New Horizons OLA Course Details

New Horizons IT - Complete Collection

Give your IT professionals the training they need to administer your system and networks, develop and maintain applications, and prepare for valuable industry certifications. Our e-Learning courses provide instruction in Networks and Operating Systems, Programming, Web Design and Development, and more. Learning paths are provided for the most current topics like Information Technology Infrastructure Library (ITIL®), and Certified Business Analyst Professional (CBAP). This comprehensive collection includes our valuable simulations, Try It  exercises and Mentoring.

This is an Online ANYTIME course library and includes multiple individual online courses. Online ANYTIME gives you access to a self-paced training solution that uses the same core course content as our world-renowned Instructor-Led Training.

 Back to OLA Course Catalog  Request Information about this Library

What’s Included

  • .NET Core, C#, and Visual Studio Extensions
  • .NET Development with Visual Studio
  • A/B Testing, Bayesian Networks, and Support Vector Machine
  • Accessibility and Design
  • Accessing Data with Spark: An Introduction to Spark
  • Accessing Data with Spark: Data Analysis using Spark SQL
  • Accessing Data with Spark: Data Analysis Using the Spark DataFrame API
  • Adaptive AI, Graphics, and Animation
  • Adaptive App Design
  • Adaptive UI Layout and Caching Strategy
  • Additional Malware Protection
  • Administer vRealize Automation Components
  • Administer vRealize Orchestrator and Troubleshoot Automation Implementation
  • Administering System Center Configuration Manager 2012 R2
  • Administrating XenDesktop 7.5 and Hypervisor Management
  • Adobe Captivate 8: Getting Started
  • Adobe Captivate 8: Media and Interactivity
  • Adobe Captivate 9: Getting Started
  • Adobe Captivate 9: Media and Recording
  • Adobe Captivate 9: Publishing and Actions
  • Adobe Captivate 9: Questions and Pools
  • Adobe ColdFusion 10 Fundamentals
  • Adobe Dreamweaver CC 2015 Browsers and HTML
  • Adobe Dreamweaver CC 2015 Fundamentals
  • Adobe Dreamweaver CC 2015 Web Design
  • Adobe Edge Animate CC: Creating and Animating Artwork
  • Adobe Edge Animate CC: Exploring the Interface
  • Adobe Edge Animate CC: Importing Artwork, Text Animation and Typeface Properties
  • Adobe Edge Animate CC: Interactive Compositions
  • Adobe Edge Animate CC: Publishing Compositions
  • Adobe Edge Animate CC: Transitions, Symbols, and Synchronizing Motion
  • Adobe Edge Animate CC: Working with Video and Audio
  • Adobe Flash Professional CC 2015 Animations
  • Adobe Flash Professional CC 2015 Fundamentals
  • Adobe Flash Professional CC 2015 Programming
  • Adobe Flash Professional CC 2015 Tools
  • Adobe Illustrator CC 2015 Advanced Tools and Effects
  • Adobe Illustrator CC 2015 Fundamentals
  • Adobe Illustrator CC 2015 Gradients and Bitmap Images
  • Adobe Illustrator CC 2015 Introduction and New Features
  • Adobe Illustrator CC 2015 Tools
  • Adobe Illustrator CC 2015 Working with the Pen Tools and Objects
  • Adobe InDesign CC 2015 Basic Navigation and Tools
  • Adobe InDesign CC 2015 Fundamentals
  • Adobe Photoshop CC 2015 Basics
  • Adobe Photoshop CC 2015 Cloning and Editing
  • Adobe Photoshop CC 2015 Enhancement Tools and Techniques
  • Adobe Photoshop CC 2015 Paths and Techniques
  • Adobe Photoshop CC 2015: File Types and Color Editing
  • Adobe Photoshop CC 2015: Layers and Type
  • Adobe Photoshop CC 2015: Selection Tools and Techniques
  • Adobe Premiere Elements 13 Essentials
  • Adobe Premiere Elements 13: Adding Video Effects
  • Adobe Premiere Elements 13: Exporting & Sharing Videos
  • Adobe Premiere Elements 13: Getting Started
  • Adobe Premiere Elements 13: Importing Files & Setting Up a Project
  • Adobe Premiere Elements 13: Project Audio Settings
  • Adobe Premiere Elements 13: Trimming & Editing a Video
  • Adobe Premiere Pro CC 2015 Fundamentals
  • Adobe Premiere Pro CC 2015 Movies and Application Extensibility
  • Adobe Premiere Pro CC 2015 Panels and Effects
  • Adopting PRINCE2® for your Project Environment (2017 Update)
  • Advanced Configuration Options
  • Advanced CSS
  • Advanced Data Access with EF Core
  • Advanced Deployment
  • Advanced Entity Framework
  • Advanced Features of Akka
  • Advanced Features of JavaScript, CSS3 and HTML5
  • Advanced HR Management: Competencies for Senior HR Professionals Part I
  • Advanced HR Management: Competencies for Senior HR Professionals Part II
  • Advanced HTML5
  • Advanced HTML5 and JavaScript
  • Advanced Human Resources Management: People and Organization
  • Advanced Human Resources Management: Workplace and HR Strategy
  • Advanced Input Validation
  • Advanced JsRender Features
  • Advanced Knockout Techniques
  • Advanced LoopBack
  • Advanced Microservices Architecture
  • Advanced Microservices Patterns
  • Advanced Options, Responsive Web Design, and Management with CSS3
  • Advanced PowerShell Desired State Configuration: Advanced Configuration
  • Advanced PowerShell Desired State Configuration: Writing Custom Resources
  • Advanced Prototyping in iRise
  • Advanced Provisioning in Vagrant
  • Advanced Querying in Java Hibernate
  • Advanced Rails
  • Advanced Scrum: Addressing Sprint Execution Challenges
  • Advanced Scrum: Developing the Product and Sprint Backlogs
  • Advanced Scrum: Integrating and Customizing Scrum
  • Advanced Selecting, Theming, and Plugins
  • Advanced TIBCO Spotfire
  • Advanced Windows Store Apps with C# in Visual Studio 2013: Data Management
  • Advanced Windows Store Apps with C# in Visual Studio 2013: Media and Devices
  • Advanced Windows Store Apps with C# in Visual Studio 2013: Security & Optimizing
  • Advanced Windows Store Apps with C# in Visual Studio 2013: Testing & Deployment
  • Advanced Windows Store Apps with C# in Visual Studio 2013: The UI, Printing, WNS
  • Adversarial Problems
  • Aggregating Data in SQL Server 2016
  • Agile Architecture, Design, & Collaboration
  • Agile Key Exam Concepts
  • Agile Principles and Methodologies
  • Agile Programming & Testing
  • Agile Project Planning
  • Agile Project Scheduling and Monitoring
  • Agile Software Development - Scrum
  • Agile Software Development - Test-driven Development
  • Agile Software Development Methodologies
  • Agile Software Testing: Methodologies and Testing Approaches
  • Agile Software Testing: Techniques and Tools
  • Agile Stakeholder Engagement and Team Development
  • AI and ML Solutions with Python: Deep Learning and Neural Network Implementation
  • AI and ML Solutions with Python: Implementing ML Algorithm Using scikit-learn
  • AI and ML Solutions with Python: Implementing Robotic Process Automation
  • AI and ML Solutions with Python: Machine Learning and Data Analytics
  • AI and ML Solutions with Python: Supervised, Unsupervised and Deep Learning
  • Ajax API Essentials
  • Ajax Applications and Server Communication
  • Ajax Basics
  • Ajax: Requesting Data and Retrieving Responses
  • Akka Essentials
  • Alexa Architecture and Components
  • Amazon ECS and OpsWorks
  • An Executive's Guide to Security: Protecting Your Information
  • An Executive's Guide to Security: Understanding Security Threats
  • An Overview of Apache Cassandra
  • Analyzing Risk (PMBOK® Guide Sixth Edition)
  • Android Architecture, Protection, and Development Best Practices
  • Android Cardboard and Unity VR
  • Android For .NET Developers: Advanced Design, Build, Android Wear, and Emulator
  • Android For .NET Developers: Android OS
  • Android For .NET Developers: Android User Interface Elements
  • Android For .NET Developers: Different Approaches to Development
  • Android For .NET Developers: Introduction to Xamarin For .NET
  • Android For .NET Developers: Java, Garbage Collection, Debugging, and Runtime
  • Android Lollipop New Features For Developers
  • Android Security Vulnerabilities, Testing, and Enterprise Considerations
  • Angular 2 Template Syntax, Directives, and Pipes
  • Angular 4: Animation
  • Angular 4: Components and Bindings
  • Angular 4: Creating an Application
  • Angular 4: Directives
  • Angular 4: Form Management
  • Angular 4: Model-driven Forms
  • Angular 4: NativeScript
  • Angular 4: Pipes
  • Angular 4: Routing
  • Angular 4: Services, Promises, and Route Protection
  • Angular 5 Features and Changes
  • Angular 5 Material and Universal Components
  • Angular 6 Development: Angular Material and Angular Elements
  • Angular 6 Development: Dependency Injection and ng-bootstrap
  • Angular 6 Development: Introduction
  • Angular 6 Development: Libraries
  • Angular 6 Development: Reactive Programming
  • Angular 6 Development: Testing & TDD
  • Angular and ngrx
  • Angular Security and the Angular CLI
  • Angular, Reactive, and Observable
  • AngularJS and ASP.NET 5 MVC 6: Creating an SPA
  • AngularJS and ASP.NET 5 MVC 6: Data Persistence, Validation, and Security
  • AngularJS and TypeScript
  • AngularJS Security Considerations
  • AngularUI Companion Frameworks
  • AngularUI Utilities and Modules
  • Animation and Internationalization
  • ANSI C Language Fundamentals
  • ANTS Performance Profiler
  • Apache Cordova: Exploring the Advanced Features
  • Apache Cordova: Exploring the Basic Features
  • Apache Hadoop
  • Apache Hadoop on Amazon EMR
  • Apache HBase Fundamentals: Access Data through the Shell and Client API
  • Apache HBase Fundamentals: Advanced API, Administration, and MapReduce
  • Apache HBase Fundamentals: Installation, Architecture, and Data Modeling
  • Apache Kafka Development
  • Apache Kafka Operations
  • Apache Solr - Query and Data Management
  • Apache Solr EDeployment and Configuration
  • Apache Spark SQL
  • Apache Storm Introduction - API and Topology
  • Apache Storm Introduction EArchitecture and Installation
  • Apache Subversion Fundamentals: Getting to Know Subversion
  • Apache Web Services Advanced
  • API Gateways
  • API Management
  • API Security
  • APIs and Machine Learning
  • App Navigation
  • App-to-app Communication and File Storage
  • Appium Concepts with Mac OS X
  • Application Deployment and Performance
  • Application Life Cycle
  • Application Security in .NET
  • Application Skills in Microsoft Dynamics CRM 2013
  • Applied Predictive Modeling
  • Applying Machine Learning
  • Applying Security Best Practices to a Physical Environment
  • Apps and Gaming
  • Architecting Microsoft Azure Solutions: Application Design and Messaging
  • Architecting Microsoft Azure Solutions: Automation with PowerShell, Chef, and Puppet
  • Architecting Microsoft Azure Solutions: Azure External Network Connectivity Design
  • Architecting Microsoft Azure Solutions: Azure Storage Design
  • Architecting Microsoft Azure Solutions: Compute Design Considerations
  • Architecting Microsoft Azure Solutions: Data Services Design
  • Architecting Microsoft Azure Solutions: Implement Azure Automation
  • Architecting Microsoft Azure Solutions: Managing Identities
  • Architecting Microsoft Azure Solutions: Monitoring Resources
  • Architecting Microsoft Azure Solutions: Network Design
  • Architecting Microsoft Azure Solutions: Plan Azure SQL-Compliant Database Usage
  • Architecting Microsoft Azure Solutions: Planning Artificial Intelligence Services
  • Architecting Microsoft Azure Solutions: Planning Azure NoSQL Deployments
  • Architecting Microsoft Azure Solutions: Securing the Azure Environment
  • Architecting Microsoft Azure Solutions: Template and Runbook Automation
  • Architecting Microsoft Azure Solutions: Web Application Design
  • Architecture and Testable Code
  • Architecture N-Tier/REST: Designing and Building Applications
  • Archiving and External Access
  • ASP.NET MVC Databases and Entity Framework
  • ASP.NET MVC Web Applications: Adaptive UI Layout and Caching Strategy
  • ASP.NET MVC Web Applications: Asynchronous Tasks
  • ASP.NET MVC Web Applications: Authorization & Exception Handling
  • ASP.NET MVC Web Applications: Claims-Based Authentication
  • ASP.NET MVC Web Applications: Configuring & Deploying
  • ASP.NET MVC Web Applications: Data & State Management
  • ASP.NET MVC Web Applications: Databases & Entity Framework
  • ASP.NET MVC Web Applications: Debugging Web Applications
  • ASP.NET MVC Web Applications: Deployment Architecture
  • ASP.NET MVC Web Applications: Designing Application Architecture
  • ASP.NET MVC Web Applications: Designing Build & Publishing Strategies
  • ASP.NET MVC Web Applications: Distributed Applications
  • ASP.NET MVC Web Applications: Globalization, Azure Events, & NuGet
  • ASP.NET MVC Web Applications: Host Options & WebApp Composition
  • ASP.NET MVC Web Applications: Implementing ASP.NET Authentication
  • ASP.NET MVC Web Applications: Implementing Secure Sites
  • ASP.NET MVC Web Applications: Introduction
  • ASP.NET MVC Web Applications: Models and Unit Testing
  • ASP.NET MVC Web Applications: Optimization & Encryption
  • ASP.NET MVC Web Applications: State & Configuration Management
  • ASP.NET MVC Web Applications: Troubleshooting, HTTP Modules, & Handlers
  • ASP.NET MVC Web Applications: Web API Routes & Controllers
  • Asynchronous Programming with Clojure's core.async Library
  • Asynchronous Tasks in ASP.NET MVC Web Application
  • Attack Vectors and Mitigations
  • Auditing, Logging, and Event Handling
  • Authentication and Identity Management
  • Authoring Tool Accessibility Guidelines (ATAG)
  • Automated Software Testing
  • Automating and Managing Databases
  • Automation and High Availability
  • Automation and Machine Learning
  • Automation Design & Robotics
  • Automation Using Bash and Expect
  • AWS Associate Solution Architect: Amazon CloudFront and Route 53
  • AWS Associate Solution Architect: Amazon Machine Images
  • AWS Associate Solution Architect: Architecting for the Cloud
  • AWS Associate Solution Architect: Architecture Security
  • AWS Associate Solution Architect: Auto Scaling
  • AWS Associate Solution Architect: AWS Primer
  • AWS Associate Solution Architect: AWS Storage Solutions
  • AWS Associate Solution Architect: Building and Managing AWS Solutions
  • AWS Associate Solution Architect: Caching
  • AWS Associate Solution Architect: Database Managed Services
  • AWS Associate Solution Architect: High Availability
  • AWS Associate Solution Architect: Loose Coupling
  • AWS Associate Solution Architect: Managing AWS
  • AWS Associate Solution Architect: Optimizing Compute Resources
  • AWS Associate Solution Architect: Optimizing Storage
  • AWS Associate Solution Architect: Scalability and Elasticity
  • AWS Associate Solution Architect: Virtual Private Cloud
  • AWS Certified Developer - Associate: Application Development
  • AWS Certified Developer - Associate: Code Management and Monitoring Tools
  • AWS Certified Developer - Associate: Plan Application and Infrastructure Security
  • AWS Certified Developer - Associate: Principles and Essential Services
  • AWS Certified Developer - Associate: Serverless Application and Container Management
  • AWS Certified Developer - Associate: Service Integration and Orchestration
  • AWS Certified SysOps Administrator: Application Infrastructure
  • AWS Certified SysOps Administrator: Compute Services
  • AWS Certified SysOps Administrator: Database Services
  • AWS Certified SysOps Administrator: High Availabilty
  • AWS Certified SysOps Administrator: Introduction
  • AWS Certified SysOps Administrator: Monitoring the AWS Environment
  • AWS Certified SysOps Administrator: Networking Services
  • AWS Certified SysOps Administrator: Preparing for Cloud Service Management
  • AWS Certified SysOps Administrator: Security and IAM Services
  • AWS Certified SysOps Administrator: Storage Services
  • AWS Lambda
  • AWS Professional Solution Architect: Business Continuity
  • AWS Professional Solution Architect: Cloud Migration
  • AWS Professional Solution Architect: Costing
  • AWS Professional Solution Architect: Data Replication
  • AWS Professional Solution Architect: Data Security
  • AWS Professional Solution Architect: Data Storage
  • AWS Professional Solution Architect: Deployment Management
  • AWS Professional Solution Architect: Hybrid Architecture
  • AWS Professional Solution Architect: Network Design
  • AWS Professional Solution Architect: Scalability and Elasticity
  • AWS Professional Solution Architect: Security Controls
  • AWS Serverless Architecture
  • AWS Serverless Monitoring & Security
  • AWS Serverless Storage
  • AWS: Cloud Primer
  • AWS: Management Tools
  • AWS: Networking
  • AWS: Other Services
  • AWS: Storage
  • AWS: Virtual Machines and Identity and Access Management
  • AWS: WorkDocs
  • Azure Active Directory and Authentication
  • Azure Active Directory and Collaboration
  • Azure App Services
  • Azure Backup and Recovery
  • Azure Blob Storage
  • Azure Developer: Advanced Scalability Using Azure
  • Azure Developer: Advanced Security & Integration Using Azure Services
  • Azure Developer: Azure Batch & Scheduling Bulk Operations
  • Azure Developer: Azure Cloud Technology Solutions
  • Azure Developer: Blob Storage Solutions
  • Azure Developer: Caching & Content Delivery Solutions
  • Azure Developer: Common Application Design & Connectivity Patterns
  • Azure Developer: Cosmos DB Storage Solutions
  • Azure Developer: Creating Mobile Apps
  • Azure Developer: File Storage Solutions
  • Azure Developer: Implementing Authentication & Access Control
  • Azure Developer: Implementing Secure Data Solutions
  • Azure Developer: Kubernetes Service Solutions
  • Azure Developer: Media Services Solutions
  • Azure Developer: PaaS Web Applications
  • Azure Developer: Relational Database Solutions
  • Azure Developer: Storage Solutions
  • Azure Developer: Storage Tables
  • Azure Developer: Working With Azure Functions
  • Azure Developer: Working with Azure Logic Apps
