards
  • CompTIA A+ Exam 220-901: Broadband Routers
  • CompTIA A+ Exam 220-901: Connectors and Connections
  • CompTIA A+ Exam 220-901: CPUs
  • CompTIA A+ Exam 220-901: Different Computer Form Factors
  • CompTIA A+ Exam 220-901: Display Devices
  • CompTIA A+ Exam 220-901: Internet Connections
  • CompTIA A+ Exam 220-901: Introduction to Networking
  • CompTIA A+ Exam 220-901: Miscellaneous Tools and Connectors
  • CompTIA A+ Exam 220-901: Mobile Computing
  • CompTIA A+ Exam 220-901: Motherboards
  • CompTIA A+ Exam 220-901: Network Protocols and Cabling
  • CompTIA A+ Exam 220-901: Peripheral Devices
  • CompTIA A+ Exam 220-901: Portable Computer Hardware
  • CompTIA A+ Exam 220-901: Printer Maintenance
  • CompTIA A+ Exam 220-901: Printers
  • CompTIA A+ Exam 220-901: RAM
  • CompTIA A+ Exam 220-901: Storage Solutions
  • CompTIA A+ Exam 220-901: Troubleshooting Peripheral and Mobile Devices
  • CompTIA A+ Exam 220-901: Troubleshooting Printers
  • CompTIA A+ Exam 220-901: Wireless Networking
  • CompTIA A+ Exam 220-902: Non-desktop Technologies
  • CompTIA A+ Exam 220-902: Non-Windows Operating Systems
  • CompTIA A+ Exam 220-902: Troubleshooting
  • CompTIA A+ Exam 220-902: Using and Managing Windows
  • CompTIA A+ Exam 220-902: Windows Networking
  • CompTIA A+: Application Installation, Networking, & Tools
  • CompTIA A+: Software Troubleshooting
  • CompTIA CASP CAS-002: Advanced Network Design, Management, and Controls
  • CompTIA CASP CAS-002: Application Vulnerabilities and Security Controls
  • CompTIA CASP CAS-002: Cryptography and Enterprise Storage Concerns
  • CompTIA CASP CAS-002: Industry Influences, Risk Planning, Strategy, and Control
  • CompTIA CASP CAS-002: Integration of Computing, Communications, and Disciplines
  • CompTIA CASP CAS-002: Privacy Policies & Procedures and Incident Recovery
  • CompTIA CASP CAS-002: Research, Analysis and Assessment
  • CompTIA CASP CAS-002: Security Controls for Hosts
  • CompTIA CASP CAS-002: Technical Integration of Enterprise Components
  • CompTIA CASP+ CAS-003: Applying Research Methods for Trend and Impact Analysis
  • CompTIA CASP+ CAS-003: Business and Industry Influences and Risks
  • CompTIA CASP+ CAS-003: Conducting Security Assessments
  • CompTIA CASP+ CAS-003: Implementing Cryptographic Techniques
  • CompTIA CASP+ CAS-003: Implementing Incident Response and Recovery
  • CompTIA CASP+ CAS-003: Implementing Security Activities across the Technology Life Cycle
  • CompTIA CASP+ CAS-003: Integrating and Troubleshooting Advanced AAA Technologies
  • CompTIA CASP+ CAS-003: Integrating Cloud and Virtualization Technologies in the Enterprise
  • CompTIA CASP+ CAS-003: Integrating Controls for Mobile and Small Form Factor Devices
  • CompTIA CASP+ CAS-003: Integrating Hosts, Storage, and Applications in the Enterprise
  • CompTIA CASP+ CAS-003: Integrating Network and Security Components, Concepts, and Architectures
  • CompTIA CASP+ CAS-003: Integrating Security Controls for Host Devices
  • CompTIA CASP+ CAS-003: Interacting across Diverse Business Units
  • CompTIA CASP+ CAS-003: Organizational Security and Privacy Policies
  • CompTIA CASP+ CAS-003: Risk Metric Scenarios for Enterprise Security
  • CompTIA CASP+ CAS-003: Risk Mitigation Strategies and Controls
  • CompTIA CASP+ CAS-003: Secure Communication and Collaboration Solutions
  • CompTIA CASP+ CAS-003: Selecting Software Security Controls
  • CompTIA Cloud+ CV0-002: Disaster Recovery
  • CompTIA Cloud+ CV0-002: Performance Management
  • CompTIA Cloud+ CV0-002: Planning Cloud Compute Resources
  • CompTIA Cloud+ CV0-002: Planning Cloud Deployments
  • CompTIA Cloud+ CV0-002: Planning Cloud Migrations and Extensions
  • CompTIA Cloud+ CV0-002: Planning Cloud Networking
  • CompTIA Cloud+ CV0-002: Planning Cloud Storage Resources
  • CompTIA Cloud+ CV0-002: Security Configurations and Compliance Controls
  • CompTIA Cloud+ CV0-002: Security Technologies and Automation Techniques
  • CompTIA Cloud+ CV0-002: System Patching and Maintenance
  • CompTIA Cloud+ CV0-002: Troubleshooting Deployments
  • CompTIA Cybersecurity Analyst+ CS0-001: Investigate Security Incidents
  • CompTIA Cybersecurity Analyst+ CS0-001: Monitoring for Security Issues
  • CompTIA Cybersecurity Analyst+ CS0-001: Network Architecture and Reconnaissance
  • CompTIA Cybersecurity Analyst+ CS0-001: Reducing Vulnerabilities
  • CompTIA Cybersecurity Analyst+ CS0-001: Threat Identification
  • CompTIA Cybersecurity Analyst+ CS0-001: Threat Mitigation
  • CompTIA Linux+ 2014 Powered By LPI: LX0-103: Advanced GNU and Unix Commands
  • CompTIA Linux+ 2014 Powered By LPI: LX0-103: Devices and Filesystems
  • CompTIA Linux+ 2014 Powered By LPI: LX0-103: GNU and Unix Commands
  • CompTIA Linux+ 2014 Powered By LPI: LX0-103: Installation and Package Management
  • CompTIA Linux+ 2014 Powered By LPI: LX0-103: System Architecture
  • CompTIA Linux+ 2014 Powered By LPI: LX0-104 Essential System Services
  • CompTIA Linux+ 2014 Powered By LPI: LX0-104 Networking Fundamentals
  • CompTIA Linux+ 2014 Powered By LPI: LX0-104 Scripting and Administrative Tasks
  • CompTIA Linux+ 2014 Powered By LPI: LX0-104 Security, Data, and Accessibility
  • CompTIA Linux+ XK0-004: Backup & Restore
  • CompTIA Linux+ XK0-004: Boot Process & Kernel
  • CompTIA Linux+ XK0-004: Bourne-again Shell & Scripting
  • CompTIA Linux+ XK0-004: Disk Partitions & File Systems
  • CompTIA Linux+ XK0-004: File Access & Permissions
  • CompTIA Linux+ XK0-004: Git Version Control
  • CompTIA Linux+ XK0-004: Graphical User Interfaces
  • CompTIA Linux+ XK0-004: Installing & Managing Software
  • CompTIA Linux+ XK0-004: Installing CentOS
  • CompTIA Linux+ XK0-004: Installing Software from Source Code
  • CompTIA Linux+ XK0-004: Installing Ubuntu
  • CompTIA Linux+ XK0-004: Introduction to Linux & the Command Line
  • CompTIA Linux+ XK0-004: Locating & Manipulating Files
  • CompTIA Linux+ XK0-004: Logical Volumes & Filesystem Hierarchy
  • CompTIA Linux+ XK0-004: Managing & Configuring Hardware
  • CompTIA Linux+ XK0-004: Managing Services
  • CompTIA Linux+ XK0-004: Managing Users & Groups
  • CompTIA Linux+ XK0-004: Network Firewall & Traffic Filtering
  • CompTIA Linux+ XK0-004: Scheduling Tasks
  • CompTIA Linux+ XK0-004: Searching & Manipulating File Contents
  • CompTIA Linux+ XK0-004: Security Best Practices
  • CompTIA Linux+ XK0-004: SELinux & AppArmor
  • CompTIA Linux+ XK0-004: TCP/IP & Networking
  • CompTIA Linux+ XK0-004: Troubleshooting Network Connections
  • CompTIA Linux+ XK0-004: Troubleshooting Services
  • CompTIA Linux+ XK0-004: Using vi/vim to Edit Files
  • CompTIA Network+ N10-006 Expert Live with Encore
  • CompTIA Network+ N10-006: Industry Standards, Practices, and Network Theory
  • CompTIA Network+ N10-006: Network Architecture Part 1
  • CompTIA Network+ N10-006: Network Architecture Part 2
  • CompTIA Network+ N10-006: Network Operations Part 1
  • CompTIA Network+ N10-006: Network Operations Part 2
  • CompTIA Network+ N10-006: Network Security
  • CompTIA Network+ N10-006: Troubleshooting Part 1
  • CompTIA Network+ N10-006: Troubleshooting Part 2
  • CompTIA Network+ N10-007: Additional Network Services
  • CompTIA Network+ N10-007: Cloud Concepts, Network Services, & Cabling Solutions
  • CompTIA Network+ N10-007: Documentation and Diagrams & Business Continuity
  • CompTIA Network+ N10-007: Mitigation Techniques
  • CompTIA Network+ N10-007: Network Attacks & Device Hardening
  • CompTIA Network+ N10-007: Network Monitoring & Remote Access Methods
  • CompTIA Network+ N10-007: Network Storage, Virtualization, & WAN Technologies
  • CompTIA Network+ N10-007: Network Topologies & Technologies
  • CompTIA Network+ N10-007: Networking Devices
  • CompTIA Network+ N10-007: Policies and Best Practices
  • CompTIA Network+ N10-007: Ports and Protocols and the OSI Model
  • CompTIA Network+ N10-007: Routing, Switching, & IP Addressing
  • CompTIA Network+ N10-007: Security Devices, Wireless Security, & Access Control
  • CompTIA Network+ N10-007: Troubleshooting Common Network Service Issues
  • CompTIA Network+ N10-007: Troubleshooting Connectivity & Performance Issues
  • CompTIA Network+ N10-007: Troubleshooting Methodology & Tools
  • CompTIA PenTest+: Analyzing Tool and Script Output
  • CompTIA PenTest+: Application-Based vulnerabilities
  • CompTIA PenTest+: Information Gathering
  • CompTIA PenTest+: Local Host Vulnerabilities
  • CompTIA PenTest+: Network-Based Exploits
  • CompTIA PenTest+: Penetration Testing Tools
  • CompTIA PenTest+: Planning for an Engagement
  • CompTIA PenTest+: Post-Exploitation and Facilities Attacks
  • CompTIA PenTest+: Reporting and Communication
  • CompTIA PenTest+: Scoping an Engagement
  • CompTIA PenTest+: Social Engineering and Specialized System Attacks
  • CompTIA PenTest+: Vulnerability Identification
  • CompTIA Project+ (2009 Edition) Expert Live with Encore
  • CompTIA Project+ PK0-004 Expert Live with Encore
  • CompTIA Security+
  • CompTIA Security+ SY0-401: Cryptographic Methods and Public Key Infrastructures
  • CompTIA Security+ SY0-501 Expert Live with Encore
  • CompTIA Security+ SY0-501: Analyzing Output from Security Technologies
  • CompTIA Security+ SY0-501: Application and Service Attacks
  • CompTIA Security+ SY0-501: Business Impact Analysis and Risk Management
  • CompTIA Security+ SY0-501: Cloud, Virtualization, and Resiliency Concepts
  • CompTIA Security+ SY0-501: Common Account Management Practices
  • CompTIA Security+ SY0-501: Components Supporting Organizational Security
  • CompTIA Security+ SY0-501: Cryptographic and Wireless Attacks
  • CompTIA Security+ SY0-501: Cryptography
  • CompTIA Security+ SY0-501: Deploying Mobile Devices Securely
  • CompTIA Security+ SY0-501: Frameworks, Guidelines, and Physical Security
  • CompTIA Security+ SY0-501: Identity and Access Management Controls
  • CompTIA Security+ SY0-501: Identity Concepts and Access Services
  • CompTIA Security+ SY0-501: Impacts from Vulnerability Types
  • CompTIA Security+ SY0-501: Implement Secure Network Architecture Concepts
  • CompTIA Security+ SY0-501: Implementing Secure Protocols
  • CompTIA Security+ SY0-501: Incident Response, Forensics, and Disaster Recovery
  • CompTIA Security+ SY0-501: Penetration Testing and Vulnerability Scanning
  • CompTIA Security+ SY0-501: Policies, Plans, and Procedures
  • CompTIA Security+ SY0-501: Public Key Infrastructure
  • CompTIA Security+ SY0-501: Secure System and Application Design and Deployment
  • CompTIA Security+ SY0-501: Security Assessment Using Software Tools
  • CompTIA Security+ SY0-501: Social Engineering and Related Attacks
  • CompTIA Security+ SY0-501: The Present Threat Landscape
  • CompTIA Security+ SY0-501: Troubleshooting Common Security Issues
  • CompTIA Security+ SY0-501: Types of Malware
  • CompTIA Security+ SY0-501: Wireless Security Settings
  • CompTIA Server+ SK0-004: Networking and Disaster Recovery
  • CompTIA Server+ SK0-004: Security
  • CompTIA Server+ SK0-004: Server Administration I
  • CompTIA Server+ SK0-004: Server Administration II
  • CompTIA Server+ SK0-004: Server Architecture
  • CompTIA Server+ SK0-004: Storage
  • CompTIA Server+ SK0-004: Troubleshooting I
  • CompTIA Server+ SK0-004: Troubleshooting II
  • Conditional Statements & Loops: Advanced Operations Using for Loops in Python
  • Conditional Statements & Loops: If-else Control Structures in Python
  • Conditional Statements & Loops: The Basics of for Loops in Python
  • Conditional Statements & Loops: While Loops in Python
  • Configuration and Troubleshooting in RabbitMQ
  • Configure and Administer vRealize Business Standards and Application Services
  • Configure and Manage Users and Groups in vRealize Automation
  • Configure File and Print Services in Windows Server 2008
  • Configure IP Addressing and Windows Services in Windows Server 2008
  • Configure Network Access in Windows Server 2008
  • Configure Terminal Services in Windows 2008
  • Configure, Manage, and Maintain IP Services in Windows Server 2008
  • Configuring Advanced Windows Server 2012 R2 Services Expert Live with Encore
  • Configuring Advanced Windows Server 2012 Services Expert Encore
  • Configuring and Deploying an ASP.NET MVC Application
  • Configuring and Deploying ASP.NET Web Applications
  • Configuring Azure VM Networking
  • Configuring Citrix XenDesktop 7.6 Components
  • Configuring DNS in Windows Server 2008
  • Configuring Enterprise Voice
  • Configuring Forms with Knockout
  • Configuring Microsoft SharePoint 2010 Expert Encore
  • Configuring Microsoft Windows 10 Expert Live with Encore
  • Configuring Microsoft Windows 8.1 Expert Live with Encore
  • Configuring MVC Controllers and Actions
  • Configuring MVC Controllers and Actions
  • Configuring Network Application Services in Windows Server 2008
  • Configuring Network Services
  • Configuring OpenStack
  • Configuring Puppet Environments and Managing Files
  • Configuring the Puppet Master and Puppet Agent
  • Configuring Tomcat and PHP
  • Configuring Web Service Protocols in Windows Server 2008
  • Configuring Web Services and Security in Windows Server 2008
  • Configuring Windows 10 Devices: Authentication
  • Configuring Windows 10 Devices: Bitlocker, Recovery, and Maintenance
  • Configuring Windows 10 Devices: Data Protection
  • Configuring Windows 10 Devices: Deployment Tools and Procedures
  • Configuring Windows 10 Devices: Devices and Disks
  • Configuring Windows 10 Devices: Installing and Managing Applications
  • Configuring Windows 10 Devices: Introduction to Deployment
  • Configuring Windows 10 Devices: Introduction to Windows 10
  • Configuring Windows 10 Devices: Maintaining Windows 10
  • Configuring Windows 10 Devices: Managing Devices
  • Configuring Windows 10 Devices: Networking
  • Configuring Windows 10 Devices: Remote Connections
  • Configuring Windows 10 Devices: Secure Identities
  • Configuring Windows 10 Devices: Start Menu, Personalization, and Multitasking
  • Configuring Windows 10 Devices: Threat Resistance and UAC
  • Configuring Windows 10 Devices: Threat Resistance Technologies
  • Configuring Windows 10 Devices: Universal Windows Apps
  • Configuring Windows 10 Devices: User Data
  • Configuring Windows 10 Devices: Virtualization Technologies
  • Configuring Windows Server 2008 Availability
  • Configuring Windows Server Hyper-V and Virtual Machines
  • Conflict, Stress, and Time Management
  • Connection Managers and Data Sources
  • Connectivity and Space Management in Oracle Database 12c
  • Constraint Satisfaction Problems
  • Consuming Services, using the ASP.NET Pipeline, and using OData Services
  • Container, Compute, and App Engine with Networking Services
  • Continued Dataproc Operations
  • Continuous Integration and Deployment with Team Foundation Server
  • Control the Project Schedule (PMBOK® Guide Sixth Edition)
  • Controllers and Directives
  • Controlling Conflict, Stress, and Time in a Customer Service Environment
  • Controlling Project Work and Closing
  • ConvNets: Introduction to Convolutional Neural Networks
  • ConvNets: Working with Convolutional Neural Networks
  • Convolutional and Recurrent Neural Networks
  • Core Commerce and the Product Catalog
  • Core Concepts of a Service-oriented Architecture
  • Core PMI® Values and Ethical Standards
  • Core Services on AWS
  • Core Solutions of Microsoft Exchange Server 2013 Expert Live with Encore
  • Core Solutions of Microsoft SharePoint Server 2013 Expert Live with Encore
  • Correlation & Regression
  • Cosmos DB and Azure Search
  • Create and Administer Cloud Networking
  • Create Spark Streaming Applications
  • Create Work Breakdown Structure (PMBOK® Guide Fifth Edition)
  • Create Work Breakdown Structure (PMBOK® Guide Sixth Edition)
  • Creating a Basic Angular Application
  • Creating a LAMP Stack
  • Creating a Project Budget (PMBOK® Guide Sixth Edition)
  • Creating a Project Schedule and Budget
  • Creating a Virtual Reality App with Unity
  • Creating and Configuring Virtual Machines in VMware Workstation 11
  • Creating and Consuming WCF Web Services
  • Creating and Consuming Web API Services
  • Creating and Maintaining Forms
  • Creating and Managing Unix File Systems
  • Creating and Securing MVC 5 Applications
  • Creating and Simulating a Working Prototype
  • Creating and Using Control Charts in Six Sigma
  • Creating and Working with PDFs in Adobe Acrobat 8
  • Creating Application Builds
  • Creating Apps
  • Creating Data APIs Using Node.js
  • Creating Mobile Apps with Appcelerator Titanium
  • Creating Secure C/C++ Code
  • Creating Software Tests
  • Creating Styles with CSS3 and Styling Text
  • Creating Virtual Machines (VMs) and Workloads
  • Cross-Platform Shared Code and Xamarin.Forms in Visual Studio
  • Cryptography Fundamentals: Applying Cryptography
  • Cryptography Fundamentals: Defining Cryptography
  • Cryptography: Introduction to Cryptography Services
  • Cryptography: Introduction to PKI
  • CS0-002 - CompTIA Cybersecurity Analyst+: Attack Types
  • CS0-002 - CompTIA Cybersecurity Analyst+: Business Continuity
  • CS0-002 - CompTIA Cybersecurity Analyst+: Cloud Computing
  • CS0-002 - CompTIA Cybersecurity Analyst+: Data Privacy
  • CS0-002 - CompTIA Cybersecurity Analyst+: Digital Forensics
  • CS0-002 - CompTIA Cybersecurity Analyst+: Encryption & Hashing
  • CS0-002 - CompTIA Cybersecurity Analyst+: Hardware & Security
  • CS0-002 - CompTIA Cybersecurity Analyst+: Intrusion Detection & Traffic Analysis
  • CS0-002 - CompTIA Cybersecurity Analyst+: IT Security Risk Mitigation
  • CS0-002 - CompTIA Cybersecurity Analyst+: Malware Threats
  • CS0-002 - CompTIA Cybersecurity Analyst+: Network Infrastructure Security
  • CS0-002 - CompTIA Cybersecurity Analyst+: Network Scanning & Traffic Analysis
  • CS0-002 - CompTIA Cybersecurity Analyst+: Software Development Security
  • CS0-002 - CompTIA Cybersecurity Analyst+: Threat Intelligence
  • CS0-002 - CompTIA Cybersecurity Analyst+: Threat Monitoring
  • CS0-002 - CompTIA Cybersecurity Analyst+: User Account Security
  • CSSLP: Secure Software Concepts
  • CSSLP: Secure Software Design
  • CSSLP: Secure Software Implementation and Coding
  • CSSLP: Secure Software Requirements
  • CSSLP: Secure Software Testing
  • CSSLP: Software Acceptance, Deployment, Operations, Maintenance, and Disposal
  • CSSLP: Supply Chain and Software Acquisition
  • Cucumber Steps and Scenario Development
  • Customer Interactions
  • Customer Service Automation in Microsoft Dynamics CRM 2013
  • Customer Service Processes and Procedures
  • Customized Mapping and Basic Querying in Java Hibernate
  • Cyber Security Audits
  • Cybersecurity 101: Auditing & Incident Response
  • Cybersecurity 101: Session & Risk Management
  • Cycle Time Reduction and Kaizen in Six Sigma
  • Data Access & Governance Policies: Data Access Oversight and IAM
  • Data Access & Governance Policies: Data Classification, Encryption, and Monitoring
  • Data Access and Binding in Apps
  • Data Access and Services with Microsoft Azure
  • Data Analysis and Root Cause Analysis in Six Sigma
  • Data Analysis Application
  • Data Analysis Concepts
  • Data Analysis Using Spark SQL and Hive
  • Data Analytics using Power BI: Concepts
  • Data Analytics Using Power BI: Data Modeling and Visualization
  • Data Analytics Using Power BI: Data Sourcing and Preparation
  • Data and Analytics Technologies at Work
  • Data and State Management in Clojure
  • Data Architecture - Deep Dive: Design & Implementation
  • Data Architecture - Deep Dive: Microservices & Serverless Computing
  • Data Architecture Primer
  • Data Classification and Machine Learning
  • Data Classification, Sampling, and Collection in Six Sigma
  • Data Collection & Exploration
  • Data Communication and Visualization
  • Data Engineering Fundamentals
  • Data Exploration
  • Data Factory with Hive
  • Data Factory with Oozie and Hue
  • Data Factory with Pig
  • Data Filtering
  • Data Flow for the Hadoop Ecosystem
  • Data Flow Implementation
  • Data Flow, Consuming, and Transmitting Data
  • Data Gathering
  • Data Infrastructure: Databases in FSD Development
  • Data Integration
  • Data Lake: Architectures & Data Management Principles
  • Data Lake: Framework & Design Implementation
  • Data Load Options
  • Data Management and Device Security
  • Data Mining, Data Distributions, & Hypothesis Testing
  • Data Models and JSP
  • Data Preprocessing
  • Data Quality Projects
  • Data Quality Services (DQS) and Master Data Services (MDS)
  • Data Reduction & Exploratory Data Analysis (EDA)
  • Data Refinery with YARN and MapReduce
  • Data Repository with Flume
  • Data Repository with HDFS and HBase
  • Data Repository with Sqoop
  • Data Rollbacks: Transaction Management & Rollbacks in NoSQL
  • Data Rollbacks: Transaction Rollbacks & Their Impact
  • Data Science 10: Data Research Exploration Techniques
  • Data Science 2: Data Driven Organizations
  • Data Science 9: Data Research Techniques
  • Data Science Overview
  • Data Science Statistics: Applied Inferential Statistics
  • Data Science Statistics: Common Approaches to Sampling Data
  • Data Science Statistics: Inferential Statistics
  • Data Science Statistics: Simple Descriptive Statistics
  • Data Science Statistics: Using Python to Compute & Visualize Statistics
  • Data Scientist 14: Data Research Statistical Approaches
  • Data Security Breach Notification Process
  • Data Silos, Lakes, & Streams: Introduction
  • Data Silos, Lakes, & Streams: Sources, Visualizations, & ETL Operations
  • Data Silos, Lakes, and Streams: Data Lakes on AWS
  • Data Sources: Implementing Edge on the Cloud
  • Data Sources: Integration
  • Data Structures & Algorithms in Python: Fundamental Data Structures
  • Data Structures & Algorithms in Python: Implementing Data Structures
  • Data Structures & Algorithms in Python: Implementing Sorting Algorithms
  • Data Structures & Algorithms in Python: Implementing Trees & Graphs
  • Data Structures & Algorithms in Python: Sorting Algorithms
  • Data Structures & Algorithms in Python: Trees & Graphs
  • Data Structures and File Management in ANSI C
  • Data Tools: Machine Learning & Deep Learning in the Cloud
  • Data Tools: Technology Landscape & Tools for Data Management
  • Data Transformation
  • Data Types, Modifiers, Operators, and Flow Control
  • Data Types, Sampling, Collection, and Measurement in Six Sigma
  • Data Visualization and Predictive Analytics
  • Data Visualization: Essentials
  • Data Warehouse Essential: Architecure Frameworks and Implementation
  • Data Warehouse Essential: Concepts
  • Data Warehousing
  • Data Warehousing with Azure: Analytics and Reporting
  • Data Warehousing with Azure: Architecture & Modeling Techniques
  • Data Warehousing with Azure: Data Lake Implementation Using Azure
  • Data Warehousing with Azure: Implementing Azure SQL Data Warehouse
  • Data Warehousing with Azure: Managing Azure Data Lake
  • Data Warehousing with Azure: Working with SQL Data Warehouse Objects
  • Data Warehousing with Hadoop: HDInsight and Retail Sales Implementation Using Hive
  • Data Warehousing with Hadoop: Managing Big Data Using HDInsight Hadoop
  • Data Warehousing with Hadoop: Microsoft Analytics Platform System and Hive
  • Data Warehousing with Hadoop: Spark, HDInsight and Cluster Management
  • Data Wrangler 4: Cleaning Data in R
  • Data Wrangling in R
  • Data Wrangling with Pandas: Advanced Features
  • Data Wrangling with Pandas: Visualizations and Time-Series Data
  • Data Wrangling with Pandas: Working with Series & DataFrames
  • Data, Workflows, and Charting in F#
  • Database Instances
  • Database Maintenance and Performance Tuning in Oracle Database 12c
  • Database Programmability Objects and Non-Relational Data
  • Database Systems and Relational Databases
  • Databases and Advanced Features with the Zend 2 Framework
  • Datacenter Virtualization with vSphere 5: Design and Optimization Expert Live with Encore
  • Dataflow Autoscaling Pipelines
  • Dataproc Architecture
  • Dealing with Customer Service Incidents and Complaints
  • Debugging ASP.NET MVC Web Applications
  • Debugging ASP.NET MVC Web Applications
  • Debugging in R
  • Debugging Tools
  • Decision Making for Software Project Managers
  • Decision Tree and Classification Analysis
  • Decoding TestNG in Detail
  • Deep Dive Cucumber
  • Deep Diving with Hibernate and Queries
  • Deep Learning with Keras
  • Deeper through GCP Analytics and Scaling
  • Defensive Coding for C#
  • Defensive Coding for C/C++
  • Defensive Coding for JavaScript and HTML5
  • Defensive Coding Fundamentals for C#
  • Defensive Coding Fundamentals for C/C++
  • Defensive Coding Fundamentals for JavaScript and HTML5
  • Defensive Programmer: Advanced Concepts
  • Defensive Programmer: Code Samples
  • Defensive Programmer: Cryptography
  • Defensive Programmer: Defensive Concepts
  • Defensive Programmer: Defensive Techniques
  • Defensive Programmer: Secure Testing
  • Defensive Programming in Android: Errors, Exceptions, and Testing
  • Defensive Programming in Android: Input and Methods
  • Defensive Programming in Android: Network Access and Java Defensive Techniques
  • Defensive Programming in Android: Using Standards
  • Defensive Programming in Java: Data Handling, Injection Attacks, and Concurrency
  • Defensive Programming in Java: Data Security and Access Control
  • Defensive Programming in Java: Fundamentals
  • Defensive Programming, MVC, and DDD
  • Define and Sequence Activities (PMBOK® Guide Fifth Edition)
  • Define and Sequence Activities (PMBOK® Guide Sixth Edition)
  • Define End Value for Software Iterations
  • Define the ALM Process
  • Defining a Project Scope and Team
  • Defining Effective End-to-end SDLC Practices
  • Deploy and Install Virtual Machine Manager
  • Deploy and Manage Orchestrator
  • Deploy and Manage Service Management Automation
  • Deploying and Using Jasmine
  • Deploying Applications and Software Updates
  • Deploying Applications to Microsoft Azure SQL Databases
  • Deploying Data Tools: Data Science Tools
  • Deploying FSD Projects: Deployment Overview
  • Deploying Hadoop Clusters
  • Deploying Service Manager
  • Deploying Windows Server 2008 Servers
  • Deploying Your Microservice in Containers
  • Deployment and Delivery on AWS
  • DESGN 3.0: Branch Network Design
  • DESGN 3.0: Campus Design
  • DESGN 3.0: Campus Design Part 2
  • DESGN 3.0: Design Hierarchy
  • DESGN 3.0: Design Lifecycle
  • DESGN 3.0: Design Methodology
  • DESGN 3.0: Design Modularity
  • DESGN 3.0: Design Resiliency
  • DESGN 3.0: Design Scalability
  • DESGN 3.0: Enterprise Architecture
  • DESGN 3.0: Enterprise Network WAN and Edge
  • DESGN 3.0: Fault Domain Design
  • DESGN 3.0: IGP Expansion
  • DESGN 3.0: Implementing Network Design
  • DESGN 3.0: Network Programmability and Data Center Component Design
  • DESGN 3.0: Networking Information Gathering and Auditing
  • DESGN 3.0: OSPF and BGP Expansion
  • DESGN 3.0: Routing Protocol Scalability
  • DESGN 3.0: Scalable Addressing and IP Addressing Schemes
  • DESGN 3.0: Security Control Considerations
  • DESGN 3.0: Virtualization in Network Design
  • DESGN 3.0: Voice and Video Design Considerations
  • DESGN 3.0: Wireless LAN Design
  • DESGN 3.0: Wireless LAN Requirements
  • Design a Distributed ASP.NET MVC Application
  • Design and Implement UI Behavior
  • Design and Implement UI Behavior
  • Design and Secure Remote Access and Multiple Namespaces Solutions
  • Design for Six Sigma and FMEA
  • Design of Experiments in Six Sigma
  • Design Pattern Classification and Architectural Patterns
  • Design Patterns in JavaScript: Constructor, Factory, & Abstract Factory Creational Patterns
  • Design Patterns in JavaScript: Flyweight, Adapter, Composite, & Proxy Structural Patterns
  • Design Patterns in JavaScript: Getting Started
  • Design Patterns in JavaScript: Mediator, State, & Command Behavioral Patterns
  • Design Patterns in JavaScript: Module, Revealing Module, Façade, Decorator, & Mixin Structural Patt
  • Design Patterns in JavaScript: Observer & Iterator Behavioral Patterns
  • Design Patterns in JavaScript: Singleton, Prototype, & Builder Creational Patterns
  • Design Thinking for Innovation: Brainstorming and Ideation
  • Design Thinking for Innovation: Defining Opportunities
  • Design Thinking for Innovation: Prototyping and Testing
  • Design Thinking for Innovation: Stakeholder Engagement
  • Design Thinking Process
  • Designing a Customer Service Strategy
  • Designing a Fact Table
  • Designing and Deploying Microsoft Exchange Server 2016 Expert Live with Encore
  • Designing and Implementing a Server 2012 R2 Infrastructure Expert Live with Encore
  • Designing and Implementing Azure Apps
  • Designing and Implementing Dimensions
  • Designing ASP.NET MVC Application Architecture
  • Designing ASP.NET MVC Application Architecture
  • Designing Batch Processing and Data Security
  • Designing Control Flow
  • Designing Data Flow
  • Designing Data Security and High Availability in Microsoft Windows Server 2008
  • Designing Hadoop Clusters
  • Designing the Active Directory Infrastructure in Microsoft Windows Server 2008
  • Designing the Lambda Architecture and Real-time Processing
  • Designing the Microservices Architecture