  • Azure Developer: Working with Azure Service Fabric
  • Azure Diagnostics, Debugging, and Access Control Service
  • Azure Functions and API Management
  • Azure Fundamentals: Azure Data Privacy
  • Azure Fundamentals: Azure Network Security
  • Azure Fundamentals: Azure Security Services
  • Azure Fundamentals: Big Data Analytics
  • Azure Fundamentals: Cloud Computing
  • Azure Fundamentals: Database Solutions
  • Azure Fundamentals: IoT & AI
  • Azure Fundamentals: Monitoring the Azure Environment
  • Azure Fundamentals: Network Components
  • Azure Fundamentals: Storage Components
  • Azure Fundamentals: The Ecosystem
  • Azure Fundamentals: Virtual Machines
  • Azure High Availability Solutions
  • Azure Networking
  • Azure Scalability
  • Azure Security and Monitoring
  • Azure Service Fabric Apps
  • Azure Services
  • Azure SQL Database and Caching
  • Azure SQL Database Encryption
  • Azure SQL Database Security
  • Azure SQL DB and ARM Templates
  • Azure Storage
  • Azure Storage and the Azure Environment
  • Azure Storage Tables and Queues
  • Azure Subscription Messages, Security, and Troubleshooting
  • Azure Virtual Machine Management
  • Azure Virtual Machines
  • Azure Virtual Machines
  • Azure VM Monitoring and Availability
  • Azure VM Scaling and Storage
  • Azure, Node.js, and SQL Server
  • Background Tasks and Reusable Components
  • Backing Up, Recovering, Importing, and Exporting Data in Oracle Database 12c
  • Balancing the Four Vs of Data: The Four Vs of Data
  • Base SAS 9 Programming: Creating Reports
  • Base SAS 9 Programming: Data Structures
  • Base SAS 9 Programming: Inputs and Outputs
  • Base SAS 9 Programming: Introduction to Data Sets
  • Base SAS 9 Programming: The SAS Environment
  • Base SAS 9 Programming: Working with Data Sets
  • Bash Advanced Scripting and File I/O
  • Bash Scripting Flow Control and Data Types
  • Basic Coding with Adobe Dreamweaver CC 2015
  • Basic Concepts of a Microservices Architecture
  • Basic Programming in Force.com
  • Basic SCCM Maintenance and Managing Operating System Deployment
  • Basic Six Sigma Statistics
  • Basics of Hypothesis Testing and Tests for Means in Six Sigma
  • Batch Solutions with Hive and Apache Pig
  • Beginning AngularJS
  • Beginning Cucumber and Behavior-driven Development
  • Beginning Object-Oriented Design
  • Being an Effective Team Member
  • Big Data - The Legal Perspective
  • Big Data Corporate Leadership Perspective
  • Big Data Engineering Perspectives
  • Big Data Fundamentals
  • Big Data Interpretation
  • Big Data Marketing Perspective
  • Big Data Opportunities and Challenges
  • Big Data Sales Perspective
  • Big Data Strategic Planning
  • Bitcoin Internals and Wallet Configuration
  • Bitcoin Technology Fundamentals
  • Blockchain and Your Business
  • Blockchain Architectural Components and Platforms
  • Blockchain in Action and IoT
  • Blockchain Trust and Design
  • Bootstrap and Dashboards with Angular 5
  • Bootstrap Environment, Requirements, and Setup
  • Bootstrap Forms and Layout
  • Build & Integrate React Applications with Redux Capabilities
  • Build and Test SPA Using React and Redux
  • Building a Microservice in .NET Core
  • Building an API Project in ASP.NET
  • Building Data Pipelines
  • Building Dynamic Web Sites with MySQL and PHP
  • Building ML Training Sets: Introduction
  • Building ML Training Sets: Preprocessing Datasets for Linear Regression
  • Building Simple Applications
  • Building Solutions using Kafka and HBase
  • Building the Foundation for an Effective Team
  • Building the Puppet Environment
  • Building the Team Foundation Server Environment
  • Business Analysis Activities and Tools
  • Business Analysis Analytical Techniques
  • Business Analysis Documentation and Criteria
  • Business Analysis Overview
  • Business Analysis Professional Effectiveness Competencies
  • Business Intelligence with QlikView
  • C++ Classes
  • C++ Standard Template Library Algorithms and Operations
  • C++ Templates and Containers
  • Capacity Management for Hadoop Clusters
  • Capturing, Analyzing, and Using Project Lessons Learned
  • Cassandra vs. SQL
  • CCENT: Access Control Lists Part 1
  • CCENT: Access Control Lists Part 2
  • CCENT: Device Hardening
  • CCENT: Device Management
  • CCENT: DHCP Configuration
  • CCENT: Discovering Ethernet
  • CCENT: Discovery Protocols
  • CCENT: DNS Configuration
  • CCENT: Functions of Routing
  • CCENT: Initial Device Configuration
  • CCENT: Interswitch Connectivity
  • CCENT: InterVLAN Routing
  • CCENT: IPv4 Addressing Part 1
  • CCENT: IPv4 Addressing Part 2
  • CCENT: IPv4 Configuration
  • CCENT: IPv6 Addressing
  • CCENT: IPv6 Configuration
  • CCENT: NAT Configuration
  • CCENT: Network Cabling
  • CCENT: Network Components, Topologies, and Architecture
  • CCENT: NTP Configuration
  • CCENT: OSI Model
  • CCENT: Overview of Cisco Devices
  • CCENT: Overview of Networking
  • CCENT: Port Security
  • CCENT: RIPv2 Configuration
  • CCENT: Static Routing
  • CCENT: Subnetting Part 1
  • CCENT: Subnetting Part 2
  • CCENT: Subnetting Practice
  • CCENT: Switching Functions
  • CCENT: TCP/IP Model
  • CCENT: Troubleshooting Interfaces and Cables
  • CCENT: Troubleshooting Methodologies
  • CCENT: VLAN Configuration
  • CEHv10: Common Web App Threats
  • CEHv10: Denial of Service
  • CEHv10: Ethical Hacking Overview and Threats
  • CEHv10: Evading IDS, Firewalls, and Honeypots Part 2
  • CEHv10: Footprinting
  • CEHv10: Hacking Concepts
  • CEHv10: Hacking Web Servers
  • CEHv10: Hidden Files and Covering Tracks
  • CEHv10: Host Discovery and Scanning with Nmap
  • CEHv10: IoT Hacking and Countermeasures
  • CEHv10: Network Sniffing
  • CEHv10: Password Attacks
  • CEHv10: Password Attacks Part 2
  • CEHv10: Pentesting, Laws, and Standards
  • CEHv10: ProxyChains and Enumeration
  • CEHv10: Security Controls
  • CEHv10: Security Controls Part 2
  • CEHv10: SQL Injection
  • CEHv10: Vulnerability Analysis Concepts and Tools
  • CEHv10: Wireless Hacking Concepts
  • Certified Business Analysis Professional
  • Certified Ethical Hacker - CEHv10: Cloud Computer Attacks
  • Certified Ethical Hacker - CEHv10: Clouding Computing Concepts
  • Certified Ethical Hacker - CEHv10: Common Web App Threats Part 2
  • Certified Ethical Hacker - CEHv10: Covert Data Gathering
  • Certified Ethical Hacker - CEHv10: Cracking and Mobile Hacking
  • Certified Ethical Hacker - CEHv10: Cryptography Attacks
  • Certified Ethical Hacker - CEHv10: Cryptography Concepts
  • Certified Ethical Hacker - CEHv10: Cryptography Concepts Part 2
  • Certified Ethical Hacker - CEHv10: Cryptography Concepts Part 3
  • Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots
  • Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots Part 3
  • Certified Ethical Hacker - CEHv10: IoT Attacks
  • Certified Ethical Hacker - CEHv10: IoT Concepts
  • Certified Ethical Hacker - CEHv10: Malware Distribution
  • Certified Ethical Hacker - CEHv10: Malware Threats
  • Certified Ethical Hacker - CEHv10: Practical Web App Hacking
  • Certified Ethical Hacker - CEHv10: Privilege Escalation
  • Certified Ethical Hacker - CEHv10: Session Hijacking
  • Certified Ethical Hacker - CEHv10: Social Engineering
  • Certified Ethical Hacker - CEHv10: SQL Injection Types and Tools
  • Certified Ethical Hacker - CEHv10: Wireless Hacking Common Threats
  • Certified Ethical Hacker - CEHv10: Wireless Hacking Tools
  • Chatting and Conferencing
  • Chef Server Basics
  • Choosing the Correct Storage Device for Users
  • CISA: Governance and Management of IT - Part 1
  • CISA: Governance and Management of IT - Part 2
  • CISA: Information Systems Acquisition, Development, and Implementation
  • CISA: Information Systems Operations, Maintenance, and Service Management
  • CISA: Protection of Information Assets - Part 1
  • CISA: Protection of Information Assets - Part 2
  • CISA: The Process of Auditing Information Systems - Part 1
  • CISA: The Process of Auditing Information Systems - Part 2
  • Cisco SWITCH 2.0: Trunking Using VTP
  • CISM: Information Risk Management Part 1
  • CISM: Information Risk Management Part 2
  • CISM: Information Security Governance Part 1
  • CISM: Information Security Governance Part 2
  • CISM: Information Security Incident Management Part 1
  • CISM: Information Security Incident Management Part 2
  • CISM: Information Security Program Development and Management Part 1
  • CISM: Information Security Program Development and Management Part 2
  • CISSP 2018 : Communication and Network Security
  • CISSP 2018: (ISC)² and Security Fundamentals
  • CISSP 2018: Conducting Incident Management
  • CISSP 2018: Cryptographic Client-based Systems
  • CISSP 2018: Identity and Access Management (IAM)
  • CISSP 2018: Security and Risk Management (Part 1)
  • CISSP 2018: Security and Risk Management (Part 2)
  • CISSP 2018: Security Architecture and Engineering (Part 1)
  • CISSP 2018: Security Architecture and Engineering (Part 2)
  • CISSP 2018: Security Assessment and Testing
  • CISSP 2018: Security Operations (Part 1)
  • CISSP 2018: Security Operations (Part 2)
  • CISSP 2018: Site and Facility Security Controls
  • CISSP 2018: Software Development Security
  • Classes, Functions, and Object-oriented Programming
  • Classifying and Collecting Data
  • CLDFND: Block & File Storage Access
  • CLDFND: Cisco Application Centric Infrastructure
  • CLDFND: Cisco Cloud Virtualization
  • CLDFND: Cisco CloudCenter
  • CLDFND: Cisco CloudCenter Components
  • CLDFND: Cisco UCS
  • CLDFND: Cisco Unified Fabric
  • CLDFND: Cloud Characteristics
  • CLDFND: Cloud Service Models
  • CLDFND: Community & Hybrid Cloud
  • CLDFND: IaaS, PaaS, & SaaS
  • CLDFND: Integrated Infrastructure & Cisco InterCloud Fabric
  • CLDFND: Public & Private Cloud Deployment Models
  • CLDFND: SAN, NAS, & Cisco Storage Network Devices
  • CLDFND: Server & Infrastructure Virtualization
  • CLDFND: Software-Defined Networking
  • CLDFND: Storage Access Technologies
  • CLDFND: Storage Provisioning
  • CLDFND: Virtual Application Containers
  • CLDFND: Virtual Networking Services
  • CLDFND: VLANs & VXLANs
  • CLI Cloud Resource Management
  • Client Configuration
  • Client Connectivity and Administrator Roles in Office 365
  • Client-side Routing and Using HTTP
  • Clojure Data-Driven and Web Application Fundamentals
  • Clojure Fundamentals
  • Cloud Application Security
  • Cloud Computing for the Business User: Concepts and Moving to the Cloud
  • Cloud Computing Fundamentals: Cloud Security
  • Cloud Computing Fundamentals: Identity, Presence, and Privacy
  • Cloud Computing Fundamentals: Migrating to the Cloud
  • Cloud Computing Fundamentals: Overview
  • Cloud Computing Fundamentals: Storing and Managing Cloud Data
  • Cloud Computing Fundamentals: Virtualization and Data Centers
  • Cloud Data Architecture: Data Management & Adoption Frameworks
  • Cloud Data Architecture: DevOps & Containerization
  • Cloud Data Platform Solutions: SQL Databases
  • Cloud Data Science: Azure AI Gallery and Azure Machine Learning
  • Cloud Data Science: Consume Models and APIs Using Azure Machine Learning Studio
  • Cloud Data Science: Data Cleanup with Azure Machine Learning Studio
  • Cloud Data Science: Deploying Models with Azure Machine Learning Studio
  • Cloud Data Science: Importing and Exporting in Azure Machine Learning Studio
  • Cloud Data Science: Introduction to Azure Machine Learning
  • Cloud Data Science: Microsoft Cognitive Toolkit and Azure Machine Learning
  • Cloud Data Science: Optimize and Validate Models in Azure Machine Learning Studio
  • Cloud Data Science: SQL Server & Azure Machine Learning
  • Cloud Data Science: Summarize Data with Azure Machine Learning Studio
  • Cloud Data Science: Transforming Data in Azure Machine Learning Studio
  • Cloud Data Science: Using Algorithms in Azure Machine Learning Studio
  • Cloud Data Science: Virtual Machines & HDInsight
  • Cloud Data Security
  • Cloud Foundry Architecture
  • Cloud Foundry Command Line Interface
  • Cloud Foundry Overview
  • Cloud Identity Management
  • Cloud Service ELegal and Compliance
  • Cloud Service EOperations Management
  • Cloud Services and Enterprise Mobility
  • Cloud Solution Management & Testing
  • Cloud System Architecture EConcepts and Design
  • Cloud System Security - Platform and Infrastructure
  • Cloudera Manager and Hadoop Clusters
  • Cluster Analysis and Ensemble Learning
  • Clustering Techniques
  • Clustering with Kafka
  • Clustering with VMWare 6.5
  • COBIT 5 Principles and Implementation
  • Code Access Security and Cryptography in .NET
  • Collaboration in Exchange 2016
  • Columnstore Indexes
  • Common DFSS Methodologies, Design for X, and Robust Designs
  • Common Widgets and Animation
  • Communicating Effectively with Customers
  • Communicating with WebSockets and Utilizing Asynchronous Processing
  • Communication, Changes, and Documentation
  • Community Cookbooks and Chef Server Patterns
  • Complex Application Development with Backbone.js
  • Complex TestNG Integrations and Implementations
  • Complex Visualizations and Analytics
  • Compliance Issues and Strategies: Data Compliance
  • Components of a SQL Server 2016 Installation
  • Components of Domain-driven Design
  • Composing the UI Layout of an Application
  • Composing the UI Layout of an Application
  • Comprehensive JMeter Operations
  • CompTIA A+ 220-1001: Accessories and Mobile Device Synchronization
  • CompTIA A+ 220-1001: Basic Cable Types
  • CompTIA A+ 220-1001: Cloud Computing
  • CompTIA A+ 220-1001: Common Devices
  • CompTIA A+ 220-1001: Configuring a Wired/Wireless Network
  • CompTIA A+ 220-1001: Connectors
  • CompTIA A+ 220-1001: Custom PC configuration
  • CompTIA A+ 220-1001: Implementing Network Concepts
  • CompTIA A+ 220-1001: Installing Hardware and Display Components
  • CompTIA A+ 220-1001: Laptops Features and Mobile Device Types
  • CompTIA A+ 220-1001: Mobile Device Network Connectivity and Application Support
  • CompTIA A+ 220-1001: Network Hosts
  • CompTIA A+ 220-1001: Network Types
  • CompTIA A+ 220-1001: Networking
  • CompTIA A+ 220-1001: Networking Tools
  • CompTIA A+ 220-1001: Power Supplies
  • CompTIA A+ 220-1001: Printers
  • CompTIA A+ 220-1001: Random Access Memory
  • CompTIA A+ 220-1001: Resolving Problems
  • CompTIA A+ 220-1001: SOHO Devices
  • CompTIA A+ 220-1001: Storage Solutions
  • CompTIA A+ 220-1001: TCP and UDP ports
  • CompTIA A+ 220-1001: Troubleshooting
  • CompTIA A+ 220-1001: Troubleshooting Printers
  • CompTIA A+ 220-1001: Virtualization
  • CompTIA A+ 220-1001: Wireless Networking Protocols
  • CompTIA A+ 220-1001: Working with Motherboards, CPUs, & Add-On Cards
  • CompTIA A+ 220-1001: Working with Peripheral Devices
  • CompTIA A+ 220-1002: Comparing Common Operating Systems
  • CompTIA A+ 220-1002: Critical Security Concepts
  • CompTIA A+ 220-1002: Microsoft Command Line Tools
  • CompTIA A+ 220-1002: Microsoft Operating System Installation & Upgrade
  • CompTIA A+ 220-1002: MS Operating System Administrative Tools
  • CompTIA A+ 220-1002: Operational Procedures Best Practices
  • CompTIA A+ 220-1002: Security Fundamentals
  • CompTIA A+ 220-1002: System Utilities
  • CompTIA A+ 220-1002: Windows Control Panel Utilities
  • CompTIA A+ 220-901: Computer Hardware Troubleshooting
  • CompTIA A+ 220-901: Internet Connectivity
  • CompTIA A+ 220-901: Laptops
  • CompTIA A+ 220-901: Memory and Storage
  • CompTIA A+ 220-901: Mobile Devices
  • CompTIA A+ 220-901: Monitors and Output Devices
  • CompTIA A+ 220-901: Networking
  • CompTIA A+ 220-901: PC Components
  • CompTIA A+ 220-901: Printers
  • CompTIA A+ 220-901: Troubleshooting Networking Devices
  • CompTIA A+ 220-901: Troubleshooting Printers
  • CompTIA A+ 220-902: A Practical Approach to Troubleshooting
  • CompTIA A+ 220-902: Adding Hardware to Windows and Storage Options
  • CompTIA A+ 220-902: Common Troubleshooting and Security Practices
  • CompTIA A+ 220-902: Desktop Security
  • CompTIA A+ 220-902: Introduction to Mobile Operating Systems
  • CompTIA A+ 220-902: Introduction to Virtualization and Basic Security Concepts
  • CompTIA A+ 220-902: Introduction to Windows
  • CompTIA A+ 220-902: Mac OSX Features and an Introduction to Linux
  • CompTIA A+ 220-902: Mobile Troubleshooting
  • CompTIA A+ 220-902: Monitoring the Windows OS and an Introduction to Other OSs
  • CompTIA A+ 220-902: Networking with the Windows Operating System
  • CompTIA A+ 220-902: Operational Procedures
  • CompTIA A+ 220-902: Safety
  • CompTIA A+ 220-902: Shell and Terminal Commands for Linux or Mac OSX
  • CompTIA A+ 220-902: Various Features and Requirements of Microsoft OS
  • CompTIA A+ 220-902: Windows Applications and Features
  • CompTIA A+ 220-902: Windows Interaction and Personalization
  • CompTIA A+ 220-902: Windows Overview and Installation
  • CompTIA A+ 220-902: Windows Security Features and Management
  • CompTIA A+ 220-902: Windows Utilities and Management
  • CompTIA A+ Exam 220-901: BIOS and Startup
  • CompTIA A+ Exam 220-901: BIOS Motherboards
  • CompTIA A+ Exam 220-901: Broadband Routers
  • CompTIA A+ Exam 220-901: Connectors and Connections
  • CompTIA A+ Exam 220-901: CPUs
  • CompTIA A+ Exam 220-901: Different Computer Form Factors
  • CompTIA A+ Exam 220-901: Display Devices
  • CompTIA A+ Exam 220-901: Internet Connections
  • CompTIA A+ Exam 220-901: Introduction to Networking
  • CompTIA A+ Exam 220-901: Miscellaneous Tools and Connectors
  • CompTIA A+ Exam 220-901: Mobile Computing
  • CompTIA A+ Exam 220-901: Motherboards
  • CompTIA A+ Exam 220-901: Network Protocols and Cabling
  • CompTIA A+ Exam 220-901: Peripheral Devices
  • CompTIA A+ Exam 220-901: Portable Computer Hardware
  • CompTIA A+ Exam 220-901: Printer Maintenance
  • CompTIA A+ Exam 220-901: Printers
  • CompTIA A+ Exam 220-901: RAM
  • CompTIA A+ Exam 220-901: Storage Solutions