  • Designing the User Experience in ASP.NET MVC Web Applications
  • Designing Web Apps
  • Designing with Flexibility and Efficiency in Mind
  • Designing, Conducting, and Analyzing Experiments in Six Sigma
  • Designing, Creating, and Manipulating Android Databases
  • Determining Process Performance and Capability in Six Sigma
  • Determining Requirements by Listening to the Voice of the Customer in Six Sigma
  • DEVASC: API Usage & Authentication
  • DEVASC: Application Infrastructure, Deployment, Security, & CI/CD
  • DEVASC: Code Organization, Design Patterns, & Version Control
  • DEVASC: Coding, Testing, & Managing Cisco Devices
  • DEVASC: Configuring Devices with Bash, Python, & Ansible
  • DEVASC: Development Methodologies & Software Quality
  • DEVASC: DevNet Overview & Setting up Tools in Linux
  • DEVASC: DevOps, Docker, Bash, & Unit Testing Basics
  • DEVASC: HTTP, APIs, & Webhooks
  • DEVASC: IP Services & Operational Planes
  • DEVASC: IPv4 Addressing, Binary Conversion, & Subnetting
  • DEVASC: Network & Network Communication Basics
  • DEVASC: Network Components, Connectivity, & Troubleshooting
  • DEVASC: Network, Collaboration, Security, & Compute Capabilities
  • DEVASC: Python Scripting & Managing WebEx Resources
  • DEVASC: Setting up Development & Virtualization Tools in Windows
  • DEVASC: Software Development Methodologies
  • DEVASC: Working with Data Formats
  • DEVASC: Working with Git
  • Develop and Manage Resources (PMBOK® Guide Sixth Edition)
  • Develop Customer Quality with High Value
  • Develop Real-time Processing Solutions with Apache Storm
  • Develop the Project Schedule (PMBOK® Guide Sixth Edition)
  • Developing a Successful Team
  • Developing Advanced Apple Watch Applications
  • Developing AI and ML Solutions with Java: AI Fundamentals
  • Developing AI and ML Solutions with Java: Expert Systems and Reinforcement Learning
  • Developing AI and ML Solutions with Java: Machine Learning Implementation
  • Developing AI and ML Solutions with Java: Neural Network and Neuroph Framework
  • Developing AI and ML Solutions with Java: Neural Network and NLP Implementation
  • Developing and Deploying Web Applications with MEAN.js
  • Developing and Implementing IoT Solutions: Arduino Language
  • Developing and Implementing IoT Solutions: Azure IoT Hub
  • Developing and Implementing IoT Solutions: Cloud Implementation Using Azure IoT
  • Developing and Implementing IoT Solutions: MicroPython and Security
  • Developing and Implementing IoT Solutions: MicroPython Board
  • Developing and Implementing IoT Solutions: Principles of IoT and Python Basics
  • Developing and Implementing IoT Solutions: Raspi-config and GPIO
  • Developing and Implementing IoT Solutions: Using Raspberry Pi and OpenCV
  • Developing Android Applications: Activities, Connectivity, and Services
  • Developing Android Applications: App Layout
  • Developing Android Applications: App Structure and Formatting
  • Developing Android Applications: Creating an App with Java
  • Developing Android Applications: Debugging and Testing
  • Developing Android Applications: Defensive Programming and Security
  • Developing Android Applications: Introduction
  • Developing ASP.NET Core 1.0 and MVC Applications
  • Developing Azure & Web Services: WCF Transactions & Services
  • Developing Azure and Web Services: API Management and Monitoring
  • Developing Azure and Web Services: Advanced Deployment
  • Developing Azure and Web Services: Azure Scalability
  • Developing Azure and Web Services: Azure Services
  • Developing Azure and Web Services: Azure Storage
  • Developing Azure and Web Services: Configuring Web Applications for Deployment
  • Developing Azure and Web Services: Consuming Services
  • Developing Azure and Web Services: Deployment Strategy
  • Developing Azure and Web Services: Diagnostics, Debugging, and ACS
  • Developing Azure and Web Services: Entity Framework
  • Developing Azure and Web Services: Hosting Web APIs
  • Developing Azure and Web Services: IIS & Web Services
  • Developing Azure and Web Services: Introduction
  • Developing Azure and Web Services: Managing Data
  • Developing Azure and Web Services: Messaging, Security, and Troubleshooting
  • Developing Azure and Web Services: Web API Services
  • Developing Azure and Web Services: Working with Assemblies
  • Developing Basic Apple Watch Applications
  • Developing SQL Databases Expert Live with Encore
  • Developing the User Experience in ASP.NET MVC
  • Developing Windows and Web Applications
  • Developing with Blockchain
  • Device Configuration and Data Access
  • DevOps & AWS: CloudOps Implementation
  • DevOps Agile Development: Agile Processes for DevOps
  • DevOps Agile Development: DevOps Methodologies for Developers
  • DevOps Automation Across Platforms: CloudOps for Multi-cloud Deployments
  • DevOps Automation Across Platforms: Working with Multi-cloud Tools
  • DevOps Automation: Configuration Management
  • DevOps Automation: Delivery Mechanisms
  • DevOps Cloud Automation: Advanced AWS Pipelines and DevOps Using Azure
  • DevOps Cloud Automation: AWS DevOps Tools
  • DevOps Cloud Automation: DevOps with Google Cloud Platform
  • DevOps Collaboration Tools: Tools for Continuous Delivery
  • DevOps Collaboration Tools: Tools for Continuous Integration
  • DevOps Continuous Feedback: Implementing Continuous Feedback
  • DevOps Continuous Feedback: Loop Tools
  • DevOps Continuous Testing: Testing Approaches
  • DevOps Continuous Testing: Testing Methodologies
  • DevOps for Data Scientists: Containers for Data Science
  • DevOps for Data Scientists: Data DevOps Concepts
  • DevOps for Data Scientists: Data Science DevOps
  • DevOps for Data Scientists: Deploying Data DevOps
  • DevOps Fundamentals: Tools, Technologies, and Infrastructures
  • DevOps Management and Capabilities
  • DevOps Methodologies and Development
  • DevOps Mindset: DevOps Implementation Using Tools
  • DevOps Mindset: DevOps Principles & Implementation Approach
  • DevOps Security Considerations: DevSecOps Principles
  • DevOps Security Considerations: Securing DevOps Pipeline
  • DevOps Smart Failure: Fail Fast & DevOps
  • DevOps Testing and Delivery
  • DevOps to CloudOps for Multi-cloud
  • DevOps Tools: Selecting the Right Tools
  • DevOps with Ansible: Introduction to Playbooks and Testing
  • DevOps with Ansible: Overview
  • DevOps with Ansible: Working with Ansible Features
  • DevOps with Docker: Container Management
  • DevOps with Docker: Implementing DevOps Using Docker
  • DevOps with Docker: Management in the Cloud
  • DevOps with Saltstack: Configuration and Components
  • DevOps with Saltstack: Overview
  • DevOps with Saltstack: Remote Execution & State System
  • Digital Forensic Techniques & Investigative Approaches
  • Diving into the World of Spotfire
  • DNS Zones and Replication in Windows Server 2008
  • Docker & Multi-cloud: Managing Multi-cloud with Docker
  • Docker & Multi-cloud: Multi-host, Multi-cloud Management with Docker Enterprise
  • Docker and Windows
  • Docker Configuration and Management
  • Docker Containers, Images, and Swarms
  • Docker for Java Microservices: Containerize Microservices
  • Docker for Java Microservices: Managing Microservices on Docker Using Compose
  • Docker for Java Microservices: Scaling Up and Managing Microservices
  • Docker for Java Microservices: Working with Docker Components
  • Docker Installation and Management
  • Docker Introduction
  • Docker Programmatic Access
  • Documentation and Criteria Used for Business Analysis
  • Domain-Specific Tools in R
  • Drawing in Adobe Illustrator CC 2015
  • Drawing with Adobe Flash Professional CC 2015
  • Drupal 8 First Look
  • EAI Paterns: Fundamentals and Environment Setup
  • EAI Paterns: Language and Transformation Patterns
  • EAI Paterns: Message Routing Pattern Implementation
  • EAI Patterns: Overview of Apache Camel
  • Ecosystem for Hadoop
  • Edge.js, Node.js, and ASP.NET MVC
  • Effective Team Communication
  • Effective Team Communication
  • Elasticsearch Data Management
  • Elements of a Cohesive Team
  • ELK Operations on the Cloud
  • Employee and Labor Relations: Behavioral and Disciplinary Issues and Resolution
  • Employee and Labor Relations: Employment Regulations and Organizational Programs
  • Employee and Labor Relations: Unions and Collective Bargaining
  • Enabling Office 365 Service: Telemetry
  • Enabling Office 365 Services: Collaboration Solutions
  • Enabling Office 365 Services: Configuring and Managing Skype for Business Online
  • Enabling Office 365 Services: Exchange Online Addresses, Mailboxes, Archiving
  • Enabling Office 365 Services: Exchange Online Policy, Migration, and Compliance
  • Enabling Office 365 Services: Managing Client User-driven and IT Deployments
  • Enabling Office 365 Services: SharePoint Online Sharing & Site Collections
  • ENCOR: LISP & VXLAN
  • ENCOR: Overview, Enterprise Network Design, & High Availability
  • ENCOR: QoS & Cisco Express Forwarding
  • Encore Session 1: Active Directory Design and Implementation
  • Encore Session 1: Active Directory Domain Controllers, Accounts, and Permissions
  • Encore Session 1: Computer Network Fundementals
  • Encore Session 1: Configure and Manage High Availability
  • Encore Session 1: Configuring Advanced Services
  • Encore Session 1: Deploy, Manage, and Maintain Servers
  • Encore Session 1: Designing a Farm Topology
  • Encore Session 1: Encryption, Data Access, Permissions, and Auditing
  • Encore Session 1: Exchange Server 2013 SP1 Solution Planning and Implementation
  • Encore Session 1: Initiating a Project
  • Encore Session 1: Initiating a Project
  • Encore Session 1: Inside a Computer
  • Encore Session 1: Install and Configure vCSA and Upgrading vSphere 4 to vSphere 5
  • Encore Session 1: Install and Configure Windows Server 2012 Servers
  • Encore Session 1: Install, Manage, and Use Windows 10
  • Encore Session 1: Installing and Configuring Microsoft SharePoint 2010
  • Encore Session 1: Installing SQL Server Instances and Creating Databases
  • Encore Session 1: Installing, Upgrading, Migrating to Windows 8.1
  • Encore Session 1: Introduction to Clustering and HA
  • Encore Session 1: Introduction to JavaScript
  • Encore Session 1: Introduction to Virtualization and VMware’s ESXi
  • Encore Session 1: IPv4/IPv6 Address and DHCP Management
  • Encore Session 1: Managing a Server Infrastructure
  • Encore Session 1: Plan, Deploy, Manage, and Troubleshoot Mailbox Databases
  • Encore Session 1: Planning and Installing SCCM
  • Encore Session 1: Planning, Configuring, and Managing Site Resilience
  • Encore Session 1: Planning, Install, or Upgrade to SharePoint 2016
  • Encore Session 1: Server Roles and Remote Management
  • Encore Session 1: SharePoint Components and Design
  • Encore Session 1: SQL Server 2016 Database Objects, Indexes, and Views
  • Encore Session 1: The Datacenter and SCVMM
  • Encore Session 1: Threats and Attacks
  • Encore Session 1: Under the Hood - Motherboards & Components
  • Encore Session 1: Understanding Network Security
  • Encore Session 1: Understanding SharePoint 2013 as a Business User
  • Encore Session 1: Understanding Windows
  • Encore Session 1: Upgrading to SharePoint Server 2013
  • Encore Session 1: Upgrading, Managing, and Monitoring
  • Encore Session 1: Windows PowerShell Foundations
  • Encore Session 1: Windows XP
  • Encore Session 2: Active Directory Object Management
  • Encore Session 2: Addressing and Routing
  • Encore Session 2: Backing Up and Restoring Databases
  • Encore Session 2: Clustered VMs and DR
  • Encore Session 2: Columnstore Indexes and Programmability Objects
  • Encore Session 2: Compliance and Operational Security
  • Encore Session 2: Computer Components
  • Encore Session 2: Configure Devices, Storage, & Network Connections in Windows 10
  • Encore Session 2: Configure File and Print Services
  • Encore Session 2: Configure File and Storage Solutions
  • Encore Session 2: Configure Windows Server 2012 Server Roles and Features
  • Encore Session 2: Configuring User Accounts and Policies in Windows 8.1
  • Encore Session 2: Deploying and Managing Network Servers
  • Encore Session 2: Developing the Mailbox Role
  • Encore Session 2: Developing the Mailbox Role
  • Encore Session 2: Disks, NTFS, and Sharing
  • Encore Session 2: Distributed Resource Scheduler
  • Encore Session 2: DNS Name Resolution and Zone Configuration
  • Encore Session 2: Introduction to Design Fundamentals
  • Encore Session 2: JavaScript Data Types
  • Encore Session 2: Manage Data in SQL 2012
  • Encore Session 2: Managing and Maintaining Servers, Images, and Storage Solutions
  • Encore Session 2: Managing Operating System Deployments
  • Encore Session 2: More Windows Options
  • Encore Session 2: OU Design and Implementation to Support Group Policy
  • Encore Session 2: Planning Application Services and Component Deployment
  • Encore Session 2: Planning Configuring and Managing Advanced Security
  • Encore Session 2: Planning for Business Continuity in SharePoint Server 2013
  • Encore Session 2: Planning the Project Scope and Schedule
  • Encore Session 2: Planning the Project Scope and Schedule
  • Encore Session 2: Power and Connection Interfaces
  • Encore Session 2: SharePoint 2016 Security
  • Encore Session 2: Upgrading to Microsoft SharePoint 2010
  • Encore Session 2: Using SharePoint Content
  • Encore Session 2: VM Hosts, Storage, and Networks
  • Encore Session 2: VMware Component Installation for vSphere 6.0
  • Encore Session 2: Vulnerabilities and Organizational Security
  • Encore Session 2: Web and Service Applications
  • Encore Session 2: Windows PowerShell-The Next Level
  • Encore Session 2: Windows Vista
  • Encore Session 3: Advanced Windows Configuration
  • Encore Session 3: Building a Computer
  • Encore Session 3: Cluster Monitoring and Profiles
  • Encore Session 3: Conditional Program Execution
  • Encore Session 3: Configure Network Services and Access
  • Encore Session 3: Configure Windows Server 2012 Hyper-V
  • Encore Session 3: Configuring and Administering SharePoint 2010 Search
  • Encore Session 3: Configuring and Managing Compliance, Archiving, and Discovery Solutions
  • Encore Session 3: Configuring Client Access Services
  • Encore Session 3: Configuring Storage, File Management, and DAC
  • Encore Session 3: Configuring User Applications and Virtualization in Windows 8.1
  • Encore Session 3: Cryptography, Keys, and Wireless Security
  • Encore Session 3: Data Deduplication, Hyper-V Installation and Configuration
  • Encore Session 3: DCD Objectives: Creating a Conceptual vSphere Design
  • Encore Session 3: Deploying Applications and Software Updates
  • Encore Session 3: Establishing Site Owners
  • Encore Session 3: Implement Business Continuity and Disaster Recovery
  • Encore Session 3: Implementing IP Address Management (IPAM)
  • Encore Session 3: Introduction to VMware Basic Networking
  • Encore Session 3: IP Subnetting, DHCP, and NIC Teaming
  • Encore Session 3: Maintaining Active Directory, Trusts and Site Management
  • Encore Session 3: Managing Database Integrity
  • Encore Session 3: Network Infrastructures
  • Encore Session 3: Networking
  • Encore Session 3: Optimizing and Troubleshooting SQL 2012
  • Encore Session 3: Plan and Deploy a Server Infrastructure
  • Encore Session 3: Planning an Upgrade/Migration Strategy and Security Deployment
  • Encore Session 3: Planning and Deploying Client Access Servers
  • Encore Session 3: Planning for Expanded Enterprise SharePoint Support
  • Encore Session 3: Planning for Resources, Risk and Quality
  • Encore Session 3: Planning for Resources, Risks and Quality
  • Encore Session 3: Remote Access Solutions
  • Encore Session 3: Security
  • Encore Session 3: Service Applications in SharePoint 2016
  • Encore Session 3: Support Identities and Authentication in Windows 10
  • Encore Session 3: Threats and Vulnerabilities
  • Encore Session 3: Triggers, Functions, Transactions, and Isolation Levels
  • Encore Session 3: VM Administration and Business Continuity Planning
  • Encore Session 3: Windows 7
  • Encore Session 4: Advanced Resource Management and Basic Design
  • Encore Session 4: Application, Host and Data Security
  • Encore Session 4: Building Up SharePoint Sites
  • Encore Session 4: Clustering, NLB, and Monitoring
  • Encore Session 4: Computer Networking
  • Encore Session 4: Configure a Network Policy Server Infrastructure
  • Encore Session 4: Configure Network Services
  • Encore Session 4: Configuring User Data and Settings in Windows 8.1
  • Encore Session 4: Creating and Configuring Service Applications
  • Encore Session 4: DCD Objectives: Creating a Logical vSphere Design
  • Encore Session 4: Defining Group Policy Objects and Implementing Group Policy Preferences
  • Encore Session 4: Defining Operations Strategy and Business Continuity
  • Encore Session 4: Deploy and Configure Windows Server 2012 Core Network Services
  • Encore Session 4: Deploying and Administering System Center Configuration Manager 2012 R2
  • Encore Session 4: Design and Implement Network Services Part 1
  • Encore Session 4: DHCP, DNS & IPAM
  • Encore Session 4: DNS and Hyper-V
  • Encore Session 4: Events and Functions
  • Encore Session 4: Hyper-V Networking, Containers, and High Availability
  • Encore Session 4: Implementing & Managing Coexistence, Hybrid Scenarios, Migration & Federation
  • Encore Session 4: Laptops & Mobile Devices
  • Encore Session 4: Manage Data Access and Protection in Windows 10
  • Encore Session 4: Managing Database Concurrency
  • Encore Session 4: Monitoring Database Activity, Queries, and SQL Server Instances
  • Encore Session 4: Network Configuration and Basic Storage Concepts
  • Encore Session 4: Network Connectivity, Remote Access, and Securing Remote Authentication
  • Encore Session 4: Network Security
  • Encore Session 4: Other Operating Systems
  • Encore Session 4: Planning and Configuring Message Transport
  • Encore Session 4: Planning and Configuring Message Transport
  • Encore Session 4: Planning for Communication, Procurement and Cost
  • Encore Session 4: Planning for Stakeholders, Communication, Procurement and Cost
  • Encore Session 4: Recovering Databases, Configuring Mail, and Automating Tasks
  • Encore Session 4: Security Protocols and Issues, Identity and Access
  • Encore Session 4: Service Accounts, Account Policies and Fine Grained Password Policies
  • Encore Session 4: SharePoint 2016 Integration
  • Encore Session 4: SharePoint Taxonomy
  • Encore Session 4: Web Applications, Authentication and Application Security Configuration
  • Encore Session 4: Windows Networking on a Client/Desktop
  • Encore Session 5: Access Control and Identity Management
  • Encore Session 5: Active Directory
  • Encore Session 5: Active Directory Certificate Services
  • Encore Session 5: AD Domains and Replication
  • Encore Session 5: Advanced Exchange 2013 Monitoring and Troubleshooting
  • Encore Session 5: Certificate Services
  • Encore Session 5: Compliance Settings and Managing Clients
  • Encore Session 5: Computer Threats and Security
  • Encore Session 5: Configure and Manage Active Directory
  • Encore Session 5: Configure and Manage Applications in Windows 10
  • Encore Session 5: Configure the Active Directory Infrastructure
  • Encore Session 5: Configuring and Managing Storage in vSphere 6.0
  • Encore Session 5: Configuring Devices, Disks, and Network Connections in Windows 8.1
  • Encore Session 5: Configuring SharePoint 2010 Site Collections, Managing Features and Solutions
  • Encore Session 5: Content Management on SharePoint 2016
  • Encore Session 5: DCD Objectives: Creating a Physical vSphere Design
  • Encore Session 5: Design and Implement Network Services Part 2
  • Encore Session 5: Executing the Project
  • Encore Session 5: Executing the Project
  • Encore Session 5: Implementing Failover Clustering and Managing High Availability Solutions
  • Encore Session 5: Implementing Security
  • Encore Session 5: Install and Administer Windows Server 2012 Active Directory
  • Encore Session 5: Manage Exchange 2013 – Infrastructure Management
  • Encore Session 5: Manage Exchange 2013 – Infrastructure Management
  • Encore Session 5: Managing Indexes and Statistics
  • Encore Session 5: Managing Sites
  • Encore Session 5: Network Architecture and Security
  • Encore Session 5: Network Operations
  • Encore Session 5: Optimize SQL Database Objects and Infrastructure
  • Encore Session 5: Planning for SharePoint Business Intelligence
  • Encore Session 5: Planning Search Solutions
  • Encore Session 5: Planning Search Solutions
  • Encore Session 5: Portable Devices
  • Encore Session 5: Printers & Computer Displays
  • Encore Session 5: Security and Mobile Devices
  • Encore Session 5: Supporting Branch Office Technologies
  • Encore Session 5: The Document Object Model
  • Encore Session 5: Understanding and Managing Active Directory
  • Encore Session 5: Update Manager
  • Encore Session 6: AD Federation Services, Web Application Proxy, and AD Rights Management Services
  • Encore Session 6: AD RMS and AD FS
  • Encore Session 6: Advanced Network Infrastructures
  • Encore Session 6: Automating SharePoint with Workflows
  • Encore Session 6: Configure and Manage Group Policy
  • Encore Session 6: Configure Identity and Access Solutions
  • Encore Session 6: Configure Security, Microsoft Edge, Hyper-V, and Power Management in Windows 10
  • Encore Session 6: Configuring, Managing, and Migrating Unified Messaging
  • Encore Session 6: Create and Manage Windows Server 2012 Group Policy
  • Encore Session 6: Cryptography
  • Encore Session 6: Database Instances and Performance Tuning
  • Encore Session 6: DCD Objectives: Implementation Planning
  • Encore Session 6: Design and Implement Network Services Part 3
  • Encore Session 6: Group Policy
  • Encore Session 6: Groups and GPOs
  • Encore Session 6: High Availability
  • Encore Session 6: High Availability and Disaster Recovery
  • Encore Session 6: Implementation and Troubleshooting
  • Encore Session 6: Introduction to Virtual Machine Configuration and Management
  • Encore Session 6: Manage Exchange 2013 – Monitoring and Troubleshooting
  • Encore Session 6: Manage Exchange 2013 – Monitoring and Troubleshooting
  • Encore Session 6: Managing Inventory and Reporting
  • Encore Session 6: Managing Solutions, Apps, and Enterprise Integration
  • Encore Session 6: Mobile Computing, Monitoring, Optimizing, and System Management/Recovery
  • Encore Session 6: Monitoring and Controlling the Project
  • Encore Session 6: Monitoring, Controlling and Closing the Project
  • Encore Session 6: Operational Procedures
  • Encore Session 6: PKI, RMS, and Federation
  • Encore Session 6: Planning Business Solutions
  • Encore Session 6: Printers
  • Encore Session 6: SharePoint 2010 Operational Health and Performance
  • Encore Session 6: SharePoint 2016 Stability and Performance
  • Encore Session 6: The Upgrade Process
  • Encore Session 6: Tools and Techniques
  • Encore Session 6: Trouble Shooting
  • Encore Session 6: Troubleshooting
  • Encore Session 6: User Profiles Maintenance and Monitoring
  • Encore Session 6: Virtualization, Policies, Risk Management, and Disaster Response/Recovery
  • Encore Session 6: VM Movement and Network Load Balancing Solutions
  • Encouraging Team Communication and Collaboration
  • End-to-End Automated Testing: End-to-End Testing Implementation
  • End-User Security: Securing End Users against Attackers
  • End-User Security: The End-User Perspective
  • End-User Security: The Security Administrator Perspective
  • Enhance Reactive Applications with Advanced React
  • Ensuring Delivery of Value and Quality in Agile Projects
  • Ensuring SharePoint 2016 Stability
  • Ensuring Social Media and Application Quality
  • Enterprise Architecture: Architectural Principles & Patterns
  • Enterprise Architecture: Design Architecture for Machine Learning Applications
  • Enterprise DevOps with Docker
  • Enterprise Services: Enterprise Machine Learning with AWS
  • Enterprise Services: Machine Learning Implementation on Google Cloud Platform
  • Enterprise Services: Machine Learning Implementation on Microsoft Azure
  • Errors, Exceptions, and Testing
  • Essential Tools for Ubuntu
  • Establishing Team Goals and Responsibilities
  • Establishing Team Goals and Responsibilities, and Using Feedback Effectively
  • ESXi
  • Ethical Hacker: Account Creation
  • Ethical Hacker: Hacking Techniques
  • Ethical Hacker: Incident Response
  • Ethical Hacker: Risk Assessment
  • Ethical Hacker: Scanning
  • Ethical Hacker: Secure Technology & Applications
  • Ethical Hacker: Security Standards
  • Ethical Standards and PMI® Core Values
  • Ethics and Project Management
  • Events, Manipulating Elements, and AJAX
  • Examining Rails APIs
  • Excel with Python: Constructing Data Visualizations
  • Excel with Python: Performing Advanced Operations
  • Excel with Python: Working with Excel Spreadsheets from Python
  • Exchange 2013 - Core Solutions: Deployment (Update Avail.)
  • Exchange 2016 Migration, Federation, and Sharing
  • Existing Infrastructures and Branch Deployments in Microsoft Windows Server 2008
  • Expanding Design Patterns
  • Exploring Appium and Windows
  • Exploring Blockchain
  • Exploring Chatbots
  • Exploring TestNG
  • Exploring the Advanced Features of Appcelerator Titanium
  • Exploring the Advanced Features of the Ionic Framework
  • Exploring the Basic Features of the Ionic Framework
  • Extending CSS3 with Sass and Less
  • Extending Oracle Commerce Applications
  • Facing Confrontation in Customer Service
  • Features of the Zend Framework
  • Filter and Modify Data in SQL Server 2016
  • Final Exam: Certified Business Analysis Professional (CBAP) - BABOK V2.0 aligned
  • Final Exam: CompTIA Cloud+
  • Final Exam: Six Sigma Black Belt (2007 BOK): Team Management
  • Final Exam: VMware vSphere 6.5: Install, Configure, & Manage
  • Financial Accounting with SAP
  • Finding Your Bearings as a Project Manager
  • First Encounters with Windows 10
  • First Steps with Chef
  • Flask in Python: An Introduction to Web Frameworks & Flask
  • Flask in Python: Building a Simple Web Site Using Flask
  • Flask in Python: User Authentication in a Flask Application
  • Flask in Python: User Interactions in Flask Applications
  • FMEA and Design for Six Sigma
  • FMEA and Other Nonstatistical Analysis Methods in Six Sigma
  • Form Handling with Pipelines and REST
  • Forms, Positioning, and Layout with CSS3
  • Framing Opportunities for Effective Data-driven Decision Making
  • FSD Development with Python: API Development in Flask
  • FSD Development: Java Spring Framework
  • FSD Front-End Development: Frameworks
  • FSD Front-end Development: Server Tools
  • FSD Front-end Development: Testing Tools
  • FSD Front-End Development: UI Development with ReactJS
  • FSD Getting Started: Introduction to Full Stack Development
  • FSD Programming Languages Primer: FSD Front-end Primer
  • FSD Programming Languages: FSD Back End & Miscellaneous Tools
  • FSD Secure Database Development
  • Full Stack Development: Business Logic and Persistence Layers
  • Full Stack Development: Introduction
  • Full Stack Development: Web Communications Layer
  • Full Stack End-to-End Testing
  • Functions in Python: Gaining a Deeper Understanding of Python Functions
  • Functions in Python: Introduction
  • Functions in Python: Working with Advanced Features of Python Functions
  • Functions, References, Exceptions Strings & Namespaces
  • Functions, Type Checking, Error Handling, and Testing
  • Fundamental Methods for Data Science in R
  • Fundamentals of Apache Web Services
  • Fundamentals of Big Query
  • Fundamentals of C++ Programming
  • Fundamentals of Lean and Six Sigma and their Applications
  • G Suite: E-mail and Calendar Management
  • G Suite: Group and OU Management
  • G Suite: Security, Service, and Mobile Device Management
  • GCP Big Data and Security
  • GCP DevOps: CloudOps with Google Cloud Platform
  • GCP Engineering and Streaming Architecture
  • GCP Network Data Processing Models
  • Generic Database Fundamentals: Architecture and Normalization Concepts
  • Generic Database Fundamentals: Relation Algebra, SQL, and Concurrency Concepts
  • Generic Design and Modeling Databases: Concepts and Conceptual Design
  • Generic Design and Modeling Databases: Logical and Physical Design
  • Genymotion: Testing Android Apps
  • Getting Familiar With Windows 8.1 UI and Layout
  • Getting Started with ADO.NET 4 Connections and Commands Using Visual Basic 2010
  • Getting Started with Amazon Web Services
  • Getting Started with ASP.NET MVC Web Applications in Visual Studio 2013
  • Getting Started with Backbone.js
  • Getting Started With Entity Framework
  • Getting Started with F#
  • Getting Started with Hadoop: Advanced Operations Using MapReduce
  • Getting Started with Hadoop: Developing a Basic MapReduce Application
  • Getting Started with Hadoop: Filtering Data Using MapReduce
  • Getting Started with Hadoop: Fundamentals & MapReduce
  • Getting Started with Hadoop: MapReduce Applications With Combiners
  • Getting Started with Hello, World!
  • Getting Started with Hibernate
  • Getting Started with Hive: Bucketing & Window Functions
  • Getting Started with Hive: Introduction
  • Getting Started with Hive: Loading and Querying Data
  • Getting Started with Hive: Optimizing Query Executions
  • Getting Started with Hive: Optimizing Query Executions with Partitioning
  • Getting Started with Hive: Viewing and Querying Complex Data
  • Getting Started with Java Hibernate
  • Getting Started with LINQ
  • Getting Started with LoopBack
  • Getting Started with Maven
  • Getting Started with Microsoft Azure HDInsight and Administering clusters
  • Getting Started with Microsoft R
  • Getting Started with Python: Introduction
  • Getting Started with REST and .NET Core
  • Getting Started with the Software and Integrating Data
  • Getting Started with Typekit
  • Getting Started with WCF 4 using VB 2010
  • Getting the Big Picture by Defining the Project's Scope and Team
  • Git & GitHub: Introduction
  • Git & GitHub: Using GitHub for Source Code Management
  • Git & GitHub: Working with Git Repositories
  • GitHub Extension for Visual Studio
  • Google Cloud
  • Google Cloud Basics
  • Google Cloud Big Data and Machine Learning
  • Google Cloud Data Storage
  • Google Cloud Dataproc
  • Google Cloud Design
  • Google Cloud Network Components
  • Google Cloud Platform Fundamentals
  • Google Cloud Platform Storage and Analytics
  • Google Cloud Programmatic Access
  • Google Cloud Security
  • Google Cloud SQL for Developers: Instance Management in the Developers Console
  • Google Cloud SQL for Developers: Interacting, Connecting, and Management
  • Google Cloud Troubleshooting
  • Google Cloud Virtual Machine Configuration
  • Google Cloud Virtual Machine Deployment
  • Google Cloud Web Applications and Name Resolution
  • Google G Suite Admin: User Management
  • Graphics, Web Hosting and Grunt Performance
  • Group Policy Objects Strategy in Windows Server 2008
  • Guiding the Analysis for Effective Data-driven Decision Making
  • Hadoop Cluster Availability
  • Hadoop Clusters
  • Hadoop Distributed File System
  • Hadoop HDFS: File Permissions
  • Hadoop HDFS: Introduction
  • Hadoop HDFS: Introduction to the Shell
  • Hadoop HDFS: Working with Files
  • Hadoop in the Cloud
  • Hadoop Maintenance and Distributions
  • Hadoop Ranger
  • Handling Team Conflict
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Heap, Thread, and Monitor Dump Analyzer
  • Helper Functions and Advanced Ajax
  • High Availability
  • High Availability and Disaster Recovery
  • HP LoadRunner 12 Essentials: Enhancing Vuser Scripts
  • HP LoadRunner 12 Essentials: Working with Controller and Analysis
  • HP LoadRunner 12 Essentials: Working with VuGen
  • HP UFT: Functional Test Automation
  • HR Competencies: Business Acumen and Relationship Management
  • HR Competencies: Consultation and Critical Evaluation
  • HR Competencies: Global and Cultural Effectiveness and Communication
  • HR Competencies: Leadership and Ethical Practice
  • HTML5 and Accessibility
  • HTML5 and Advanced CSS3
  • HTML5 and CSS3
  • HTML5 and JavaScript
  • HTML5 APIs and Local Data Storage
  • HTML5 APIs and Media
  • HTML5 Forms
  • HTML5 Graphics and Canvas
  • HTML5 Layout
  • HTML5 Layout with CSS3
  • HTML5 with JavaScript & CSS3: Advanced Input Validation
  • HTML5 with JavaScript & CSS3: APIs & Data Storage
  • HTML5 with JavaScript & CSS3: Data Flow, Consuming, & Transmitting Data
  • HTML5 with JavaScript & CSS3: HTML5 & Javascript
  • HTML5 with JavaScript & CSS3: Introduction
  • HTML5 with JavaScript & CSS3: Styling HTML5 & JavaScript
  • HTML5 with JavaScript & CSS3: WebSockets & Asynchronous Processing
  • Human Resource Development: Employee Training
  • Human Resource Development: Performance Appraisal and Talent Management
  • Human Resource Development: Regulations and Organizational Development
  • Human Resource Strategy Management: Business and HR Strategy
  • Human Resource Strategy Management: Strategic Planning
  • Human Resources Core Knowledge: Functions and Activities
  • Human Resources Core Knowledge: Skills, Concepts, and Tools
  • Hybrid Cloud Architecture & Deployment: Adopting Migration Strategies
  • Hybrid Cloud Architecture & Deployment: AWS Data & Service Migration
  • Hybrid Cloud Architecture & Deployment: AWS Migration Management
  • Hybrid Cloud Architecture & Deployment: AWS Services & Application Migration
  • Hybrid Cloud Architecture & Deployment: Azure IaaS & Data Migration tools
  • Hybrid Cloud Architecture & Deployment: Azure Migration Tools & Best Practices
  • Hybrid Cloud Architecture & Deployment: Cloud Migration Essentials
  • Hybrid Cloud Architecture & Deployment: Implementing Migration in Azure
  • Hybrid SQL Server Solutions
  • Hypothesis Tests for Variances and Proportions in Six Sigma
  • IBM BigInsights Fundamentals: Analyzing, Querying, and Extracting Big Data
  • IBM BigInsights Fundamentals: Hadoop Solution
  • IBM Memory Analyzer and Visualizer
  • IBM Pattern Modeling Analysis Tool
  • ICND2 3.0: Switch Aggregation and Threat Mitigation
  • ICND2 3.0: Configuring ACLs
  • ICND2 3.0: Configuring and Verifying EIGRP
  • ICND2 3.0: Configuring and Verifying OSPFv3
  • ICND2 3.0: Configuring EtherChannel
  • ICND2 3.0: Configuring Multiarea OSPFv2
  • ICND2 3.0: Configuring OSPFv2
  • ICND2 3.0: Configuring Trunking
  • ICND2 3.0: Device Monitoring, Management, and Programmability
  • ICND2 3.0: Implementing EIGRP
  • ICND2 3.0: Implementing VLANs
  • ICND2 3.0: Infrastructure Services
  • ICND2 3.0: InterVLAN Routing
  • ICND2 3.0: OSPFv2 Operations
  • ICND2 3.0: PortFast and BPDU guard
  • ICND2 3.0: QoS Overview
  • ICND2 3.0: Routing Protocols
  • ICND2 3.0: SNMP Monitoring
  • ICND2 3.0: Spanning Tree Configuration and Verification
  • ICND2 3.0: Spanning Tree Overview
  • ICND2 3.0: Troubleshooting Connectivity
  • ICND2 3.0: Trunking Overview
  • ICND2 3.0: WAN Topologies and Connectivity
  • ICND2 3.0: Wide Area Networks Using GRE and eBGP
  • ICND2 3.0: Wide Area Networks Using PPP
  • Identifying Risk (PMBOK® Guide Sixth Edition)
  • Identifying Six Sigma Projects
  • Identity with Windows Server 2016 Expert Live with Encore
  • IINS 3.0: AnyConnect VPN Using ASDM
  • IINS 3.0: ASA Security and Policies
  • IINS 3.0: Attack Mitigation
  • IINS 3.0: Auto Secure
  • IINS 3.0: Clientless SSL VPN & ASDM
  • IINS 3.0: Configuring Cisco IPS
  • IINS 3.0: Control Plane Policing
  • IINS 3.0: Cryptographic Key Exchange
  • IINS 3.0: Encryption Methods
  • IINS 3.0: Firewall Features
  • IINS 3.0: Firewall Technology
  • IINS 3.0: Introduction to Cisco Security
  • IINS 3.0: Introduction to Network Attacks
  • IINS 3.0: IPS Deployment Configuration
  • IINS 3.0: IPsec and VPN
  • IINS 3.0: IPSec Site-to-Site VPN
  • IINS 3.0: Malware and Data Loss
  • IINS 3.0: Management Plane Access
  • IINS 3.0: Network Access Control
  • IINS 3.0: Network Address Translation
  • IINS 3.0: Network Time Protocol
  • IINS 3.0: Network Topologies
  • IINS 3.0: OSPF and EIGRP Authentication
  • IINS 3.0: Port Based Access Control, BYOD, and MDM
  • IINS 3.0: PVLANs and VLAN Security
  • IINS 3.0: SCP and AAA Technologies
  • IINS 3.0: Secure CLI Access
  • IINS 3.0: Secure Device Management
  • IINS 3.0: SIEM Technology and Security Terminology
  • IINS 3.0: Simple Network Management Protocol
  • IINS 3.0: Specific Network Attacks
  • IINS 3.0: TACACS+
  • IINS 3.0: Threat Mitigation for Email, Web, and Endpoints
  • IINS 3.0: Zone-Based Firewall Configuration
  • IIS and Web Services
  • Impact on Stakeholders and Benchmarking for Six Sigma
  • Implement ASP.NET Authorization and Exception Handling Strategy
  • Implement ASP.NET Claims-Based Authentication
  • Implement Globalization, Azure Role Life Cycle and Search Engine Optimization
  • Implementation
  • Implementations with BigQuery for Big Data
  • Implementing a SQL Database
  • Implementing an Advanced Server 2012 R2 Infrastructure Expert Live with Encore
  • Implementing ASP.NET Authentication
  • Implementing ASP.NET Authentication and Authorization
  • Implementing Cisco IP Routing (ROUTE) 2.0 | Bootcamp with Expert Replay (ITPRO.TV)
  • Implementing Cisco IP Switched Networks (SWITCH) 2.0 | Bootcamp with Expert Replay (ITPRO.TV)
  • Implementing Cisco Network Security (IINS) 3.0 | Bootcamp with Expert Replay (ITPRO.TV)
  • Implementing Communication and Messaging Strategies
  • Implementing Control Flow
  • Implementing Deep Learning: Optimized Deep Learning Applications
  • Implementing Deep Learning: Practical Deep Learning Using Frameworks & Tools
  • Implementing Disk Encryption
  • Implementing File Encryption
  • Implementing Governance Strategies
  • Implementing OpenStack
  • Implementing Secure Sites with ASP.NET
  • Implementing Server Patching and Updating
  • Implementing Smart Contracts Using Ethereum
  • Implementing Unit Testing Best Practices
  • Implementing WebLOAD Solutions
  • Implementing Workload-specific Security Part I
  • Implementing Workload-specific Security Part II
  • Importing and Manipulating Data
  • Improvements to Role Services in Windows Server 2008 R2
  • Improving Neural Networks: Data Scaling & Regularization
  • Improving Neural Networks: Loss Function & Optimization
  • Improving Neural Networks: Neural Network Performance Management
  • Improving Your Technical Writing Skills
  • In Depth with NoSQL
  • Incident Tracking & Response
  • Indexers, Clusters, and Advanced Search
  • Information Security Incident Management (Part 1)
  • Information Security Program Development and Management (Part 2)
  • Information Security: APT Defenses
  • Information Security: Continual Infrastructure Testing
  • Information Security: Hardened Security Topologies
  • Information Security: Honeypots
  • Information Security: NACs & Gateways
  • Information Security: Pen Testing
  • Information Security: Securing Networking Protocols
  • Information Security: Security Governance
  • Information Security: Subnetting & DNS for Security Architects
  • Information Systems Security and Audit Professional
  • Ingesting Data and Computing for Batch Processing
  • Ingesting Data and Computing for Real-time Processing
  • Install and Configure vRealize Suite
  • Install and Manage Windows 10 Applications and Universal Windows Apps
  • Installation of Hadoop
  • Installation, Storage, and Compute with Windows Server 2016 Expert Live with Encore
  • Installing and Configuring Microsoft Windows Server 2012 Expert Encore
  • Installing and Configuring Microsoft Windows Server 2012 R2 Expert Live with Encore
  • Installing and Configuring a Microsoft IIS Server Service
  • Installing and Configuring VMware Workstation 11
  • Installing and Configuring WebSphere Commerce
  • Installing and Configuring Windows 10: Configuring Core Services
  • Installing and Configuring Windows 10: Implementing Windows
  • Installing and Configuring Windows 10: Managing and Maintaining Windows
  • Installing and Configuring Windows 10: Managing Updates and Monitoring Windows
  • Installing and Monitoring Data Protection Manager
  • Installing and Upgrading SQL Server 2016
  • Installing and Using Grunt
  • Installing Operations Manager
  • Installing System Center Configuration Manager
  • Installing Unix
  • Integrate Development and Operations (DevOps)
  • Integrating jQuery Mobile with PhoneGap
  • Intelligent Orchestration: Automating Security Incident Processing
  • Interacting with Customers
  • Interactive Processing using Apache Phoenix on HBase
  • Interactive Queries with Spark SQL and Interactive Hive
  • Interconnecting Cisco Networking Devices, Part 1 (ICND1) 3.0 | Bootcamp with Expert Replay (ITPRO.TV
  • Interconnecting Cisco Networking Devices, Part 2 (ICND2) 3.0 | Bootcamp with Expert Replay (ITPRO.TV
  • Interconnecting SharePoint 2016
  • Intermediate Programming in Force.com
  • Internet of Things and UI/UX
  • Internet of Things Applications
  • Internet of Things Hardware
  • Internet Site Development
  • Interpreting Stakeholder Needs: Managing and Engaging Stakeholders
  • Introducing Cloud Computing
  • Introducing Git
  • Introducing Gulp.js to Web Development
  • Introducing Natural Language Processing
  • Introducing the Windows 10 Creators Update
  • Introducing UWP and Basic App Layouts
  • Introducing Visual Studio
  • Introducing Windows Server 2008
  • Introduction to Agile Software Development
  • Introduction to Algorithms and Data Structures
  • Introduction to Apache Spark
  • Introduction to Appium Testing
  • Introduction to Application Performance Engineering
  • Introduction to Artificial Intelligence
  • Introduction to ASP.NET Core 1.0
  • Introduction to ASP.NET MVC Web Applications
  • Introduction to Automated Testing with Selenium
  • Introduction to Automation with Terraform
  • Introduction to Balsamiq Mockups
  • Introduction to Bash Scripting
  • Introduction to Business Analysis
  • Introduction to Business Analysis and Essential Competencies
  • Introduction to Business Analysis Planning
  • Introduction to Clean Coding
  • Introduction to COBIT 5
  • Introduction to CQRS
  • Introduction to Data Modeling in Hadoop
  • Introduction to Debugging
  • Introduction to Designing a Relational Database
  • Introduction to Digital Currency
  • Introduction to Directives
  • Introduction to Domain-driven Design
  • Introduction to Eclipse
  • Introduction to Express
  • Introduction to Hadoop
  • Introduction to HTML5
  • Introduction to HTML5 and CSS
  • Introduction to HTML5 and CSS3
  • Introduction to Hypothesis Testing and Tests for Means in Six Sigma
  • Introduction to Java EE 6
  • Introduction to jQuery
  • Introduction to Justinmind
  • Introduction to Kotlin
  • Introduction to Kubernetes
  • Introduction to Machine Learning and Supervised Learning
  • Introduction to Microservices
  • Introduction to Models
  • Introduction to Popular Frameworks
  • Introduction to PowerShell 5.0
  • Introduction to Project Management (PMBOK® Guide Fifth Edition)
  • Introduction to R Programming
  • Introduction to RabbitMQ
  • Introduction to Rails
  • Introduction to Reactive Programming
  • Introduction to ReactJS and Grunt
  • Introduction to Secure Programming
  • Introduction to SOLID
  • Introduction to SOLID
  • Introduction to SQL
  • Introduction to SQL: Managing Table Design
  • Introduction to SQL: Multiple Tables and Advanced Queries
  • Introduction to SQL: Views, Transactions, and SQL Security Architecture
  • Introduction to the Entity Framework
  • Introduction to Ubuntu
  • Introduction To UI/UX
  • Introduction to Using PyCharm IDE
  • Introduction to Views
  • Introduction to Virtual Reality
  • Introduction to Web Accessibility
  • Introduction to Web Services
  • Introduction to Windows 10
  • Intrusion Detection: Best Practices
  • Intrusion Prevention: Best Practices
  • iOS 12 Development: Augmented Reality and HealthKit
  • iOS 12 Development: Best Practices in iOS Security
  • iOS 12 Development: Getting Started with Xcode and iOS
  • iOS 12 Development: Testing and Error Handling
  • iOS 12 Development: Working With Data and Gestures
  • iOS 12 Development: Working With Layout and Controls in iOS
  • iOS Application Development: Application Lifecycle Management
  • iOS Application Development: Creating a Basic iOS App
  • iOS Application Development: Creating Adaptive Apps
  • iOS Application Development: Data, Graphics and Media
  • iOS Application Development: iOS 10 Features
  • iOS Application Development: Layout and Controls
  • iOS Application Development: Optimizing Apps
  • iOS Security Architecture and Application Data Protection
  • IPv6 Fundamentals
  • iRise Editor Basics
  • IT Infrastructure Automation: Automated Monitoring
  • IT Infrastructure Automation: Automation and Scalability
  • IT Infrastructure Automation: Introduction to Automation
  • IT Infrastructure Automation: Python Automation Programming
  • IT Infrastructure Automation: Text File Processing and RegEx
  • IT Infrastructure Automation: Version Control and GIT
  • IT Security for End Users: IT Security Fundamentals
  • IT Security for End Users: Secure Corporate Communications and Networking
  • IT Security for End Users: Using Corporate Devices Securely
  • Iterations, Functions and Pointers in ANSI C
  • ITIL ® Operational Support & Analysis
  • ITIL® 2011 Edition Foundation: Continual Service Improvement
  • ITIL® 2011 Edition Foundation: Introduction to Service Operation
  • ITIL® 2011 Edition Foundation: ITIL® and the Service Lifecycle
  • ITIL® 2011 Edition Foundation: Service Design Fundamentals
  • ITIL® 2011 Edition Foundation: Service Design Processes
  • ITIL® 2011 Edition Foundation: Service Operation Processes
  • ITIL® 2011 Edition Foundation: Service Strategy Fundamentals
  • ITIL® 2011 Edition Foundation: Service Strategy Processes
  • ITIL® 2011 Edition Foundation: Service Transition Processes and Policies
  • ITIL® 2011 Edition OSA: Function Activities
  • ITIL® 2011 Edition OSA: Incident Management Interactions
  • ITIL® 2011 Edition OSA: Introduction to Access Management
  • ITIL® 2011 Edition OSA: Introduction to Event Management
  • ITIL® 2011 Edition OSA: Introduction to Functions
  • ITIL® 2011 Edition OSA: Introduction to Incident Management
  • ITIL® 2011 Edition OSA: Introduction to Operational Support and Analysis
  • ITIL® 2011 Edition OSA: Introduction to Problem Management
  • ITIL® 2011 Edition OSA: Introduction to Request Fulfillment
  • ITIL® 2011 Edition OSA: Introduction to the Service Desk
  • ITIL® 2011 Edition OSA: Problem Management Process Interfaces and Challenges
  • ITIL® 2011 Edition OSA: Request Fulfillment Process Interfaces and Challenges
  • ITIL® 2011 Edition OSA: Service Desk Metrics and Outsourcing
  • ITIL® 2011 Edition OSA: Technology and Implementation Considerations
  • ITIL® 2011 Edition Overview: Certification and Benefits
  • ITIL® 2011 Edition Overview: Creating a Service Culture
  • ITIL® 2011 Edition Overview: Introduction to the ITIL® Framework
  • ITIL® 4 Foundation: General Management Practices
  • ITIL® 4 Foundation: Introduction
  • ITIL® 4 Foundation: Key Concepts
  • ITIL® 4 Foundation: Key Concepts of Service Management
  • ITIL® 4 Foundation: Service Management Practices (Part 1)
  • ITIL® 4 Foundation: Service Management Practices (Part 2)
  • ITIL® 4 Foundation: The Guiding Principles
  • ITIL® 4 Foundation: The Service Value Chain
  • ITIL® 4 Foundation: The Service Value System
  • ITIL® Continual Service Improvement
  • ITIL® Service Design Concepts
  • ITIL® Service Design Processes
  • ITIL® Service Operation Concepts
  • ITIL® Service Operation Processes
  • ITIL® Service Strategy Concepts
  • ITIL® Service Strategy Processes
  • ITIL® Service Transition Concepts and Processes
  • Java Application Performance Analysis Tools
  • Java ASYNC Interface
  • Java Development with Eclipse
  • Java EE 7 Back-end Server Application Development: Business Logic
  • Java EE 7 Back-end Server Application Development: Communication and Security
  • Java EE 7 Back-end Server Application Development: EJB Timers and Security
  • Java EE 7 Back-end Server Application Development: Getting Started
  • Java EE 7 Back-end Server Application Development: JAXB and JAX-WS Web Services
  • Java EE 7 Back-end Server Application Development: Web Services
  • Java EE 7 Back-end Web Application Development: Transaction Support
  • Java EE 7 Front End Web Application Development: Business Logic and Persistence
  • Java EE 7 Front End Web Application Development: Communication and Security
  • Java EE 7 Front End Web Application Development: Getting Started
  • Java EE 7 Front End Web Application Development: Presentation with JSF
  • Java EE 7 Front End Web Application Development: Transaction Support
  • Java EE 7 Front End Web Application Development: Web Components
  • Java EE 7 Front End Web Application Development: Web Services
  • Java Multi-Tenant Cloud Application Programming Fundamentals
  • Java OOP: Access Modifiers for Regulating Access
  • Java OOP: Interfaces & Anonymous Classes
  • Java OOP: Multi-level Inheritance
  • Java OOP: Run-time & Compile-time Polymorphism
  • Java OOP: The Role of Constructors in Inheritance
  • Java OOP: The Semantics of the final & abstract Keywords
  • Java OOP: Understanding Inheritance & Polymorphism in Java
  • Java OOP: Understanding Overriding & Hiding in Inheritance
  • Java Programming: Arithmetic & Logical Operations
  • Java Programming: Conditional Evaluation
  • Java Programming: Introduction
  • Java Programming: Iterative Evaluation
  • Java Programming: Working with Primitive Data Types
  • Java Programming: Working with Strings & Wrapper Objects
  • Java SE 11: Encapsulation
  • Java SE 11: Exception Handling
  • Java SE 11: Expressions, Arrays, and Loops
  • Java SE 11: Flow Control & Debugging
  • Java SE 11: Inheritance, Lists, Inference, and Lambda Expressions
  • Java SE 11: Inheritance, Polymorphism, and Abstraction
  • Java SE 11: Introduction to Java SE and the NetBeans IDE
  • Java SE 11: JDK Objects and Nested Loops
  • Java SE 11: JShell
  • Java SE 11: Modular Design
  • Java SE 11: Objects & Classes
  • Java SE 11: Strings and Primitive Data Types
  • Java SE 11: Variables and Operators
  • Java SE 13: Byte & Character Streams in Java
  • Java SE 13: Constructors & Other Methods
  • Java SE 13: Correctly Using Try-Catch-Finally Blocks
  • Java SE 13: More Operations on Member Variables & Methods
  • Java SE 13: Semantics of Method Invocation & Nested Classes
  • Java SE 13: Streams for Primitive Types, Objects, & Buffered IO
  • Java SE 13: Try-with-resources & Custom Exceptions
  • Java SE 13: Understanding Classes & Objects in Java
  • Java SE 13: Understanding Exception Handling in java
  • Java SE 13: Working with Files & Directories
  • Java SE 8 Fundamentals: Classes and Objects
  • Java SE 8 Fundamentals: Data Manipulation and Inheritance
  • Java SE 8 Fundamentals: Interfaces, Exceptions, and Deployment
  • Java SE 8 Fundamentals: Introduction to Java
  • Java SE 8 Fundamentals: Methods, Encapsulation, and Conditionals
  • Java SE 8 Programming: Concurrency, Parallelism, the JDBC API, and Localization
  • Java SE 8 Programming: Date/Time API, I/O and File I/O (NIO.2), and Concurrency
  • Java SE 8 Programming: Encapsulation, Polymorphism, and Abstraction
  • Java SE 8 Programming: Inheritance, Interfaces, Exceptions, and Deployment
  • Java SE 8 Programming: Interfaces, Lambda Expressions, Collections, and Generics
  • Java SE7 Fundamentals: Decision Constructs, Arrays, and Loops
  • Java SE7 Fundamentals: Handling Errors and Deploying Applications
  • Java SE7 Fundamentals: Introduction to Java
  • Java SE7 Fundamentals: Overloading, Validation, and Object-Oriented Concepts
  • Java SE7 Fundamentals: Variables, Operators, and Objects
  • Java SE7 New Features: I/O, Network, and Desktop Enhancements
  • Java SE7 New Features: Java Language and Technology Enhancements
  • Java SE7 Professional: File I/O, Concurrency, JDBC, and Localization
  • Java SE7 Professional: Generics, Errors, and I/O
  • Java SE7 Professional: Syntax and Class Design
  • Java Spring: Adding Security Using the Spring Security Project
  • Java Spring: Annotation Configuration and Java Configuration in Spring
  • Java Spring: Aspect-Oriented Programming Using Spring AOP
  • Java Spring: Creating Web Applications Using Spring MVC
  • Java Spring: Spring Application Basics
  • Java Spring: Working with Data in Spring
  • JavaScript - Ember.js Fundamentals
  • JavaScript Data, Decision Making, and Arrays
  • JavaScript Front End Development: Frameworks
  • JavaScript Front End Development: Front End Development Basics
  • JavaScript Front End Development: Functions and Objects
  • JavaScript Front-end Development: Errors, Events, Objects, & New Features
  • JavaScript Fundamentals
  • JavaScript Fundamentals Expert Live with Encore
  • JavaScript Language Basics
  • JavaScript Objects and Event Handlers
  • JavaScript Operators, Arrays, and Functions
  • JavaScript Sencha: Ext JS
  • JavaScript Sencha: Sencha Touch
  • JavaScript SPA: Adding Views and Handling View Navigation in Durandal
  • JavaScript SPA: Connecting to and Managing Data
  • JavaScript SPA: Durandal Modules and Lifecycle events
  • JavaScript SPA: Getting Started with SPA in Visual Studio 2013
  • JavaScript SPA: Managing Application Data
  • JavaScript SPA: SPA Views and Routes
  • JavaScript SPA: Working with Rich Application Data
  • JavaScript SPA: Working With Validation
  • JavaScript: Advanced Browser Scripting and DHTML
  • JavaScript: Advanced Function Operations
  • JavaScript: Browser Scripting Fundamentals
  • JavaScript: Closures & Prototypes
  • JavaScript: Form Validation & Async Programming in JavaScript
  • JavaScript: Functions & Arrays in JavaScript
  • JavaScript: Getting Started with JavaScript Programming
  • JavaScript: Introduction
  • JavaScript: Objects
  • JavaScript: Types, Operators, & Control Structures in JavaScript
  • JavaScript: Working with the DOM & Events
  • Jenkins 2 Nuts and Bolts
  • Jenkins Administration
  • Jenkins for DevOps: Automated Testing & Advanced Jobs Using Jenkins
  • Jenkins for DevOps: Jenkins Configuration for DevOps
  • JIRA Cloud: Configuring & Managing Boards
  • JIRA Cloud: Creating & Setting Up Projects
  • JIRA Cloud: Planning & Working on a Software Project
  • JIRA Cloud: Reporting in Jira Software
  • JMeter Architecture and Operations
  • jQuery and TypeScript
  • jQuery Mobile – App Basics, UI Controls and Navigation
  • jQuery Mobile – Forms, Lists, Sets and Tables
  • jQuery: Advanced Features and Functions
  • jQuery: Basic Setup and Features
  • jQuery: Using Essential Features and Functions
  • JSON and XML Data Formats
  • JSON Essentials
  • JsRender Fundamentals
  • Juniper Networks Junos Essentials: Configuration Basics
  • Juniper Networks Junos Essentials: Junos OS Fundamentals
  • Juniper Networks Junos Essentials: Monitoring and Maintenance
  • Juniper Networks Junos Essentials: Networking Fundamentals
  • Juniper Networks Junos Essentials: Routing Fundamentals
  • Juniper Networks Junos Essentials: Routing Policy & Firewall Filters
  • JUnit Fundamentals
  • K-Nearest Neighbor (k-NN) & Artificial Neural Networks
  • Kafka Integration with Spark
  • Kafka Integration with Storm
  • Kafka Real-time Applications
  • Kanban Fundamentals: Using Kanban in IT and Software Development
  • Keeping Your Project on Budget (PMBOK® Guide Sixth Edition)
  • Kendo UI: HTML Helpers for ASP.NET MVC
  • Kendo UI: Installation and Overview
  • Kendo UI: Mobile API
  • Key Statistical Concepts
  • Kibana and Reporting Capabilities
  • Knockout Fundamentals
  • Kotlin IDEs
  • Kotlin Loops and Functions
  • Kotlin Objects and Classes
  • Kotlin Syntax