  • CompTIA A+ Exam 220-901: Troubleshooting Peripheral and Mobile Devices
  • CompTIA A+ Exam 220-901: Troubleshooting Printers
  • CompTIA A+ Exam 220-901: Wireless Networking
  • CompTIA A+ Exam 220-902: Non-desktop Technologies
  • CompTIA A+ Exam 220-902: Non-Windows Operating Systems
  • CompTIA A+ Exam 220-902: Troubleshooting
  • CompTIA A+ Exam 220-902: Using and Managing Windows
  • CompTIA A+ Exam 220-902: Windows Networking
  • CompTIA A+: Application Installation, Networking, & Tools
  • CompTIA A+: Software Troubleshooting
  • CompTIA CASP CAS-003: Applying Research Methods for Trend and Impact Analysis
  • CompTIA CASP CAS-003: Business and Industry Influences and Risks
  • CompTIA CASP CAS-003: Conducting Security Assessments
  • CompTIA CASP CAS-003: Implementing Cryptographic Techniques
  • CompTIA CASP CAS-003: Implementing Incident Response and Recovery
  • CompTIA CASP CAS-003: Implementing Security Activities across the Technology Life Cycle
  • CompTIA CASP CAS-003: Integrating and Troubleshooting Advanced AAA Technologies
  • CompTIA CASP CAS-003: Integrating Cloud and Virtualization Technologies in the Enterprise
  • CompTIA CASP CAS-003: Integrating Hosts, Storage, and Applications in the Enterprise
  • CompTIA CASP CAS-003: Interacting across Diverse Business Units
  • CompTIA CASP CAS-003: Organizational Security and Privacy Policies
  • CompTIA CASP CAS-003: Secure Communication and Collaboration Solutions
  • CompTIA CASP+ CAS-003: Integrating Controls for Mobile and Small Form Factor Devices
  • CompTIA CASP+ CAS-003: Integrating Network and Security Components, Concepts, and Architectures
  • CompTIA CASP+ CAS-003: Integrating Security Controls for Host Devices
  • CompTIA CASP+ CAS-003: Risk Metric Scenarios for Enterprise Security
  • CompTIA CASP+ CAS-003: Risk Mitigation Strategies and Controls
  • CompTIA CASP+ CAS-003: Selecting Software Security Controls
  • CompTIA Cloud+ CV0-002: Disaster Recovery
  • CompTIA Cloud+ CV0-002: Performance Management
  • CompTIA Cloud+ CV0-002: Planning Cloud Compute Resources
  • CompTIA Cloud+ CV0-002: Planning Cloud Deployments
  • CompTIA Cloud+ CV0-002: Planning Cloud Migrations and Extensions
  • CompTIA Cloud+ CV0-002: Planning Cloud Networking
  • CompTIA Cloud+ CV0-002: Planning Cloud Storage Resources
  • CompTIA Cloud+ CV0-002: Security Configurations and Compliance Controls
  • CompTIA Cloud+ CV0-002: Security Technologies and Automation Techniques
  • CompTIA Cloud+ CV0-002: System Patching and Maintenance
  • CompTIA Cloud+ CV0-002: Troubleshooting Deployments
  • CompTIA Cybersecurity Analyst+ CS0-001: Investigate Security Incidents
  • CompTIA Cybersecurity Analyst+ CS0-001: Monitoring for Security Issues
  • CompTIA Cybersecurity Analyst+ CS0-001: Network Architecture and Reconnaissance
  • CompTIA Cybersecurity Analyst+ CS0-001: Reducing Vulnerabilities
  • CompTIA Cybersecurity Analyst+ CS0-001: Threat Identification
  • CompTIA Cybersecurity Analyst+ CS0-001: Threat Mitigation
  • CompTIA Linux+ 2014 Powered By LPI: LX0-103: Advanced GNU and Unix Commands
  • CompTIA Linux+ 2014 Powered By LPI: LX0-103: Devices and Filesystems
  • CompTIA Linux+ 2014 Powered By LPI: LX0-103: GNU and Unix Commands
  • CompTIA Linux+ 2014 Powered By LPI: LX0-103: Installation and Package Management
  • CompTIA Linux+ 2014 Powered By LPI: LX0-103: System Architecture
  • CompTIA Linux+ 2014 Powered By LPI: LX0-104 Essential System Services
  • CompTIA Linux+ 2014 Powered By LPI: LX0-104 Networking Fundamentals
  • CompTIA Linux+ 2014 Powered By LPI: LX0-104 Scripting and Administrative Tasks
  • CompTIA Linux+ 2014 Powered By LPI: LX0-104 Security, Data, and Accessibility
  • CompTIA Network+ N10-007: Additional Network Services
  • CompTIA Network+ N10-007: Cloud Concepts, Network Services, & Cabling Solutions
  • CompTIA Network+ N10-007: Documentation and Diagrams & Business Continuity
  • CompTIA Network+ N10-007: Mitigation Techniques
  • CompTIA Network+ N10-007: Network Attacks & Device Hardening
  • CompTIA Network+ N10-007: Network Monitoring & Remote Access Methods
  • CompTIA Network+ N10-007: Network Storage, Virtualization, & WAN Technologies
  • CompTIA Network+ N10-007: Network Topologies & Technologies
  • CompTIA Network+ N10-007: Networking Devices
  • CompTIA Network+ N10-007: Policies and Best Practices
  • CompTIA Network+ N10-007: Ports and Protocols and the OSI Model
  • CompTIA Network+ N10-007: Routing, Switching, & IP Addressing
  • CompTIA Network+ N10-007: Security Devices, Wireless Security, & Access Control
  • CompTIA Network+ N10-007: Troubleshooting Common Network Service Issues
  • CompTIA Network+ N10-007: Troubleshooting Connectivity & Performance Issues
  • CompTIA Network+ N10-007: Troubleshooting Methodology & Tools
  • CompTIA PenTest+: Analyzing Tool and Script Output
  • CompTIA PenTest+: Application-Based vulnerabilities
  • CompTIA PenTest+: Information Gathering
  • CompTIA PenTest+: Local Host Vulnerabilities
  • CompTIA PenTest+: Network-Based Exploits
  • CompTIA PenTest+: Penetration Testing Tools
  • CompTIA PenTest+: Planning for an Engagement
  • CompTIA PenTest+: Post-Exploitation and Facilities Attacks
  • CompTIA PenTest+: Reporting and Communication
  • CompTIA PenTest+: Scoping an Engagement
  • CompTIA PenTest+: Social Engineering and Specialized System Attacks
  • CompTIA PenTest+: Vulnerability Identification
  • CompTIA Security+ SY0-501: Analyzing Output from Security Technologies
  • CompTIA Security+ SY0-501: Application and Service Attacks
  • CompTIA Security+ SY0-501: Business Impact Analysis and Risk Management
  • CompTIA Security+ SY0-501: Cloud, Virtualization, and Resiliency Concepts
  • CompTIA Security+ SY0-501: Common Account Management Practices
  • CompTIA Security+ SY0-501: Components Supporting Organizational Security
  • CompTIA Security+ SY0-501: Cryptographic and Wireless Attacks
  • CompTIA Security+ SY0-501: Cryptography
  • CompTIA Security+ SY0-501: Deploying Mobile Devices Securely
  • CompTIA Security+ SY0-501: Frameworks, Guidelines, and Physical Security
  • CompTIA Security+ SY0-501: Identity and Access Management Controls
  • CompTIA Security+ SY0-501: Identity Concepts and Access Services
  • CompTIA Security+ SY0-501: Impacts from Vulnerability Types
  • CompTIA Security+ SY0-501: Implement Secure Network Architecture Concepts
  • CompTIA Security+ SY0-501: Implementing Secure Protocols
  • CompTIA Security+ SY0-501: Incident Response, Forensics, and Disaster Recovery
  • CompTIA Security+ SY0-501: Penetration Testing and Vulnerability Scanning
  • CompTIA Security+ SY0-501: Policies, Plans, and Procedures
  • CompTIA Security+ SY0-501: Public Key Infrastructure
  • CompTIA Security+ SY0-501: Secure System and Application Design and Deployment
  • CompTIA Security+ SY0-501: Security Assessment Using Software Tools
  • CompTIA Security+ SY0-501: Social Engineering and Related Attacks
  • CompTIA Security+ SY0-501: The Present Threat Landscape
  • CompTIA Security+ SY0-501: Troubleshooting Common Security Issues
  • CompTIA Security+ SY0-501: Types of Malware
  • CompTIA Security+ SY0-501: Wireless Security Settings
  • CompTIA Server+ SK0-004: Networking and Disaster Recovery
  • CompTIA Server+ SK0-004: Security
  • CompTIA Server+ SK0-004: Server Administration I
  • CompTIA Server+ SK0-004: Server Administration II
  • CompTIA Server+ SK0-004: Server Architecture
  • CompTIA Server+ SK0-004: Storage
  • CompTIA Server+ SK0-004: Troubleshooting I
  • CompTIA Server+ SK0-004: Troubleshooting II
  • Configuration and Troubleshooting in RabbitMQ
  • Configure and Administer vRealize Business Standards and Application Services
  • Configure and Manage Users and Groups in vRealize Automation
  • Configuring and Deploying ASP.NET Web Applications
  • Configuring Azure VM Networking
  • Configuring Citrix XenDesktop 7.6 Components
  • Configuring Enterprise Voice
  • Configuring Forms with Knockout
  • Configuring MVC Controllers and Actions
  • Configuring MVC Controllers and Actions
  • Configuring Network Services
  • Configuring OpenStack
  • Configuring Puppet Environments and Managing Files
  • Configuring the Puppet Master and Puppet Agent
  • Configuring Tomcat and PHP
  • Configuring Windows 10 Devices: Authentication
  • Configuring Windows 10 Devices: Bitlocker, Recovery, and Maintenance
  • Configuring Windows 10 Devices: Data Protection
  • Configuring Windows 10 Devices: Deployment Tools and Procedures
  • Configuring Windows 10 Devices: Devices and Disks
  • Configuring Windows 10 Devices: Installing and Managing Applications
  • Configuring Windows 10 Devices: Introduction to Deployment
  • Configuring Windows 10 Devices: Introduction to Windows 10
  • Configuring Windows 10 Devices: Maintaining Windows 10
  • Configuring Windows 10 Devices: Managing Devices
  • Configuring Windows 10 Devices: Networking
  • Configuring Windows 10 Devices: Remote Connections
  • Configuring Windows 10 Devices: Secure Identities
  • Configuring Windows 10 Devices: Start Menu, Personalization, and Multitasking
  • Configuring Windows 10 Devices: Threat Resistance and UAC
  • Configuring Windows 10 Devices: Threat Resistance Technologies
  • Configuring Windows 10 Devices: Universal Windows Apps
  • Configuring Windows 10 Devices: User Data
  • Configuring Windows 10 Devices: Virtualization Technologies
  • Configuring Windows Server 2008 Server Core
  • Connection Managers and Data Sources
  • Connectivity and Space Management in Oracle Database 12c
  • Connectors and Ports
  • Constraint Satisfaction Problems
  • Consuming Services, using the ASP.NET Pipeline, and using OData Services
  • Container, Compute, and App Engine with Networking Services
  • Continued Dataproc Operations
  • Continuous Integration and Deployment with Team Foundation Server
  • Control the Project Schedule (PMBOK® Guide Sixth Edition)
  • Controllers and Directives
  • Controlling Conflict, Stress, and Time in a Customer Service Environment
  • Controlling Project Work and Closing
  • Convolutional and Recurrent Neural Networks
  • Core Commerce and the Product Catalog
  • Core Concepts of a Service-oriented Architecture
  • Correlation & Regression
  • Cosmos DB and Azure Search
  • Create and Administer Cloud Networking
  • Create Spark Streaming Applications
  • Create Work Breakdown Structure (PMBOK® Guide Sixth Edition)
  • Creating a Basic Angular Application
  • Creating a LAMP Stack
  • Creating a Project Budget (PMBOK® Guide Sixth Edition)
  • Creating a Project Schedule and Budget
  • Creating a Virtual Reality App with Unity
  • Creating and Configuring Virtual Machines in VMware Workstation 11
  • Creating and Maintaining Forms
  • Creating and Managing Unix File Systems
  • Creating and Securing MVC 5 Applications
  • Creating and Simulating a Working Prototype
  • Creating Application Builds
  • Creating Apps
  • Creating Data APIs Using Node.js
  • Creating Mobile Apps with Appcelerator Titanium
  • Creating Secure C/C++ Code
  • Creating Software Tests
  • Creating Styles with CSS3 and Styling Text
  • Creating Virtual Machines (VMs) and Workloads
  • Cross-Platform Shared Code and Xamarin.Forms in Visual Studio
  • Cryptography Fundamentals: Applying Cryptography
  • Cryptography Fundamentals: Defining Cryptography
  • CSSLP: Secure Software Concepts
  • CSSLP: Secure Software Design
  • CSSLP: Secure Software Implementation and Coding
  • CSSLP: Secure Software Requirements
  • CSSLP: Secure Software Testing
  • CSSLP: Software Acceptance, Deployment, Operations, Maintenance, and Disposal
  • CSSLP: Supply Chain and Software Acquisition
  • Cucumber Steps and Scenario Development
  • Customer Service Automation in Microsoft Dynamics CRM 2013
  • Customized Mapping and Basic Querying in Java Hibernate
  • Cybersecurity 101: Auditing & Incident Response
  • Cybersecurity 101: Session & Risk Management
  • Dashboards and Comparative Analysis
  • Data Access & Governance Policies: Data Access Oversight and IAM
  • Data Access & Governance Policies: Data Classification, Encryption, and Monitoring
  • Data Access and Binding in Apps
  • Data Analysis and Root Cause Analysis in Six Sigma
  • Data Analysis Application
  • Data Analysis Concepts
  • Data Analysis Using Spark SQL and Hive
  • Data Analytics using Power BI: Concepts
  • Data Analytics Using Power BI: Data Modeling and Visualization
  • Data Analytics Using Power BI: Data Sourcing and Preparation
  • Data and State Management in Clojure
  • Data Architecture - Deep Dive: Design & Implementation
  • Data Architecture - Deep Dive: Microservices & Serverless Computing
  • Data Architecture Primer
  • Data Classification and Machine Learning
  • Data Collection & Exploration
  • Data Communication and Visualization
  • Data Engineering Fundamentals
  • Data Exploration
  • Data Factory with Hive
  • Data Factory with Oozie and Hue
  • Data Factory with Pig
  • Data Filtering
  • Data Flow for the Hadoop Ecosystem
  • Data Flow Implementation
  • Data Flow, Consuming, and Transmitting Data
  • Data Gathering
  • Data Governance and Metadata Management
  • Data Insights, Anomalies, & Verification: Handling Anomalies
  • Data Insights, Anomalies, & Verification: Machine Learning & Visualization Tools
  • Data Integration
  • Data Lake: Architectures & Data Management Principles
  • Data Lake: Framework & Design Implementation
  • Data Load Options
  • Data Management and Device Security
  • Data Mining, Data Distributions, & Hypothesis Testing
  • Data Modeling
  • Data Models and JSP
  • Data Ops 16: Securing Big Data Streams
  • Data Preprocessing
  • Data Quality Projects
  • Data Quality Services (DQS) and Master Data Services (MDS)
  • Data Reduction & Exploratory Data Analysis (EDA)
  • Data Refinery with YARN and MapReduce
  • Data Repository with Flume
  • Data Repository with HDFS and HBase
  • Data Repository with Sqoop
  • Data Rollbacks: Transaction Management & Rollbacks in NoSQL
  • Data Rollbacks: Transaction Rollbacks & Their Impact
  • Data Science 10: Data Research Exploration Techniques
  • Data Science 2: Data Driven Organizations
  • Data Science 9: Data Research Techniques
  • Data Science Overview
  • Data Science Statistics: Applied Inferential Statistics
  • Data Science Statistics: Common Approaches to Sampling Data
  • Data Science Statistics: Inferential Statistics
  • Data Science Statistics: Simple Descriptive Statistics
  • Data Science Statistics: Using Python to Compute & Visualize Statistics
  • Data Scientist 14: Data Research Statistical Approaches
  • Data Silos, Lakes, & Streams: Introduction
  • Data Silos, Lakes, & Streams: Sources, Visualizations, & ETL Operations
  • Data Silos, Lakes, and Streams: Data Lakes on AWS
  • Data Sources: Implementing Edge on the Cloud
  • Data Sources: Integration
  • Data Structures and File Management in ANSI C
  • Data Tools: Machine Learning & Deep Learning in the Cloud
  • Data Tools: Technology Landscape & Tools for Data Management
  • Data Transformation
  • Data Types, Modifiers, Operators, and Flow Control
  • Data Types, Sampling, Collection, and Measurement in Six Sigma
  • Data Visualization and Predictive Analytics
  • Data Visualization: Essentials
  • Data Warehouse Essential: Architecure Frameworks and Implementation
  • Data Warehouse Essential: Concepts
  • Data Warehousing
  • Data Warehousing with Azure: Analytics and Reporting
  • Data Warehousing with Azure: Architecture & Modeling Techniques
  • Data Warehousing with Azure: Data Lake Implementation Using Azure
  • Data Warehousing with Azure: Implementing Azure SQL Data Warehouse
  • Data Warehousing with Azure: Managing Azure Data Lake
  • Data Warehousing with Azure: Working with SQL Data Warehouse Objects
  • Data Warehousing with Hadoop: HDInsight and Retail Sales Implementation Using Hive
  • Data Warehousing with Hadoop: Managing Big Data Using HDInsight Hadoop
  • Data Warehousing with Hadoop: Microsoft Analytics Platform System and Hive
  • Data Warehousing with Hadoop: Spark, HDInsight and Cluster Management
  • Data Wrangler 4: Cleaning Data in R
  • Data Wrangling in R
  • Data Wrangling with Pandas: Advanced Features
  • Data Wrangling with Pandas: Visualizations and Time-Series Data
  • Data Wrangling with Pandas: Working with Series & DataFrames
  • Data, Workflows, and Charting in F#
  • Database Instances
  • Database Maintenance and Performance Tuning in Oracle Database 12c
  • Database Programmability Objects and Non-Relational Data
  • Databases and Advanced Features with the Zend 2 Framework
  • Dataflow Autoscaling Pipelines
  • Dataproc Architecture
  • Dealing with Customer Service Incidents and Complaints
  • Debugging ASP.NET MVC Web Applications
  • Debugging in R
  • Debugging Tools
  • Decision Tree and Classification Analysis
  • Decoding TestNG in Detail
  • Deep Dive Cucumber
  • Deep Diving with Hibernate and Queries
  • Deep Learning with Keras
  • Deeper through GCP Analytics and Scaling
  • Defense in Depth: Using Security Controls
  • Defensive Coding for C#
  • Defensive Coding for C/C++
  • Defensive Coding for JavaScript and HTML5
  • Defensive Coding Fundamentals for C#
  • Defensive Coding Fundamentals for C/C++
  • Defensive Coding Fundamentals for JavaScript and HTML5
  • Defensive Programming in Android: Errors, Exceptions, and Testing
  • Defensive Programming in Android: Input and Methods
  • Defensive Programming in Android: Network Access and Java Defensive Techniques
  • Defensive Programming in Android: Using Standards
  • Defensive Programming in Java: Data Handling, Injection Attacks, and Concurrency
  • Defensive Programming in Java: Data Security and Access Control
  • Defensive Programming in Java: Fundamentals
  • Defensive Programming, MVC, and DDD
  • Define and Sequence Activities (PMBOK® Guide Sixth Edition)
  • Define End Value for Software Iterations