  • Kubernetes & Automation Testing
  • Kubernetes API and Components
  • Kubernetes Clusters
  • Kubernetes Concepts
  • Kubernetes on Google Cloud Platform
  • LAMP Overview and Deployment
  • Leading a Cross-functional Team
  • Leading Teams: Building Trust and Commitment
  • Leading Teams: Dealing with Conflict
  • Leading Teams: Developing the Team and its Culture
  • Leading Teams: Establishing Goals, Roles, and Guidelines
  • Leading Teams: Fostering Effective Communication and Collaboration
  • Leading Teams: Launching a Successful Team
  • Leading Teams: Managing Virtual Teams
  • Leading Teams: Motivating and Optimizing Performance
  • Lean and Six Sigma
  • Lean Improvement Methods and Implementation Planning in Six Sigma
  • Lean in Scrum: Lean Development Practices
  • Lean Principles and Six Sigma Projects
  • Lean Principles in Six Sigma Projects
  • Lean Tools and FMEA
  • Lean Tools and FMEA in Six Sigma
  • Lean Tools for Process Control in Six Sigma
  • Leveraging the JIRA Platform for Development Projects
  • Linear and Logistic Regression
  • Linear Regression Models: An Introduction to Logistic Regression
  • Linear Regression Models: Building Simple Regression Models with Scikit Learn and Keras
  • Linear Regression Models: Introduction to Linear Regression
  • Linear Regression Models: Multiple and Parsimonious Linear Regression
  • Linear Regression Models: Simplifying Regression and Classification with Estimators
  • Live Session 1: Introduction to Virtualization and VMware’s ESXi
  • Live Session 1: Active Directory Design and Implementation
  • Live Session 1: Active Directory Domain Controllers, Accounts, and Permissions
  • Live Session 1: Computer Network Fundementals
  • Live Session 1: Configure and Manage High Availability
  • Live Session 1: Configuring Advanced Services
  • Live Session 1: Deploy, Manage, and Maintain Servers
  • Live Session 1: Encryption, Data Access, Permissions, and Auditing
  • Live Session 1: Exchange Server 2013 SP1 Solution Planning and Implementation
  • Live Session 1: Initiating a Project
  • Live Session 1: Initiating a Project
  • Live Session 1: Install and Configure vCSA and Upgrading vSphere 4 to vSphere 5
  • Live Session 1: Install and Configure Windows Server 2012 Servers
  • Live Session 1: Install, Manage, and Use Windows 10
  • Live Session 1: Installing SQL Server Instances and Creating Databases
  • Live Session 1: Installing, Upgrading, Migrating to Windows 8.1
  • Live Session 1: Introduction to Clustering and HA
  • Live Session 1: Introduction to JavaScript
  • Live Session 1: IPv4/IPv6 Address and DHCP Management
  • Live Session 1: Managing a Server Infrastructure
  • Live Session 1: Plan, Deploy, Manage, and Troubleshoot Mailbox Databases
  • Live Session 1: Planning and Installing SCCM
  • Live Session 1: Planning, Configuring, and Managing Site Resilience
  • Live Session 1: Planning, Install, or Upgrade to SharePoint 2016
  • Live Session 1: Server Roles and Remote Management
  • Live Session 1: SharePoint Components and Design
  • Live Session 1: SQL Server 2016 Database Objects, Indexes, and Views
  • Live Session 1: The Datacenter and SCVMM
  • Live Session 1: Threats and Attacks
  • Live Session 1: Understanding SharePoint 2013 as a Business User
  • Live Session 1: Upgrading to SharePoint Server 2013
  • Live Session 1: Upgrading, Managing, and Monitoring
  • Live Session 1: Windows PowerShell Foundations
  • Live Session 2: Active Directory Object Management
  • Live Session 2: Addressing and Routing
  • Live Session 2: Backing Up and Restoring Databases
  • Live Session 2: Clustered VMs and DR
  • Live Session 2: Columnstore Indexes and Programmability Objects
  • Live Session 2: Configure Devices, Storage, & Network Connections in Windows 10
  • Live Session 2: Configure File and Print Services
  • Live Session 2: Configure File and Storage Solutions
  • Live Session 2: Configure Windows Server 2012 Server Roles and Features
  • Live Session 2: Configuring User Accounts and Policies in Windows 8.1
  • Live Session 2: Deploying and Managing Network Servers
  • Live Session 2: Developing the Mailbox Role
  • Live Session 2: Developing the Mailbox Role
  • Live Session 2: Disks, NTFS, and Sharing
  • Live Session 2: Distributed Resource Scheduler
  • Live Session 2: DNS Name Resolution and Zone Configuration
  • Live Session 2: Introduction to Design Fundamentals
  • Live Session 2: JavaScript Data Types
  • Live Session 2: Manage Data in SQL 2012
  • Live Session 2: Managing and Maintaining Servers, Images, and Storage Solutions
  • Live Session 2: Managing Operating System Deployments
  • Live Session 2: OU Design and Implementation to Support Group Policy
  • Live Session 2: Planning Configuring and Managing Advanced Security
  • Live Session 2: Planning for Business Continuity in SharePoint Server 2013
  • Live Session 2: Planning the Project Scope and Schedule
  • Live Session 2: Planning the Project Scope and Schedule
  • Live Session 2: SharePoint 2016 Security
  • Live Session 2: Using SharePoint Content
  • Live Session 2: VM Hosts, Storage, and Networks
  • Live Session 2: VMware Component Installation for vSphere 6.0
  • Live Session 2: Vulnerabilities and Organizational Security
  • Live Session 2: Web and Service Applications
  • Live Session 2: Windows PowerShell-The Next Level
  • Live Session 3: Cluster Monitoring and Profiles
  • Live Session 3: Conditional Program Execution
  • Live Session 3: Configure Network Services and Access
  • Live Session 3: Configure Windows Server 2012 Hyper-V
  • Live Session 3: Configuring and Managing Compliance, Archiving, and Discovery Solutions
  • Live Session 3: Configuring Client Access Services
  • Live Session 3: Configuring Storage, File Management, and DAC
  • Live Session 3: Configuring User Applications and Virtualization in Windows 8.1
  • Live Session 3: Cryptography, Keys, and Wireless Security
  • Live Session 3: Data Deduplication, Hyper-V Installation and Configuration
  • Live Session 3: DCD Objectives: Creating a Conceptual vSphere Design
  • Live Session 3: Deploying Applications and Software Updates
  • Live Session 3: Establishing Site Owners
  • Live Session 3: Implement Business Continuity and Disaster Recovery
  • Live Session 3: Implementing IP Address Management (IPAM)
  • Live Session 3: Introduction to VMware Basic Networking
  • Live Session 3: IP Subnetting, DHCP, and NIC Teaming
  • Live Session 3: Maintaining Active Directory, Trusts and Site Management
  • Live Session 3: Managing Database Integrity
  • Live Session 3: Network Infrastructures
  • Live Session 3: Optimizing and Troubleshooting SQL 2012
  • Live Session 3: Plan and Deploy a Server Infrastructure
  • Live Session 3: Planning and Deploying Client Access Servers
  • Live Session 3: Planning for Expanded Enterprise SharePoint Support
  • Live Session 3: Planning for Resources, Risk and Quality
  • Live Session 3: Planning for Resources, Risks and Quality
  • Live Session 3: Remote Access Solutions
  • Live Session 3: Security
  • Live Session 3: Service Applications in SharePoint 2016
  • Live Session 3: Support Identities and Authentication in Windows 10
  • Live Session 3: Triggers, Functions, Transactions, and Isolation Levels
  • Live Session 3: VM Administration and Business Continuity Planning
  • Live Session 4: Advanced Resource Management and Basic Design
  • Live Session 4: Building Up SharePoint Sites
  • Live Session 4: Clustering, NLB, and Monitoring
  • Live Session 4: Configure a Network Policy Server Infrastructure
  • Live Session 4: Configure Network Services
  • Live Session 4: Configuring User Data and Settings in Windows 8.1
  • Live Session 4: Creating and Configuring Service Applications
  • Live Session 4: DCD Objectives: Creating a Logical vSphere Design
  • Live Session 4: Defining Group Policy Objects and Implementing Group Policy Preferences
  • Live Session 4: Deploy and Configure Windows Server 2012 Core Network Services
  • Live Session 4: Deploying and Administering System Center Configuration Manager 2012 R2
  • Live Session 4: Design and Implement Network Services Part 1
  • Live Session 4: DHCP, DNS & IPAM
  • Live Session 4: DNS and Hyper-V
  • Live Session 4: Events and Functions
  • Live Session 4: Hyper-V Networking, Containers, and High Availability
  • Live Session 4: Implementing & Managing Coexistence, Hybrid Scenarios, Migration & Federation
  • Live Session 4: Manage Data Access and Protection in Windows 10
  • Live Session 4: Managing Database Concurrency
  • Live Session 4: Monitoring Database Activity, Queries, and SQL Server Instances
  • Live Session 4: Network Configuration and Basic Storage Concepts
  • Live Session 4: Network Connectivity, Remote Access, and Securing Remote Authentication
  • Live Session 4: Network Security
  • Live Session 4: Planning and Configuring Message Transport
  • Live Session 4: Planning and Configuring Message Transport
  • Live Session 4: Planning for Communication, Procurement and Cost
  • Live Session 4: Planning for Stakeholders, Communication, Procurement and Cost
  • Live Session 4: Recovering Databases, Configuring Mail, and Automating Tasks
  • Live Session 4: Security Protocols and Issues, Identity and Access
  • Live Session 4: Service Accounts, Account Policies and Fine Grained Password Policies
  • Live Session 4: SharePoint 2016 Integration
  • Live Session 4: SharePoint Taxonomy
  • Live Session 5: Active Directory
  • Live Session 5: Active Directory Certificate Services
  • Live Session 5: AD Domains and Replication
  • Live Session 5: Advanced Exchange 2013 Monitoring and Troubleshooting
  • Live Session 5: Certificate Services
  • Live Session 5: Compliance Settings and Managing Clients
  • Live Session 5: Configure and Manage Active Directory
  • Live Session 5: Configure and Manage Applications in Windows 10
  • Live Session 5: Configure the Active Directory Infrastructure
  • Live Session 5: Configuring and Managing Storage in vSphere 6.0
  • Live Session 5: Configuring Devices, Disks, and Network Connections in Windows 8.1
  • Live Session 5: Content Management on SharePoint 2016
  • Live Session 5: DCD Objectives: Creating a Physical vSphere Design
  • Live Session 5: Design and Implement Network Services Part 2
  • Live Session 5: Executing the Project
  • Live Session 5: Executing the Project
  • Live Session 5: Implementing Failover Clustering and Managing High Availability Solutions
  • Live Session 5: Implementing Security
  • Live Session 5: Install and Administer Windows Server 2012 Active Directory
  • Live Session 5: Manage Exchange 2013 – Infrastructure Management
  • Live Session 5: Managing Indexes and Statistics
  • Live Session 5: Managing Sites
  • Live Session 5: Network Architecture and Security
  • Live Session 5: Network Operations
  • Live Session 5: Optimize SQL Database Objects and Infrastructure
  • Live Session 5: Plan, Deploy, and Manage Compliance, Archiving, eDiscovery, and Auditing
  • Live Session 5: Planning for SharePoint Business Intelligence
  • Live Session 5: Planning Search Solutions
  • Live Session 5: Supporting Branch Office Technologies
  • Live Session 5: The Document Object Model
  • Live Session 5: Understanding and Managing Active Directory
  • Live Session 5: Update Manager
  • Live Session 5: VPN
  • Live Session 6: AD Federation Services, Web Application Proxy, and AD Rights Management Services
  • Live Session 6: AD RMS and AD FS
  • Live Session 6: Advanced Network Infrastructures
  • Live Session 6: Automating SharePoint with Workflows
  • Live Session 6: Configure and Manage Group Policy
  • Live Session 6: Configure Identity and Access Solutions
  • Live Session 6: Configure Security, Microsoft Edge, Hyper-V, and Power Management in Windows 10
  • Live Session 6: Configuring, Managing, and Migrating Unified Messaging
  • Live Session 6: Create and Manage Windows Server 2012 Group Policy
  • Live Session 6: Database Instances and Performance Tuning
  • Live Session 6: DCD Objectives: Implementation Planning
  • Live Session 6: Design and Implement Network Services Part 3
  • Live Session 6: Group Policy
  • Live Session 6: Groups and GPOs
  • Live Session 6: High Availability
  • Live Session 6: High Availability and Disaster Recovery
  • Live Session 6: Implementation and Troubleshooting
  • Live Session 6: Implementing & Managing Coexistence, Hybrid Scenarios, Migration & Federation
  • Live Session 6: Introduction to Virtual Machine Configuration and Management
  • Live Session 6: Manage Exchange 2013 – Monitoring and Troubleshooting
  • Live Session 6: Managing Inventory and Reporting
  • Live Session 6: Managing Solutions, Apps, and Enterprise Integration
  • Live Session 6: Mobile Computing, Monitoring, Optimizing, and System Management/Recovery
  • Live Session 6: Monitoring and Controlling the Project
  • Live Session 6: Monitoring, Controlling and Closing the Project
  • Live Session 6: PKI, RMS, and Federation
  • Live Session 6: SharePoint 2016 Stability and Performance
  • Live Session 6: The Upgrade Process
  • Live Session 6: Tools and Techniques
  • Live Session 6: User Profiles Maintenance and Monitoring
  • Live Session 6: Virtualization, Policies, Risk Management, and Disaster Response/Recovery
  • Live Session 6: VM Movement and Network Load Balancing Solutions
  • Logging, Scaling, and High Availability
  • Logstash for Data Ingestion in Elasticsearch
  • Machine Learning
  • Machine Learning Examples for Data Science in R
  • Machine Learning with TensorFlow and Cloud ML
  • Machine Learning, Propensity Score, & Segmentation Modeling
  • Malware Removal: Analyzing an Infected System
  • Malware Removal: Identifying Malware Types & Classification Approaches
  • Manage and Control Quality (PMBOK® Guide Sixth Edition)
  • Manage Virtual Machine Manager
  • Manage vRealize Automation Resources
  • Managed and User-provided Services
  • Management and Planning Tools for Six Sigma
  • Management Improvements in Windows Server 2008 R2
  • Management of People: Employee Engagement
  • Management of People: Learning and Development
  • Management of People: Talent Acquisition and Retention
  • Management of People: Total Rewards
  • Management of Relational Database Data
  • Managing a Citrix XenDesktop 7.6 Environment
  • Managing a Project to Minimize Risk and Maximize Quality
  • Managing Activities and Data for Azure Big Data Analytics
  • Managing Agile Software Development
  • Managing an Oracle Database 12c Instance
  • Managing and Monitoring Azure Storage
  • Managing Azure VMs
  • Managing Big Data Operations
  • Managing Database Concurrency
  • Managing File Servers and Data Provisioning in Windows Server 2008
  • Managing HDInsight Data, Jobs, and Security
  • Managing Identities in Office 365
  • Managing IIS in Windows Server 2008
  • Managing Inventory and Reporting
  • Managing Microservices and REST Architecture
  • Managing Microsoft SharePoint Server 2016 Expert Live with Encore
  • Managing Multi-cloud Containers Using Kubernetes
  • Managing Network Interaction
  • Managing Object Construction and Behavior Using Patterns
  • Managing Office 365 Cloud Identities, Synchronization, and Clients
  • Managing Office 365 Identities Using Azure AD Connect
  • Managing Office 365 Identities with PowerShell
  • Managing Privileged Identities Part I
  • Managing Privileged Identities Part II
  • Managing Project Work (PMBOK® Guide Sixth Edition)
  • Managing Projects Using Kanban
  • Managing Server 2016 Malware Solutions
  • Managing Stacks and Application Deployment
  • Managing Stakeholder Engagement (PMBOK® Guide Sixth Edition)
  • Managing Virtual Machine Devices and Resources in VMware Workstation 11
  • Managing XenDesktop 7.5 Desktops and Applications
  • Managing, Troubleshooting, and Automating Software Tests
  • Manipulating the VR Environment
  • Manipulating XML with the XML DOM and Ajax
  • MapReduce Essentials
  • Marketing Automation in Microsoft Dynamics CRM 2013
  • Mastering the Details of a Project's Schedule and Budget
  • Math for Data Science & Machine Learning
  • MATLAB Fundamentals
  • Maven Fundamentals: Documentation, Resources, Plugins, Releases, IDE Integration
  • MD-100 - Windows 10: Active Directory Management
  • MD-100 - Windows 10: Configure Networking
  • MD-100 - Windows 10: Configure Remote Connectivity
  • MD-100 - Windows 10: Configure System & Data Recovery
  • MD-100 - Windows 10: Deployment
  • MD-100 - Windows 10: Manage Devices & Data
  • MD-100 - Windows 10: Manage Updates
  • MD-100 - Windows 10: Monitor a& Manage Windows
  • MD-100 - Windows 10: Perform Post-Installation Configuration
  • MD-100 - Windows 10: Policy-Based Management
  • MD-100 - Windows 10: Prepare for Deployment
  • MD-101 - Managing Modern Desktops: Co-Management
  • MD-101 - Managing Modern Desktops: Conditional Access & Compliance
  • MD-101 - Managing Modern Desktops: Deploy & Update Applications
  • MD-101 - Managing Modern Desktops: Device Authentication
  • MD-101 - Managing Modern Desktops: Device Profiles
  • MD-101 - Managing Modern Desktops: Dynamic Deployments
  • MD-101 - Managing Modern Desktops: Intune Device Enrollment
  • MD-101 - Managing Modern Desktops: Managing Updates
  • MD-101 - Managing Modern Desktops: Mobile Application Management
  • MD-101 - Managing Modern Desktops: Monitoring Devices
  • MD-101 - Managing Modern Desktops: Upgrading Devices
  • MD-101 - Managing Modern Desktops: User Profiles
  • MD-101 - Managing Modern Desktops: Windows Autopilot
  • MD-101 - Managing Modern Desktops: Windows Defender
  • MEAN for FSD Development: Introduction to the MEAN Stack
  • MEAN Stack Development
  • Measurement System Analysis in Six Sigma
  • Measuring and Modeling Relationships between Variables in Six Sigma
  • MERN: Advanced MERN Development
  • Message Handling and Clustering in RabbitMQ
  • Message Records Management
  • Microservice Refactoring Patterns
  • Microservices and Netflix
  • Microservices Architecture
  • Microservices Architecture and Design Patterns
  • Microservices Containers
  • Microservices Current and Future Trends
  • Microservices Deep Dive
  • Microservices Deployment and Continuous Integration
  • Microservices Testing Strategies, Scaling, Monitoring, and Security
  • Microsoft .NET Framework 4.0: Web Applications with Visual Studio 2010 and Visual Basic 2010
  • Microsoft 365 Fundamentals: Mobile Management & Security and Compliance
  • Microsoft 365 Mobility & Security: Implementing Mobile Device Management
  • Microsoft Advanced Windows Store App Development with HTML5: Data and Security
  • Microsoft Advanced Windows Store App Development with HTML5: Localize and Deploy
  • Microsoft Advanced Windows Store App Development with HTML5: Media and Devices
  • Microsoft Advanced Windows Store App Development with HTML5: User Interaction
  • Microsoft Advanced Windows Store Apps with HTML5: Animations and Custom Controls
  • Microsoft Advanced Windows Store Apps with HTML5: Enhancing Performance
  • Microsoft Azure - Implementing Infrastructure Solutions: Virtual Networks
  • Microsoft Azure Architect Technologies: Azure Active Directory
  • Microsoft Azure Architect Technologies: Azure Files and Databases
  • Microsoft Azure Architect Technologies: Azure Remote Connectivity
  • Microsoft Azure Architect Technologies: Load Balancing
  • Microsoft Azure SQL Database Security
  • Microsoft Azure: Introduction
  • Microsoft Azure: Networks and Storage
  • Microsoft Azure: Publishing and Caching
  • Microsoft Dynamics CRM 2013 - Customization and Configuration: Entities
  • Microsoft Dynamics CRM 2013 - Customization and Configuration: Introduction
  • Microsoft Dynamics CRM 2013 - Customization and Configuration: Relationships
  • Microsoft Dynamics CRM 2013: Forms, Marketing, Contacts, and Processes
  • Microsoft Enterprise Library
  • Microsoft Exchange Server 2013 - Advanced Solutions: Advanced Security
  • Microsoft Exchange Server 2013 - Advanced Solutions: Availability
  • Microsoft Exchange Server 2013 - Advanced Solutions: Compliance and Discovery
  • Microsoft Exchange Server 2013 - Advanced Solutions: Migration and Federation
  • Microsoft Exchange Server 2013 - Advanced Solutions: Site-resilience Solutions
  • Microsoft Exchange Server 2013 - Advanced Solutions: Troubleshooting
  • Microsoft Exchange Server 2013 - Advanced Solutions: Unified Messaging
  • Microsoft Exchange Server 2013 - Core Solutions: Monitoring and Troubleshooting
  • Microsoft Lync Server 2013: Administration and Data Resiliency Overview
  • Microsoft Lync Server 2013: Configuration and Maintenance
  • Microsoft PowerShell and Exchange Server: Distribution Groups and Databases
  • Microsoft PowerShell and Exchange Server: Getting Started
  • Microsoft PowerShell and Exchange Server: Managing Mailboxes
  • Microsoft PowerShell and SharePoint: Getting Started
  • Microsoft PowerShell and SharePoint: Managing Sites
  • Microsoft PowerShell and SQL Server: Database Management
  • Microsoft PowerShell and SQL Server: Introduction
  • Microsoft PowerShell for Windows: Aliases, Providers, and Objects
  • Microsoft PowerShell for Windows: Getting Started with PowerShell
  • Microsoft PowerShell for Windows: Remoting and Modules
  • Microsoft Security Fundamentals: Network Security
  • Microsoft Security Fundamentals: Operating System Security
  • Microsoft Security Fundamentals: Security Layers
  • Microsoft Security Fundamentals: Security Software
  • Microsoft SharePoint 2010 Administration Expert Encore
  • Microsoft SharePoint 2013 for Site Owners Expert Live with Encore
  • Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Applications
  • Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Content Support
  • Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Continuity
  • Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Search Services
  • Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Solutions
  • Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Support Service
  • Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Upgrading
  • Microsoft SharePoint Server 2013 - Developing Core Solutions: Business Processes
  • Microsoft SharePoint Server 2013 - Developing Core Solutions: Create Office Apps
  • Microsoft SharePoint Server 2013 - Developing Core Solutions: Implement Security
  • Microsoft SharePoint Server 2013 - Developing Core Solutions: Manage Solutions
  • Microsoft SharePoint Server 2013 - Developing Core Solutions: Managing Data
  • Microsoft SharePoint Server 2013 - Developing Core Solutions: Planning Sites
  • Microsoft SharePoint Server 2013 - Developing Core Solutions: User Experience
  • Microsoft SQL Server 2012 – Developing Databases: CLR Integration
  • Microsoft SQL Server 2012 – Developing Databases: Implementing Indexes
  • Microsoft SQL Server 2012 – Developing Databases: Implementing Tables and Views
  • Microsoft SQL Server 2012 – Developing Databases: Managing and Troubleshooting
  • Microsoft SQL Server 2012 – Developing Databases: Stored Procedures
  • Microsoft SQL Server 2012 – Developing Databases: Tuning and Optimizing Queries
  • Microsoft SQL Server 2012 – Developing Databases: Working with Data
  • Microsoft SQL Server 2012 – Developing Databases: Working with XML Data
  • Microsoft SQL Server 2012 – Implementing a Data Warehouse: Design and Deployment
  • Microsoft SQL Server 2012 – Implementing a Data Warehouse: ETL Solutions
  • Microsoft SQL Server 2012: Configuring High Availability
  • Microsoft SQL Server 2012: Creating Database Objects
  • Microsoft SQL Server 2012: Creating Functions and Triggers
  • Microsoft SQL Server 2012: Creating Programming Objects and Optimizing Queries
  • Microsoft SQL Server 2012: Instance Configuration and Database Creation
  • Microsoft SQL Server 2012: Managing Database Data
  • Microsoft SQL Server 2012: Managing Databases and Automating Tasks
  • Microsoft SQL Server 2012: Managing XML Data
  • Microsoft SQL Server 2012: Manipulate Data Using Operators and Functions
  • Microsoft SQL Server 2012: Querying Basics and Modifying Data
  • Microsoft SQL Server 2014 - Designing BI Solutions: Availability and Recovery
  • Microsoft SQL Server 2014 - Designing BI Solutions: BI Infrastructure Design
  • Microsoft SQL Server 2014 - Designing BI Solutions: Data Models
  • Microsoft SQL Server 2014 - Designing BI Solutions: Extract, Transform, and Load
  • Microsoft SQL Server 2014 - Designing BI Solutions: MDX Queries and Performance
  • Microsoft SQL Server 2014 - Designing BI Solutions: Reporting Services
  • Microsoft SQL Server 2014 - Designing BI Solutions: SharePoint Integration
  • Microsoft SQL Server 2014 - Designing Solutions: Backup and Recovery
  • Microsoft SQL Server 2014 - Designing Solutions: Clustering and AlwaysOn
  • Microsoft SQL Server 2014 - Designing Solutions: High Availability
  • Microsoft SQL Server 2014 - Designing Solutions: Planning Infrastructure
  • Microsoft SQL Server 2014 - Designing Solutions: Private Clouds
  • Microsoft SQL Server 2014 - Designing Solutions: Windows Azure SQL Database
  • Microsoft SQL Server 2014 - Developing Databases: New Features
  • Microsoft SQL Server 2014: Create and Manage Tabular Data Models
  • Microsoft SQL Server 2014: Design and Implement Dimensions
  • Microsoft SQL Server 2014: Design and Install Analysis Services and Tools
  • Microsoft SQL Server 2014: Design Reports and Create Data Sources and Datasets
  • Microsoft SQL Server 2014: Designing Multidimensional Models and Data Sources
  • Microsoft SQL Server 2014: Manage Reporting Services
  • Microsoft SQL Server 2014: Manage, Maintain, and Troubleshoot SSAS
  • Microsoft SQL Server 2014: MDX Queries, Process Models, and Deploy Databases
  • Microsoft SQL Server 2014: Process Report and Create Subscriptions and Schedules
  • Microsoft SQL Server 2014: Report Formatting and Interactivity
  • Microsoft SQL Server 2016 First Look: Preview
  • Microsoft SQL Server 2016: Auditing
  • Microsoft SQL Server 2016: Backing Up Databases
  • Microsoft SQL Server 2016: Data Access and Permissions
  • Microsoft SQL Server 2016: Encryption
  • Microsoft SQL Server 2016: High Availability and Disaster Recovery
  • Microsoft SQL Server 2016: Managing Database Integrity
  • Microsoft SQL Server 2016: Managing Indexes and Statistics
  • Microsoft SQL Server 2016: Monitoring Database Activity and Queries
  • Microsoft SQL Server 2016: Monitoring SQL Server Instances
  • Microsoft SQL Server 2016: Restoring Databases
  • Microsoft SQL Server Data Warehousing and Business Intelligence Overview
  • Microsoft SQL Server: Implement and Configure Cubes
  • Microsoft SQL Server: Implement Partitions and Custom Logic
  • Microsoft System Center 2012 R2 – Configure and Deploy: Application Delivery