  • Define the ALM Process
  • Defining a Project Scope and Team
  • Defining Effective End-to-end SDLC Practices
  • Delivering Dashboards: Exploration & Analytics
  • Delivering Dashboards: Management Patterns
  • Deploy and Install Virtual Machine Manager
  • Deploy and Manage Orchestrator
  • Deploy and Manage Service Management Automation
  • Deploying and Using Jasmine
  • Deploying Applications and Software Updates
  • Deploying Applications to Microsoft Azure SQL Databases
  • Deploying Data Tools: Data Science Tools
  • Deploying Hadoop Clusters
  • Deploying Service Manager
  • Deploying Your Microservice in Containers
  • Deployment and Delivery on AWS
  • DESGN 3.0: Branch Network Design
  • DESGN 3.0: Campus Design
  • DESGN 3.0: Campus Design Part 2
  • DESGN 3.0: Design Hierarchy
  • DESGN 3.0: Design Lifecycle
  • DESGN 3.0: Design Methodology
  • DESGN 3.0: Design Modularity
  • DESGN 3.0: Design Resiliency
  • DESGN 3.0: Design Scalability
  • DESGN 3.0: Enterprise Architecture
  • DESGN 3.0: Enterprise Network WAN and Edge
  • DESGN 3.0: Fault Domain Design
  • DESGN 3.0: IGP Expansion
  • DESGN 3.0: Implementing Network Design
  • DESGN 3.0: Network Programmability and Data Center Component Design
  • DESGN 3.0: Networking Information Gathering and Auditing
  • DESGN 3.0: OSPF and BGP Expansion
  • DESGN 3.0: Routing Protocol Scalability
  • DESGN 3.0: Scalable Addressing and IP Addressing Schemes
  • DESGN 3.0: Security Control Considerations
  • DESGN 3.0: Virtualization in Network Design
  • DESGN 3.0: Voice and Video Design Considerations
  • DESGN 3.0: Wireless LAN Design
  • DESGN 3.0: Wireless LAN Requirements
  • Design a Distributed ASP.NET MVC Application
  • Design and Implement UI Behavior
  • Design and Implement UI Behavior
  • Design and Secure Remote Access and Multiple Namespaces Solutions
  • Design Pattern Classification and Architectural Patterns
  • Design Thinking Process
  • Designing a Customer Service Strategy
  • Designing a Fact Table
  • Designing and Implementing Azure Apps
  • Designing and Implementing Dimensions
  • Designing ASP.NET MVC Application Architecture
  • Designing Batch Processing and Data Security
  • Designing Control Flow
  • Designing Data Flow
  • Designing Hadoop Clusters
  • Designing the Lambda Architecture and Real-time Processing
  • Designing the Microservices Architecture
  • Designing Web Apps
  • Designing with Flexibility and Efficiency in Mind
  • Designing, Conducting, and Analyzing Experiments in Six Sigma
  • Designing, Creating, and Manipulating Android Databases
  • Determining Process Performance and Capability in Six Sigma
  • Determining Requirements by Listening to the Voice of the Customer in Six Sigma
  • Develop and Manage Resources (PMBOK® Guide Sixth Edition)
  • Develop Customer Quality with High Value
  • Develop Real-time Processing Solutions with Apache Storm
  • Develop the Project Schedule (PMBOK® Guide Sixth Edition)
  • Developing a Successful Team
  • Developing Advanced Apple Watch Applications
  • Developing AI and ML Solutions with Java: AI Fundamentals
  • Developing AI and ML Solutions with Java: Expert Systems and Reinforcement Learning
  • Developing AI and ML Solutions with Java: Machine Learning Implementation
  • Developing AI and ML Solutions with Java: Neural Network and Neuroph Framework
  • Developing AI and ML Solutions with Java: Neural Network and NLP Implementation
  • Developing and Deploying Web Applications with MEAN.js
  • Developing and Implementing IoT Solutions: Arduino Language
  • Developing and Implementing IoT Solutions: Azure IoT Hub
  • Developing and Implementing IoT Solutions: Cloud Implementation Using Azure IoT
  • Developing and Implementing IoT Solutions: MicroPython and Security
  • Developing and Implementing IoT Solutions: MicroPython Board
  • Developing and Implementing IoT Solutions: Principles of IoT and Python Basics
  • Developing and Implementing IoT Solutions: Raspi-config and GPIO
  • Developing and Implementing IoT Solutions: Using Raspberry Pi and OpenCV
  • Developing Android Applications: Activities, Connectivity, and Services
  • Developing Android Applications: App Layout
  • Developing Android Applications: App Structure and Formatting
  • Developing Android Applications: Creating an App with Java
  • Developing Android Applications: Debugging and Testing
  • Developing Android Applications: Defensive Programming and Security
  • Developing Android Applications: Introduction
  • Developing ASP.NET Core 1.0 and MVC Applications
  • Developing Azure & Web Services: WCF Transactions & Services
  • Developing Azure and Web Services: API Management and Monitoring
  • Developing Azure and Web Services: Advanced Deployment
  • Developing Azure and Web Services: Azure Scalability
  • Developing Azure and Web Services: Azure Services
  • Developing Azure and Web Services: Azure Storage
  • Developing Azure and Web Services: Configuring Web Applications for Deployment
  • Developing Azure and Web Services: Consuming Services
  • Developing Azure and Web Services: Deployment Strategy
  • Developing Azure and Web Services: Diagnostics, Debugging, and ACS
  • Developing Azure and Web Services: Entity Framework
  • Developing Azure and Web Services: Hosting Web APIs
  • Developing Azure and Web Services: IIS & Web Services
  • Developing Azure and Web Services: Introduction
  • Developing Azure and Web Services: Managing Data
  • Developing Azure and Web Services: Messaging, Security, and Troubleshooting
  • Developing Azure and Web Services: Web API Services
  • Developing Azure and Web Services: Working with Assemblies
  • Developing Basic Apple Watch Applications
  • Developing Windows and Web Applications
  • Developing with Blockchain
  • Device Configuration and Data Access
  • DevOps Management and Capabilities
  • DevOps Methodologies and Development
  • DevOps Testing and Delivery
  • DevOps with Ansible: Introduction to Playbooks and Testing
  • DevOps with Ansible: Overview
  • DevOps with Ansible: Working with Ansible Features
  • DevOps with Saltstack: Configuration and Components
  • DevOps with Saltstack: Overview
  • DevOps with Saltstack: Remote Execution & State System
  • Diving into the World of Spotfire
  • Docker and Windows
  • Docker Configuration and Management
  • Docker Containers, Images, and Swarms
  • Docker for Java Microservices: Containerize Microservices
  • Docker for Java Microservices: Managing Microservices on Docker Using Compose
  • Docker for Java Microservices: Scaling Up and Managing Microservices
  • Docker for Java Microservices: Working with Docker Components
  • Docker Installation and Management
  • Docker Introduction
  • Docker Programmatic Access
  • Domain-Specific Tools in R
  • Drawing in Adobe Illustrator CC 2015
  • Drawing with Adobe Flash Professional CC 2015
  • Drupal 8 First Look
  • EAI Paterns: Fundamentals and Environment Setup
  • EAI Paterns: Language and Transformation Patterns
  • EAI Paterns: Message Routing Pattern Implementation
  • EAI Patterns: Overview of Apache Camel
  • Ecosystem for Hadoop
  • Edge.js, Node.js, and ASP.NET MVC
  • Effective Team Communication
  • Elasticsearch Data Management
  • ELK Operations on the Cloud
  • Enabling Office 365 Service: Telemetry
  • Enabling Office 365 Services: Collaboration Solutions
  • Enabling Office 365 Services: Configuring and Managing Skype for Business Online
  • Enabling Office 365 Services: Exchange Online Addresses, Mailboxes, Archiving
  • Enabling Office 365 Services: Exchange Online Policy, Migration, and Compliance
  • Enabling Office 365 Services: Managing Client User-driven and IT Deployments
  • Enabling Office 365 Services: SharePoint Online Sharing & Site Collections
  • Encouraging Team Communication and Collaboration
  • Enhance Reactive Applications with Advanced React
  • Ensuring SharePoint 2016 Stability
  • Ensuring Social Media and Application Quality
  • Errors, Exceptions, and Testing
  • Essential Tools for Ubuntu
  • Establishing Team Goals and Responsibilities, and Using Feedback Effectively
  • ESXi
  • Ethical Standards and PMI® Core Values
  • Ethics and Project Management
  • Events, Manipulating Elements, and AJAX
  • Examining Rails APIs
  • Exchange 2016 Migration, Federation, and Sharing
  • Expanding Design Patterns
  • Exploring Appium and Windows
  • Exploring Blockchain
  • Exploring Chatbots
  • Exploring TestNG
  • Exploring the Advanced Features of Appcelerator Titanium
  • Exploring the Advanced Features of the Ionic Framework
  • Exploring the Basic Features of the Ionic Framework
  • Extending CSS3 with Sass and Less
  • Extending Oracle Commerce Applications
  • Facing Confrontation in Customer Service
  • Features of the Zend Framework
  • Filter and Modify Data in SQL Server 2016
  • Final Exam: CompTIA Cloud+
  • Final Exam: VMware vSphere 6.5: Install, Configure, & Manage
  • First Encounters with Windows 10
  • First Steps with Chef
  • FMEA and Design for Six Sigma
  • FMEA and Other Nonstatistical Analysis Methods in Six Sigma
  • Form Handling with Pipelines and REST
  • Forms, Positioning, and Layout with CSS3
  • Full Stack Development: Business Logic and Persistence Layers
  • Full Stack Development: Introduction
  • Full Stack Development: Web Communications Layer
  • Functions, References, Exceptions Strings & Namespaces
  • Functions, Type Checking, Error Handling, and Testing
  • Fundamentals of Apache Web Services
  • Fundamentals of Big Query
  • Fundamentals of C++ Programming
  • Fundamentals of Lean and Six Sigma and their Applications
  • Fundamentals of Sequence Model: Artificial Neural Network & Sequence Modeling
  • Fundamentals of Sequence Model: Language Model & Modeling Algorithms
  • G Suite: E-mail and Calendar Management
  • G Suite: Group and OU Management
  • G Suite: Security, Service, and Mobile Device Management
  • GCP Big Data and Security
  • GCP Engineering and Streaming Architecture
  • GCP Network Data Processing Models
  • Generic Database Fundamentals: Architecture and Normalization Concepts
  • Generic Database Fundamentals: Relation Algebra, SQL, and Concurrency Concepts
  • Generic Design and Modeling Databases: Concepts and Conceptual Design
  • Generic Design and Modeling Databases: Logical and Physical Design
  • Genymotion: Testing Android Apps
  • Getting Started with Backbone.js
  • Getting Started With Entity Framework
  • Getting Started with F#
  • Getting Started with Hadoop: Advanced Operations Using MapReduce
  • Getting Started with Hadoop: Developing a Basic MapReduce Application
  • Getting Started with Hadoop: Filtering Data Using MapReduce
  • Getting Started with Hadoop: Fundamentals & MapReduce
  • Getting Started with Hadoop: MapReduce Applications With Combiners
  • Getting Started with Hello, World!
  • Getting Started with Hibernate
  • Getting Started with Hive: Bucketing & Window Functions
  • Getting Started with Hive: Introduction
  • Getting Started with Hive: Loading and Querying Data
  • Getting Started with Hive: Optimizing Query Executions
  • Getting Started with Hive: Optimizing Query Executions with Partitioning
  • Getting Started with Hive: Viewing and Querying Complex Data
  • Getting Started with Java Hibernate
  • Getting Started with LINQ
  • Getting Started with LoopBack
  • Getting Started with Maven
  • Getting Started with Microsoft Azure HDInsight and Administering clusters
  • Getting Started with Microsoft R
  • Getting Started with REST and .NET Core
  • Getting Started with the Software and Integrating Data
  • Getting Started with Typekit
  • GitHub Extension for Visual Studio
  • Google Cloud
  • Google Cloud Basics
  • Google Cloud Big Data and Machine Learning
  • Google Cloud Data Storage
  • Google Cloud Dataproc
  • Google Cloud Design
  • Google Cloud Network Components
  • Google Cloud Platform Fundamentals
  • Google Cloud Platform Storage and Analytics
  • Google Cloud Programmatic Access
  • Google Cloud Security
  • Google Cloud SQL for Developers: Instance Management in the Developers Console
  • Google Cloud SQL for Developers: Interacting, Connecting, and Management
  • Google Cloud Troubleshooting
  • Google Cloud Virtual Machine Configuration
  • Google Cloud Virtual Machine Deployment
  • Google Cloud Web Applications and Name Resolution
  • Google G Suite Admin: User Management
  • Graphics, Web Hosting and Grunt Performance
  • Hadoop Cluster Availability
  • Hadoop Clusters
  • Hadoop Distributed File System
  • Hadoop HDFS: File Permissions
  • Hadoop HDFS: Introduction
  • Hadoop HDFS: Introduction to the Shell
  • Hadoop HDFS: Working with Files
  • Hadoop in the Cloud
  • Hadoop Maintenance and Distributions
  • Hadoop Ranger
  • Handling Team Conflict
  • Harnessing Data Volume & Velocity: Big Data to Smart Data
  • Heap, Thread, and Monitor Dump Analyzer
  • Helper Functions and Advanced Ajax
  • High Availability
  • High Availability and Disaster Recovery
  • HP LoadRunner 12 Essentials: Enhancing Vuser Scripts
  • HP LoadRunner 12 Essentials: Working with Controller and Analysis
  • HP LoadRunner 12 Essentials: Working with VuGen
  • HR Competencies: Business Acumen and Relationship Management
  • HR Competencies: Consultation and Critical Evaluation
  • HR Competencies: Global and Cultural Effectiveness and Communication
  • HR Competencies: Leadership and Ethical Practice
  • HTML5 and Accessibility
  • HTML5 and Advanced CSS3
  • HTML5 and CSS3
  • HTML5 and JavaScript
  • HTML5 APIs and Local Data Storage
  • HTML5 APIs and Media
  • HTML5 Forms
  • HTML5 Graphics and Canvas
  • HTML5 Layout
  • HTML5 Layout with CSS3
  • HTML5 with JavaScript & CSS3: Advanced Input Validation
  • HTML5 with JavaScript & CSS3: APIs & Data Storage
  • HTML5 with JavaScript & CSS3: Data Flow, Consuming, & Transmitting Data
  • HTML5 with JavaScript & CSS3: HTML5 & Javascript
  • HTML5 with JavaScript & CSS3: Introduction
  • HTML5 with JavaScript & CSS3: Styling HTML5 & JavaScript
  • HTML5 with JavaScript & CSS3: WebSockets & Asynchronous Processing
  • Human Resource Strategy Management: Business and HR Strategy
  • Human Resource Strategy Management: Strategic Planning
  • Hybrid SQL Server Solutions
  • IBM BigInsights Fundamentals: Analyzing, Querying, and Extracting Big Data
  • IBM BigInsights Fundamentals: Hadoop Solution
  • IBM Memory Analyzer and Visualizer
  • IBM Pattern Modeling Analysis Tool
  • ICND2 3.0: Switch Aggregation and Threat Mitigation
  • ICND2 3.0: Configuring ACLs
  • ICND2 3.0: Configuring and Verifying EIGRP
  • ICND2 3.0: Configuring and Verifying OSPFv3
  • ICND2 3.0: Configuring EtherChannel
  • ICND2 3.0: Configuring Multiarea OSPFv2
  • ICND2 3.0: Configuring OSPFv2
  • ICND2 3.0: Configuring Trunking
  • ICND2 3.0: Device Monitoring, Management, and Programmability
  • ICND2 3.0: Implementing EIGRP
  • ICND2 3.0: Implementing VLANs
  • ICND2 3.0: Infrastructure Services
  • ICND2 3.0: InterVLAN Routing
  • ICND2 3.0: OSPFv2 Operations
  • ICND2 3.0: PortFast and BPDU guard
  • ICND2 3.0: QoS Overview
  • ICND2 3.0: Routing Protocols
  • ICND2 3.0: SNMP Monitoring
  • ICND2 3.0: Spanning Tree Configuration and Verification
  • ICND2 3.0: Spanning Tree Overview
  • ICND2 3.0: Troubleshooting Connectivity
  • ICND2 3.0: Trunking Overview
  • ICND2 3.0: WAN Topologies and Connectivity
  • ICND2 3.0: Wide Area Networks Using GRE and eBGP
  • ICND2 3.0: Wide Area Networks Using PPP
  • Identifying Risk (PMBOK® Guide Sixth Edition)
  • Identifying Security Controls
  • Identifying Six Sigma Projects
  • IINS 3.0: AnyConnect VPN Using ASDM
  • IINS 3.0: ASA Security and Policies
  • IINS 3.0: Attack Mitigation
  • IINS 3.0: Auto Secure
  • IINS 3.0: Clientless SSL VPN & ASDM
  • IINS 3.0: Configuring Cisco IPS
  • IINS 3.0: Control Plane Policing
  • IINS 3.0: Cryptographic Key Exchange
  • IINS 3.0: Encryption Methods
  • IINS 3.0: Firewall Features
  • IINS 3.0: Firewall Technology
  • IINS 3.0: Introduction to Cisco Security
  • IINS 3.0: Introduction to Network Attacks
  • IINS 3.0: IPS Deployment Configuration
  • IINS 3.0: IPsec and VPN
  • IINS 3.0: IPSec Site-to-Site VPN
  • IINS 3.0: Malware and Data Loss
  • IINS 3.0: Management Plane Access
  • IINS 3.0: Network Access Control
  • IINS 3.0: Network Address Translation
  • IINS 3.0: Network Time Protocol
  • IINS 3.0: Network Topologies
  • IINS 3.0: OSPF and EIGRP Authentication
  • IINS 3.0: Port Based Access Control, BYOD, and MDM
  • IINS 3.0: PVLANs and VLAN Security
  • IINS 3.0: SCP and AAA Technologies
  • IINS 3.0: Secure CLI Access
  • IINS 3.0: Secure Device Management
  • IINS 3.0: SIEM Technology and Security Terminology
  • IINS 3.0: Simple Network Management Protocol
  • IINS 3.0: Specific Network Attacks
  • IINS 3.0: TACACS+
  • IINS 3.0: Threat Mitigation for Email, Web, and Endpoints
  • IINS 3.0: Zone-Based Firewall Configuration
  • IIS and Web Services
  • Impact on Stakeholders and Benchmarking for Six Sigma
  • Implement ASP.NET Authorization and Exception Handling Strategy
  • Implement ASP.NET Claims-Based Authentication
  • Implement Globalization, Azure Role Life Cycle and Search Engine Optimization
  • Implementation
  • Implementations with BigQuery for Big Data
  • Implementing a SQL Database
  • Implementing Applications using Modules and MEAN Stack
  • Implementing ASP.NET Authentication
  • Implementing Communication and Messaging Strategies
  • Implementing Control Flow
  • Implementing Disk Encryption
  • Implementing File Encryption
  • Implementing Governance Strategies
  • Implementing OpenStack
  • Implementing Secure Sites with ASP.NET
  • Implementing Server Patching and Updating
  • Implementing Smart Contracts Using Ethereum
  • Implementing WebLOAD Solutions
  • Implementing Workload-specific Security Part I
  • Implementing Workload-specific Security Part II
  • Importing and Manipulating Data