  • Microsoft System Center 2012 R2 – Configure and Deploy: Automation
  • Microsoft System Center 2012 R2 – Configure and Deploy: Building Private Clouds
  • Microsoft System Center 2012 R2 – Configure and Deploy: DPM
  • Microsoft System Center 2012 R2 – Configure and Deploy: Extending & Maintaining
  • Microsoft System Center 2012 R2 – Configure and Deploy: Monitoring
  • Microsoft System Center 2012 R2 – Configure and Deploy: Service Management
  • Microsoft System Center 2012 R2 – Configure and Deploy: VMM Overview
  • Microsoft System Center 2012 R2 – Monitor and Operate: Backup and Recovery
  • Microsoft System Center 2012 R2 – Monitor and Operate: Compliance
  • Microsoft System Center 2012 R2 – Monitor and Operate: Deploying Cloud Services
  • Microsoft System Center 2012 R2 – Monitor and Operate: Monitoring Cloud Services
  • Microsoft System Center 2012 R2 – Monitor and Operate: Private Cloud Overview
  • Microsoft System Center 2012 R2 – Monitor and Operate: Problem Management
  • Microsoft System Center 2012 R2 – Monitor and Operate: Service Management
  • Microsoft System Center 2012 R2 – Monitor and Operate: SLAs Widgets & Dashboards
  • Microsoft Team Foundation Server 2013: Clients, Workspaces, and Version Control
  • Microsoft Team Foundation Server 2013: Customization for Team Use
  • Microsoft Team Foundation Server 2013: Installation and Configuration
  • Microsoft Team Foundation Server 2013: Managing an Implementation
  • Microsoft Visual Studio 2012: Advanced HTML5 and JavaScript
  • Microsoft Visual Studio 2012: Consuming and Transmitting Data with HTML5
  • Microsoft Visual Studio 2012: HTML5 and JavaScript
  • Microsoft Visual Studio 2012: HTML5 APIs and Local Storage
  • Microsoft Visual Studio 2012: HTML5 Graphics and Animation
  • Microsoft Visual Studio 2012: HTML5, CSS3, and Adaptive UIs
  • Microsoft Visual Studio 2012: Introduction to HTML5 and CSS3
  • Microsoft Visual Studio 2012: Utilizing the HTML5 WebSocket API and Web Workers
  • Microsoft Windows - Deploying Windows Devices and Apps: Assessment Strategies
  • Microsoft Windows - Deploying Windows Devices and Enterprise Apps: Activation
  • Microsoft Windows - Deploying Windows Devices and Enterprise Apps: Compatibility
  • Microsoft Windows - Deploying Windows Devices and Enterprise Apps: Images & PXE
  • Microsoft Windows - Deploying Windows Devices and Enterprise Apps: MDT and LTI
  • Microsoft Windows - Deploying Windows Devices and Enterprise Apps: ZTI and SCCM
  • Microsoft Windows - Managing Enterprise Devices and Apps: Client Management
  • Microsoft Windows - Managing Enterprise Devices and Apps: Compliance
  • Microsoft Windows - Managing Enterprise Devices and Apps: Desktops and Devices
  • Microsoft Windows - Managing Enterprise Devices and Apps: Inventory and Assets
  • Microsoft Windows - Managing Enterprise Devices and Apps: Managing Applications
  • Microsoft Windows - Managing Enterprise Devices and Apps: Preparing SCCM
  • Microsoft Windows - Managing Enterprise Devices and Apps: Site Management
  • Microsoft Windows - Managing Enterprise Devices and Apps: Software Updates
  • Microsoft Windows 10 First Look: Configuration
  • Microsoft Windows 10 First Look: Interface and New Features
  • Microsoft Windows 10: Implementing Windows
  • Microsoft Windows 10: Supporting Authentication, Permissions, and Data Security
  • Microsoft Windows 10: Supporting Client Compliance and Managing Clients
  • Microsoft Windows 10: Supporting Connectivity and Data Storage
  • Microsoft Windows 10: Supporting Hardware, Performance, and Mobile Devices
  • Microsoft Windows 10: Supporting Operating System and Application Installation
  • Microsoft Windows Nano Server: Nano Server First Look
  • Microsoft Windows Performance Monitoring Basics
  • Microsoft Windows Performance Monitoring Best Practice
  • Microsoft Windows Performance Tools In Windows Operating Systems
  • Microsoft Windows Server 2012 R2 - Administration: Deploying and Managing WDS
  • Microsoft Windows Server 2012 R2 - Administration: File Services and Encryption
  • Microsoft Windows Server 2012 R2 - Administration: Group Policy Processing
  • Microsoft Windows Server 2012 R2 - Administration: Managing Active Directory
  • Microsoft Windows Server 2012 R2 - Administration: Managing GPOs and Preferences
  • Microsoft Windows Server 2012 R2 - Administration: Network Services and Access
  • Microsoft Windows Server 2012 R2 - Administration: RADIUS, NPS, and NAP
  • Microsoft Windows Server 2012 R2 - Administration: Service Accounts and Policies
  • Microsoft Windows Server 2012 R2 - Administration: Updating and Monitoring
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: AD RMS and AD FS
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Business Continuity
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Certificate Services
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Clustering and NLB
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Monitoring
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Storage and Networks
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Updates
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: VM Administration
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: VM hosts and guests
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: AD Domains
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: AD Replication
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: DAC
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: DHCP & DNS
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: Federation
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: HA
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: PKI
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: Storage
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: VMs and DR
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: Active Directory
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: AD Groups & GPOs
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: DNS
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: Hyper - V
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: Networking
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: Print Services
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: Security
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: Servers
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: Storage
  • Microsoft Windows Server 2012 R2: Server Infrastructure - AD Design
  • Microsoft Windows Server 2012 R2: Server Infrastructure - AD DS
  • Microsoft Windows Server 2012 R2: Server Infrastructure - DHCP Design
  • Microsoft Windows Server 2012 R2: Server Infrastructure - DNS, File and Storage
  • Microsoft Windows Server 2012 R2: Server Infrastructure - Implement NPS and WAP
  • Microsoft Windows Server 2012 R2: Server Infrastructure - IPAM and VPN
  • Microsoft Windows Server 2012 R2: Server Infrastructure - Network Protection
  • Microsoft Windows Server 2012 R2: Server Infrastructure - OU and Group Policy
  • Microsoft Windows Server 2012 R2: Server Infrastructure – DirectAccess
  • Microsoft Windows Server 2012 R2: Server Infrastructure – Server Deployment
  • Microsoft Windows Server 2016 (First Look): Active Directory and Networking
  • Microsoft Windows Store App Essentials with HTML5: Deployment
  • Microsoft Windows Store App Essentials with HTML5: Input Devices and User Touch
  • Microsoft Windows Store App Essentials with HTML5: Managing Data
  • Microsoft Windows Store App Essentials with HTML5: Navigation, Contacts, Tiles
  • Microsoft Windows Store App Essentials with HTML5: Overview
  • Microsoft Windows Store App Essentials with HTML5: PLM and Contracts
  • Microsoft Windows Store App Essentials with HTML5: Security
  • Microsoft Windows Store App Essentials with HTML5: The UI and Layout Controls
  • Migrating Client Applications
  • ML/DL Best Practices: Building Pipelines with Applied Rules
  • ML/DL Best Practices: Machine Learning Workflow Best Practices
  • Mobile App Development: An Introduction Android Development
  • Mobile App Development: Authentication in an Android App
  • Mobile App Development: Building a Basic Android App
  • Mobile App Development: Coding the Behavior of an Android App
  • Mobile App Development: Defining the UI for an Android App
  • Mobile App Development: Testing an Android App
  • Mobile Center for Xamarin and React Native
  • Mobile Center Identity and Troubleshooting
  • Mobile Center SDK for Android and iOS
  • Mobile Center Tools
  • Model Development, Validation, & Evaluation
  • Model Life Cycle Management
  • Modifying and Summarizing Data
  • Module-based Testing: Automated Testing with Model-based Testing
  • MongoDB for Data Wrangling: Aggregation
  • MongoDB for Data Wrangling: Querying
  • MongoDB: Backups, Monitoring, and Stats
  • MongoDB: Cloud and Hadoop Deployments
  • MongoDB: Indexes and Query Optimization
  • MongoDB: Installation Overview
  • MongoDB: Integration with Python
  • MongoDB: Integration with Spark
  • MongoDB: Java REST and GridFS
  • MongoDB: Map Reduce, Atomic Counters, and Binary Data
  • MongoDB: Replication and Security
  • MongoDB: System Management
  • MongoDB: User Management
  • MongoDB: Write, Read, and Aggregate Data
  • Monitor Network Infrastructure in Windows Server 2008
  • Monitor Project Communications (PMBOK® Guide Sixth Edition)
  • Monitor, Tune, and Troubleshoot SharePoint 2016
  • Monitoring & Logging
  • Monitoring & Securing System Configuration
  • Monitoring a Citrix XenDesktop 7.6 Environment
  • Monitoring Office 365 Usage
  • Monitoring, Backups, and Recovery in Windows Server 2008
  • More Advanced HTML5 and CSS3
  • More Spotfire Visualization Techniques
  • Motivating Action with a Compelling and Data-driven Story
  • MS Azure DevOps Solutions: Code Flow & Mobile DevOps
  • MS-100 - Microsoft 365 Identity and Services: Application Access
  • MS-100 - Microsoft 365 Identity and Services: Application Deployment
  • MS-100 - Microsoft 365 Identity and Services: Authentication
  • MS-100 - Microsoft 365 Identity and Services: Designing a Hybrid Identity
  • MS-100 - Microsoft 365 Identity and Services: External Users
  • MS-100 - Microsoft 365 Identity and Services: Identity Strategy
  • MS-100 - Microsoft 365 Identity and Services: Manage Azure AD Identities
  • MS-100 - Microsoft 365 Identity and Services: Migrating Users & Data
  • MS-100 - Microsoft 365 Identity and Services: Multi-Factor Authentication (MFA)
  • MS-100 - Microsoft 365 Identity and Services: Office 365 Workload Deployment
  • MS-100 - Microsoft 365 Identity and Services: Planning a Microsoft Implementation
  • MS-100 - Microsoft 365 Identity and Services: Subscription & Tenant Health
  • MS-100 - Microsoft 365 Identity and Services: Tenancy & Subscriptions
  • MS-100 - Microsoft 365 Identity and Services: User Roles
  • MS-101 - Microsoft 365 Mobility & Security: Auditing
  • MS-101 - Microsoft 365 Mobility & Security: Azure Information Protection
  • MS-101 - Microsoft 365 Mobility & Security: Cloud App Security
  • MS-101 - Microsoft 365 Mobility & Security: Data Governance
  • MS-101 - Microsoft 365 Mobility & Security: Data Loss Prevention
  • MS-101 - Microsoft 365 Mobility & Security: Devices & Apps
  • MS-101 - Microsoft 365 Mobility & Security: eDiscovery
  • MS-101 - Microsoft 365 Mobility & Security: Managing Device Compliance
  • MS-101 - Microsoft 365 Mobility & Security: Security Reports & Alerts
  • MS-101 - Microsoft 365 Mobility & Security: Threat Management
  • MS-101 - Microsoft 365 Mobility & Security: Windows 10 Deployment
  • MS-101 - Microsoft 365 Mobility & Security: Windows Defender Threat Protection
  • MS-200 - Configuring a Messaging Platform: Client Access
  • MS-200 - Configuring a Messaging Platform: Connectors
  • MS-200 - Configuring a Messaging Platform: Database Availability Groups
  • MS-200 - Configuring a Messaging Platform: Database Management
  • MS-200 - Configuring a Messaging Platform: Disaster Recovery
  • MS-200 - Configuring a Messaging Platform: Mail Flow
  • MS-200 - Configuring a Messaging Platform: Messaging Infrastructure Lifecycle
  • MS-200 - Configuring a Messaging Platform: Mobile Devices
  • MS-200 - Configuring a Messaging Platform: Recipient Resources
  • MS-200 - Configuring a Messaging Platform: Transport Pipeline
  • MS-200 - Configuring a Messaging Platform: Troubleshooting Mail Flow Problems
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Address Lists
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Advanced Threat Protection (ATP)
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Compliance
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Deploying Hybrid Environments
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: E-mail Address Policies and Workload M
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Message Hygiene
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Migration
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Offline Address Books (OAB)
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Planning Hybrid Environments
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Public Folders
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Retention & Data Loss Prevention
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Role-based Permissions
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Sharing
  • MS-300 - Deploying Microsoft 365 Teamwork: Customizations, Apps, & Metadata
  • MS-300 - Deploying Microsoft 365 Teamwork: Guest Access
  • MS-300 - Deploying Microsoft 365 Teamwork: Manage and Monitor SharePoint Online
  • MS-300 - Deploying Microsoft 365 Teamwork: Monitoring OneDrive
  • MS-300 - Deploying Microsoft 365 Teamwork: OneDrive Users & Groups
  • MS-300 - Deploying Microsoft 365 Teamwork: Sharing & Security
  • MS-300 - Deploying Microsoft 365 Teamwork: Site Collections & Hub Sites
  • MS-300: Deploying Microsoft 365 Teamwork: Identity and Authentication for Teams
  • MS-300: Deploying Microsoft 365 Teamwork: Managing & Monitoring the Teams Environment & Service
  • MS-300: Deploying Microsoft 365 Teamwork: OneDrive for Business
  • MS-300: Deploying Microsoft 365 Teamwork: Teams Settings
  • MS-900 - Microsoft 365 Fundamentals: Azure AD & Access Management
  • MS-900 - Microsoft 365 Fundamentals: Cloud Benefits & Considerations
  • MS-900 - Microsoft 365 Fundamentals: Cloud Services & Principles
  • MS-900 - Microsoft 365 Fundamentals: Deployment Planning, Azure, & Updates
  • MS-900 - Microsoft 365 Fundamentals: Microsoft 365 Pricing and Support
  • MS-900 - Microsoft 365 Fundamentals: Microsoft 365 Purchasing & Support
  • MS-900 - Microsoft 365 Fundamentals: Microsoft 365, Exchange, & SharePoint
  • MS-900 - Microsoft 365 Fundamentals: Office 365 & Collaboration
  • MS-900 - Microsoft 365 Fundamentals: Protecting Your Information
  • MS-900 - Microsoft 365 Fundamentals: Skype for Business, Teams, & Collaboration
  • MS-900 - Microsoft 365 Fundamentals: Understanding Cloud Concepts
  • MS-900 - Microsoft 365 Fundamentals: Windows 10 & Admin Center
  • MS-900 - Microsoft 365 Fundamentals: Windows 10 Enterprise
  • MS-900 - Microsoft 365 Fundamentals: Windows 10, Autopilot, & Azure
  • MS300 - Deploying Microsoft 365 Teamwork: Integrate Microsoft 365 Workloads
  • MS300 - Deploying Microsoft 365 Teamwork: Microsoft 365 and External Data & Systems
  • MS300 - Deploying Microsoft 365 Teamwork: Stream Capabilities
  • MS300 - Deploying Microsoft 365 Teamwork: Yammer
  • Multi-vari Studies, Correlation, and Linear Regression in Six Sigma
  • Multivariate Tools and Nonparametric Tests in Six Sigma
  • MVC Application Routes
  • MVC Application Routes
  • MySQL as a Datastore
  • MySQL Database Development: Database Design Fundamentals
  • MySQL Database Development: DDL Statements
  • MySQL Database Development: GIS, Cloud, and Connectors for MySQL
  • MySQL Database Development: Introduction
  • MySQL Database Development: Manipulating Data
  • MySQL Database Development: Query and Performance Optimization
  • MySQL Database Development: SELECT Statement and Operators
  • MySQL Database Development: Stored Routines, Triggers, and the InnoDB memcached Plugin
  • MySQL Database Development: Working with Functions
  • MySQL: Administration, Transactions, Optimization, Scaling, Backup, and Recovery
  • MySQL: Advanced Routines, Optimization, and DCL
  • MySQL: Creating & Updating Tables
  • MySQL: Database Concepts, Design, and Installation
  • MySQL: General Syntax, Advanced Queries, and Stored Programs
  • MySQL: Getting Started
  • MySQL: Grouping & Aggregation Operations
  • MySQL: Performance Monitoring, Database Health and Integrity, and Security
  • MySQL: Querying Data
  • MySQL: Querying Data Using the SELECT Statement
  • MySQL: Storage Engines, Advanced Indexing, and Maintenance
  • MySQL: Transactions, Savepoints, & Locks
  • MySQL: Triggers & Stored Procedures
  • MySQL: Understanding & Implementing Joins
  • MySQL: Using the Data Manipulation and Definition Statements
  • MySQL: Views, Indices, & Normal Forms
  • Name Resolution in Windows Server 2008
  • Navigating Software Testing Tools: Types of Software Testing Tools
  • Navigating through Changes and Conflicts in Projects
  • Navigation and Layout in Windows Store Apps
  • Navigation Elements and Animations with CSS3
  • Need for Design Patterns and the Principles Guiding Design Patterns
  • Network Access in Microsoft Windows Server 2008
  • Network Access Security in Windows Server 2008
  • Network Survey & Extraction: Network Analysis
  • Network Survey & Extraction: Network Monitoring
  • Networking Fundamentals: Configuring Wired and Wireless Networks and Firewalls
  • Networking Fundamentals: Remote Connections, Shares, and Mac OSX Networking
  • Networking with Windows Server 2016 Expert Live with Encore
  • Neural Networks
  • New Features of Android 7
  • New Project Manager Essentials
  • NHibernate Advanced Techniques
  • NHibernate Essentials
  • NLP for ML with Python: Advanced NLP Using spaCy & Scikit-learn
  • NLP for ML with Python: NLP Using Python & NLTK
  • NoSQL Concepts and Background
  • NoSQL for FSD Development
  • NoSQL Models and Applications
  • Notifications with Toasts and Tiles
  • Object-oriented Programming Fundamentals
  • Office 365 and Azure AD Connect
  • Office 365 Configuring Domains
  • Office 365 DNS Records and Rights Management
  • Office 365 Federated Identities (Single Sign-On)
  • Office 365 Federated Identities - Single Sign-On
  • Office 365 Managing AD FS Servers
  • Office 365 Pilot Deployment
  • Office 365 Services: Configuring Exchange Online and Lync Online
  • Office 365 Services: SharePoint Online Site Collections
  • Office 365 Tenancy and Licensing
  • Online Prototyping with iRise
  • Operating Hadoop Clusters
  • Operationalize and Design with Spark
  • Operations Manager
  • Operators and Expressions in SQL Server 2016
  • Optimize SQL Database Objects and Infrastructure
  • Optimizing and Debugging ANSI C Programs
  • Optimizing and Protecting Application Data
  • Optimizing Application Data
  • Optimizing Clojure Projects
  • Optimizing for Unity VR
  • Optimizing jQuery Mobile Apps
  • Optimizing the Customer Experience
  • Oracle 12c Performance Tuning: Application Monitoring and SQL Diagnostics
  • Oracle 12c Performance Tuning: Automatic Workload Repository
  • Oracle 12c Performance Tuning: Introduction
  • Oracle 12c Performance Tuning: Measuring and Maintaining SQL Performance
  • Oracle 12c Performance Tuning: Metrics and Monitoring
  • Oracle 12c Performance Tuning: Performance Tuning Summary
  • Oracle 12c Performance Tuning: Tuning Instance Memory
  • Oracle 12c Performance Tuning: Tuning Problem SQL Statements
  • Oracle Commerce Application Structure and Deployment
  • Oracle Database 11g Release 2: Application Performance Enhancements
  • Oracle Database 11g Release 2: ASM, Storage and Partitioning Enhancements
  • Oracle Database 11g Release 2: Backup and Recovery
  • Oracle Database 11g Release 2: Backup, Recover, Archive, and Repair Data
  • Oracle Database 11g Release 2: Database Architecture and Installation
  • Oracle Database 11g Release 2: Database Architecture and Recovery Operations
  • Oracle Database 11g Release 2: Database Creation and Instance Management
  • Oracle Database 11g Release 2: Database Diagnostics and Flashback Technologies
  • Oracle Database 11g Release 2: Diagnosability Enhancements
  • Oracle Database 11g Release 2: Installation and Oracle Restart
  • Oracle Database 11g Release 2: Intelligent Infrastructure Enhancements
  • Oracle Database 11g Release 2: Managing Concurrency, Undo, and Auditing
  • Oracle Database 11g Release 2: Managing Database Maintenance and Performance
  • Oracle Database 11g Release 2: Managing Database Memory and Performance
  • Oracle Database 11g Release 2: Managing Database Resources and the Scheduler
  • Oracle Database 11g Release 2: Managing Database Space and Duplication
  • Oracle Database 11g Release 2: Moving Data and Oracle Support
  • Oracle Database 11g Release 2: Oracle Partitioning and Security Features
  • Oracle Database 11g Release 2: Oracle Scheduler and Secure Backup
  • Oracle Database 11g Release 2: Performing Restore and Recovery Tasks
  • Oracle Database 11g Release 2: SQL Monitoring and Performance Enhancements
  • Oracle Database 11g Release 2: Storage Structures and User Security
  • Oracle Database 11g Release 2: The ASM Instance and Network Connectivity
  • Oracle Database 11g Release 2: The RMAN Catalog and Creating Backups
  • Oracle Database 11g Release 2: Using Change Management Solutions
  • Oracle Database 11g Release 2: Using, Monitoring and Tuning RMAN
  • Oracle Database 11g: Configure, Manage, and Use Services in RAC
  • Oracle Database 11g: Installation of Clusterware and RAC
  • Oracle Database 12c - Backup and Recovery: Configuring for Recoverability
  • Oracle Database 12c - Backup and Recovery: Duplicating Databases and Tuning RMAN
  • Oracle Database 12c - Backup and Recovery: Failure and Recovery Concepts
  • Oracle Database 12c - Backup and Recovery: Perform Recovery and Secure Backup
  • Oracle Database 12c - Backup and Recovery: Performing and Managing Backups
  • Oracle Database 12c - Backup and Recovery: Transporting Data and Performing PITR
  • Oracle Database 12c - Backup and Recovery: Using Flashback Technologies
  • Oracle Database 12c - Introduction to SQL: Data Conversion and Aggregating Data
  • Oracle Database 12c - Introduction to SQL: Data Manipulation Language
  • Oracle Database 12c - Introduction to SQL: Relational Database and SQL Developer
  • Oracle Database 12c - Introduction to SQL: Restrict, Sort, and Customize Output
  • Oracle Database 12c - Introduction to SQL: SQL*Plus and SELECT Statement
  • Oracle Database 12c - Introduction to SQL: Working with Joins and Subqueries
  • Oracle Database 12c - Introduction to SQL: Working with SET Operators and DDL
  • Oracle Database 12c – Install and Upgrade: Database Architecture
  • Oracle Database 12c – Install and Upgrade: Installation
  • Oracle Database 12c – Install and Upgrade: Upgrading
  • Oracle Database 12c R2 SQL: Controlling User Access
  • Oracle Database 12c R2 SQL: Conversion Functions and Conditional Expressions
  • Oracle Database 12c R2 SQL: Creating Other Schema Objects
  • Oracle Database 12c R2 SQL: Data Definition Language (DDL)
  • Oracle Database 12c R2 SQL: Data Manipulation Language and Transaction Control Language
  • Oracle Database 12c R2 SQL: Displaying Data from Multiple Tables
  • Oracle Database 12c R2 SQL: Managing Objects with Data Dictionary Views 
  • Oracle Database 12c R2 SQL: Managing Schema Objects    
  • Oracle Database 12c R2 SQL: Manipulating Data Using Advanced Queries
  • Oracle Database 12c R2 SQL: Reporting Aggregated Data Using the Group Functions   
  • Oracle Database 12c R2 SQL: Restricting and Sorting Data
  • Oracle Database 12c R2 SQL: SQL*Plus
  • Oracle Database 12c R2 SQL: Using Basic SELECT statements
  • Oracle Database 12c R2 SQL: Using Single-Row Functions to Customize Output   
  • Oracle Database 12c R2 SQL: Using Structured Query Language (SQL)
  • Oracle Database 12c R2 SQL: Using Subqueries to Solve Queries 
  • Oracle Database 12c R2 SQL: Using the Set Operators
  • Oracle Database 12c RAC Administration: Backup and Recovery
  • Oracle Database 12c RAC Administration: Client Connections and QoS
  • Oracle Database 12c RAC Administration: Day-to-Day Administration
  • Oracle Database 12c RAC Administration: Global Resource Management
  • Oracle Database 12c RAC Administration: Installing, Configuring, and Patching
  • Oracle Database 12c RAC Administration: Introduction to Oracle RAC
  • Oracle Database 12c RAC Administration: Monitoring and Tuning
  • Oracle Database 12c RAC Administration: Services and Multitenant Architecture
  • Oracle Database 12c: Enterprise Manager Cloud Control and Creating CDB and PDB
  • Oracle Database 12c: High Availability and Database Management
  • Oracle Database 12c: Managing CDB and PDB, and Data Optimization
  • Oracle Database 12c: Managing Security
  • Oracle Database 12c: Resource Manager, Online Operations, and ADR
  • Oracle Database 12c: Transporting Databases and Managing Data
  • Oracle Database 12c: Tuning SQL and Using ADDM
  • Oracle Database 12c: Using Automatic Data Optimization, Storage, and Archiving
  • Orchestrator Performance and Requirements
  • Organization and HR: Employee Relations
  • Organization and HR: Organizational Effectiveness and Development
  • Organization and HR: Structure of the HR Function
  • Organization and HR: Workforce Management and Using Technology and Data
  • Organizational Goals and Six Sigma
  • OSs, Regulations, & Laws
  • Overview & Prerequisite Setup for System Center Configuration Manager 2012 R2
  • Overview of the ITIL® Service Lifecycle
  • Overview of the Scrum Development Process
  • OWASP A10 and A9: API and Component Attacks
  • OWASP A4 and A2: Broken Applications
  • OWASP A5 and A1: Security and Injection
  • OWASP A7 and A6: Leaky and Unprepared Applications
  • OWASP A8 and A3: Cross-site Attacks
  • OWASP Overview
  • OWASP Top 10: List Item Overview
  • OWASP: Top 10 & Web Applications
  • OWASP: Top 10 Item A10
  • OWASP: Top 10 Items A3, A2, & A1
  • OWASP: Top 10 Items A6, A5, & A4
  • OWASP: Top 10 Items A9, A8, & A7
  • OWASP: Web Application Security
  • Packages and Data Types
  • Patch Management and Securing and Monitoring Servers in Windows Server 2008
  • Patterns in Programming: API Design Patterns
  • PAWS and LAPS
  • Pen Testing Awareness: Results Management
  • Pen Testing: Advanced Pen Testing Techniques
  • Pen Testing: End-user Behavior
  • Penetration Testing Fundamentals
  • Perform Quality Assurance and Quality Control (PMBOK® Guide Fifth Edition)
  • Performance Analyzer Features
  • Performance Metrics for Six Sigma
  • Performance Monitoring
  • Performance Testing and JMeter
  • Performance Tuning
  • Performance Tuning of Hadoop Clusters
  • Perl Language Essentials
  • Perl Programming Techniques
  • Personal Skills for Effective Business Analysis
  • Perspectives for Effective Business Analysis
  • PhoneGap: Exploring Advanced Features
  • PhoneGap: Exploring Basic Features
  • Physical Penetration Testing
  • Plan and Acquire Resources (PMBOK® Guide Sixth Edition)
  • Plan and Define Project Scope (PMBOK® Guide Sixth Edition)
  • Plan and Manage Communications (PMBOK® Guide Sixth Edition)
  • Planning Active Directory and Group Policy for Windows Server 2008
  • Planning AI Implementation
  • Planning an Agile Software Development Project
  • Planning and Controlling the Project Schedule
  • Planning and Installing SharePoint 2016
  • Planning Business Analysis Communication and Monitoring
  • Planning for and Deploying Mailbox Servers
  • Planning for Data Protection Manager
  • Planning Measures: Incident Response Planning
  • Planning Name Resolution and IP Addressing in Microsoft Windows Server 2008
  • Planning Project Quality (PMBOK® Guide Fifth Edition)
  • Planning Quality Management (PMBOK® Guide Sixth Edition)
  • Planning Risk Management (PMBOK® Guide Sixth Edition)
  • Planning Stakeholder Engagement (PMBOK® Guide Sixth Edition)
  • Planning Windows Server 2008 Deployment
  • Planning, Installation, and Upgrading
  • PMP Practical Exercises (PMBOK® Guide Fifth Edition)
  • Policy & Governance: Incident Response
  • Polishing Your Skills for Excellent Customer Service
  • Positioning Powerful Messages to Enable Action
  • Post-Test 1: Under the Hood - Motherboards & Components
  • Post-Test 1: Windows XP
  • Post-Test 1: Active Directory Design and Implementation
  • Post-Test 1: Active Directory Domain Controllers, Accounts, and Permissions
  • Post-Test 1: Computer Network Fundementals
  • Post-Test 1: Configure and Manage High Availability
  • Post-Test 1: Configuring Advanced Services
  • Post-Test 1: Deploy, Manage, and Maintain Servers
  • Post-Test 1: Designing a Farm Topology
  • Post-Test 1: Encryption, Data Access, Permissions, and Auditing
  • Post-Test 1: Exchange Server 2013 SP1 Solution Planning and Implementation
  • Post-Test 1: Initiating a Project
  • Post-Test 1: Initiating a Project
  • Post-Test 1: Inside a Computer
  • Post-Test 1: Install and Configure Windows Server 2012 Servers
  • Post-Test 1: Install, Manage, and Use Windows 10
  • Post-Test 1: Installing and Configuring Microsoft SharePoint 2010
  • Post-Test 1: Installing SQL Server Instances and Creating Databases
  • Post-Test 1: Installing, Upgrading, Migrating to Windows 8
  • Post-Test 1: Introduction to Clustering and HA
  • Post-Test 1: Introduction to JavaScript
  • Post-Test 1: Introduction to Virtualization and VMware’s ESXi
  • Post-Test 1: IPv4/IPv6 Address and DHCP Management
  • Post-Test 1: Managing a Server Infrastructure
  • Post-Test 1: Plan, Deploy, Manage, and Troubleshoot Mailbox Databases
  • Post-Test 1: Planning and Installing SCCM
  • Post-Test 1: Planning, Configuring, and Managing Site Resilience
  • Post-Test 1: Planning, Install, or Upgrade to SharePoint 2016
  • Post-Test 1: Server Roles and Remote Management
  • Post-Test 1: SharePoint Components and Design
  • Post-Test 1: SQL Server 2016 Database Objects, Indexes, and Views
  • Post-Test 1: The Datacenter and SCVMM
  • Post-Test 1: Threats and Attacks
  • Post-Test 1: Understanding Network Security
  • Post-Test 1: Understanding SharePoint 2013 as a Business User
  • Post-Test 1: Understanding Windows
  • Post-Test 1: Upgrading to SharePoint Server 2013
  • Post-Test 1: Upgrading, Managing, and Monitoring
  • Post-Test 1: Windows PowerShell Foundations
  • Post-Test 2: Active Directory Object Management
  • Post-Test 2: Addressing and Routing
  • Post-Test 2: Backing Up and Restoring Databases
  • Post-Test 2: Clustered VMs and DR
  • Post-Test 2: Columnstore Indexes and Programmability Objects
  • Post-Test 2: Compliance and Operational Security
  • Post-Test 2: Computer Components
  • Post-Test 2: Configure Devices, Storage, & Network Connections in Windows 10
  • Post-Test 2: Configure File and Print Services
  • Post-Test 2: Configure File and Storage Solutions
  • Post-Test 2: Configure Windows Server 2012 Server Roles and Features
  • Post-Test 2: Configuring User Accounts and Policies in Windows 8
  • Post-Test 2: Deploying and Managing Network Servers
  • Post-Test 2: Developing the Mailbox Role
  • Post-Test 2: Developing the Mailbox Role
  • Post-Test 2: Disks, NTFS, and Sharing
  • Post-Test 2: Distributed Resource Scheduler
  • Post-Test 2: DNS Name Resolution and Zone Configuration
  • Post-Test 2: JavaScript Data Types
  • Post-Test 2: Manage Data in SQL 2012
  • Post-Test 2: Managing and Maintaining Servers, Images, and Storage Solutions
  • Post-Test 2: Managing Operating System Deployments
  • Post-Test 2: More Windows Options
  • Post-Test 2: OU Design and Implementation to Support Group Policy
  • Post-Test 2: Planning Application Services and Component Deployment
  • Post-Test 2: Planning Configuring and Managing Advanced Security
  • Post-Test 2: Planning for Business Continuity in SharePoint Server 2013
  • Post-Test 2: Planning the Project Scope and Schedule
  • Post-Test 2: Planning the Project Scope and Schedule
  • Post-Test 2: Power and Connection Interfaces
  • Post-Test 2: SharePoint 2016 Security
  • Post-Test 2: Upgrading to Microsoft SharePoint 2010
  • Post-Test 2: Using SharePoint Content
  • Post-Test 2: VM Hosts, Storage, and Networks
  • Post-Test 2: VMware Component Installation for vSphere 6.0
  • Post-Test 2: Vulnerabilities and Organizational Security
  • Post-Test 2: Web and Service Applications
  • Post-Test 2: Windows PowerShell-The Next Level
  • Post-Test 2: Windows Vista
  • Post-Test 3: Advanced Windows Configuration
  • Post-Test 3: Building a Computer
  • Post-Test 3: Cluster Monitoring and Profiles
  • Post-Test 3: Conditional Program Execution
  • Post-Test 3: Configure Network Services and Access
  • Post-Test 3: Configure Windows Server 2012 Hyper-V
  • Post-Test 3: Configuring and Administering SharePoint 2010 Search
  • Post-Test 3: Configuring and Managing Compliance, Archiving, and Discovery Solutions
  • Post-Test 3: Configuring Client Access Services
  • Post-Test 3: Configuring Storage, File Management, and DAC
  • Post-Test 3: Configuring User Applications and Virtualization in Windows 8
  • Post-Test 3: Cryptography, Keys, and Wireless Security
  • Post-Test 3: Data Deduplication, Hyper-V Installation and Configuration
  • Post-Test 3: Deploying Applications and Software Updates
  • Post-Test 3: Establishing Site Owners
  • Post-Test 3: Implement Business Continuity and Disaster Recovery
  • Post-Test 3: Implementing IP Address Management (IPAM)
  • Post-Test 3: Introduction to VMware Basic Networking
  • Post-Test 3: IP Subnetting, DHCP, and NIC Teaming
  • Post-Test 3: Maintaining Active Directory, Trusts and Site Management
  • Post-Test 3: Managing Database Integrity
  • Post-Test 3: Network Infrastructures
  • Post-Test 3: Networking
  • Post-Test 3: Optimizing and Troubleshooting SQL 2012
  • Post-Test 3: Plan and Deploy a Server Infrastructure
  • Post-Test 3: Planning an Upgrade/Migration Strategy and Security Deployment
  • Post-Test 3: Planning and Deploying Client Access Servers
  • Post-Test 3: Planning for Expanded Enterprise SharePoint Support
  • Post-Test 3: Planning for Resources, Risk and Quality
  • Post-Test 3: Planning for Resources, Risks and Quality
  • Post-Test 3: Remote Access Solutions
  • Post-Test 3: Security
  • Post-Test 3: Service Applications in SharePoint 2016
  • Post-Test 3: Support Identities and Authentication in Windows 10
  • Post-Test 3: Threats and Vulnerabilities
  • Post-Test 3: Triggers, Functions, Transactions, and Isolation Levels
  • Post-Test 3: VM Administration and Business Continuity Planning
  • Post-Test 3: Windows 7
  • Post-Test 4: Advanced Resource Management and Basic Design
  • Post-Test 4: Application, Host and Data Security
  • Post-Test 4: Building Up SharePoint Sites
  • Post-Test 4: Clustering, NLB, and Monitoring
  • Post-Test 4: Computer Networking
  • Post-Test 4: Configure a Network Policy Server Infrastructure
  • Post-Test 4: Configure Network Services
  • Post-Test 4: Configuring User Data and Settings in Windows 8
  • Post-Test 4: Creating and Configuring Service Applications
  • Post-Test 4: Defining Group Policy Objects and Implementing Group Policy Preferences
  • Post-Test 4: Defining Operations Strategy and Business Continuity
  • Post-Test 4: Deploy and Configure Windows Server 2012 Core Network Services
  • Post-Test 4: Deploying and Administering System Center Configuration Manager 2012 R2
  • Post-Test 4: Design and Implement Network Services Part 1
  • Post-Test 4: DHCP, DNS & IPAM
  • Post-Test 4: DNS and Hyper-V
  • Post-Test 4: Events and Functions
  • Post-Test 4: Hyper-V Networking, Containers, and High Availability
  • Post-Test 4: Implementing & Managing Coexistence, Hybrid Scenarios, Migration & Federation
  • Post-Test 4: Laptops & Mobile Devices
  • Post-Test 4: Manage Data Access and Protection in Windows 10
  • Post-Test 4: Managing Database Concurrency
  • Post-Test 4: Monitoring Database Activity, Queries, and SQL Server Instances
  • Post-Test 4: Network Configuration and Basic Storage Concepts
  • Post-Test 4: Network Connectivity, Remote Access, and Securing Remote Authentication
  • Post-Test 4: Network Security
  • Post-Test 4: Other Operating Systems
  • Post-Test 4: Planning and Configuring Message Transport
  • Post-Test 4: Planning and Configuring Message Transport
  • Post-Test 4: Planning for Communication, Procurement and Cost
  • Post-Test 4: Planning for Stakeholders, Communication, Procurement and Cost
  • Post-Test 4: Recovering Databases, Configuring Mail, and Automating Tasks
  • Post-Test 4: Security Protocols and Issues, Identity and Access
  • Post-Test 4: Service Accounts, Account Policies and Fine Grained Password Policies
  • Post-Test 4: SharePoint 2016 Integration
  • Post-Test 4: SharePoint Taxonomy
  • Post-Test 4: Web Applications, Authentication and Application Security Configuration
  • Post-Test 4: Windows Networking on a Client/Desktop
  • Post-Test 5: Access Control and Identity Management
  • Post-Test 5: Active Directory
  • Post-Test 5: Active Directory Certificate Services
  • Post-Test 5: AD Domains and Replication
  • Post-Test 5: Advanced Exchange 2013 Monitoring and Troubleshooting
  • Post-Test 5: Certificate Services
  • Post-Test 5: Compliance Settings and Managing Clients
  • Post-Test 5: Computer Threats and Security
  • Post-Test 5: Configure and Manage Active Directory
  • Post-Test 5: Configure and Manage Applications in Windows 10
  • Post-Test 5: Configure the Active Directory Infrastructure
  • Post-Test 5: Configuring and Managing Storage in vSphere 6.0
  • Post-Test 5: Configuring Devices, Disks, and Network Connections in Windows 8
  • Post-Test 5: Configuring SharePoint 2010 Site Collections, Managing Features and Solutions
  • Post-Test 5: Content Management on SharePoint 2016
  • Post-Test 5: Design and Implement Network Services Part 2
  • Post-Test 5: Executing the Project
  • Post-Test 5: Executing the Project
  • Post-Test 5: Implementing Failover Clustering and Managing High Availability Solutions
  • Post-Test 5: Implementing Security
  • Post-Test 5: Install and Administer Windows Server 2012 Active Directory
  • Post-Test 5: Manage Exchange 2013 – Infrastructure Management
  • Post-Test 5: Managing Indexes and Statistics
  • Post-Test 5: Managing Sites
  • Post-Test 5: Network Architecture and Security
  • Post-Test 5: Network Operations
  • Post-Test 5: Optimize SQL Database Objects and Infrastructure
  • Post-Test 5: Plan, Deploy, and Manage Compliance, Archiving, eDiscovery, and Auditing
  • Post-Test 5: Planning for SharePoint Business Intelligence
  • Post-Test 5: Planning Search Solutions
  • Post-Test 5: Planning Search Solutions
  • Post-Test 5: Portable Devices
  • Post-Test 5: Printers & Computer Displays
  • Post-Test 5: Security and Mobile Devices
  • Post-Test 5: Supporting Branch Office Technologies
  • Post-Test 5: The Document Object Model
  • Post-Test 5: Understanding and Managing Active Directory
  • Post-Test 5: Update Manager
  • Post-Test 6: AD Federation Services, Web Application Proxy, and AD Rights Management Services
  • Post-Test 6: AD RMS and AD FS
  • Post-Test 6: Advanced Network Infrastructures
  • Post-Test 6: Automating SharePoint with Workflows
  • Post-Test 6: Configure and Manage Group Policy
  • Post-Test 6: Configure Identity and Access Solutions
  • Post-Test 6: Configure Security, Microsoft Edge, Hyper-V, and Power Management in Windows 10
  • Post-Test 6: Configuring, Managing, and Migrating Unified Messaging
  • Post-Test 6: Create and Manage Windows Server 2012 Group Policy
  • Post-Test 6: Cryptography
  • Post-Test 6: Database Instances and Performance Tuning
  • Post-Test 6: Design and Implement Network Services Part 3
  • Post-Test 6: Group Policy
  • Post-Test 6: Groups and GPOs
  • Post-Test 6: High Availability
  • Post-Test 6: High Availability and Disaster Recovery
  • Post-Test 6: Implementation and Troubleshooting
  • Post-Test 6: Implementing & Managing Coexistence, Hybrid Scenarios, Migration & Federation
  • Post-Test 6: Introduction to Virtual Machine Configuration and Management
  • Post-Test 6: Manage Exchange 2013 – Monitoring and Troubleshooting
  • Post-Test 6: Managing Inventory and Reporting
  • Post-Test 6: Managing Solutions, Apps, and Enterprise Integration
  • Post-Test 6: Mobile Computing, Monitoring, Optimizing, and System Management/Recovery
  • Post-Test 6: Monitoring and Controlling the Project
  • Post-Test 6: Monitoring, Controlling and Closing the Project
  • Post-Test 6: Operational Procedures
  • Post-Test 6: PKI, RMS, and Federation
  • Post-Test 6: Planning Business Solutions
  • Post-Test 6: Printers
  • Post-Test 6: SharePoint 2010 Operational Health and Performance
  • Post-Test 6: SharePoint 2016 Stability and Performance
  • Post-Test 6: The Upgrade Process
  • Post-Test 6: Tools and Techniques
  • Post-Test 6: Trouble Shooting
  • Post-Test 6: Troubleshooting
  • Post-Test 6: User Profiles Maintenance and Monitoring
  • Post-Test 6: Virtualization, Policies, Risk Management, and Disaster Response/Recovery
  • Post-Test 6: VM Movement and Network Load Balancing Solutions
  • PostgreSQL Database Fundamentals Part #1
  • PostgreSQL Database Fundamentals Part #2
  • Powering Recommendation Engines: Recommendation Engines
  • PowerShell 5.0 Aliases, Providers, and Objects
  • PowerShell 5.0 Cmdlet Structure and Help
  • PowerShell 5.0 Configuration, Advanced Help, and Queries
  • PowerShell 5.0 Desired State Configuration (DSC)
  • PowerShell 5.0 DSC and Azure
  • PowerShell 5.0 DSC Resources
  • PowerShell 5.0 DSC with Linux and JEA
  • PowerShell 5.0 DSC, Configurations, and Repositories
  • PowerShell 5.0 Local Configuration Manager (LCM)
  • PowerShell 5.0 Output Formatting, Modules, and Customization
  • PowerShell 5.0 Remote Management
  • PowerShell 5.0 Resource Creation and Configuration
  • PowerShell 5.0 Syntax, Help, and Conditionals
  • Practice Exam 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND1)
  • Practice Exam 200-105 Interconnecting Cisco Networking Devices Part 2 (ICND2)
  • Practice Exam 70-740 Installation, Storage, and Compute with Windows Server 2016
  • Practice Exam: 210-260 Implementing Cisco Network Security (IINS)
  • Practice Exam: Administering Microsoft Windows Server 2012
  • Practice Exam: Administering Microsoft Windows Server 2012 R2
  • Practice Exam: Advanced Solutions of Microsoft Exchange Server 2013
  • Practice Exam: Advanced Solutions of Microsoft SharePoint Server 2013
  • Practice Exam: CompTIA A+ 220-801
  • Practice Exam: CompTIA A+ 220-802
  • Practice Exam: CompTIA A+ 220-901
  • Practice Exam: CompTIA A+ 220-902
  • Practice Exam: CompTIA Network+ N10-006
  • Practice Exam: CompTIA Project+ (2009 Edition)
  • Practice Exam: CompTIA Security+ 2012
  • Practice Exam: Configuring Advanced Windows Server 2012 R2
  • Practice Exam: Configuring Advanced Windows Server 2012 Services
  • Practice Exam: Configuring Microsoft SharePoint 2010
  • Practice Exam: Configuring Microsoft Windows 8
  • Practice Exam: Core Solutions of Microsoft Exchange Server 2013
  • Practice Exam: Core Solutions of Microsoft SharePoint Server 2013
  • Practice Exam: Designing and Implementing a Server 2012 Infrastructure
  • Practice Exam: Implementing an Advanced Server 2012 Infrastructure
  • Practice Exam: Implementing Cisco IP Routing (ROUTE) 2.0
  • Practice Exam: Implementing Cisco Switched Networks (SWITCH) 2.0
  • Practice Exam: Installing and Configuring Microsoft Windows Server 2012
  • Practice Exam: Installing and Configuring Microsoft Windows Server 2012 R2
  • Practice Exam: Microsoft SharePoint 2010 Administration
  • Practice Exam: Microsoft SharePoint Site Owner
  • Practice Exam: SQL 2012 Admin
  • Pre-Test 1: Under the Hood - Motherboards & Components
  • Pre-Test 1: Windows XP
  • Pre-Test 1: Active Directory Design and Implementation
  • Pre-Test 1: Active Directory Domain Controllers, Accounts, and Permissions
  • Pre-Test 1: Computer Network Fundementals
  • Pre-Test 1: Configure and Manage High Availability
  • Pre-Test 1: Configuring Advanced Services
  • Pre-Test 1: Deploy, Manage, and Maintain Servers
  • Pre-Test 1: Designing a Farm Topology
  • Pre-Test 1: Encryption, Data Access, Permissions, and Auditing
  • Pre-Test 1: Exchange Server 2013 SP1 Solution Planning and Implementation
  • Pre-Test 1: Initiating a Project
  • Pre-Test 1: Initiating a Project
  • Pre-Test 1: Inside a Computer
  • Pre-Test 1: Install and Configure Windows Server 2012 Servers
  • Pre-Test 1: Install, Manage, and Use Windows 10
  • Pre-Test 1: Installing and Configuring Microsoft SharePoint 2010
  • Pre-Test 1: Installing SQL Server Instances and Creating Databases
  • Pre-Test 1: Installing, Upgrading, Migrating to Windows 8
  • Pre-Test 1: Introduction to Clustering and HA
  • Pre-Test 1: Introduction to JavaScript
  • Pre-Test 1: Introduction to Virtualization and VMware’s ESXi
  • Pre-Test 1: IPv4/IPv6 Address and DHCP Management
  • Pre-Test 1: Managing a Server Infrastructure
  • Pre-Test 1: Plan, Deploy, Manage, and Troubleshoot Mailbox Databases
  • Pre-Test 1: Planning and Installing SCCM
  • Pre-Test 1: Planning, Configuring, and Managing Site Resilience
  • Pre-Test 1: Planning, Install, or Upgrade to SharePoint 2016
  • Pre-Test 1: Server Roles and Remote Management
  • Pre-Test 1: SharePoint Components and Design
  • Pre-Test 1: SQL Server 2016 Database Objects, Indexes, and Views
  • Pre-Test 1: The Datacenter and SCVMM
  • Pre-Test 1: Threats and Attacks
  • Pre-Test 1: Understanding Network Security
  • Pre-Test 1: Understanding SharePoint 2013 as a Business User
  • Pre-Test 1: Understanding Windows
  • Pre-Test 1: Upgrading to SharePoint Server 2013
  • Pre-Test 1: Upgrading, Managing, and Monitoring
  • Pre-Test 1: Windows PowerShell Foundations
  • Pre-Test 2: Active Directory Object Management
  • Pre-Test 2: Addressing and Routing
  • Pre-Test 2: Backing Up and Restoring Databases
  • Pre-Test 2: Clustered VMs and DR
  • Pre-Test 2: Columnstore Indexes and Programmability Objects
  • Pre-Test 2: Compliance and Operational Security
  • Pre-Test 2: Computer Components
  • Pre-Test 2: Configure Devices, Storage, & Network Connections in Windows 10
  • Pre-Test 2: Configure File and Print Services
  • Pre-Test 2: Configure File and Storage Solutions
  • Pre-Test 2: Configure Windows Server 2012 Server Roles and Features
  • Pre-Test 2: Configuring User Accounts and Policies in Windows 8
  • Pre-Test 2: Deploying and Managing Network Servers
  • Pre-Test 2: Developing the Mailbox Role
  • Pre-Test 2: Developing the Mailbox Role
  • Pre-Test 2: Disks, NTFS, and Sharing
  • Pre-Test 2: Distributed Resource Scheduler
  • Pre-Test 2: DNS Name Resolution and Zone Configuration
  • Pre-Test 2: JavaScript Data Types
  • Pre-Test 2: Manage Data in SQL 2012
  • Pre-Test 2: Managing and Maintaining Servers, Images, and Storage Solutions
  • Pre-Test 2: Managing Operating System Deployments
  • Pre-Test 2: More Windows Options
  • Pre-Test 2: OU Design and Implementation to Support Group Policy
  • Pre-Test 2: Planning Application Services and Component Deployment
  • Pre-Test 2: Planning Configuring and Managing Advanced Security
  • Pre-Test 2: Planning for Business Continuity in SharePoint Server 2013
  • Pre-Test 2: Planning the Project Scope and Schedule
  • Pre-Test 2: Planning the Project Scope and Schedule
  • Pre-Test 2: Power and Connection Interfaces
  • Pre-Test 2: SharePoint 2016 Security
  • Pre-Test 2: Upgrading to Microsoft SharePoint 2010
  • Pre-Test 2: Using SharePoint Content
  • Pre-Test 2: VM Hosts, Storage, and Networks
  • Pre-Test 2: VMware Component Installation for vSphere 6.0
  • Pre-Test 2: Vulnerabilities and Organizational Security
  • Pre-Test 2: Web and Service Applications
  • Pre-Test 2: Windows PowerShell-The Next Level
  • Pre-Test 2: Windows Vista
  • Pre-Test 3: Advanced Windows Configuration
  • Pre-Test 3: Building a Computer
  • Pre-Test 3: Cluster Monitoring and Profiles
  • Pre-Test 3: Conditional Program Execution
  • Pre-Test 3: Configure Network Services and Access
  • Pre-Test 3: Configure Windows Server 2012 Hyper-V
  • Pre-Test 3: Configuring and Administering SharePoint 2010 Search
  • Pre-Test 3: Configuring and Managing Compliance, Archiving, and Discovery Solutions
  • Pre-Test 3: Configuring Client Access Services
  • Pre-Test 3: Configuring Storage, File Management, and DAC
  • Pre-Test 3: Configuring User Applications and Virtualization in Windows 8
  • Pre-Test 3: Cryptography, Keys, and Wireless Security
  • Pre-Test 3: Data Deduplication, Hyper-V Installation and Configuration
  • Pre-Test 3: Deploying Applications and Software Updates
  • Pre-Test 3: Establishing Site Owners
  • Pre-Test 3: Implement Business Continuity and Disaster Recovery
  • Pre-Test 3: Implementing IP Address Management (IPAM)
  • Pre-Test 3: Introduction to VMware Basic Networking
  • Pre-Test 3: IP Subnetting, DHCP, and NIC Teaming
  • Pre-Test 3: Maintaining Active Directory, Trusts and Site Management
  • Pre-Test 3: Managing Database Integrity
  • Pre-Test 3: Network Infrastructures
  • Pre-Test 3: Networking
  • Pre-Test 3: Optimizing and Troubleshooting SQL 2012
  • Pre-Test 3: Plan and Deploy a Server Infrastructure
  • Pre-Test 3: Planning an Upgrade/Migration Strategy and Security Deployment
  • Pre-Test 3: Planning and Deploying Client Access Servers
  • Pre-Test 3: Planning for Expanded Enterprise SharePoint Support
  • Pre-Test 3: Planning for Resources, Risk and Quality
  • Pre-Test 3: Planning for Resources, Risks and Quality
  • Pre-Test 3: Remote Access Solutions
  • Pre-Test 3: Security
  • Pre-Test 3: Service Applications in SharePoint 2016
  • Pre-Test 3: Support Identities and Authentication in Windows 10
  • Pre-Test 3: Threats and Vulnerabilities
  • Pre-Test 3: Triggers, Functions, Transactions, and Isolation Levels
  • Pre-Test 3: VM Administration and Business Continuity Planning
  • Pre-Test 3: Windows 7
  • Pre-Test 4: Advanced Resource Management and Basic Design
  • Pre-Test 4: Application, Host and Data Security
  • Pre-Test 4: Building Up SharePoint Sites
  • Pre-Test 4: Clustering, NLB, and Monitoring
  • Pre-Test 4: Computer Networking
  • Pre-Test 4: Configure a Network Policy Server Infrastructure
  • Pre-Test 4: Configure Network Services
  • Pre-Test 4: Configuring User Data and Settings in Windows 8
  • Pre-Test 4: Creating and Configuring Service Applications
  • Pre-Test 4: Defining Group Policy Objects and Implementing Group Policy Preferences
  • Pre-Test 4: Defining Operations Strategy and Business Continuity
  • Pre-Test 4: Deploy and Configure Windows Server 2012 Core Network Services
  • Pre-Test 4: Deploying and Administering System Center Configuration Manager 2012 R2
  • Pre-Test 4: Design and Implement Network Services Part 1
  • Pre-Test 4: DHCP, DNS & IPAM
  • Pre-Test 4: DNS and Hyper-V
  • Pre-Test 4: Events and Functions
  • Pre-Test 4: Hyper-V Networking, Containers, and High Availability
  • Pre-Test 4: Implementing & Managing Coexistence, Hybrid Scenarios, Migration & Federation
  • Pre-Test 4: Laptops & Mobile Devices
  • Pre-Test 4: Manage Data Access and Protection in Windows 10
  • Pre-Test 4: Managing Database Concurrency
  • Pre-Test 4: Monitoring Database Activity, Queries, and SQL Server Instances
  • Pre-Test 4: Network Configuration and Basic Storage Concepts
  • Pre-Test 4: Network Connectivity, Remote Access, and Securing Remote Authentication
  • Pre-Test 4: Network Security
  • Pre-Test 4: Other Operating Systems
  • Pre-Test 4: Planning and Configuring Message Transport
  • Pre-Test 4: Planning and Configuring Message Transport
  • Pre-Test 4: Planning for Communication, Procurement and Cost
  • Pre-Test 4: Planning for Stakeholders, Communication, Procurement and Cost
  • Pre-Test 4: Recovering Databases, Configuring Mail, and Automating Tasks
  • Pre-Test 4: Security Protocols and Issues, Identity and Access
  • Pre-Test 4: Service Accounts, Account Policies and Fine Grained Password Policies
  • Pre-Test 4: SharePoint 2016 Integration
  • Pre-Test 4: SharePoint Taxonomy
  • Pre-Test 4: Web Applications, Authentication and Application Security Configuration
  • Pre-Test 4: Windows Networking on a Client/Desktop
  • Pre-Test 5: Access Control and Identity Management
  • Pre-Test 5: Active Directory
  • Pre-Test 5: Active Directory Certificate Services
  • Pre-Test 5: AD Domains and Replication
  • Pre-Test 5: Advanced Exchange 2013 Monitoring and Troubleshooting
  • Pre-Test 5: Certificate Services
  • Pre-Test 5: Compliance Settings and Managing Clients
  • Pre-Test 5: Computer Threats and Security
  • Pre-Test 5: Configure and Manage Active Directory
  • Pre-Test 5: Configure and Manage Applications in Windows 10
  • Pre-Test 5: Configure the Active Directory Infrastructure
  • Pre-Test 5: Configuring and Managing Storage in vSphere 6.0
  • Pre-Test 5: Configuring Devices, Disks, and Network Connections in Windows 8
  • Pre-Test 5: Configuring SharePoint 2010 Site Collections, Managing Features and Solutions
  • Pre-Test 5: Content Management on SharePoint 2016
  • Pre-Test 5: Design and Implement Network Services Part 2
  • Pre-Test 5: Executing the Project
  • Pre-Test 5: Executing the Project
  • Pre-Test 5: Implementing Failover Clustering and Managing High Availability Solutions