  • Improving Your Technical Writing Skills
  • In Depth with NoSQL
  • Indexers, Clusters, and Advanced Search
  • Ingesting Data and Computing for Batch Processing
  • Ingesting Data and Computing for Real-time Processing
  • Install and Configure vRealize Suite
  • Installation of Hadoop
  • Installing and Configuring a Microsoft IIS Server Service
  • Installing and Configuring VMware Workstation 11
  • Installing and Configuring WebSphere Commerce
  • Installing and Configuring Windows 10: Configuring Core Services
  • Installing and Configuring Windows 10: Implementing Windows
  • Installing and Configuring Windows 10: Managing Updates and Monitoring Windows
  • Installing and Configuring Windows 10: Managing Updates and Monitoring Windows
  • Installing and Monitoring Data Protection Manager
  • Installing and Upgrading SQL Server 2016
  • Installing and Using Grunt
  • Installing Operations Manager
  • Installing System Center Configuration Manager
  • Installing Unix
  • Integrate Development and Operations (DevOps)
  • Integrating jQuery Mobile with PhoneGap
  • Interacting with Customers
  • Interactive Processing using Apache Phoenix on HBase
  • Interactive Queries with Spark SQL and Interactive Hive
  • Interconnecting SharePoint 2016
  • Intermediate Programming in Force.com
  • Internet of Things and UI/UX
  • Internet of Things Applications
  • Internet of Things Hardware
  • Internet Site Development
  • Introducing Git
  • Introducing Gulp.js to Web Development
  • Introducing Natural Language Processing
  • Introducing the Windows 10 Creators Update
  • Introducing UWP and Basic App Layouts
  • Introducing Visual Studio
  • Introduction to Agile Software Development
  • Introduction to Algorithms and Data Structures
  • Introduction to Apache Spark
  • Introduction to Appium Testing
  • Introduction to Application Performance Engineering
  • Introduction to Artificial Intelligence
  • Introduction to ASP.NET Core 1.0
  • Introduction to ASP.NET MVC Web Applications
  • Introduction to Automated Testing with Selenium
  • Introduction to Automation with Terraform
  • Introduction to Balsamiq Mockups
  • Introduction to Bash Scripting
  • Introduction to Clean Coding
  • Introduction to COBIT 5
  • Introduction to CQRS
  • Introduction to Data Modeling in Hadoop
  • Introduction to Debugging
  • Introduction to Digital Currency
  • Introduction to Directives
  • Introduction to Domain-driven Design
  • Introduction to Eclipse
  • Introduction to Express
  • Introduction to Hadoop
  • Introduction to HTML5
  • Introduction to HTML5 and CSS
  • Introduction to Java EE 6
  • Introduction to jQuery
  • Introduction to Justinmind
  • Introduction to Kotlin
  • Introduction to Kubernetes
  • Introduction to Machine Learning and Supervised Learning
  • Introduction to Microservices
  • Introduction to Models
  • Introduction to Popular Frameworks
  • Introduction to PowerShell 5.0
  • Introduction to R Programming
  • Introduction to RabbitMQ
  • Introduction to Rails
  • Introduction to Reactive Programming
  • Introduction to ReactJS and Grunt
  • Introduction to Secure Programming
  • Introduction to SOLID
  • Introduction to SOLID
  • Introduction to SQL
  • Introduction to SQL: Managing Table Design
  • Introduction to SQL: Multiple Tables and Advanced Queries
  • Introduction to SQL: Views, Transactions, and SQL Security Architecture
  • Introduction to the Entity Framework
  • Introduction to Ubuntu
  • Introduction To UI/UX
  • Introduction to Views
  • Introduction to Virtual Reality
  • Introduction to Web Accessibility
  • Introduction to Web Services
  • iOS 12 Development: Augmented Reality and HealthKit
  • iOS 12 Development: Best Practices in iOS Security
  • iOS 12 Development: Getting Started with Xcode and iOS
  • iOS 12 Development: Testing and Error Handling
  • iOS 12 Development: Working With Data and Gestures
  • iOS 12 Development: Working With Layout and Controls in iOS
  • iOS Application Development: Application Lifecycle Management
  • iOS Application Development: Creating a Basic iOS App
  • iOS Application Development: Creating Adaptive Apps
  • iOS Application Development: Data, Graphics and Media
  • iOS Application Development: iOS 10 Features
  • iOS Application Development: Layout and Controls
  • iOS Application Development: Optimizing Apps
  • iOS Security Architecture and Application Data Protection
  • IPv6 Fundamentals
  • iRise Editor Basics
  • IT Infrastructure Automation: Automated Monitoring
  • IT Infrastructure Automation: Automation and Scalability
  • IT Infrastructure Automation: Introduction to Automation
  • IT Infrastructure Automation: Version Control and GIT
  • IT Security for End Users: IT Security Fundamentals
  • IT Security for End Users: Secure Corporate Communications and Networking
  • IT Security for End Users: Using Corporate Devices Securely
  • Iterations, Functions and Pointers in ANSI C
  • ITIL ® Operational Support & Analysis
  • ITIL® 2011 Edition OSA: Function Activities
  • ITIL® 2011 Edition OSA: Incident Management Interactions
  • ITIL® 2011 Edition OSA: Introduction to Access Management
  • ITIL® 2011 Edition OSA: Introduction to Event Management
  • ITIL® 2011 Edition OSA: Introduction to Functions
  • ITIL® 2011 Edition OSA: Introduction to Incident Management
  • ITIL® 2011 Edition OSA: Introduction to Operational Support and Analysis
  • ITIL® 2011 Edition OSA: Introduction to Problem Management
  • ITIL® 2011 Edition OSA: Introduction to Request Fulfillment
  • ITIL® 2011 Edition OSA: Introduction to the Service Desk
  • ITIL® 2011 Edition OSA: Problem Management Process Interfaces and Challenges
  • ITIL® 2011 Edition OSA: Request Fulfillment Process Interfaces and Challenges
  • ITIL® 2011 Edition OSA: Service Desk Metrics and Outsourcing
  • ITIL® 2011 Edition OSA: Technology and Implementation Considerations
  • ITIL® Continual Service Improvement
  • ITIL® Service Design Concepts
  • ITIL® Service Design Processes
  • ITIL® Service Operation Concepts
  • ITIL® Service Operation Processes
  • ITIL® Service Strategy Concepts
  • ITIL® Service Strategy Processes
  • ITIL® Service Transition Concepts and Processes
  • Java Application Performance Analysis Tools
  • Java ASYNC Interface
  • Java Development with Eclipse
  • Java EE 7 Back-end Server Application Development: Business Logic
  • Java EE 7 Back-end Server Application Development: Communication and Security
  • Java EE 7 Back-end Server Application Development: EJB Timers and Security
  • Java EE 7 Back-end Server Application Development: Getting Started
  • Java EE 7 Back-end Server Application Development: JAXB and JAX-WS Web Services
  • Java EE 7 Back-end Server Application Development: Web Services
  • Java EE 7 Back-end Web Application Development: Transaction Support
  • Java EE 7 Front End Web Application Development: Business Logic and Persistence
  • Java EE 7 Front End Web Application Development: Communication and Security
  • Java EE 7 Front End Web Application Development: Getting Started
  • Java EE 7 Front End Web Application Development: Presentation with JSF
  • Java EE 7 Front End Web Application Development: Transaction Support
  • Java EE 7 Front End Web Application Development: Web Components
  • Java EE 7 Front End Web Application Development: Web Services
  • Java Multi-Tenant Cloud Application Programming Fundamentals
  • Java SE 11: Encapsulation
  • Java SE 11: Exception Handling
  • Java SE 11: Expressions, Arrays, and Loops
  • Java SE 11: Flow Control & Debugging
  • Java SE 11: Inheritance, Lists, Inference, and Lambda Expressions
  • Java SE 11: Inheritance, Polymorphism, and Abstraction
  • Java SE 11: Introduction to Java SE and the NetBeans IDE
  • Java SE 11: JDK Objects and Nested Loops
  • Java SE 11: JShell
  • Java SE 11: Modular Design
  • Java SE 11: Objects & Classes
  • Java SE 11: Strings and Primitive Data Types
  • Java SE 11: Variables and Operators
  • Java SE 8 Fundamentals: Classes and Objects
  • Java SE 8 Fundamentals: Data Manipulation and Inheritance
  • Java SE 8 Fundamentals: Interfaces, Exceptions, and Deployment
  • Java SE 8 Fundamentals: Introduction to Java
  • Java SE 8 Fundamentals: Methods, Encapsulation, and Conditionals
  • Java SE 8 Programming: Concurrency, Parallelism, the JDBC API, and Localization
  • Java SE 8 Programming: Date/Time API, I/O and File I/O (NIO.2), and Concurrency
  • Java SE 8 Programming: Encapsulation, Polymorphism, and Abstraction
  • Java SE 8 Programming: Inheritance, Interfaces, Exceptions, and Deployment
  • Java SE 8 Programming: Interfaces, Lambda Expressions, Collections, and Generics
  • Java SE7 Fundamentals: Decision Constructs, Arrays, and Loops
  • Java SE7 Fundamentals: Handling Errors and Deploying Applications
  • Java SE7 Fundamentals: Introduction to Java
  • Java SE7 Fundamentals: Overloading, Validation, and Object-Oriented Concepts
  • Java SE7 Fundamentals: Variables, Operators, and Objects
  • Java SE7 New Features: I/O, Network, and Desktop Enhancements
  • Java SE7 New Features: Java Language and Technology Enhancements
  • Java SE7 Professional: File I/O, Concurrency, JDBC, and Localization
  • Java SE7 Professional: Generics, Errors, and I/O
  • Java SE7 Professional: Syntax and Class Design
  • Java Spring: Adding Security Using the Spring Security Project
  • Java Spring: Annotation Configuration and Java Configuration in Spring
  • Java Spring: Aspect-Oriented Programming Using Spring AOP
  • Java Spring: Creating Web Applications Using Spring MVC
  • Java Spring: Spring Application Basics
  • Java Spring: Working with Data in Spring
  • JavaScript - Ember.js Fundamentals
  • JavaScript Data, Decision Making, and Arrays
  • JavaScript Front End Development: Frameworks
  • JavaScript Front End Development: Front End Development Basics
  • JavaScript Front End Development: Functions and Objects
  • JavaScript Front End Development: Working With JavaScript Errors, Events, Objects, and New Features
  • JavaScript Fundamentals
  • JavaScript Objects and Event Handlers
  • JavaScript Operators, Arrays, and Functions
  • JavaScript Sencha: Ext JS
  • JavaScript Sencha: Sencha Touch
  • JavaScript SPA: Adding Views and Handling View Navigation in Durandal
  • JavaScript SPA: Connecting to and Managing Data
  • JavaScript SPA: Durandal Modules and Lifecycle events
  • JavaScript SPA: Getting Started with SPA in Visual Studio 2013
  • JavaScript SPA: Managing Application Data
  • JavaScript SPA: SPA Views and Routes
  • JavaScript SPA: Working with Rich Application Data
  • JavaScript SPA: Working With Validation
  • Jenkins 2 Nuts and Bolts
  • Jenkins Administration
  • JMeter Architecture and Operations
  • jQuery and TypeScript
  • jQuery Mobile EApp Basics, UI Controls and Navigation
  • jQuery Mobile EForms, Lists, Sets and Tables
  • jQuery: Advanced Features and Functions
  • jQuery: Basic Setup and Features
  • jQuery: Using Essential Features and Functions
  • JSON and XML Data Formats
  • JSON Essentials
  • JsRender Fundamentals
  • Juniper Networks Junos Essentials: Configuration Basics
  • Juniper Networks Junos Essentials: Junos OS Fundamentals
  • Juniper Networks Junos Essentials: Monitoring and Maintenance
  • Juniper Networks Junos Essentials: Networking Fundamentals
  • Juniper Networks Junos Essentials: Routing Fundamentals
  • Juniper Networks Junos Essentials: Routing Policy & Firewall Filters
  • JUnit Fundamentals
  • K-Nearest Neighbor (k-NN) & Artificial Neural Networks
  • Kafka Integration with Spark
  • Kafka Integration with Storm
  • Kafka Real-time Applications
  • Kanban Fundamentals: Using Kanban in IT and Software Development
  • Keeping Your Project on Budget (PMBOK® Guide Sixth Edition)
  • Kendo UI: HTML Helpers for ASP.NET MVC
  • Kendo UI: Installation and Overview
  • Kendo UI: Mobile API
  • Key Statistical Concepts
  • Kibana and Reporting Capabilities
  • Knockout Fundamentals
  • Kotlin IDEs
  • Kotlin Loops and Functions
  • Kotlin Objects and Classes
  • Kotlin Syntax
  • Kubernetes API and Components
  • Kubernetes Clusters
  • Kubernetes Concepts
  • Kubernetes on Google Cloud Platform
  • LAMP Overview and Deployment
  • Leading a Cross-functional Team
  • Lean Improvement Methods and Implementation Planning in Six Sigma
  • Lean Principles in Six Sigma Projects
  • Lean Tools and FMEA
  • Leveraging the JIRA Platform for Development Projects
  • Linear and Logistic Regression
  • Linear Regression Models: An Introduction to Logistic Regression
  • Linear Regression Models: Building Simple Regression Models with Scikit Learn and Keras
  • Linear Regression Models: Introduction to Linear Regression
  • Linear Regression Models: Multiple and Parsimonious Linear Regression
  • Linear Regression Models: Simplifying Regression and Classification with Estimators
  • Logging, Scaling, and High Availability
  • Logstash for Data Ingestion in Elasticsearch
  • Machine & Deep Learning Algorithms: Data Preperation in Pandas ML
  • Machine & Deep Learning Algorithms: Imbalanced Datasets Using Pandas ML
  • Machine & Deep Learning Algorithms: Introduction
  • Machine & Deep Learning Algorithms: Regression & Clustering
  • Machine Learning
  • Machine Learning with TensorFlow and Cloud ML
  • Machine Learning, Propensity Score, & Segmentation Modeling
  • Macros and Properties
  • Manage and Control Quality (PMBOK® Guide Sixth Edition)
  • Manage Virtual Machine Manager
  • Manage vRealize Automation Resources
  • Managed and User-provided Services
  • Management and Planning Tools for Six Sigma
  • Management of People: Employee Engagement
  • Management of People: Learning and Development
  • Management of People: Talent Acquisition and Retention
  • Management of People: Total Rewards
  • Managing a Citrix XenDesktop 7.6 Environment
  • Managing a Project to Minimize Risk and Maximize Quality
  • Managing Activities and Data for Azure Big Data Analytics
  • Managing Advanced Application Elements Using Node.js
  • Managing Agile Software Development
  • Managing an Oracle Database 12c Instance
  • Managing and Monitoring Azure Storage
  • Managing Azure VMs
  • Managing Big Data Operations
  • Managing Database Concurrency
  • Managing HDInsight Data, Jobs, and Security
  • Managing Identities in Office 365
  • Managing Inventory and Reporting
  • Managing Microservices and REST Architecture
  • Managing Network Interaction
  • Managing Object Construction and Behavior Using Patterns
  • Managing Office 365 Identities Using Azure AD Connect
  • Managing Office 365 Identities with PowerShell
  • Managing Privileged Identities Part I
  • Managing Privileged Identities Part II
  • Managing Project Work (PMBOK® Guide Sixth Edition)
  • Managing Server 2016 Malware Solutions
  • Managing Stacks and Application Deployment
  • Managing Stakeholder Engagement (PMBOK® Guide Sixth Edition)
  • Managing Virtual Machine Devices and Resources in VMware Workstation 11
  • Managing XenDesktop 7.5 Desktops and Applications
  • Managing, Troubleshooting, and Automating Software Tests
  • Manipulating the VR Environment
  • Manipulating XML with the XML DOM and Ajax
  • MapReduce Essentials
  • Marketing Automation in Microsoft Dynamics CRM 2013
  • Math for Data Science & Machine Learning
  • MATLAB Fundamentals
  • Maven Fundamentals: Documentation, Resources, Plugins, Releases, IDE Integration
  • MD-100 - Windows 10: Active Directory Management
  • MD-100 - Windows 10: Configure Networking
  • MD-100 - Windows 10: Configure Remote Connectivity
  • MD-100 - Windows 10: Configure System & Data Recovery
  • MD-100 - Windows 10: Deployment
  • MD-100 - Windows 10: Manage Devices & Data
  • MD-100 - Windows 10: Manage Updates
  • MD-100 - Windows 10: Monitor a& Manage Windows
  • MD-100 - Windows 10: Perform Post-Installation Configuration
  • MD-100 - Windows 10: Policy-Based Management
  • MD-100 - Windows 10: Prepare for Deployment
  • Measuring and Modeling Relationships between Variables in Six Sigma
  • Mentoring 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND1)
  • Mentoring 1Z0-808 Java SE Programmer 8
  • Mentoring 1Z0-809 Java SE 8 Programmer II
  • Mentoring 200-105 Interconnecting Cisco Networking Devices Part 2 (ICND2)
  • Mentoring 200-125 Interconnecting Cisco Networking Devices (CCNA)
  • Mentoring 220-1001 CompTIA A+
  • Mentoring 220-1002 CompTIA A+
  • Mentoring 220-901 CompTIA A+
  • Mentoring 220-902 CompTIA A+
  • Mentoring 300-101 Implementing Cisco IP Routing (ROUTE)
  • Mentoring 300-115 Implementing Cisco IP Switched Networks (SWITCH)
  • Mentoring 300-135 Troubleshooting and Maintaining Cisco IP Networks (TSHOOT)
  • Mentoring 70-410 Installing and Configuring Windows Server 2012
  • Mentoring 70-411 Administering Windows Server 2012
  • Mentoring 70-412 Configuring Advanced Windows Server 2012 Services
  • Mentoring 70-461 Querying Microsoft SQL Server 2012
  • Mentoring 70-462 Administering Microsoft SQL Server 2012 Databases
  • Mentoring 70-480 Programming in HTML5 with JavaScript and CSS3
  • Mentoring 70-483 Programming in C#
  • Mentoring 70-486 Developing ASP.NET MVC Web Applications
  • Mentoring 70-487 Developing Microsoft Azure and Web Services
  • Mentoring 70-740 Installation, Storage, and Compute with Windows Server 2016
  • Mentoring 70-741 Networking with Windows Server 2016
  • Mentoring 70-742 Identity with Windows Server 2016
  • Mentoring 98-361 Software Development Fundamentals
  • Mentoring 98-364 Database Fundamentals
  • Mentoring 98-368 Mobility and Devices Fundamentals
  • Mentoring BH0-010 Certified Tester Foundation Level
  • Mentoring Certified Ethical Hacker
  • Mentoring Certified Information Systems Security Professional (CISSP)
  • Mentoring Cisco KnowledgeCenter
  • Mentoring CompTIA Advanced Security Practitioner (CASP)
  • Mentoring CompTIA Network+ N10-007
  • Mentoring CS0-001 CompTIA Cybersecurity Analyst+