  • Pre-Test 5: Implementing Security
  • Pre-Test 5: Install and Administer Windows Server 2012 Active Directory
  • Pre-Test 5: Manage Exchange 2013 – Infrastructure Management
  • Pre-Test 5: Managing Indexes and Statistics
  • Pre-Test 5: Managing Sites
  • Pre-Test 5: Network Architecture and Security
  • Pre-Test 5: Network Operations
  • Pre-Test 5: Optimize SQL Database Objects and Infrastructure
  • Pre-Test 5: Plan, Deploy, and Manage Compliance, Archiving, eDiscovery, and Auditing
  • Pre-Test 5: Planning for SharePoint Business Intelligence
  • Pre-Test 5: Planning Search Solutions
  • Pre-Test 5: Planning Search Solutions
  • Pre-Test 5: Portable Devices
  • Pre-Test 5: Printers & Computer Displays
  • Pre-Test 5: Security and Mobile Devices
  • Pre-Test 5: Supporting Branch Office Technologies
  • Pre-Test 5: The Document Object Model
  • Pre-Test 5: Understanding and Managing Active Directory
  • Pre-Test 5: Update Manager
  • Pre-Test 6: AD Federation Services, Web Application Proxy, and AD Rights Management Services
  • Pre-Test 6: AD RMS and AD FS
  • Pre-Test 6: Advanced Network Infrastructures
  • Pre-Test 6: Automating SharePoint with Workflows
  • Pre-Test 6: Configure and Manage Group Policy
  • Pre-Test 6: Configure Identity and Access Solutions
  • Pre-Test 6: Configure Security, Microsoft Edge, Hyper-V, and Power Management in Windows 10
  • Pre-Test 6: Configuring, Managing, and Migrating Unified Messaging
  • Pre-Test 6: Create and Manage Windows Server 2012 Group Policy
  • Pre-Test 6: Cryptography
  • Pre-Test 6: Database Instances and Performance Tuning
  • Pre-Test 6: Design and Implement Network Services Part 3
  • Pre-Test 6: Group Policy
  • Pre-Test 6: Groups and GPOs
  • Pre-Test 6: High Availability
  • Pre-Test 6: High Availability and Disaster Recovery
  • Pre-Test 6: Implementation and Troubleshooting
  • Pre-Test 6: Implementing & Managing Coexistence, Hybrid Scenarios, Migration & Federation
  • Pre-Test 6: Introduction to Virtual Machine Configuration and Management
  • Pre-Test 6: Manage Exchange 2013 – Monitoring and Troubleshooting
  • Pre-Test 6: Managing Inventory and Reporting
  • Pre-Test 6: Managing Solutions, Apps, and Enterprise Integration
  • Pre-Test 6: Mobile Computing, Monitoring, Optimizing, and System Management/Recovery
  • Pre-Test 6: Monitoring and Controlling the Project
  • Pre-Test 6: Monitoring, Controlling and Closing the Project
  • Pre-Test 6: Operational Procedures
  • Pre-Test 6: PKI, RMS, and Federation
  • Pre-Test 6: Planning Business Solutions
  • Pre-Test 6: Printers
  • Pre-Test 6: SharePoint 2010 Operational Health and Performance
  • Pre-Test 6: SharePoint 2016 Stability and Performance
  • Pre-Test 6: The Upgrade Process
  • Pre-Test 6: Tools and Techniques
  • Pre-Test 6: Trouble Shooting
  • Pre-Test 6: Troubleshooting
  • Pre-Test 6: User Profiles Maintenance and Monitoring
  • Pre-Test 6: Virtualization, Policies, Risk Management, and Disaster Response/Recovery
  • Pre-Test 6: VM Movement and Network Load Balancing Solutions
  • Predictive Analytics & Big Data
  • Predictive Modelling Best Practices: Applying Predictive Analytics
  • Preemptive Troubleshooting: Concepts & Strategies
  • Preparing and Packaging Applications For Deployment
  • Preparing Impactful Presentations that Drive Decision Makers to Action
  • PRINCE2® Control, Manage, and Close Projects (2017 Update)
  • PRINCE2® Practitioner Exam Information
  • PRINCE2® Project Control, Management, and Closure (2009-aligned)
  • PRINCE2® Project Management Overview (2009-aligned)
  • PRINCE2® Project Management Overview (2017 Update)
  • PRINCE2® Project Planning and Risk Management (2009-aligned)
  • PRINCE2® Project Planning and Risk Management (2017 Update)
  • PRINCE2® Project Quality and Control (2017 Update)
  • PRINCE2® Project Quality Planning and Control (2009-aligned)
  • PRINCE2® Project Start Up, Initiation, and Direction (2009-aligned)
  • PRINCE2® Start, Direct, and Initiate Projects (2017 Update)
  • Probability and Probability Distributions in Six Sigma
  • Process & Application
  • Process and Performance Capability Measurement in Six Sigma
  • Process Documentation and Analysis in Six Sigma
  • Process Flow Metrics and Analysis Tools for Six Sigma
  • Procurement Management (PMBOK® Guide Sixth Edition)
  • Procurement Planning (PMBOK® Guide Sixth Edition)
  • Product Development Practices
  • Professional in Human Resources: Business Environment
  • Professional in Human Resources: Business Planning
  • Professional in Human Resources: Introduction to PHR® Exam
  • Professional in Human Resources: PHR® Exam Summary
  • Programmability Objects
  • Programming Apps with Java SE 6
  • Programming Apps with Java SE 7
  • Programming Fundamentals
  • Programming in C#: Creating and Using Types
  • Programming in C#: Creating Types
  • Programming in C#: Creating Types
  • Programming in C#: Debugging and Security Implementation
  • Programming in C#: Debugging and Security Implementation
  • Programming in C#: Implementing Data Access
  • Programming in C#: Implementing Data Access
  • Programming in C#: Managing Multithreating
  • Programming in C#: Managing Multithreating
  • Programming in C#: Managing Program Flow
  • Programming in C#: Managing Program Flow
  • Programming in C#: Managing Program Flow
  • Programming in C#: Manipulating and Retrieving Data
  • Programming in C#: Manipulating and Retrieving Data
  • Programming in C#: Memory Management and String Operations
  • Programming in C#: Using Types
  • Programming in C#: Using Types
  • Programming in C++: Program Structure and Exceptions
  • Programming in C++: Structure and Data Types
  • Programming in C++: Tools and Techniques
  • Programming in Go
  • Programming in HTML5: Adaptive AI, Graphics, & Animation
  • Programming in HTML5: More Advanced HTML5 & CSS3
  • Programming in the IoT Arena
  • Programming Techniques
  • Programming Techniques in R
  • Programming with NoSQL
  • Project Changes and Closing (PMBOK® Guide Sixth Edition)
  • Project Documents and Terminology
  • Project Evaluation: Defining Success Metrics
  • Project Fundamentals (PMBOK® Guide Sixth Edition)
  • Project Initiation and Planning (PMBOK® Guide Sixth Edition)
  • Project Management Fundamentals
  • Project Management Introduction (PMBOK® Guide Sixth Edition)
  • Project Management Practical Exercises
  • Project Management: Scrum Framework for Software Development
  • Project Planning Documents
  • Project Selection and Initiation
  • Promoting DevOps Discipline: DevOps Practices for the Enterprise
  • Protecting Data in iOS Apps
  • Prototyping Design Thinking
  • Providing Effective Internal Customer Service
  • Providing On-site Customer Service
  • Providing Telephone Customer Service
  • Provisioning an Azure Data Factory
  • Puppet Refactoring Patterns
  • Python Applications
  • Python Classes & Inheritance: Advanced Functionality Using Python Classes
  • Python Classes & Inheritance: Getting Started with Classes in Python
  • Python Classes & Inheritance: Working with Inheritance in Python
  • Python Classes and Inheritance: Introduction
  • Python Concurrent Programming: Asynchronous Executions in Python
  • Python Concurrent Programming: Introduction to Concurrent Programming
  • Python Concurrent Programming: Multiprocessing in Python
  • Python Concurrent Programming: Multithreading in Python
  • Python Data Processing
  • Python Design Patterns: Principles of Good Design
  • Python Design Patterns: Working with Behavioral Design Patterns
  • Python Design Patterns: Working with Creational Design Patterns
  • Python Design Patterns: Working with Structural Design Patterns
  • Python for Data Science – Introduction to Python for Data Science
  • Python for Data Science: Advanced Data Visualization Using Seaborn
  • Python for Data Science: Advanced Operations with NumPy Arrays
  • Python for Data Science: Basic Data Visualization Using Seaborn
  • Python for Data Science: Introduction to NumPy for Multi-dimentional Data
  • Python for Data Science: Introduction to Pandas
  • Python for Data Science: Manipulating and Analyzing Data in Pandas DataFrames
  • Python Fundamentals
  • Python Language Basics
  • Python Requests: HTTP Requests with Python
  • Python Unit Testing: Advanced Python Testing Using the unittest Framework
  • Python Unit Testing: An Introduction to Python's unittest Framework
  • Python Unit Testing: Testing Python Code Using doctest
  • Python Unit Testing: Testing Python Code Using pytest
  • Python: Classes and Modules
  • Python: Data Science Fundamentals
  • Python: Iteration and Exceptions
  • Python: The Basics
  • Python: Web Application Development
  • Python: web2py and Test-driven Development
  • Quality and Procurement Planning
  • Quality and Security of Big Data Operations
  • Quality Methodologies and Standards for Project Management
  • Querying and Manipulating Data
  • Querying and Manipulating Data with the Entity Framework
  • Querying XML Data with XPath and XQuery
  • R for Data Science: Classification & Clustering
  • R for Data Science: Data Exploration
  • R for Data Science: Data Structures
  • R for Data Science: Data Visualization
  • R for Data Science: Importing and Exporting Data
  • R for Data Science: Regression Methods
  • RADD Knowledge Area: Part 1
  • RADD Knowledge Area: Part 2
  • Random Forests & Uplift Models
  • Rapport Building in Customer Service
  • RavenDB Integration
  • RavenDB Overview
  • Raw Data to Insights: Data Ingestion & Statistical Analysis
  • Raw Data to Insights: Data Management & Decision Making
  • React and Flux: An Overview
  • React and Flux: Creating Simple React Components
  • React and Flux: React Router and Forms
  • React and Flux: Working with Flux
  • Reactive Programming Methods
  • Reactive Programming Using Redux
  • Recovering SQL Databases
  • Recovery Strategies And Client Access Services
  • Red Hat Certified System Administrator: Administration and Permissions
  • Red Hat Certified System Administrator: Advanced Networking
  • Red Hat Certified System Administrator: Boot Process and Installation
  • Red Hat Certified System Administrator: File Systems and Device Management
  • Red Hat Certified System Administrator: Introduction to Virtualization
  • Red Hat Certified System Administrator: Processes, Networking, and Logging
  • Red Hat Certified System Administrator: Remote Connections and Access
  • Red Hat Certified System Administrator: Scripting and Scheduling
  • Red Hat Certified System Administrator: SELinux and Troubleshooting
  • Red Hat Certified System Administrator: The Command Line
  • Red Hat Certified System Administrator: The Environment
  • Refactoring ML/DL Algorithms: Refactor Machine Learning Algorithms
  • Refactoring ML/DL Algorithms: Techniques & Principles
  • Regression Analysis
  • Regulation Conformance for Incidence Response
  • Regulatory Mandates: Security Program Regulatory Integration
  • Reinforcement Learning
  • Replay Session 1
  • Replay Session 1
  • Replay Session 1
  • Replay Session 1
  • Replay Session 1
  • Replay Session 1
  • Replay Session 2
  • Replay Session 2
  • Replay Session 2
  • Replay Session 2
  • Replay Session 2
  • Replay Session 2
  • Replay Session 3
  • Replay Session 3
  • Replay Session 3
  • Replay Session 3
  • Replay Session 3
  • Replay Session 3
  • Replay Session 4
  • Replay Session 4
  • Replay Session 4
  • Replay Session 4
  • Replay Session 4
  • Replay Session 4
  • Replay Session 5
  • Replay Session 5
  • Replay Session 5
  • Replay Session 5
  • Replay Session 5
  • Replay Session 6
  • Replay Session 6
  • Replay Session 6
  • Replay Session 6
  • Replay Session 6
  • Replay Session 6
  • Reporting and User Management
  • Research Topics in ML and DL
  • Resource and Risk Planning
  • Responding to Risk (PMBOK® Guide Sixth Edition)
  • Responsive Web Design: Flexible Data and UIs, Devices, Process and Performance
  • Responsive Web Design: Flexible Grids, Images, and Media Queries
  • REST API with Java: Java APIs with JSON, Maven, & Spring
  • REST API with Java: REST APIs with POSTMAN & CRUD
  • REST API with Java: Spring Boot with Java
  • REST API with Java: Spring JPA & Apache Derby
  • REST API: Exploring the Advanced Features
  • REST API: Exploring the Basic Features
  • RESTful Services for FSD: Building & Testing RESTful Services
  • Reusable Components and iRise Administration
  • Reusing Content in Dreamweaver CS5
  • Risk Analysis: Security Risk Management
  • Risk Management: Organizational Risk and Safety and Health Legislation
  • Risk Management: Project Risk Assessment
  • Risk Management: Workplace Safety, Security, and Privacy
  • Role of Testing in Managing Clean Code
  • Root Cause Analysis and Waste Elimination in Six Sigma
  • ROUTE 2.0: Routing Policies
  • ROUTE 2.0: Access Control
  • ROUTE 2.0: Administrative Distance and Passive Interfaces
  • ROUTE 2.0: Authentication, Authorization, and Accounting
  • ROUTE 2.0: BGP Attributes
  • ROUTE 2.0: BGP Loopback and Propagation
  • ROUTE 2.0: Border Gateway Protocol Introduction
  • ROUTE 2.0: Default Routes
  • ROUTE 2.0: Device Management
  • ROUTE 2.0: DHCP IPv6 Stateless Server
  • ROUTE 2.0: DHCP Server
  • ROUTE 2.0: Dynamic Multipoint, Easy VPN, and Ipsec
  • ROUTE 2.0: EIGRP Authentication
  • ROUTE 2.0: EIGRP Load Balancing and Metrics
  • ROUTE 2.0: EIGRP Neighbors
  • ROUTE 2.0: EIGRP Over IPv6
  • ROUTE 2.0: EIGRP Stubs
  • ROUTE 2.0: Frame Relay Operations
  • ROUTE 2.0: Generic Routing Encapsulation Tunnels
  • ROUTE 2.0: Introduction to EIGRP
  • ROUTE 2.0: Introduction to Networking
  • ROUTE 2.0: IP Addressing and DHCP
  • ROUTE 2.0: IP Operations
  • ROUTE 2.0: IPv4 Addressing Types
  • ROUTE 2.0: IPv6 Addressing
  • ROUTE 2.0: IPv6 Addressing and DHCP
  • ROUTE 2.0: Logging and Debugging
  • ROUTE 2.0: Loop Prevention Using Built-In Mechanisms
  • ROUTE 2.0: Loop Prevention Using Route Tags and Maps
  • ROUTE 2.0: Multiprotocol BGP
  • ROUTE 2.0: NetFlow
  • ROUTE 2.0: Network Address Translation
  • ROUTE 2.0: Network Migration
  • ROUTE 2.0: OSPF Area Types
  • ROUTE 2.0: OSPF Configuration
  • ROUTE 2.0: OSPF IPv6 Routing
  • ROUTE 2.0: OSPF Network and LSA Types
  • ROUTE 2.0: OSPF Packet Types
  • ROUTE 2.0: OSPF Route Types
  • ROUTE 2.0: OSPF Virtual Links and Paths
  • ROUTE 2.0: Point-to-Point Networking
  • ROUTE 2.0: Route Filtering
  • ROUTE 2.0: Route Filtering for EIGRP, OSPF, and BGP
  • ROUTE 2.0: Route Redistribution with OSPF
  • ROUTE 2.0: Route Redistribution with RIP and EIGRP
  • ROUTE 2.0: Router Summarization for EIGRP and OSPF
  • ROUTE 2.0: Router Summarization for RIP
  • ROUTE 2.0: Routing Information Protocol
  • ROUTE 2.0: Routing Protocol Types
  • ROUTE 2.0: Security Features
  • ROUTE 2.0: SLAs and Object Tracking
  • ROUTE 2.0: SNMP and NTP
  • ROUTE 2.0: Static Routing
  • ROUTE 2.0: TCP and UDP Operations
  • ROUTE 2.0: Using VRF Lite
  • Ruby Full Stack Development: Flow Control and Data Types
  • Ruby Full Stack Development: Introduction
  • Ruby Full Stack Development: Object-Oriented Programming with Ruby
  • Ruby Full Stack Development: RegEx and I/O with Ruby
  • Ruby Full Stack Development: Threads and Security
  • Ruby Full Stack Development: Unit Testing and Behavior Driven Development
  • Sales Automation in Microsoft Dynamics CRM 2013
  • SAP Administration
  • SAP Business One - Introduction for End Users
  • SAP BusinessObjects: Business Intelligence
  • SAP BusinessObjects: Crystal Reports
  • SAP BusinessObjects: Dashboards and Analytics
  • SAP BusinessObjects: InfoView
  • SAP BusinessObjects: Overview
  • SAP BusinessObjects: Web Intelligence
  • SAP Customer Relationship Management (CRM)
  • SAP Enterprise Resource Planning (ERP)
  • SAP Product Lifecycle Management
  • SAP Supplier Relationship Management
  • SAP Supply Chain Management
  • Scala Expressions and Parallel Computation
  • Scala Functional Programming and Collections
  • Scala Introduction
  • Scala Pattern Matching, Interoperability, and Concurrency
  • Scala Tooling
  • Scaling an Organization's Scrum Process
  • Scaling Cloud Solutions
  • Scaling DevOps: Infrastructure at Scale
  • Scaling DevOps: Pipelines at Scale
  • Scaling Scrum: Challenges
  • Scaling Scrum: Choosing Scaled Agile Frameworks
  • SCCM 2012 R2 Boundaries and Security Considerations
  • SCCM 2012 R2 Compliance Settings and Managing Clients
  • SCCM 2012 R2 Performance and Health Monitoring
  • Scope, Schedule and Cost Planning
  • Script Components
  • Scripting with Spotfire
  • Scrum Business Value: Accessing the Business Value of Scrum
  • Scrum Concepts & the Product Owner
  • Scrum Foundations: Transitioning to Scrum
  • Scrum Master: Scrum for the Team
  • Scrum Master: Sprint Goals & Planning
  • SCRUM Meetings: On-target Daily Meetings
  • Scrum Practices: Managing the Scrum Project
  • Scrum Product: Defining the Why & How of the Product
  • Scrum Sprint: Retrospective
  • Scrum Sprint: Review
  • Scrum Team Velocity: Exploring Team Velocity
  • Scrum: Creating Effective Product Backlogs
  • Scrum: Product Backlog
  • Scrum: Product Development Framework
  • Search Problems
  • SECFND: ACLs & Filtering
  • SECFND: Attacks and Evasion
  • SECFND: Basic Networking Protocols
  • SECFND: Basic Networking Services
  • SECFND: Cryptographic Encryption Algorithms
  • SECFND: Cryptographic Hashing Algorithms
  • SECFND: Cryptography
  • SECFND: Data Loss & Defense in Depth
  • SECFND: Digital Signatures
  • SECFND: Endpoint Security
  • SECFND: Filtering and Packet Capture
  • SECFND: Interpreting Log Data
  • SECFND: Linux Host Terminology
  • SECFND: Monitoring Network Protocols
  • SECFND: Network Addressing
  • SECFND: Network and Web Attacks
  • SECFND: Network Data Types
  • SECFND: Network Data Types and Security Monitoring
  • SECFND: Network Devices Operations & Security
  • SECFND: Network Models
  • SECFND: Network Monitoring
  • SECFND: Next Generation Firewalls
  • SECFND: Overview and Network Models
  • SECFND: Packet Analysis
  • SECFND: Security Attack Concepts
  • SECFND: Security Concepts
  • SECFND: Security Management Part 1
  • SECFND: Security Management Part 2
  • SECFND: SSL/TLS Components
  • SECFND: VLANS and Data Visibility
  • SECFND: Windows Host Terminology
  • SecOps Engineer: Cloud & IoT security
  • SecOps Engineer: Secure Coding
  • SecOps Engineer: Security Engineering
  • SecOps Engineer: System Infrastructure Security
  • SecOps Engineer: Threat Mitigation
  • SECOPS: Analyzing Intrusion Impact
  • SECOPS: Analyzing Threat Mitigation Reports
  • SECOPS: Categorize and Classify Intrusions
  • SECOPS: CSIRT Goals and Cybersec Elements
  • SECOPS: Data Normalization and 5-Tuple Correlation
  • SECOPS: Examining Intrusion Events
  • SECOPS: Firepower Management Console and Analysis Methods
  • SECOPS: Handling Incident Events and Evidence
  • SECOPS: HTTP Headers
  • SECOPS: ICMP Intrusion
  • SECOPS: ICMP Intrusion Part 2
  • SECOPS: Identifying Forensic Evidence
  • SECOPS: Identifying NetFlow v5 Records
  • SECOPS: Interpreting Regular Expressions
  • SECOPS: Intrusion Event Technologies
  • SECOPS: IP Header Security
  • SECOPS: Protocol Header Security
  • SECOPS: Responding to Incidents
  • SECOPS: Scoring with CVSS 3.0
  • SECOPS: Securing File Systems
  • SECOPS: Transport Layer Headers
  • Secure Agile Programming: Agile Concepts
  • Secure Agile Programming: Agile Modeling
  • Secure Agile Programming: Agile Techniques
  • Secure Agile Programming: Testing
  • Secure Full Stack Developer Programming
  • Secure Programmer: Attacks
  • Secure Programmer: Coding Practices
  • Secure Programmer: Intro to Programming Standards
  • Secure Programmer: Resiliency Coding
  • Secure Programmer: Security Concepts
  • Secure Programmer: Software Design Techniques
  • Secure Programmer: Software Modeling Techniques
  • Secure Programmer: Software Testing
  • Secure Programmer: Vulnerabilities
  • Secure Programming for C/C++
  • Secure Programming: Encryption
  • Securing .NET Programming
  • Securing a Network Infrastructure with Windows Firewalls
  • Securing a Virtualization Infrastructure
  • Securing Against Threats, Securing for Enterprise, and Jailbreaking Devices
  • Securing Blockchain Implementations
  • Securing C/C++ Applications
  • Securing Hadoop Clusters
  • Securing Microservices
  • Securing Mobile Devices in the Enterprise: Configuring Enterprise-level Security
  • Securing Mobile Devices in the Enterprise: Mobile Security Technologies
  • Securing Mobile Devices in the Enterprise: Mobile Security Threat Mitigation
  • Securing Mobile Devices in the Enterprise: Mobile Security Threats
  • Securing Network Infrastructure Traffic
  • Securing Unix Systems
  • Securing User Accounts: Authorization, Registration, and Passwords
  • Securing User Accounts: Fundamental Security Concepts
  • Securing User Accounts: Logon, Logoff, Account Changes, and Attack Mitigation
  • Securing Your Microservices
  • Securing, Testing, and Deploying MEAN Applications
  • Security and WCF Streams
  • Security Architect: Ethical Hacking Best Practices
  • Security Architect: Secure Coding Concepts
  • Security Architectures: Defensible Security
  • Security Best Practices: Network Appliance Security
  • Security Fundamentals: Authentication
  • Security Fundamentals: Authentication, Passwords & Audit Policies
  • Security Fundamentals: Client and Email Security
  • Security Fundamentals: Core Security
  • Security Fundamentals: Encryption and Malware
  • Security Fundamentals: Firewalls
  • Security Fundamentals: Internet and Wireless Security
  • Security Fundamentals: Network Isolation
  • Security Fundamentals: Permissions
  • Security Fundamentals: Protocol Security
  • Security Fundamentals: Server Protection
  • Security Incident Triage
  • Security Measures: Implementing Security Controls
  • Security Programming: Code Identification
  • Security Programming: Command Line Essentials
  • Security Programming: Scripting Essentials
  • Security Programming: System Essentials
  • Security Rules: Rules of Engagement
  • Security Software Assessments: Security Software Assessments
  • Security Strategies
  • Security Strategy: Patch Management Strategies
  • Security Topologies: Developing Secure Networks
  • Security Vulnerabilities: Managing Threats & Vulnerabilities
  • Selecting Structural Patterns for Simplified Designs
  • Selenium IDE - Advanced Features and Debugging
  • Selenium IDE - Locating, Verifying, and Testing Elements
  • Selenium IDE: Scripts & Commands
  • Selenium: Using Selenium for Continuous Testing
  • SENSS 1.0: ASA Firewall Access Control
  • SENSS 1.0: ASA Firewall Configuration & Access Control
  • SENSS 1.0: Centralized Logging & Device Management
  • SENSS 1.0: Cisco Port-Based Traffic Control
  • SENSS 1.0: DHCP Snooping & IP Source Guard
  • SENSS 1.0: High Availability & Private VLANs
  • SENSS 1.0: IOS Security Configuration
  • SENSS 1.0: IPv6 Support & Traffic Inspection
  • SENSS 1.0: Role-Based Access Control
  • SENSS 1.0: Traffic & Device Monitoring
  • SENSS 1.0: Transparent Firewalls & Security Contexts
  • SENSS 1.0: Twice NAT & Network Object NAT
  • SENSS 1.0: Zone-Based Firewalls
  • Server 2012 R2 - Administration: Deploying and Managing WDS (Update Avail.)
  • Server 2012 R2 - Administration: File Services and Encryption (Update Avail.)
  • Server 2012 R2 - Administration: Group Policy Processing (Update Avail.)
  • Server 2012 R2 - Administration: Managing Active Directory (Update Avail.)
  • Server 2012 R2 - Administration: Managing GPOs and Preferences (Update Avail.)
  • Server 2012 R2 - Administration: Network Services and Access (Update Avail.)
  • Server 2012 R2 - Administration: RADIUS, NPS, and NAP (Update Avail.)
  • Server 2012 R2 - Administration: Service Accounts and Policies (Update Avail.)
  • Server 2012 R2 - Administration: Updating and Monitoring (Update Avail.)
  • Server 2012 R2 - Advanced Infrastructure: AD RMS and AD FS (Update Avail.)
  • Server 2012 R2 - Advanced Infrastructure: Business Continuity (Update Avail.)
  • Server 2012 R2 - Advanced Infrastructure: Certificate Services (Update Avail.)
  • Server 2012 R2 - Advanced Infrastructure: Clustering and NLB (Update Avail.)
  • Server 2012 R2 - Advanced Infrastructure: Monitoring (Update Avail.)
  • Server 2012 R2 - Advanced Infrastructure: Storage and networks (Update Avail.)
  • Server 2012 R2 - Advanced Infrastructure: Updates (Update Avail.)
  • Server 2012 R2 - Advanced Infrastructure: VM Administration (Update Avail.)
  • Server 2012 R2 - Advanced Infrastructure: VM hosts and guests (Update Avail.)
  • Server 2012 R2 - Configuring Advanced Services: AD Domains (Update Avail.)
  • Server 2012 R2 - Configuring Advanced Services: AD Replication (Update Avail.)
  • Server 2012 R2 - Configuring Advanced Services: DAC (Update Avail.)
  • Server 2012 R2 - Configuring Advanced Services: DHCP & DNS (Update Avail.)
  • Server 2012 R2 - Configuring Advanced Services: Federation (Update Avail.)
  • Server 2012 R2 - Configuring Advanced Services: HA (Update Avail.)
  • Server 2012 R2 - Configuring Advanced Services: PKI (Update Avail.)
  • Server 2012 R2 - Configuring Advanced Services: Storage (Update Avail.)
  • Server 2012 R2 - Configuring Advanced Services: VMs and DR (Update Avail.)
  • Server 2012 R2 - Installing and Configuring: Active Directory (Update Avail.)
  • Server 2012 R2 - Installing and Configuring: AD Groups & GPOs (Update Avail.)
  • Server 2012 R2 - Installing and Configuring: DNS (Update Avail.)
  • Server 2012 R2 - Installing and Configuring: Hyper - V (Update Avail.)
  • Server 2012 R2 - Installing and Configuring: Networking (Update Avail.)
  • Server 2012 R2 - Installing and Configuring: Print Services (Update Avail.)
  • Server 2012 R2 - Installing and Configuring: Security (Update Avail.)
  • Server 2012 R2 - Installing and Configuring: Servers (Update Avail.)
  • Server 2012 R2 - Installing and Configuring: Storage (Update Avail.)
  • Server 2012 R2: Server Infrastructure - AD Design (Update Avail.)
  • Server 2012 R2: Server Infrastructure - AD DS (Update Avail.)
  • Server 2012 R2: Server Infrastructure - DHCP Design (Update Avail.)
  • Server 2012 R2: Server Infrastructure - DNS, File and Storage (Update Avail.)
  • Server 2012 R2: Server Infrastructure - Implement NPS and WAP (Update Avail.)
  • Server 2012 R2: Server Infrastructure - IPAM and VPN (Update Avail.)
  • Server 2012 R2: Server Infrastructure - Network Protection (Update Avail.)
  • Server 2012 R2: Server Infrastructure - OU and Group Policy (Update Avail.)
  • Server 2012 R2: Server Infrastructure – DirectAccess (Update Avail.)
  • Server 2012 R2: Server Infrastructure – Server Deployment (Update Avail.)