  • Mentoring CV0-002 CompTIA Cloud+
  • Mentoring DoD 8570.1 KnowledgeCenter
  • Mentoring IT Security KnowledgeCenter
  • Mentoring ITIL Foundation
  • Mentoring MD-100 Windows 10
  • Mentoring Microsoft Enterprise Solutions 2008 KnowledgeCenter
  • Mentoring Oracle KnowledgeCenter
  • Mentoring PK0-004 CompTIA Project+
  • Mentoring PMI Agile Certified Practitioner
  • Mentoring Professional in Human Resources (PHR)
  • Mentoring Project Management Professional (PMP) PMBOK Guide 6th Edition Aligned
  • Mentoring PT0-001 CompTIA PenTest+
  • Mentoring Senior Professional in Human Resources (SPHR)
  • Mentoring Six Sigma Green Belt (SSGB)
  • Mentoring Six Sigma KnowledgeCenter
  • Mentoring Six Sigma Yellow Belt (SSYB)
  • Mentoring SK0-004 CompTIA Server+
  • Mentoring SY0-501 CompTIA Security+
  • Mentoring Systems Security Certified Practitioner (SSCP)
  • Message Handling and Clustering in RabbitMQ
  • Message Records Management
  • Microservice Refactoring Patterns
  • Microservices and Netflix
  • Microservices Architecture
  • Microservices Architecture and Design Patterns
  • Microservices Containers
  • Microservices Current and Future Trends
  • Microservices Deep Dive
  • Microservices Deployment and Continuous Integration
  • Microservices Testing Strategies, Scaling, Monitoring, and Security
  • Microsoft 365 Mobility & Security: Implementing Mobile Device Management
  • Microsoft Azure SQL Database Security
  • Microsoft Azure: Introduction
  • Microsoft Azure: Networks and Storage
  • Microsoft Azure: Publishing and Caching
  • Microsoft Dynamics CRM 2013 - Customization and Configuration: Entities
  • Microsoft Dynamics CRM 2013 - Customization and Configuration: Introduction
  • Microsoft Dynamics CRM 2013 - Customization and Configuration: Relationships
  • Microsoft Dynamics CRM 2013: Forms, Marketing, Contacts, and Processes
  • Microsoft Enterprise Library
  • Microsoft Exchange Server 2013 - Advanced Solutions: Advanced Security
  • Microsoft Exchange Server 2013 - Advanced Solutions: Availability
  • Microsoft Exchange Server 2013 - Advanced Solutions: Compliance and Discovery
  • Microsoft Exchange Server 2013 - Advanced Solutions: Migration and Federation
  • Microsoft Exchange Server 2013 - Advanced Solutions: Site-resilience Solutions
  • Microsoft Exchange Server 2013 - Advanced Solutions: Troubleshooting
  • Microsoft Exchange Server 2013 - Advanced Solutions: Unified Messaging
  • Microsoft Lync Server 2013: Administration and Data Resiliency Overview
  • Microsoft Lync Server 2013: Configuration and Maintenance
  • Microsoft PowerShell and Exchange Server: Distribution Groups and Databases
  • Microsoft PowerShell and Exchange Server: Getting Started
  • Microsoft PowerShell and Exchange Server: Managing Mailboxes
  • Microsoft PowerShell and SharePoint: Getting Started
  • Microsoft PowerShell and SharePoint: Managing Sites
  • Microsoft PowerShell and SQL Server: Database Management
  • Microsoft PowerShell and SQL Server: Introduction
  • Microsoft PowerShell for Windows: Aliases, Providers, and Objects
  • Microsoft PowerShell for Windows: Getting Started with PowerShell
  • Microsoft PowerShell for Windows: Remoting and Modules
  • Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Applications
  • Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Content Support
  • Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Continuity
  • Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Search Services
  • Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Solutions
  • Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Support Service
  • Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Upgrading
  • Microsoft SharePoint Server 2013 - Developing Core Solutions: Business Processes
  • Microsoft SharePoint Server 2013 - Developing Core Solutions: Create Office Apps
  • Microsoft SharePoint Server 2013 - Developing Core Solutions: Implement Security
  • Microsoft SharePoint Server 2013 - Developing Core Solutions: Manage Solutions
  • Microsoft SharePoint Server 2013 - Developing Core Solutions: Managing Data
  • Microsoft SharePoint Server 2013 - Developing Core Solutions: Planning Sites
  • Microsoft SharePoint Server 2013 - Developing Core Solutions: User Experience
  • Microsoft SQL Server 2008: Selecting the Right Edition
  • Microsoft SQL Server 2012 EDeveloping Databases: CLR Integration
  • Microsoft SQL Server 2012 EDeveloping Databases: Implementing Indexes
  • Microsoft SQL Server 2012 EDeveloping Databases: Implementing Tables and Views
  • Microsoft SQL Server 2012 EDeveloping Databases: Managing and Troubleshooting
  • Microsoft SQL Server 2012 EDeveloping Databases: Stored Procedures
  • Microsoft SQL Server 2012 EDeveloping Databases: Tuning and Optimizing Queries
  • Microsoft SQL Server 2012 EDeveloping Databases: Working with Data
  • Microsoft SQL Server 2012 EDeveloping Databases: Working with XML Data
  • Microsoft SQL Server 2012: Creating Database Objects
  • Microsoft SQL Server 2012: Creating Functions and Triggers
  • Microsoft SQL Server 2012: Creating Programming Objects and Optimizing Queries
  • Microsoft SQL Server 2012: Managing XML Data
  • Microsoft SQL Server 2012: Manipulate Data Using Operators and Functions
  • Microsoft SQL Server 2012: Querying Basics and Modifying Data
  • Microsoft SQL Server 2014 - Designing BI Solutions: Availability and Recovery
  • Microsoft SQL Server 2014 - Designing BI Solutions: BI Infrastructure Design
  • Microsoft SQL Server 2014 - Designing BI Solutions: Data Models
  • Microsoft SQL Server 2014 - Designing BI Solutions: Extract, Transform, and Load
  • Microsoft SQL Server 2014 - Designing BI Solutions: MDX Queries and Performance
  • Microsoft SQL Server 2014 - Designing BI Solutions: Reporting Services
  • Microsoft SQL Server 2014 - Designing BI Solutions: SharePoint Integration
  • Microsoft SQL Server 2014 - Designing Solutions: Backup and Recovery
  • Microsoft SQL Server 2014 - Designing Solutions: Clustering and AlwaysOn
  • Microsoft SQL Server 2014 - Designing Solutions: High Availability
  • Microsoft SQL Server 2014 - Designing Solutions: Planning Infrastructure
  • Microsoft SQL Server 2014 - Designing Solutions: Private Clouds
  • Microsoft SQL Server 2014 - Designing Solutions: Windows Azure SQL Database
  • Microsoft SQL Server 2014 - Developing Databases: New Features
  • Microsoft SQL Server 2014: Create and Manage Tabular Data Models
  • Microsoft SQL Server 2014: Design and Implement Dimensions
  • Microsoft SQL Server 2014: Design and Install Analysis Services and Tools
  • Microsoft SQL Server 2014: Design Reports and Create Data Sources and Datasets
  • Microsoft SQL Server 2014: Designing Multidimensional Models and Data Sources
  • Microsoft SQL Server 2014: Manage Reporting Services
  • Microsoft SQL Server 2014: Manage, Maintain, and Troubleshoot SSAS
  • Microsoft SQL Server 2014: MDX Queries, Process Models, and Deploy Databases
  • Microsoft SQL Server 2014: Process Report and Create Subscriptions and Schedules
  • Microsoft SQL Server 2014: Report Formatting and Interactivity
  • Microsoft SQL Server 2016: Auditing
  • Microsoft SQL Server 2016: Backing Up Databases
  • Microsoft SQL Server 2016: Data Access and Permissions
  • Microsoft SQL Server 2016: Encryption
  • Microsoft SQL Server 2016: High Availability and Disaster Recovery
  • Microsoft SQL Server 2016: Managing Database Integrity
  • Microsoft SQL Server 2016: Managing Indexes and Statistics
  • Microsoft SQL Server 2016: Monitoring Database Activity and Queries
  • Microsoft SQL Server 2016: Monitoring SQL Server Instances
  • Microsoft SQL Server 2016: Restoring Databases
  • Microsoft SQL Server Data Warehousing and Business Intelligence Overview
  • Microsoft SQL Server: Implement and Configure Cubes
  • Microsoft SQL Server: Implement Partitions and Custom Logic
  • Microsoft Team Foundation Server 2013: Clients, Workspaces, and Version Control
  • Microsoft Team Foundation Server 2013: Customization for Team Use
  • Microsoft Team Foundation Server 2013: Installation and Configuration
  • Microsoft Team Foundation Server 2013: Managing an Implementation
  • Microsoft Windows - Deploying Windows Devices and Apps: Assessment Strategies
  • Microsoft Windows - Deploying Windows Devices and Enterprise Apps: Activation
  • Microsoft Windows - Deploying Windows Devices and Enterprise Apps: Compatibility
  • Microsoft Windows - Deploying Windows Devices and Enterprise Apps: Images & PXE
  • Microsoft Windows - Deploying Windows Devices and Enterprise Apps: MDT and LTI
  • Microsoft Windows - Deploying Windows Devices and Enterprise Apps: ZTI and SCCM
  • Microsoft Windows - Managing Enterprise Devices and Apps: Client Management
  • Microsoft Windows - Managing Enterprise Devices and Apps: Compliance
  • Microsoft Windows - Managing Enterprise Devices and Apps: Desktops and Devices
  • Microsoft Windows - Managing Enterprise Devices and Apps: Inventory and Assets
  • Microsoft Windows - Managing Enterprise Devices and Apps: Managing Applications
  • Microsoft Windows - Managing Enterprise Devices and Apps: Preparing SCCM
  • Microsoft Windows - Managing Enterprise Devices and Apps: Site Management
  • Microsoft Windows - Managing Enterprise Devices and Apps: Software Updates
  • Microsoft Windows 10 First Look: Configuration
  • Microsoft Windows 10 First Look: Interface and New Features
  • Microsoft Windows 10: Supporting Authentication, Permissions, and Data Security
  • Microsoft Windows 10: Supporting Client Compliance and Managing Clients
  • Microsoft Windows 10: Supporting Connectivity and Data Storage
  • Microsoft Windows 10: Supporting Hardware, Performance, and Mobile Devices
  • Microsoft Windows 10: Supporting Operating System and Application Installation
  • Microsoft Windows Nano Server: Nano Server First Look
  • Microsoft Windows Performance Monitoring Basics
  • Microsoft Windows Performance Monitoring Best Practice
  • Microsoft Windows Performance Tools In Windows Operating Systems
  • Microsoft Windows Server 2012 R2 - Administration: Deploying and Managing WDS
  • Microsoft Windows Server 2012 R2 - Administration: File Services and Encryption
  • Microsoft Windows Server 2012 R2 - Administration: Group Policy Processing
  • Microsoft Windows Server 2012 R2 - Administration: Managing Active Directory
  • Microsoft Windows Server 2012 R2 - Administration: Managing GPOs and Preferences
  • Microsoft Windows Server 2012 R2 - Administration: Network Services and Access
  • Microsoft Windows Server 2012 R2 - Administration: RADIUS, NPS, and NAP
  • Microsoft Windows Server 2012 R2 - Administration: Service Accounts and Policies
  • Microsoft Windows Server 2012 R2 - Administration: Updating and Monitoring
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: AD RMS and AD FS
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Business Continuity
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Certificate Services
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Clustering and NLB
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Monitoring
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Storage and Networks
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Updates
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: VM Administration
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: VM hosts and guests
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: AD Domains
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: AD Replication
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: DAC
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: DHCP & DNS
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: Federation
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: HA
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: PKI
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: Storage
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: VMs and DR
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: Active Directory
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: AD Groups & GPOs
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: DNS
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: Hyper - V
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: Networking
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: Print Services
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: Security
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: Servers
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: Storage
  • Microsoft Windows Server 2012 R2: Server Infrastructure - AD Design
  • Microsoft Windows Server 2012 R2: Server Infrastructure - AD DS
  • Microsoft Windows Server 2012 R2: Server Infrastructure - DHCP Design
  • Microsoft Windows Server 2012 R2: Server Infrastructure - DNS, File and Storage
  • Microsoft Windows Server 2012 R2: Server Infrastructure - Implement NPS and WAP
  • Microsoft Windows Server 2012 R2: Server Infrastructure - IPAM and VPN
  • Microsoft Windows Server 2012 R2: Server Infrastructure - Network Protection
  • Microsoft Windows Server 2012 R2: Server Infrastructure - OU and Group Policy
  • Microsoft Windows Server 2012 R2: Server Infrastructure EDirectAccess
  • Microsoft Windows Server 2012 R2: Server Infrastructure EServer Deployment
  • Microsoft Windows Server 2016 (First Look): Active Directory and Networking
  • Migrating Client Applications
  • Mitigating LAN Security Threats
  • Mitigating WAN Link Security Threats
  • Mitigating WLAN security threats
  • Mobile Center for Xamarin and React Native
  • Mobile Center Identity and Troubleshooting
  • Mobile Center SDK for Android and iOS
  • Mobile Center Tools
  • Model Development, Validation, & Evaluation
  • Model Life Cycle Management
  • Modifying and Summarizing Data
  • MongoDB for Data Wrangling: Aggregation
  • MongoDB for Data Wrangling: Querying
  • MongoDB: Backups, Monitoring, and Stats
  • MongoDB: Cloud and Hadoop Deployments
  • MongoDB: Indexes and Query Optimization
  • MongoDB: Installation Overview
  • MongoDB: Integration with Python
  • MongoDB: Integration with Spark
  • MongoDB: Java REST and GridFS
  • MongoDB: Map Reduce, Atomic Counters, and Binary Data
  • MongoDB: Replication and Security
  • MongoDB: System Management
  • MongoDB: User Management
  • MongoDB: Write, Read, and Aggregate Data
  • Monitor Project Communications (PMBOK® Guide Sixth Edition)
  • Monitor, Tune, and Troubleshoot SharePoint 2016
  • Monitoring & Logging
  • Monitoring a Citrix XenDesktop 7.6 Environment
  • Monitoring Office 365 Usage
  • More Advanced HTML5 and CSS3
  • More Spotfire Visualization Techniques
  • MS-101 - Microsoft 365 Mobility & Security: Azure Information Protection
  • MS-101 - Microsoft 365 Mobility & Security: Cloud App Security
  • MS-101 - Microsoft 365 Mobility & Security: Data Loss Prevention
  • MS-101 - Microsoft 365 Mobility & Security: Devices & Apps
  • MS-101 - Microsoft 365 Mobility & Security: eDiscovery
  • MS-101 - Microsoft 365 Mobility & Security: Managing Device Compliance
  • MS-101 - Microsoft 365 Mobility & Security: Security Reports & Alerts
  • MS-101 - Microsoft 365 Mobility & Security: Threat Management
  • MS-101 - Microsoft 365 Mobility & Security: Windows 10 Deployment
  • MS-101 - Microsoft 365 Mobility & Security: Windows Defender Threat Protection
  • Multivariate Tools and Nonparametric Tests in Six Sigma
  • MVC Application Routes
  • MVC Application Routes
  • MySQL as a Datastore
  • MySQL Database Development: Database Design Fundamentals
  • MySQL Database Development: DDL Statements
  • MySQL Database Development: GIS, Cloud, and Connectors for MySQL
  • MySQL Database Development: Introduction
  • MySQL Database Development: Manipulating Data
  • MySQL Database Development: Query and Performance Optimization
  • MySQL Database Development: SELECT Statement and Operators
  • MySQL Database Development: Stored Routines, Triggers, and the InnoDB memcached Plugin
  • MySQL Database Development: Working with Functions
  • Navigating through Changes and Conflicts in Projects
  • Navigation Elements and Animations with CSS3
  • Need for Design Patterns and the Principles Guiding Design Patterns
  • Networking Fundamentals: Configuring Wired and Wireless Networks and Firewalls
  • Networking Fundamentals: Remote Connections, Shares, and Mac OSX Networking
  • Neural Networks
  • New Features of Android 7
  • New Features of Exchange Server 2010
  • New Features of Windows Server 2008 R2
  • New Project Manager Essentials
  • NHibernate Advanced Techniques
  • NHibernate Essentials
  • Node Clusters and Memory Optimizations
  • Node.js and Microservices
  • Node.js Language Fundamentals
  • Node.js Process Managers
  • Node.js Real-time Applications
  • Node.js Security and Middleware Implementation
  • Node.js, Microservices Frameworks, and Utilities
  • NoSQL Concepts and Background
  • NoSQL Models and Applications
  • Notifications with Toasts and Tiles
  • Object-oriented Programming Fundamentals
  • Office 365 and Azure AD Connect
  • Office 365 Configuring Domains
  • Office 365 DNS Records and Rights Management
  • Office 365 Federated Identities - Single Sign-On
  • Office 365 Managing AD FS Servers
  • Office 365 Pilot Deployment
  • Office 365 Tenancy and Licensing
  • Online Prototyping with iRise
  • Operating Hadoop Clusters
  • Operationalize and Design with Spark
  • Operations Manager
  • Operators and Expressions in SQL Server 2016
  • Optimize SQL Database Objects and Infrastructure
  • Optimizing and Debugging ANSI C Programs
  • Optimizing Application Data
  • Optimizing Clojure Projects
  • Optimizing for Unity VR
  • Optimizing jQuery Mobile Apps
  • Oracle 12c Performance Tuning: Application Monitoring and SQL Diagnostics
  • Oracle 12c Performance Tuning: Automatic Workload Repository
  • Oracle 12c Performance Tuning: Introduction
  • Oracle 12c Performance Tuning: Measuring and Maintaining SQL Performance
  • Oracle 12c Performance Tuning: Metrics and Monitoring
  • Oracle 12c Performance Tuning: Performance Tuning Summary
  • Oracle 12c Performance Tuning: Tuning Instance Memory
  • Oracle 12c Performance Tuning: Tuning Problem SQL Statements
  • Oracle Commerce Application Structure and Deployment
  • Oracle Database 11g Enterprise Edition: Selecting Additional Options
  • Oracle Database 11g Release 2: Application Performance Enhancements
  • Oracle Database 11g Release 2: ASM, Storage and Partitioning Enhancements
  • Oracle Database 11g Release 2: Backup and Recovery
  • Oracle Database 11g Release 2: Backup, Recover, Archive, and Repair Data
  • Oracle Database 11g Release 2: Database Architecture and Installation
  • Oracle Database 11g Release 2: Database Architecture and Recovery Operations
  • Oracle Database 11g Release 2: Database Creation and Instance Management
  • Oracle Database 11g Release 2: Database Diagnostics and Flashback Technologies
  • Oracle Database 11g Release 2: Diagnosability Enhancements
  • Oracle Database 11g Release 2: Installation and Oracle Restart
  • Oracle Database 11g Release 2: Intelligent Infrastructure Enhancements
  • Oracle Database 11g Release 2: Managing Concurrency, Undo, and Auditing
  • Oracle Database 11g Release 2: Managing Database Maintenance and Performance
  • Oracle Database 11g Release 2: Managing Database Memory and Performance
  • Oracle Database 11g Release 2: Managing Database Resources and the Scheduler
  • Oracle Database 11g Release 2: Managing Database Space and Duplication
  • Oracle Database 11g Release 2: Moving Data and Oracle Support
  • Oracle Database 11g Release 2: Oracle Partitioning and Security Features
  • Oracle Database 11g Release 2: Oracle Scheduler and Secure Backup
  • Oracle Database 11g Release 2: Performing Restore and Recovery Tasks
  • Oracle Database 11g Release 2: SQL Monitoring and Performance Enhancements
  • Oracle Database 11g Release 2: Storage Structures and User Security
  • Oracle Database 11g Release 2: The ASM Instance and Network Connectivity
  • Oracle Database 11g Release 2: The RMAN Catalog and Creating Backups
  • Oracle Database 11g Release 2: Using Change Management Solutions
  • Oracle Database 11g Release 2: Using, Monitoring and Tuning RMAN
  • Oracle Database 11g: Selecting the Right Edition
  • Oracle Database 12c - Backup and Recovery: Configuring for Recoverability
  • Oracle Database 12c - Backup and Recovery: Duplicating Databases and Tuning RMAN
  • Oracle Database 12c - Backup and Recovery: Failure and Recovery Concepts
  • Oracle Database 12c - Backup and Recovery: Perform Recovery and Secure Backup
  • Oracle Database 12c - Backup and Recovery: Performing and Managing Backups
  • Oracle Database 12c - Backup and Recovery: Transporting Data and Performing PITR
  • Oracle Database 12c - Backup and Recovery: Using Flashback Technologies
  • Oracle Database 12c - Introduction to SQL: Data Conversion and Aggregating Data
  • Oracle Database 12c - Introduction to SQL: Data Manipulation Language
  • Oracle Database 12c - Introduction to SQL: Relational Database and SQL Developer
  • Oracle Database 12c - Introduction to SQL: Restrict, Sort, and Customize Output
  • Oracle Database 12c - Introduction to SQL: SQL*Plus and SELECT Statement
  • Oracle Database 12c - Introduction to SQL: Working with Joins and Subqueries
  • Oracle Database 12c - Introduction to SQL: Working with SET Operators and DDL
  • Oracle Database 12c EInstall and Upgrade: Database Architecture
  • Oracle Database 12c EInstall and Upgrade: Installation
  • Oracle Database 12c EInstall and Upgrade: Upgrading
  • Oracle Database 12c R2 SQL: Controlling User Access
  • Oracle Database 12c R2 SQL: Conversion Functions and Conditional Expressions
  • Oracle Database 12c R2 SQL: Creating Other Schema Objects
  • Oracle Database 12c R2 SQL: Data Definition Language (DDL)
  • Oracle Database 12c R2 SQL: Data Manipulation Language and Transaction Control Language
  • Oracle Database 12c R2 SQL: Displaying Data from Multiple Tables
  • Oracle Database 12c R2 SQL: Managing Objects with Data Dictionary Views 
  • Oracle Database 12c R2 SQL: Managing Schema Objects    
  • Oracle Database 12c R2 SQL: Manipulating Data Using Advanced Queries
  • Oracle Database 12c R2 SQL: Reporting Aggregated Data Using the Group Functions   
  • Oracle Database 12c R2 SQL: Restricting and Sorting Data
  • Oracle Database 12c R2 SQL: SQL*Plus
  • Oracle Database 12c R2 SQL: Using Basic SELECT statements
  • Oracle Database 12c R2 SQL: Using Single-Row Functions to Customize Output   
  • Oracle Database 12c R2 SQL: Using Structured Query Language (SQL)
  • Oracle Database 12c R2 SQL: Using Subqueries to Solve Queries 
  • Oracle Database 12c R2 SQL: Using the Set Operators
  • Oracle Database 12c RAC Administration: Backup and Recovery
  • Oracle Database 12c RAC Administration: Client Connections and QoS
  • Oracle Database 12c RAC Administration: Day-to-Day Administration
  • Oracle Database 12c RAC Administration: Global Resource Management
  • Oracle Database 12c RAC Administration: Installing, Configuring, and Patching
  • Oracle Database 12c RAC Administration: Introduction to Oracle RAC
  • Oracle Database 12c RAC Administration: Monitoring and Tuning
  • Oracle Database 12c RAC Administration: Services and Multitenant Architecture
  • Oracle Database 12c: Enterprise Manager Cloud Control and Creating CDB and PDB
  • Oracle Database 12c: High Availability and Database Management
  • Oracle Database 12c: Managing CDB and PDB, and Data Optimization
  • Oracle Database 12c: Managing Security
  • Oracle Database 12c: Resource Manager, Online Operations, and ADR
  • Oracle Database 12c: Transporting Databases and Managing Data
  • Oracle Database 12c: Tuning SQL and Using ADDM
  • Oracle Database 12c: Using Automatic Data Optimization, Storage, and Archiving
  • Oracle: Creating tables and using joins in Oracle Database 11g
  • Orchestrator Performance and Requirements
  • Organization and HR: Employee Relations
  • Organization and HR: Organizational Effectiveness and Development
  • Organization and HR: Structure of the HR Function
  • Organization and HR: Workforce Management and Using Technology and Data
  • Organizational Goals and Six Sigma
  • OSs, Regulations, & Laws
  • Overview & Prerequisite Setup for System Center Configuration Manager 2012 R2
  • Overview of the ITIL® Service Lifecycle
  • OWASP A10 and A9: API and Component Attacks
  • OWASP A4 and A2: Broken Applications
  • OWASP A5 and A1: Security and Injection
  • OWASP A7 and A6: Leaky and Unprepared Applications
  • OWASP A8 and A3: Cross-site Attacks
  • OWASP Overview
  • OWASP Top 10: List Item Overview
  • Packages and Data Types
  • PAWS and LAPS
  • Performance Analyzer Features
  • Performance Monitoring
  • Performance Testing and JMeter
  • Performance Tuning
  • Performance Tuning of Hadoop Clusters
  • Perl Language Essentials
  • Perl Programming Techniques
  • Personal Skills for Effective Business Analysis
  • Perspectives for Effective Business Analysis
  • PhoneGap: Exploring Advanced Features
  • PhoneGap: Exploring Basic Features
  • Plan and Acquire Resources (PMBOK® Guide Sixth Edition)
  • Plan and Define Project Scope (PMBOK® Guide Sixth Edition)
  • Plan and Manage Communications (PMBOK® Guide Sixth Edition)
  • Planning AI Implementation
  • Planning an Agile Software Development Project
  • Planning and Controlling the Project Schedule
  • Planning and Installing SharePoint 2016
  • Planning for and Deploying Mailbox Servers
  • Planning for Data Protection Manager
  • Planning Quality Management (PMBOK® Guide Sixth Edition)
  • Planning Risk Management (PMBOK® Guide Sixth Edition)
  • Planning Stakeholder Engagement (PMBOK® Guide Sixth Edition)
  • Planning, Installation, and Upgrading
  • Polishing Your Skills for Excellent Customer Service
  • PostgreSQL Database Fundamentals Part #1
  • PostgreSQL Database Fundamentals Part #2
  • Powering Recommendation Engines: Recommendation Engines
  • PowerShell 5.0 Aliases, Providers, and Objects
  • PowerShell 5.0 Cmdlet Structure and Help
  • PowerShell 5.0 Configuration, Advanced Help, and Queries
  • PowerShell 5.0 Desired State Configuration (DSC)
  • PowerShell 5.0 DSC and Azure
  • PowerShell 5.0 DSC Resources
  • PowerShell 5.0 DSC with Linux and JEA
  • PowerShell 5.0 DSC, Configurations, and Repositories
  • PowerShell 5.0 Local Configuration Manager (LCM)
  • PowerShell 5.0 Output Formatting, Modules, and Customization
  • PowerShell 5.0 Remote Management
  • PowerShell 5.0 Resource Creation and Configuration
  • PowerShell 5.0 Syntax, Help, and Conditionals
  • Predictive Analytics & Big Data
  • Predictive Modelling Best Practices: Applying Predictive Analytics
  • PRINCE2® Control, Manage, and Close Projects (2017 Update)
  • PRINCE2® Project Management Overview (2017 Update)
  • PRINCE2® Project Planning and Risk Management (2017 Update)
  • PRINCE2® Project Quality and Control (2017 Update)
  • PRINCE2® Start, Direct, and Initiate Projects (2017 Update)
  • Probability and Probability Distributions in Six Sigma
  • Process & Application
  • Process Flow Metrics and Analysis Tools for Six Sigma
  • Procurement Management (PMBOK® Guide Sixth Edition)
  • Procurement Planning (PMBOK® Guide Sixth Edition)
  • Programmability Objects
  • Programming Apps with Java SE 6
  • Programming Apps with Java SE 7
  • Programming Fundamentals
  • Programming in C#: Creating and Using Types
  • Programming in C#: Creating Types
  • Programming in C#: Debugging and Security Implementation
  • Programming in C#: Debugging and Security Implementation
  • Programming in C#: Implementing Data Access
  • Programming in C#: Implementing Data Access
  • Programming in C#: Managing Multithreating
  • Programming in C#: Managing Program Flow
  • Programming in C#: Managing Program Flow
  • Programming in C#: Manipulating and Retrieving Data
  • Programming in C#: Memory Management and String Operations
  • Programming in C#: Using Types
  • Programming in Go
  • Programming in HTML5: Adaptive AI, Graphics, & Animation
  • Programming in HTML5: More Advanced HTML5 & CSS3
  • Programming in the IoT Arena
  • Programming Techniques
  • Programming Techniques in R
  • Programming with NoSQL
  • Project Changes and Closing (PMBOK® Guide Sixth Edition)
  • Project Documents and Terminology
  • Project Fundamentals (PMBOK® Guide Sixth Edition)
  • Project Initiation and Planning (PMBOK® Guide Sixth Edition)
  • Project Management Introduction (PMBOK® Guide Sixth Edition)
  • Project Management Practical Exercises
  • Project Planning Documents
  • Project Selection and Initiation
  • Protecting Data in iOS Apps
  • Prototyping Design Thinking
  • Providing Effective Internal Customer Service
  • Providing On-site Customer Service
  • Providing Telephone Customer Service
  • Provisioning an Azure Data Factory
  • Puppet Refactoring Patterns
  • Python Applications
  • Python Automation Programming
  • Python Data Processing
  • Python for Data Science: Advanced Data Visualization Using Seaborn
  • Python for Data Science: Advanced Operations with NumPy Arrays
  • Python for Data Science: Basic Data Visualization Using Seaborn
  • Python for Data Science: Introduction to NumPy for Multi-dimentional Data
  • Python for Data Science: Introduction to Pandas
  • Python for Data Science: Manipulating and Analyzing Data in Pandas DataFrames
  • Python Fundamentals
  • Python: Classes and Modules
  • Python: Data Science Fundamentals
  • Python: Iteration and Exceptions
  • Python: The Basics
  • Python: Web Application Development
  • Python: web2py and Test-driven Development
  • Quality and Procurement Planning
  • Quality and Security of Big Data Operations
  • Quality Methodologies and Standards for Project Management
  • Querying and Manipulating Data
  • Querying XML Data with XPath and XQuery
  • Queues & Reliable Sessions
  • R for Data Science: Classification & Clustering
  • R for Data Science: Data Exploration
  • R for Data Science: Data Structures
  • R for Data Science: Data Visualization
  • R for Data Science: Importing and Exporting Data
  • R for Data Science: Regression Methods
  • RADD Knowledge Area: Part 1
  • RADD Knowledge Area: Part 2
  • Random Forests & Uplift Models
  • Rapport Building in Customer Service
  • RavenDB Integration
  • RavenDB Overview
  • Raw Data to Insights: Data Ingestion & Statistical Analysis
  • Raw Data to Insights: Data Management & Decision Making
  • React and Flux: An Overview
  • React and Flux: Creating Simple React Components
  • React and Flux: React Router and Forms
  • React and Flux: Working with Flux
  • Reactive Programming Methods
  • Reactive Programming Using Redux
  • Recovering SQL Databases
  • Recovery Strategies And Client Access Services
  • Red Hat Certified System Administrator: Administration and Permissions
  • Red Hat Certified System Administrator: Advanced Networking
  • Red Hat Certified System Administrator: Boot Process and Installation
  • Red Hat Certified System Administrator: File Systems and Device Management
  • Red Hat Certified System Administrator: Introduction to Virtualization
  • Red Hat Certified System Administrator: Processes, Networking, and Logging
  • Red Hat Certified System Administrator: Remote Connections and Access
  • Red Hat Certified System Administrator: Scripting and Scheduling
  • Red Hat Certified System Administrator: SELinux and Troubleshooting
  • Red Hat Certified System Administrator: The Command Line
  • Red Hat Certified System Administrator: The Environment
  • Regression Analysis
  • Reinforcement Learning
  • Reporting and User Management
  • Research Topics in ML and DL
  • Resource and Risk Planning
  • Responding to Risk (PMBOK® Guide Sixth Edition)
  • Responsive Web Design: Flexible Data and UIs, Devices, Process and Performance
  • Responsive Web Design: Flexible Grids, Images, and Media Queries
  • REST API: Exploring the Advanced Features
  • REST API: Exploring the Basic Features
  • Reusable Components and iRise Administration
  • ROUTE 2.0: Routing Policies
  • ROUTE 2.0: Access Control
  • ROUTE 2.0: Administrative Distance and Passive Interfaces
  • ROUTE 2.0: Authentication, Authorization, and Accounting
  • ROUTE 2.0: BGP Attributes
  • ROUTE 2.0: BGP Loopback and Propagation
  • ROUTE 2.0: Border Gateway Protocol Introduction
  • ROUTE 2.0: Default Routes
  • ROUTE 2.0: Device Management
  • ROUTE 2.0: DHCP IPv6 Stateless Server
  • ROUTE 2.0: DHCP Server
  • ROUTE 2.0: Dynamic Multipoint, Easy VPN, and Ipsec
  • ROUTE 2.0: EIGRP Authentication
  • ROUTE 2.0: EIGRP Load Balancing and Metrics
  • ROUTE 2.0: EIGRP Neighbors
  • ROUTE 2.0: EIGRP Over IPv6
  • ROUTE 2.0: EIGRP Stubs
  • ROUTE 2.0: Frame Relay Operations
  • ROUTE 2.0: Generic Routing Encapsulation Tunnels
  • ROUTE 2.0: Introduction to EIGRP
  • ROUTE 2.0: Introduction to Networking
  • ROUTE 2.0: IP Addressing and DHCP
  • ROUTE 2.0: IP Operations
  • ROUTE 2.0: IPv4 Addressing Types
  • ROUTE 2.0: IPv6 Addressing
  • ROUTE 2.0: IPv6 Addressing and DHCP
  • ROUTE 2.0: Logging and Debugging
  • ROUTE 2.0: Loop Prevention Using Built-In Mechanisms
  • ROUTE 2.0: Loop Prevention Using Route Tags and Maps
  • ROUTE 2.0: Multiprotocol BGP
  • ROUTE 2.0: NetFlow
  • ROUTE 2.0: Network Address Translation
  • ROUTE 2.0: Network Migration
  • ROUTE 2.0: OSPF Area Types
  • ROUTE 2.0: OSPF Configuration
  • ROUTE 2.0: OSPF IPv6 Routing
  • ROUTE 2.0: OSPF Network and LSA Types
  • ROUTE 2.0: OSPF Packet Types
  • ROUTE 2.0: OSPF Route Types
  • ROUTE 2.0: OSPF Virtual Links and Paths
  • ROUTE 2.0: Point-to-Point Networking
  • ROUTE 2.0: Route Filtering
  • ROUTE 2.0: Route Filtering for EIGRP, OSPF, and BGP
  • ROUTE 2.0: Route Redistribution with OSPF
  • ROUTE 2.0: Route Redistribution with RIP and EIGRP
  • ROUTE 2.0: Router Summarization for EIGRP and OSPF
  • ROUTE 2.0: Router Summarization for RIP
  • ROUTE 2.0: Routing Information Protocol
  • ROUTE 2.0: Routing Protocol Types
  • ROUTE 2.0: Security Features
  • ROUTE 2.0: SLAs and Object Tracking
  • ROUTE 2.0: SNMP and NTP
  • ROUTE 2.0: Static Routing
  • ROUTE 2.0: TCP and UDP Operations
  • ROUTE 2.0: Using VRF Lite
  • Ruby Full Stack Development: Flow Control and Data Types
  • Ruby Full Stack Development: Introduction
  • Ruby Full Stack Development: Object-Oriented Programming with Ruby
  • Ruby Full Stack Development: RegEx and I/O with Ruby
  • Ruby Full Stack Development: Threads and Security
  • Ruby Full Stack Development: Unit Testing and Behavior Driven Development
  • Sales Automation in Microsoft Dynamics CRM 2013
  • SAP Business One - Introduction for End Users
  • SAP BusinessObjects: Business Intelligence
  • SAP BusinessObjects: Crystal Reports
  • SAP BusinessObjects: Dashboards and Analytics
  • SAP BusinessObjects: InfoView
  • SAP BusinessObjects: Overview
  • SAP BusinessObjects: Web Intelligence
  • SAP Customer Relationship Management (CRM)
  • SAP Enterprise Resource Planning (ERP)
  • SAP Product Lifecycle Management
  • SAP Supplier Relationship Management
  • SAP Supply Chain Management
  • Scala Expressions and Parallel Computation
  • Scala Functional Programming and Collections
  • Scala Introduction
  • Scala Pattern Matching, Interoperability, and Concurrency
  • Scala Tooling
  • Scalable Data Architectures: Introduction
  • Scalable Data Architectures: Introduction to Amazon Redshift
  • Scalable Data Architectures: Working with Amazon Redshift & QuickSight
  • Scaling Cloud Solutions
  • SCCM 2012 R2 Boundaries and Security Considerations
  • SCCM 2012 R2 Compliance Settings and Managing Clients
  • SCCM 2012 R2 Performance and Health Monitoring
  • Scope, Schedule and Cost Planning
  • Script Components