  • Server 2016 - Identity: Active Directory Accounts & Permissions
  • Server 2016 - Identity: Active Directory Certificate Services
  • Server 2016 - Identity: Active Directory Domain Controllers
  • Server 2016 - Identity: Active Directory Federation Services & Web Application Proxy
  • Server 2016 - Identity: Active Directory Group Policy Objects
  • Server 2016 - Identity: Active Directory Group Policy Preferences
  • Server 2016 - Identity: Active Directory Group Policy Processing
  • Server 2016 - Identity: Active Directory Group Policy Settings
  • Server 2016 - Identity: Active Directory Groups & Organizational Units
  • Server 2016 - Identity: Active Directory Rights Management Services
  • Server 2016 - Identity: Active Directory Service Authentication & Account Policies
  • Server 2016 - Identity: Active Directory Trusts & Sites
  • Server 2016 - Identity: Active Directroy Maintenance & Recovery
  • Server 2016 - Identity: AD Federation Services and Web Application Proxy
  • Server 2016 - Install, Store, and Compute: Upgrading, Managing, and Monitoring
  • Server 2016: Install, Store, and Compute: Backup Strategies & Server Monitoring
  • Server 2016: Install, Store, and Compute: Data Deduplication & Hyper-V Setup
  • Server 2016: Install, Store, and Compute: Disk & Volume Configuration
  • Server 2016: Install, Store, and Compute: Failover Clustering Strategies
  • Server 2016: Install, Store, and Compute: Hyper-V Networking Configuration
  • Server 2016: Install, Store, and Compute: Hyper-V Storage Configuration
  • Server 2016: Install, Store, and Compute: Image Deployment Management
  • Server 2016: Install, Store, and Compute: Installation Options
  • Server 2016: Install, Store, and Compute: Managing High Availability Solutions
  • Server 2016: Install, Store, and Compute: Server Storage Solutions
  • Server 2016: Install, Store, and Compute: Upgrades, Migrations, & Activation Models
  • Server 2016: Install, Store, and Compute: Virtual Machine (VM) Settings
  • Server 2016: Install, Store, and Compute: VM Motion and Network Load Balancing
  • Server 2016: Install, Store, and Compute: Windows Container Deployment
  • Server 2016: Install, Store, and Compute: Windows Container Management and Hyper-V
  • Server 2016: Networking: Advanced Network Infrastructures
  • Server 2016: Networking: DHCP Configuration
  • Server 2016: Networking: DHCP Management
  • Server 2016: Networking: Distributed File System & Branch Office Solutions
  • Server 2016: Networking: DNS & DHCP Management Using IPAM
  • Server 2016: Networking: DNS Configuration
  • Server 2016: Networking: DNS Zones & Records
  • Server 2016: Networking: IP Address Management Configuration
  • Server 2016: Networking: IPv4 & IPv6 Address Management
  • Server 2016: Networking: Network Connectivity & Remote Access
  • Server 2016: Networking: Network Policy Server
  • Server 2016: Securing Remote Authentication
  • Server and Application Virtualization in Microsoft Windows Server 2008
  • Service Management Automation and Runbooks
  • Service Manager
  • Services and Routing
  • Serving Digital Customers with Omnichannel
  • Session 1 Homework: Install, Manage, and Use Windows 10
  • Session 2 Homework: Configure Devices, Storage, & Network Connections in Windows 10
  • Session 3 Homework: Support Identities and Authentication in Windows 10
  • Session 4 Homework: Manage Data Access and Protection in Windows 10
  • Session 6 Homework: Configure Security, Microsoft Edge, Hyper-V, and Power Management in Windows 10
  • SharePoint 2016 Content Management
  • SharePoint 2016 Security
  • SharePoint 2016 Service Applications
  • SharePoint 2016 Taxonomy and Search
  • SharePoint Online
  • Shell Scripting
  • Sinatra Fundamentals
  • Six Sigma and Lean Foundations and Principles
  • Six Sigma and Lean: Foundations and Principles
  • Six Sigma and Organizational Goals
  • Six Sigma Business Case, Project Charter, and Tools
  • Six Sigma Control Charts
  • Six Sigma Control Tools and Documentation
  • Six Sigma Correlation, Regression, and Hypothesis Testing
  • Six Sigma Cycle-time Reduction and Kaizen Blitz
  • Six Sigma Data Classification, Sampling, and Collection
  • Six Sigma Design of Experiments
  • Six Sigma Exploratory Data Analysis
  • Six Sigma Hypothesis Testing Fundamentals
  • Six Sigma Hypothesis Tests for Variances and Proportions
  • Six Sigma Management and Planning Tools
  • Six Sigma Measurement System Analysis
  • Six Sigma Measurement Systems Analysis
  • Six Sigma Measurement Systems and Metrology
  • Six Sigma Performance Metrics
  • Six Sigma Probability and Statistical Distributions
  • Six Sigma Process and Performance Capability Measurement
  • Six Sigma Process Control Tools
  • Six Sigma Process Documentation and Analysis
  • Six Sigma Project Identification
  • Six Sigma Project Management Essentials
  • Six Sigma Project Selection, Roles, and Responsibilities
  • Six Sigma Project Team Dynamics and Performance
  • Six Sigma Root Cause Analysis and Waste Elimination
  • Six Sigma Statistical Process Control Basics
  • Six Sigma Statistics and Graphical Presentation
  • Six Sigma Strategic Planning and Deployment
  • Six Sigma Team Basics, Roles, and Responsibilities
  • Six Sigma Team Dynamics and Training
  • Six Sigma Team Dynamics, Roles, and Success Factors
  • Six Sigma Team Facilitation and Leadership
  • Six Sigma Techniques for Improvement
  • Six Sigma Voice of the Customer
  • Six Sigma: Identifying Projects
  • Six Sigma: Metrics
  • Six Sigma: Project Management Basics
  • Six Sigma: Quality Tools
  • Six Sigma: Team Basics, Roles, and Responsibilities
  • Skill Development Using Alexa Components
  • Skills for Project Analysts: Negotiation Skills
  • SOA Fundamentals
  • SOAP and Development of Microservices
  • Socket Programming in Python: Advanced Topics
  • Socket Programming in Python: Introduction
  • Software Data Analysis: Project Management Metrics
  • Software Debugging in Windows
  • Software Defined Networking Fundamentals
  • Software Development Concepts: Software Development Glossary
  • Software PM Communication: Software Project Management Communication Skills
  • Software Practices (SCRUM): SCRUM Meetings
  • Software Practices (SCRUM): SCRUM Roles
  • Software Programming Fundamentals: Best Practices for Maintaining Code
  • Software Programming Fundamentals: Design and Development Best Practices
  • Software Programming Fundamentals: Software Security Best Practices
  • Software Programming Fundamentals: Source Coding Best Practices
  • Software Projects: Recruiting the Project Team
  • Software Quality Assurance
  • Software Testing Cycle: Agile Testing
  • Software Testing for DevOps: DevOps Test Tools
  • Software Testing for DevOps: DevOps Testing Pipeline
  • Software Testing for DevOps: Testing & DevOps Overview
  • Software Testing Foundation 2018: Black-box & White-box Testing Techniques
  • Software Testing Foundation 2018: Fundamentals
  • Software Testing Foundation 2018: Risk & Defect Management
  • Software Testing Foundation 2018: Static Testing
  • Software Testing Foundation 2018: Test Management
  • Software Testing Foundation 2018: Test Monitoring & Control
  • Software Testing Foundation 2018: Test Process Fundamentals
  • Software Testing Foundation 2018: Test Tool Support
  • Software Testing Foundation 2018: Test Types & Maintenance Testing
  • Software Testing Foundation 2018: Testing & the Software Development Lifecycle
  • Software Testing Foundation 2018: Testing Techniques
  • Software Testing Foundations: Static, Dynamic, Black-box, and White-box Testing
  • Software Testing Foundations: Test Planning, Management, and Tool Support
  • Software Testing Foundations: Testing throughout the Software Life Cycle
  • Software Testing with Visual Studio: Create and Configure Test Plans
  • Software Testing with Visual Studio: Manage Test Cases
  • Software Testing with Visual Studio: Manage Test Execution Part 1
  • Software Testing with Visual Studio: Manage Test Execution Part 2
  • Software Updates and Compliance Management in Microsoft Windows Server 2008
  • SOLID Fundamentals
  • Source Control on AWS
  • Spark Monitoring and Tuning
  • Spark Security
  • Speech Input and Cortana
  • Splunk Administration
  • Splunk Fundamentals
  • Splunk Visualizations and Dashboards
  • Spotfire Automation, Analyzation, and Visualization
  • Spotfire Basics
  • Spotfire Data Combinations
  • Spotfire Visualizations and Relationships
  • SQL Server 2016 Database Objects
  • SQL Server 2016 Indexes and Views
  • SQL Server Database Fundamentals: Creating, Optimizing, and Securing Databases
  • SQL Server Database Fundamentals: Design Principles and Data Manipulation
  • SQL Server Database Security
  • SQL Server Instances and Storage Considerations
  • SQL Server Performance Settings
  • SQL Server Virtual Machines on Azure
  • SQL Tuning, Resource Management, and Job Scheduling in Oracle Database 12c
  • SSCP Domain : Networks and Telecommunications Part 2
  • SSCP Domain: Access Controls
  • SSIS Components
  • SSIS Package Execution and Script Tasks
  • SSIS Packages
  • SSIS Security
  • SSIS Solutions
  • SSIS Variables
  • Stabilizing Hadoop Clusters
  • Statistical Process Control (SPC) and Control Charts in Six Sigma
  • Statistical Process Control and Control Plans in Six Sigma
  • Statistics and Graphical Presentation in Six Sigma
  • Strategic HR for SPHR Exam Candidates Part I
  • Strategic HR for SPHR Exam Candidates Part II
  • Strategically Focused Project Management
  • Strategies for Building a Cohesive Team
  • Streaming Data Architectures: An Introduction to Streaming Data
  • Streaming Data Architectures: Processing Streaming Data
  • Streaming Pipelines and Analytics
  • Structured Streaming
  • Styling HTML5 and JavaScript
  • Styling Page Elements using CSS3
  • Subqueries and Predicate
  • Supervised Learning Models
  • Sustaining Six Sigma Improvements
  • Swift Language Basics
  • SWITCH 2.0 : DHCP Snooping, IPSG, and DAI
  • SWITCH 2.0 : EtherChannel
  • SWITCH 2.0 : Hot Standby Router Protocol
  • SWITCH 2.0 : L2 Attacks and Port Security
  • SWITCH 2.0 : Layer 2 Network Discovery
  • SWITCH 2.0 : Layer 3 Switching
  • SWITCH 2.0 : Rapid and Multiple Spanning Tree
  • SWITCH 2.0 : SPAN, RSPAN, and StackWise Clustering
  • SWITCH 2.0 : Spanning Tree and Per VLAN Spanning Tree
  • SWITCH 2.0 : Storm Control and Port-Based Authentication
  • SWITCH 2.0 : STP Enhancements
  • SWITCH 2.0 : STP Timers and Failover
  • SWITCH 2.0 : Switch Overview and Administartion
  • SWITCH 2.0 : Trunking Using DTP, Dot1Q, & ISL
  • SWITCH 2.0 : Virtual LANs
  • SWITCH 2.0 : VLAN ACLs and Private VLANs
  • SWITCH 2.0 : VLAN Trunk Protocol Pruning
  • SWITCH 2.0 : VRRP and GLBP
  • Syntax, Variables, Objects, and Classes
  • SYO-601 - CompTIA Security+: Analyzing Application & Network Attacks
  • SYO-601 - CompTIA Security+: Social Engineering Techniques & Attack Types
  • System Center Configuration Manager Introduction and Planning
  • System Security Certified Practitioner (SSCP 2018): Asset & Change Management
  • System Security Certified Practitioner (SSCP 2018): Business Continuity
  • System Security Certified Practitioner (SSCP 2018): Controlling Resource Access
  • System Security Certified Practitioner (SSCP 2018): Cryptography Primer
  • System Security Certified Practitioner (SSCP 2018): Digital Forensics
  • System Security Certified Practitioner (SSCP 2018): Identity Management
  • System Security Certified Practitioner (SSCP 2018): Malware & Endpoint Security
  • System Security Certified Practitioner (SSCP 2018): Network Fundamentals
  • System Security Certified Practitioner (SSCP 2018): Network Security
  • System Security Certified Practitioner (SSCP 2018): Public Key Infrastructure
  • System Security Certified Practitioner (SSCP 2018): Risk Management
  • System Security Certified Practitioner (SSCP 2018): Securing Environments
  • System Security Certified Practitioner (SSCP 2018): Security Assessments
  • System Security Certified Practitioner (SSCP 2018): Security Concepts
  • System Security Certified Practitioner (SSCP 2018): Security Controls
  • Systems Security Certified Practitioner: Access Controls
  • Systems Security Certified Practitioner: Cryptography
  • Systems Security Certified Practitioner: Incident Response and Recovery
  • Systems Security Certified Practitioner: Network and Communications Security
  • Systems Security Certified Practitioner: Risk Management
  • Systems Security Certified Practitioner: Security Administration
  • Systems Security Certified Practitioner: Security Operations
  • Systems Security Certified Practitioner: Systems and Application Security
  • T-SQL Querying
  • Tableau Advanced Visualizations
  • Tableau Calculations
  • Tableau Charts
  • Tableau Dashboards and Data Organization
  • Tableau Data Connections
  • Tableau Desktop: Real Time Dashboards
  • Tableau Interface and Sharing
  • Tableau Maps
  • Tableau Scripting
  • Tableau Time Dimensions
  • Tableau Visualization
  • Tableau Visualization Design
  • Tailoring PRINCE2® for your Project Environment (2009-aligned)
  • Taking Final Steps to Bring a Project to its Close
  • Team and Customer Relationships
  • Team Dynamics and Performance for Six Sigma Projects
  • Team Foundation Server Administration and Configuration
  • Tensorflow: Building Autoencoders in TensorFlow
  • TensorFlow: Convolutional Neural Networks for Image Classification
  • TensorFlow: Convolutional Neural Networks for Image Classification
  • TensorFlow: Deep Neural Networks and Image Classification
  • TensorFlow: Introduction to Machine Learning
  • Tensorflow: K-means Clustering with TensorFlow
  • Tensorflow: Sentiment Analysis with Recurrent Neural Networks
  • TensorFlow: Simple Regression and Classification Models
  • Tensorflow: Word Embeddings & Recurrent Neural Networks
  • Tensorflow: Word Embeddings & Recurrent Neural Networks
  • Teradata Basics: Communication and Database Security
  • Teradata Basics: Data Storage and Access Methods
  • Teradata Basics: Relational Database and Data Warehouse Basics
  • Teradata SQL: DDL, DML, and SQL Optimization
  • Teradata SQL: Functions, Data Conversions, and Working with Time
  • Teradata SQL: The SELECT Statement, Joins, and Subqueries
  • Terminal Services Resource Access in Windows 2008
  • Terraform Configurations
  • Terraform Infrastructure
  • Terraform Provisioning and Modules
  • Terraform Variables
  • Test Driven Development: Implementing TDD
  • Test Framework Modification
  • Test-driven Cookbooks
  • TestComplete: Test Automation with TestComplete
  • Testing and Continuous Integration
  • Testing Angular Apps
  • Testing AngularJS
  • Testing with WebLOAD
  • TestPrep 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND1)
  • TestPrep 1Z0-050 Oracle Database 11g: New Features for Administrators
  • TestPrep 1Z0-052 Oracle Database 11g: Administration I
  • TestPrep 1Z0-053 Oracle Database 11g: Administration II
  • TestPrep 1Z0-060 Upgrade to Oracle Database 12c
  • TestPrep 1Z0-061 Oracle Database 12c: SQL Fundamentals
  • TestPrep 1Z0-071 Oracle Database SQL
  • TestPrep 1Z0-808 Java SE 8 Programmer I
  • TestPrep 1Z0-809 Java SE 8 Programmer II
  • TestPrep 200-105 Interconnecting Cisco Networking Devices Part 2 (ICND2)
  • TestPrep 200-125 CCNA Routing and Switching
  • TestPrep 200-310 Designing for Cisco Internetwork Solutions (DESGN)
  • TestPrep 210-060 Implementing Cisco Collaboration Devices (CICD)
  • TestPrep 210-065 Implementing Cisco Video Network Devices (CICD)
  • TestPrep 210-260 Implementing Cisco Network Security (IINS)
  • TestPrep 210-451 Understanding Cisco Cloud Fundamentals (CLDFND)
  • TestPrep 220-1001 CompTIA A+
  • TestPrep 220-901 CompTIA A+
  • TestPrep 220-902 CompTIA A+
  • TestPrep 300-070 Implementing Cisco IP Telephony & Video, Part 1 (CIPTV1)
  • TestPrep 300-101 Implementing Cisco IP Routing (ROUTE)
  • TestPrep 300-115 Implementing Cisco IP Switched Networks (SWITCH)
  • TestPrep 300-135 Troubleshooting and Maintaining Cisco IP Networks (TSHOOT)
  • TestPrep 300-206 Implementing Cisco Edge Network Security Solutions (SENSS)
  • TestPrep 300-208 Implementing Cisco Secure Access Solutions (SISAS)
  • TestPrep 300-209 Implementing Cisco Secure Mobility Solutions (SIMOS)
  • TestPrep 312-50 Certified Ethical Hacker (CEH)
  • TestPrep 640-875 Building Cisco Service Provider Networks, Part 1 (SPNGN1)
  • TestPrep 70-246 Monitoring and Operating a Private Cloud, System Center 2012
  • TestPrep 70-247 Configuring and Deploying a Private Cloud, System Center 2012
  • TestPrep 70-410 Installing and Configuring Windows Server 2012
  • TestPrep 70-411 Administering Windows Server 2012
  • TestPrep 70-412 Configuring Advanced Windows Server 2012 Services
  • TestPrep 70-413 Designing and Implementing a Server Infrastructure
  • TestPrep 70-414 Implementing an Advanced Server Infrastructure
  • TestPrep 70-461 Querying Microsoft SQL Server 2012/2014
  • TestPrep 70-462 Administering Microsoft SQL Server 2012/2014 Databases
  • TestPrep 70-463 Implementing a Data Warehouse with SQL Server 2012/2014
  • TestPrep 70-464 Developing Microsoft SQL Server Databases
  • TestPrep 70-480 Programming in HTML5 with JavaScript and CSS3
  • TestPrep 70-483 Programming in C#
  • TestPrep 70-486 Developing ASP.NET MVC Web Applications
  • TestPrep 70-487 Developing Microsoft Azure and Web Services
  • TestPrep 70-697 Configuring Windows Devices
  • TestPrep 70-698 Installing and Configuring Windows 10
  • TestPrep 70-740 Installation, Storage, and Compute with Windows Server 2016
  • TestPrep 70-741 Networking with Windows Server 2016
  • TestPrep 70-742 Identity with Windows Server 2016
  • TestPrep 70-761 Querying Data with Transact SQL
  • TestPrep 98-368 Mobility and Device Fundamentals
  • TestPrep Agile Tester Foundation Extension
  • TestPrep BH0-010 Certified Tester Foundation Level
  • TestPrep CAS-003 CompTIA Advanced Security Practitioner (CASP)
  • TestPrep Certified Associate in Project Management (CAPM) PMBOK Guide 5th Ed.
  • TestPrep Certified Associate in Project Management (CAPM) PMBOK Guide 6th Ed.
  • TestPrep Certified Information Security Manager (CISM)
  • TestPrep Certified Information Systems Security Professional (CISSP)
  • TestPrep Certified Information Systems Security Professional (CISSP)
  • TestPrep CS0-001 CompTIA Cybersecurity Analyst (CySA+)
  • TestPrep ITIL 4 Foundation
  • TestPrep ITIL Foundation
  • TestPrep JNCIA-Junos (JN0-102)
  • TestPrep LX0-103 CompTIA Linux+ Powered by LPI Exam 1
  • TestPrep LX0-104 CompTIA Linux+ Powered by LPI Exam 2
  • TestPrep MB0-001 CompTIA Mobility+
  • TestPrep N10-006 CompTIA Network+
  • TestPrep N10-007 CompTIA Network+
  • TestPrep PMI Agile Certified Practitioner
  • TestPrep PRINCE2 2017 Foundation
  • TestPrep PRINCE2®: Foundation
  • TestPrep Professional in Human Resources (PHR)
  • TestPrep Project Management Professional PMBOK 6th Ed
  • TestPrep Senior Professional in Human Resources (SPHR)
  • TestPrep Six Sigma Green Belt (SSGB)
  • TestPrep Six Sigma Yellow Belt (SSYB)
  • TestPrep SK0-004 CompTIA Server+
  • TestPrep SY0-501 CompTIA Security+
  • TestPrep Systems Security Certified Practitioner (SSCP)
  • TestPrep Systems Security Certified Practitioner (SSCP) 2018
  • TestPrep XK0-004 CompTIA Linux+
  • Tests for Variances and Proportions, ANOVA, and Goodness-of-fit in Six Sigma
  • Text Mining & Social Network Analysis
  • The Active Directory Infrastructure in Windows Server 2008
  • The Adobe Dreamweaver CC 2015 Interface
  • The Apache Web Server Engine
  • The BA Elicitation and Collaboration Knowledge Area
  • The BA Planning and Monitoring Knowledge Area
  • The Basics of Blockchain
  • The Basics of Scalding Programming
  • The Big Data Technology Wave
  • The Certificate Services Infrastructure in Microsoft Windows Server 2008
  • The Customer Service Representative (CSR)
  • The Development of Android Applications
  • The Justinmind Desktop Application Interface
  • The Language of DevOps: DevOps Principles & Practices
  • The Language of DevOps: DevOps Tools & Processes
  • The Main Components of Android
  • The Process Groups (PMBOK® Guide Sixth Edition)
  • The R Language and Big Data Processing
  • The Requirements Life Cycle Management Knowledge Area
  • The Role of Ethics in Project Management
  • The Solution Evaluation Knowledge Area
  • The Strategy Analysis Knowledge Area
  • The Unix Command Line and GUI
  • The Waterfall Software Development Model
  • Thinking Defensively about Functions, Methods, and Input
  • Threat Detection Solutions
  • Time Series Modeling
  • Tips and Tricks for Developing Secure Mobile Apps
  • TOGAF Fundamentals - Architectural Artifacts and the Enterprise Continuum
  • TOGAF Fundamentals - Security and SOA Governance
  • TOGAF® Advanced - Content Framework And Continuum
  • TOGAF® Advanced - Enterprise Architecture
  • TOGAF® Advanced - Guidelines and Techniques
  • TOGAF® Advanced - Reference Models and Capability Framework
  • TOGAF® Fundamentals - Content Framework and Capability Basics
  • TOGAF® Fundamentals - Enterprise Architecture Basics
  • Tool Support in Software Testing
  • Tools and C++ Updates
  • Transactions and Isolation Levels
  • Transition to Scrum: Agile Foundation to Scrum
  • Transitioning into a Project Management Role
  • Trifacta for Data Wrangling: Wrangling Data
  • Triggers and Functions
  • Troubleshooting a Citrix XenDesktop 7.6 Environment
  • Troubleshooting and Closing the Project
  • Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) 2.0 | Bootcamp with Expert Replay (ITPRO.
  • Troubleshooting Data Integration
  • Troubleshooting Office 365 Usage
  • Troubleshooting Runtime Issues and HTTP Modules & Handlers
  • Troubleshooting Skype for Business
  • Troubleshooting SQL Database Errors
  • TSHOOT 2.0 : BGP IPv6 Troubleshooting
  • TSHOOT 2.0 : BGP Troubleshooting Part 1
  • TSHOOT 2.0 : BGP Troubleshooting Part 2
  • TSHOOT 2.0 : EIGRP Troubleshooting Part 1
  • TSHOOT 2.0 : EIGRP Troubleshooting Part 2
  • TSHOOT 2.0 : EIGRP Troubleshooting Part 3
  • TSHOOT 2.0 : EtherChannel & Spanning Tree Troubleshooting
  • TSHOOT 2.0 : HSRP Troubleshooting
  • TSHOOT 2.0 : Layer 2 Troubleshooting Part 1
  • TSHOOT 2.0 : Layer 2 Troubleshooting Part 2
  • TSHOOT 2.0 : Layer 2 Troubleshooting Part 3
  • TSHOOT 2.0 : Layer 3 Troubleshooting
  • TSHOOT 2.0 : Logging & Path Verification
  • TSHOOT 2.0 : Miscellaneous Troubleshooting
  • TSHOOT 2.0 : Network Traffic Viewing, Reporting, & Monitoring
  • TSHOOT 2.0 : OSPF Troubleshooting Part 1
  • TSHOOT 2.0 : OSPF Troubleshooting Part 2
  • TSHOOT 2.0 : OSPF Troubleshooting Part 3
  • TSHOOT 2.0 : Response Automation & Backups
  • TSHOOT 2.0 : Routing Troubleshooting Part 1
  • TSHOOT 2.0 : Routing Troubleshooting Part 2
  • TSHOOT 2.0 : Troubleshooting & Manipulating Output
  • TSHOOT 2.0 : Troubleshooting Basics
  • TSHOOT 2.0 : VRRP Troubleshooting
  • TypeScript Essentials: Advanced TypeScript
  • TypeScript Essentials: Getting Started
  • UI Patterns and Troubleshooting
  • UI/UX for Chatbot and Voice Interface AIs
  • Uncertainty
  • Underscore.js: Array, Object, and Utility Functions
  • Underscore.js: Collection Functions and Function Functions
  • Understanding and Raising Analytics Maturity
  • Understanding Bots: Amazon Alexa Skills Development
  • Understanding Bots: Building Bots with Dialogflow
  • Understanding Bots: Chatbot Advanced Concepts and Features
  • Understanding Bots: Chatbot Architecture
  • Understanding DOE and Planning Experiments in Six Sigma
  • Understanding Mailflow and Auditing
  • Understanding the Digital Customer
  • Unified Security: Playbook Approach to Security
  • Unit Testing in DevOps Software Development
  • Unit Testing in JavaScript: Exploring & Configuring the Mocha Testing Framework
  • Unit Testing in JavaScript: Mocha & Chai
  • Unit Testing in JavaScript: Mocha & Unit.js
  • Unit Testing in JavaScript: Should.js & Must.js
  • Unit Testing in JavaScript: SinonJS
  • Unix Hardening and Maintenance
  • Unix Software Management
  • Unsupervised Learning
  • Updating to Server 2019 : Windows Server 2019 Features
  • Updating to Server 2019: PowerShell for Windows Server
  • Updating to Server 2019: Server Configuration
  • Updating to Server 2019: Server Roles
  • Updating to Server 2019: Storage, Failover Clustering, & Application Platform
  • Updating to Server 2019: Windows Server Installations
  • Upgrading and Updating SharePoint 2016
  • User Interfaces in Virtual Reality
  • User Interfaces, Controls, and Fragments
  • User Security and Auditing in Oracle Database 12c
  • Users, Groups, and Authentication
  • Using and Creating Widgets
  • Using Animation and Supporting Mobile Devices
  • Using AWS CodeDeploy
  • Using AWS to Set Up DevOps and CloudOps Automation Frameworks
  • Using Basic Statistics and Graphical Methods in Six Sigma
  • Using Business and Financial Measures in Six Sigma
  • Using Data to Find Data: Correction & Categorization
  • Using Data to Find Data: Data Discovery & Exploration
  • Using Docker for DevOps: Configuring Docker for Continuous Delivery
  • Using Docker for DevOps: Introduction to Docker
  • Using Docker: Benefits and Installation
  • Using Docker: Customizing and Clustering
  • Using Docker: Dockerizing Applications
  • Using Eclipse
  • Using Eclipse with Subversive
  • Using Express and Express Middleware
  • Using Feedback to Improve Team Performance
  • Using Functions in SQL Server 2016
  • Using Git for DevOps: Managing Conflict & Effectively Using Git Workflow
  • Using Git for DevOps: Using Git Effectively
  • Using GoogleVR and Unreal
  • Using Lean Control Tools and Maintaining Controls in Six Sigma
  • Using Mouse, Touch, and Keyboard Input
  • Using MVC 5 with EF6, Web API 2, SignalR, and Azure
  • Using Other Device Input Methods
  • Using Splunk for Data Analysis
  • Using Swift Advanced Language Features
  • Using the Repository
  • Using Typekit Fonts on Web Sites
  • Using Vagrant: Configuration
  • Using Vagrant: Introduction
  • Using Your Data with Splunk
  • UX Design Foundations: Design Principles and Strategies
  • UX Design Foundations: Navigation, Layout, and Content
  • UX Design Foundations: Techniques and Tools
  • Vagrant Advanced Administration
  • Validate and Control Scope (PMBOK® Guide Sixth Edition)
  • Value-driven Delivery: Delivering Value in Agile Projects
  • vCenter
  • Virtual Machines
  • Virtualization with VMware: An Overview
  • Virtualizing Enterprise Desktops and Apps: App-V Clients and App Sequencing
  • Virtualizing Enterprise Desktops and Apps: Plan App Virtualization and Use MAP
  • Virtualizing Enterprise Desktops and Apps: Plan for Resilient Virtualized Apps
  • Virtualizing Enterprise Desktops and Apps: RemoteApps
  • Virtualizing Enterprise Desktops and Apps: VM-based and Session-based RDS
  • Visual Studio 2013 Debugging
  • Visual Studio 2017 Installation and New Features
  • Visual Studio Code Cross-platform Code Editor: Basics
  • Visual Studio Frameworks and Tools
  • Visual Studio Mobile Center Introduction and New Features
  • Visualization Using Kibana
  • VMware Business Mobility Solutions
  • VMware Cloud Services Solutions
  • VMware Data Center Virtualization Overview
  • VMware Datacenter Overview
  • VMware Desktop Overview
  • VMware Desktop Virtualization Overview
  • VMware NSX Network Virtualization: Configuring NSX Virtual Networks
  • VMware NSX Network Virtualization: Configuring vSphere Networking
  • VMware NSX Network Virtualization: Installing and Upgrading
  • VMware NSX Network Virtualization: NSX Network Security
  • VMware NSX Network Virtualization: NSX Network Services
  • VMware NSX Network Virtualization: NSX Operations
  • VMware NSX Network Virtualization: Physical Infrastructure Requirements
  • VMware NSX Network Virtualization: Technology and Architecture
  • VMware Server Overview
  • VMware VCA: Cloud Overview
  • VMware VCA: vCloud Connector and vSphere
  • VMware VCA: vRealize Automation and vRealize Operations Manager
  • VMware vSphere 5 - Datacenter Design VMs, Management, and Implementation
  • VMware vSphere 5 - Part 1: An Overview of Virtual Network Creation
  • VMware vSphere 5 - Part 1: Configuring and Managing Virtual Machines
  • VMware vSphere 5 - Part 1: Configuring and Managing Virtual Networks
  • VMware vSphere 5 - Part 1: Creating Virtual Machines
  • VMware vSphere 5 - Part 1: ESXi Installation and Configuration
  • VMware vSphere 5 - Part 1: Introduction to Virtualization
  • VMware vSphere 5 - Part 1: Introduction to vSphere Storage Concepts
  • VMware vSphere 5 - Part 1: vCenter Server Administration
  • VMware vSphere 5 - Part 1: vCenter Server Installation
  • VMware vSphere 5 - Part 1: vCenter Server Management
  • VMware vSphere 5 - Part 1: vSphere Client and vCenter Server Configuration
  • VMware vSphere 5 - Part 2: DRS, Resource Pools, and vApps
  • VMware vSphere 5 - Part 2: High Availability and Fault Tolerance
  • VMware vSphere 5 - Part 2: Host Profiles, Update Manager, and Auto Deploy
  • VMware vSphere 5 - Part 2: Logging and Performance
  • VMware vSphere 5 - Part 2: Processor and Resource Management
  • VMware vSphere 5 - Part 2: Securing Hosts, Internal Components, Certificate Use
  • VMware vSphere 5 - Part 2: Upgrading Hosts and Virtual Machines
  • VMware vSphere 5 - Part 2: vCenter Server Appliance Deployments and Upgrades
  • VMware vSphere 5 - Part 2: VSphere Clustering
  • VMware vSphere 5 - Part 2: vSphere Security
  • VMware vSphere 5 – Datacenter Design: Creating vSphere Conceptual and Logical Designs
  • VMware vSphere 5 – Datacenter Design: Introducing vSphere Design Fundamentals
  • VMware vSphere 5 – Datacenter Design: vSphere Network and Storage Design
  • VMware vSphere 5 – Part 1: Storage Configuration and Management
  • VMware vSphere 5 – Part 1: vCenter Server Inventory
  • VMware vSphere 6 Install, Configure, Manage - Part 1: Storage and VMs
  • VMware vSphere 6 Install, Configure, Manage - Part 1: Virtual Networks
  • VMware vSphere 6 Install, Configure, Manage - Part 1: vSphere 6 Overview
  • VMware vSphere 6 Install, Configure, Manage - Part 1: vSphere Installation
  • VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 Clustering
  • VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 Design
  • VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 DRS
  • VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 Monitoring
  • VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 Updating
  • VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 Upgrading
  • VMware Workstation 11 Networking and Remote Connectivity
  • VMware Workstation 7: Getting started with Virtual Machines
  • VMware Workstation 7: Managing Virtual Machines
  • Voice of the Customer in Six Sigma
  • Voice User Interfaces
  • VoIP Technologies
  • vSphere 6.0 ICM Part One Expert Live with Encore
  • vSphere 6.0 ICM Part Two Expert Live with Encore
  • vSphere 6.5 Distributed Resource Scheduler (DRS)
  • vSphere 6.5 High Availability Clusters
  • vSphere 6.5 Installation
  • vSphere 6.5 Monitoring and Compliance
  • vSphere 6.5 Networking
  • vSphere 6.5 Overview
  • vSphere 6.5 Resource Management
  • vSphere 6.5 Storage
  • vSphere 6.5 Update Manager
  • vSphere 6.5 Virtual Machine Creation
  • vSphere 6.5 Virtual Machine Management
  • Vue.js: Component Communication & Routing
  • Vue.js: Getting Started
  • Vue.js: Working with Components
  • Vue.js: Working With Forms & Unit Testing
  • Vue.js: Working with Vue State & Data
  • Vulnerabilities and Exploits
  • WCAG 2.0 Accessibility Standards
  • WCF Essentials: Building Clients
  • WCF Essentials: Contracts
  • WCF Essentials: Distributed Applications
  • WCF Essentials: Hosting
  • WCF Essentials: Interoperability and Integration
  • WCF Essentials: Introduction to the Framework
  • WCF Essentials: Managing Transactions
  • WCF Essentials: Queues & Reliable Sessions
  • WCF Essentials: Services
  • WCF Essentials: Tools
  • WCF Instancing and Concurrency and WCF Data Services
  • WCF Services
  • WCF Transactions, Pipelines, and Extensibility
  • Wearable Technology and UI/UX
  • Web 2.0 Fundamentals
  • Web API Advanced
  • Web API Essentials
  • Web Application Libraries
  • Web Browsing and Cortana
  • Web Building and Testing with Gulp.js
  • Web Design Basics
  • Web Design Enhancements
  • Web Development Fundamentals
  • Web Development Using the Yeoman Stack: Essential Development Tools
  • Web Services and XML
  • WebSphere Commerce Advanced Topics
  • WebSphere Commerce Application Development and Customization
  • WebSphere Commerce Basics
  • WebSphere Commerce Security, Performance, and Troubleshooting
  • Whole Page Controls and Extending Bootstrap
  • Wi-Fi Penetration Testing
  • Windows 10: Designing for Cloud and Hybrid Identity
  • Windows 10: Designing for Data Access, Protection, and Remote Access
  • Windows 10: Designing for Device Access and Protection
  • Windows 10: Planning for Apps, Updates, and Recovery
  • Windows Application Development with Visual Basic 2010
  • Windows Embedded 8.1 Industry
  • Windows Ink and Paint 3D
  • Windows Performance Monitoring: Additional Performance Tools
  • Windows PowerShell 101 Expert Live with Encore
  • Windows PowerShell Desired State Configuration Fundamentals
  • Windows Server 2008 Application Server Management and Application Provisioning
  • Windows Server 2008 Application Servers and Services
  • Windows Server 2008 Backup and Recovery
  • Windows Server 2008 Management and Delegation
  • Windows Store Applications and Databases
  • Windows Store, Security, and Browsing
  • WordPress Advanced Themes and Administration
  • WordPress Introduction and Basic Configuration
  • WordPress Networking and Security
  • Workforce Planning and Employment: Employment Legislation
  • Workforce Planning and Employment: Orientation, Onboarding, and Exit Strategies
  • Workforce Planning and Employment: Recruitment Strategies
  • Workforce Planning and Employment: Sourcing and Selecting Candidates
  • Working with ASK API Using Node.js and Java
  • Working with ASP.NET MVC Models
  • Working with ASP.NET MVC Models and Unit Testing
  • Working with ASP.NET Web API Routes and Controllers
  • Working with Balsamiq Versions and Plugins
  • Working with Bitcoin
  • Working with Cassandra
  • Working With Charms and Contracts
  • Working With Data and Files
  • Working with Data for Effective Decision Making
  • Working with Data in AngularJS
  • Working with Data Mapping, Jobs, and Automation
  • Working with Docker Machine, Security, and APIs
  • Working with Forms, the Canvas, and Media in HTML5
  • Working with Git
  • Working with GitHub
  • Working with HDInsight Clusters
  • Working with Images and Exporting Files in Adobe InDesign CC 2015
  • Working with Jenkins: Fundamentals
  • Working with JSON and XML Data Formats
  • Working with JUnit Tests
  • Working with Knockout
  • Working With Local Data Access Technologies
  • Working with Node.js and .NET
  • Working with Objects and Editing Tools in Adobe InDesign CC 2015
  • Working with Pages in Adobe InDesign CC 2015
  • Working with Sinatra
  • Working with Smart Home and Business
  • Working with SSML and AVS
  • Working with Text in Adobe Illustrator CC 2015
  • Working with Text in Adobe InDesign CC 2015
  • Working With The App Bar, Semantic Zoom, User Input, and Process Lifetime Management
  • Working with WebLOAD
  • Workplace Management: Corporate Social Responsibility
  • Workplace Management: Employment Laws and Regulations
  • Workplace Management: Global HR, Diversity, and Inclusion
  • Workplace Management: Risk Management
  • WPF Fundamentals with XAML and C#
  • Xamarin Android and iOS Projects in Cross-Platform Solutions in Visual Studio
  • XAML App Controls
  • XML Language Basics
  • XML Transformation Using XSLT and XSL-FO
  • Yeoman Stack: Advanced Usage of Generator and Polymer
  • Yeoman Stack: Application Development
  • Yeoman Stack: Managing the Environment for Productivity
  • Yeoman Stack: Working with NPM and Adopting Testing Strategies