  • Scripting and Designing
  • Scripting with Spotfire
  • Search Problems
  • SECFND: ACLs & Filtering
  • SECFND: Attacks and Evasion
  • SECFND: Basic Networking Protocols
  • SECFND: Basic Networking Services
  • SECFND: Cryptographic Encryption Algorithms
  • SECFND: Cryptographic Hashing Algorithms
  • SECFND: Cryptography
  • SECFND: Data Loss & Defense in Depth
  • SECFND: Digital Signatures
  • SECFND: Endpoint Security
  • SECFND: Filtering and Packet Capture
  • SECFND: Interpreting Log Data
  • SECFND: Linux Host Terminology
  • SECFND: Monitoring Network Protocols
  • SECFND: Network Addressing
  • SECFND: Network and Web Attacks
  • SECFND: Network Data Types
  • SECFND: Network Data Types and Security Monitoring
  • SECFND: Network Devices Operations & Security
  • SECFND: Network Models
  • SECFND: Network Monitoring
  • SECFND: Next Generation Firewalls
  • SECFND: Overview and Network Models
  • SECFND: Packet Analysis
  • SECFND: Security Attack Concepts
  • SECFND: Security Concepts
  • SECFND: Security Management Part 1
  • SECFND: Security Management Part 2
  • SECFND: SSL/TLS Components
  • SECFND: VLANS and Data Visibility
  • SECFND: Windows Host Terminology
  • SECOPS: Analyzing Intrusion Impact
  • SECOPS: Analyzing Threat Mitigation Reports
  • SECOPS: Categorize and Classify Intrusions
  • SECOPS: CSIRT Goals and Cybersec Elements
  • SECOPS: Data Normalization and 5-Tuple Correlation
  • SECOPS: Examining Intrusion Events
  • SECOPS: Firepower Management Console and Analysis Methods
  • SECOPS: Handling Incident Events and Evidence
  • SECOPS: HTTP Headers
  • SECOPS: ICMP Intrusion
  • SECOPS: ICMP Intrusion Part 2
  • SECOPS: Identifying Forensic Evidence
  • SECOPS: Identifying NetFlow v5 Records
  • SECOPS: Interpreting Regular Expressions
  • SECOPS: Intrusion Event Technologies
  • SECOPS: IP Header Security
  • SECOPS: Protocol Header Security
  • SECOPS: Responding to Incidents
  • SECOPS: Scoring with CVSS 3.0
  • SECOPS: Securing File Systems
  • SECOPS: Transport Layer Headers
  • Secure Programming for C/C++
  • Securing .NET Programming
  • Securing a Network Infrastructure with Windows Firewalls
  • Securing a Virtualization Infrastructure
  • Securing Against Threats, Securing for Enterprise, and Jailbreaking Devices
  • Securing Blockchain Implementations
  • Securing C/C++ Applications
  • Securing Hadoop Clusters
  • Securing Microservices
  • Securing Mobile Devices in the Enterprise: Configuring Enterprise-level Security
  • Securing Mobile Devices in the Enterprise: Mobile Security Technologies
  • Securing Mobile Devices in the Enterprise: Mobile Security Threat Mitigation
  • Securing Mobile Devices in the Enterprise: Mobile Security Threats
  • Securing Network Infrastructure Traffic
  • Securing Unix Systems
  • Securing User Accounts: Authorization, Registration, and Passwords
  • Securing User Accounts: Fundamental Security Concepts
  • Securing User Accounts: Logon, Logoff, Account Changes, and Attack Mitigation
  • Securing Your Microservices
  • Securing, Testing, and Deploying MEAN Applications
  • Security and WCF Streams
  • Security Fundamentals: Authentication
  • Security Fundamentals: Authentication, Passwords & Audit Policies
  • Security Fundamentals: Client and Email Security
  • Security Fundamentals: Core Security
  • Security Fundamentals: Encryption and Malware
  • Security Fundamentals: Firewalls
  • Security Fundamentals: Internet and Wireless Security
  • Security Fundamentals: Network Isolation
  • Security Fundamentals: Permissions
  • Security Fundamentals: Protocol Security
  • Security Fundamentals: Server Protection
  • Security Strategies
  • Selecting Structural Patterns for Simplified Designs
  • Selenium IDE - Advanced Features and Debugging
  • Selenium IDE - Locating, Verifying, and Testing Elements
  • Selenium IDE: Scripts & Commands
  • SENSS 1.0: ASA Firewall Access Control
  • SENSS 1.0: ASA Firewall Configuration & Access Control
  • SENSS 1.0: Centralized Logging & Device Management
  • SENSS 1.0: Cisco Port-Based Traffic Control
  • SENSS 1.0: DHCP Snooping & IP Source Guard
  • SENSS 1.0: High Availability & Private VLANs
  • SENSS 1.0: IOS Security Configuration
  • SENSS 1.0: IPv6 Support & Traffic Inspection
  • SENSS 1.0: Role-Based Access Control
  • SENSS 1.0: Traffic & Device Monitoring
  • SENSS 1.0: Transparent Firewalls & Security Contexts
  • SENSS 1.0: Twice NAT & Network Object NAT
  • SENSS 1.0: Zone-Based Firewalls
  • Server
  • Server 2016 - Identity: Active Directory Accounts & Permissions
  • Server 2016 - Identity: Active Directory Certificate Services
  • Server 2016 - Identity: Active Directory Domain Controllers
  • Server 2016 - Identity: Active Directory Federation Services & Web Application Proxy
  • Server 2016 - Identity: Active Directory Group Policy Objects
  • Server 2016 - Identity: Active Directory Group Policy Preferences
  • Server 2016 - Identity: Active Directory Group Policy Processing
  • Server 2016 - Identity: Active Directory Group Policy Settings
  • Server 2016 - Identity: Active Directory Groups & Organizational Units
  • Server 2016 - Identity: Active Directory Rights Management Services
  • Server 2016 - Identity: Active Directory Service Authentication & Account Policies
  • Server 2016 - Identity: Active Directory Trusts & Sites
  • Server 2016 - Identity: Active Directroy Maintenance & Recovery
  • Server 2016: Install, Store, and Compute: Backup Strategies & Server Monitoring
  • Server 2016: Install, Store, and Compute: Data Deduplication & Hyper-V Setup
  • Server 2016: Install, Store, and Compute: Disk & Volume Configuration
  • Server 2016: Install, Store, and Compute: Failover Clustering Strategies
  • Server 2016: Install, Store, and Compute: Hyper-V Networking Configuration
  • Server 2016: Install, Store, and Compute: Hyper-V Storage Configuration
  • Server 2016: Install, Store, and Compute: Image Deployment Management
  • Server 2016: Install, Store, and Compute: Installation Options
  • Server 2016: Install, Store, and Compute: Managing High Availability Solutions
  • Server 2016: Install, Store, and Compute: Server Storage Solutions
  • Server 2016: Install, Store, and Compute: Upgrades, Migrations, & Activation Models
  • Server 2016: Install, Store, and Compute: Virtual Machine (VM) Settings
  • Server 2016: Install, Store, and Compute: VM Motion and Network Load Balancing
  • Server 2016: Install, Store, and Compute: Windows Container Deployment
  • Server 2016: Install, Store, and Compute: Windows Container Management and Hyper-V
  • Server 2016: Networking: Advanced Network Infrastructures
  • Server 2016: Networking: DHCP Configuration
  • Server 2016: Networking: DHCP Management
  • Server 2016: Networking: Distributed File System & Branch Office Solutions
  • Server 2016: Networking: DNS & DHCP Management Using IPAM
  • Server 2016: Networking: DNS Configuration
  • Server 2016: Networking: DNS Zones & Records
  • Server 2016: Networking: IP Address Management Configuration
  • Server 2016: Networking: IPv4 & IPv6 Address Management
  • Server 2016: Networking: Network Connectivity & Remote Access
  • Server 2016: Networking: Network Policy Server
  • Service Management Automation and Runbooks
  • Service Manager
  • Services and Routing
  • SharePoint 2016 Content Management
  • SharePoint 2016 Security
  • SharePoint 2016 Service Applications
  • SharePoint 2016 Taxonomy and Search
  • Shell Scripting
  • Sinatra Fundamentals
  • Six Sigma and Lean: Foundations and Principles
  • Six Sigma Business Case, Project Charter, and Tools
  • Six Sigma Control Charts
  • Six Sigma Control Tools and Documentation
  • Six Sigma Correlation, Regression, and Hypothesis Testing
  • Six Sigma Cycle-time Reduction and Kaizen Blitz
  • Six Sigma Data Classification, Sampling, and Collection
  • Six Sigma Design of Experiments
  • Six Sigma Exploratory Data Analysis
  • Six Sigma Hypothesis Testing Fundamentals
  • Six Sigma Hypothesis Tests for Variances and Proportions
  • Six Sigma Measurement System Analysis
  • Six Sigma Measurement Systems Analysis
  • Six Sigma Measurement Systems and Metrology
  • Six Sigma Performance Metrics
  • Six Sigma Probability and Statistical Distributions
  • Six Sigma Process and Performance Capability Measurement
  • Six Sigma Process Control Tools
  • Six Sigma Process Documentation and Analysis
  • Six Sigma Project Management Essentials
  • Six Sigma Project Selection, Roles, and Responsibilities
  • Six Sigma Root Cause Analysis and Waste Elimination
  • Six Sigma Statistical Process Control Basics
  • Six Sigma Statistics and Graphical Presentation
  • Six Sigma Strategic Planning and Deployment
  • Six Sigma Team Dynamics and Training
  • Six Sigma Team Dynamics, Roles, and Success Factors
  • Six Sigma Team Facilitation and Leadership
  • Six Sigma Techniques for Improvement
  • Six Sigma Voice of the Customer
  • Six Sigma: Identifying Projects
  • Six Sigma: Metrics
  • Six Sigma: Project Management Basics
  • Six Sigma: Quality Tools
  • Six Sigma: Team Basics, Roles, and Responsibilities
  • Skill Development Using Alexa Components
  • SOA Fundamentals
  • SOAP and Development of Microservices
  • Software Debugging in Windows
  • Software Defined Networking Fundamentals
  • Software Practices (SCRUM): SCRUM Meetings
  • Software Practices (SCRUM): SCRUM Roles
  • Software Programming Fundamentals: Best Practices for Maintaining Code
  • Software Programming Fundamentals: Design and Development Best Practices
  • Software Programming Fundamentals: Software Security Best Practices
  • Software Programming Fundamentals: Source Coding Best Practices
  • Software Quality Assurance
  • Software Testing Foundations: Static, Dynamic, Black-box, and White-box Testing
  • Software Testing Foundations: Test Planning, Management, and Tool Support
  • Software Testing Foundations: Testing throughout the Software Life Cycle
  • Software Testing with Visual Studio: Create and Configure Test Plans
  • Software Testing with Visual Studio: Manage Test Cases
  • Software Testing with Visual Studio: Manage Test Execution Part 1
  • Software Testing with Visual Studio: Manage Test Execution Part 2
  • SOLID Fundamentals
  • Source Control on AWS
  • Spark Monitoring and Tuning
  • Spark Security
  • Speech Input and Cortana
  • Splunk Administration
  • Splunk Fundamentals
  • Splunk Visualizations and Dashboards
  • Spotfire Automation, Analyzation, and Visualization
  • Spotfire Basics
  • Spotfire Data Combinations
  • Spotfire Visualizations and Relationships
  • SQL Server 2016 Database Objects
  • SQL Server 2016 Indexes and Views
  • SQL Server Database Fundamentals: Creating, Optimizing, and Securing Databases
  • SQL Server Database Fundamentals: Design Principles and Data Manipulation
  • SQL Server Database Security
  • SQL Server Instances and Storage Considerations
  • SQL Server Performance Settings
  • SQL Server Virtual Machines on Azure
  • SQL Tuning, Resource Management, and Job Scheduling in Oracle Database 12c
  • SSIS Components
  • SSIS Package Execution and Script Tasks
  • SSIS Packages
  • SSIS Security
  • SSIS Solutions
  • SSIS Variables
  • Stabilizing Hadoop Clusters
  • Statistical Process Control (SPC) and Control Charts in Six Sigma
  • Strategically Focused Project Management
  • Strategies for Building a Cohesive Team
  • Streaming Data Architectures: An Introduction to Streaming Data
  • Streaming Data Architectures: Processing Streaming Data
  • Streaming Pipelines and Analytics
  • Structured Streaming
  • Styling HTML5 and JavaScript
  • Styling Page Elements using CSS3
  • Subqueries and Predicate
  • Supervised Learning Models
  • Sustaining Six Sigma Improvements
  • Swift Language Basics
  • SWITCH 2.0 : DHCP Snooping, IPSG, and DAI
  • SWITCH 2.0 : EtherChannel
  • SWITCH 2.0 : Hot Standby Router Protocol
  • SWITCH 2.0 : L2 Attacks and Port Security
  • SWITCH 2.0 : Layer 2 Network Discovery
  • SWITCH 2.0 : Layer 3 Switching
  • SWITCH 2.0 : Rapid and Multiple Spanning Tree
  • SWITCH 2.0 : SPAN, RSPAN, and StackWise Clustering
  • SWITCH 2.0 : Spanning Tree and Per VLAN Spanning Tree
  • SWITCH 2.0 : Storm Control and Port-Based Authentication
  • SWITCH 2.0 : STP Enhancements
  • SWITCH 2.0 : STP Timers and Failover
  • SWITCH 2.0 : Switch Overview and Administartion
  • SWITCH 2.0 : Trunking Using DTP, Dot1Q, & ISL
  • SWITCH 2.0 : Virtual LANs
  • SWITCH 2.0 : VLAN ACLs and Private VLANs
  • SWITCH 2.0 : VLAN Trunk Protocol Pruning
  • SWITCH 2.0 : VRRP and GLBP
  • Syntax, Variables, Objects, and Classes
  • System Center Configuration Manager Introduction and Planning
  • System Security Certified Practitioner (SSCP 2018): Asset & Change Management
  • System Security Certified Practitioner (SSCP 2018): Business Continuity
  • System Security Certified Practitioner (SSCP 2018): Controlling Resource Access
  • System Security Certified Practitioner (SSCP 2018): Cryptography Primer
  • System Security Certified Practitioner (SSCP 2018): Digital Forensics
  • System Security Certified Practitioner (SSCP 2018): Identity Management
  • System Security Certified Practitioner (SSCP 2018): Malware & Endpoint Security
  • System Security Certified Practitioner (SSCP 2018): Network Fundamentals
  • System Security Certified Practitioner (SSCP 2018): Network Security
  • System Security Certified Practitioner (SSCP 2018): Public Key Infrastructure
  • System Security Certified Practitioner (SSCP 2018): Risk Management
  • System Security Certified Practitioner (SSCP 2018): Securing Environments
  • System Security Certified Practitioner (SSCP 2018): Security Assessments
  • System Security Certified Practitioner (SSCP 2018): Security Concepts
  • System Security Certified Practitioner (SSCP 2018): Security Controls
  • Systems Security Certified Practitioner: Access Controls
  • Systems Security Certified Practitioner: Cryptography
  • Systems Security Certified Practitioner: Incident Response and Recovery
  • Systems Security Certified Practitioner: Network and Communications Security
  • Systems Security Certified Practitioner: Risk Management
  • Systems Security Certified Practitioner: Security Administration
  • Systems Security Certified Practitioner: Security Operations
  • Systems Security Certified Practitioner: Systems and Application Security
  • T-SQL Querying
  • Tableau Advanced Visualizations
  • Tableau Calculations
  • Tableau Charts
  • Tableau Dashboards and Data Organization
  • Tableau Data Connections
  • Tableau Desktop: Real Time Dashboards
  • Tableau Interface and Sharing
  • Tableau Maps
  • Tableau Scripting
  • Tableau Time Dimensions
  • Tableau Visualization Design
  • Taking Final Steps to Bring a Project to its Close
  • Team Dynamics and Performance for Six Sigma Projects
  • Team Foundation Server Administration and Configuration
  • Tensorflow: Building Autoencoders in TensorFlow
  • TensorFlow: Convolutional Neural Networks for Image Classification
  • TensorFlow: Convolutional Neural Networks for Image Classification
  • TensorFlow: Deep Neural Networks and Image Classification
  • TensorFlow: Introduction to Machine Learning
  • Tensorflow: K-means Clustering with TensorFlow
  • Tensorflow: Sentiment Analysis with Recurrent Neural Networks
  • TensorFlow: Simple Regression and Classification Models
  • Tensorflow: Word Embeddings & Recurrent Neural Networks
  • Tensorflow: Word Embeddings & Recurrent Neural Networks
  • Teradata Basics: Communication and Database Security
  • Teradata Basics: Data Storage and Access Methods
  • Teradata Basics: Relational Database and Data Warehouse Basics
  • Teradata SQL: DDL, DML, and SQL Optimization
  • Teradata SQL: Functions, Data Conversions, and Working with Time
  • Teradata SQL: The SELECT Statement, Joins, and Subqueries
  • Terraform Configurations
  • Terraform Infrastructure
  • Terraform Provisioning and Modules
  • Terraform Variables
  • Test-driven Cookbooks
  • Testing and Continuous Integration
  • Testing Angular Apps
  • Testing AngularJS
  • Testing with WebLOAD
  • TestPrep 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND1)
  • TestPrep 1Z0-052 Oracle Database 11g: Administration I
  • TestPrep 1Z0-053 Oracle Database 11g: Administration II
  • TestPrep 1Z0-060 Upgrade to Oracle Database 12c
  • TestPrep 1Z0-061 Oracle Database 12c: SQL Fundamentals
  • TestPrep 1Z0-071 Oracle Database SQL
  • TestPrep 1Z0-808 Java SE 8 Programmer I
  • TestPrep 1Z0-809 Java SE 8 Programmer II
  • TestPrep 200-105 Interconnecting Cisco Networking Devices Part 2 (ICND2)
  • TestPrep 200-125 CCNA Routing and Switching
  • TestPrep 200-310 Designing for Cisco Internetwork Solutions (DESGN)
  • TestPrep 210-060 Implementing Cisco Collaboration Devices (CICD)
  • TestPrep 210-065 Implementing Cisco Video Network Devices (CICD)
  • TestPrep 210-260 Implementing Cisco Network Security (IINS)
  • TestPrep 210-451 Understanding Cisco Cloud Fundamentals (CLDFND)
  • TestPrep 220-1001 CompTIA A+
  • TestPrep 220-901 CompTIA A+
  • TestPrep 220-902 CompTIA A+
  • TestPrep 300-070 Implementing Cisco IP Telephony & Video, Part 1 (CIPTV1)
  • TestPrep 300-101 Implementing Cisco IP Routing (ROUTE)
  • TestPrep 300-115 Implementing Cisco IP Switched Networks (SWITCH)
  • TestPrep 300-135 Troubleshooting and Maintaining Cisco IP Networks (TSHOOT)
  • TestPrep 300-206 Implementing Cisco Edge Network Security Solutions (SENSS)
  • TestPrep 300-208 Implementing Cisco Secure Access Solutions (SISAS)
  • TestPrep 300-209 Implementing Cisco Secure Mobility Solutions (SIMOS)
  • TestPrep 312-50 Certified Ethical Hacker (CEH)
  • TestPrep 640-875 Building Cisco Service Provider Networks, Part 1 (SPNGN1)
  • TestPrep 70-410 Installing and Configuring Windows Server 2012
  • TestPrep 70-411 Administering Windows Server 2012
  • TestPrep 70-412 Configuring Advanced Windows Server 2012 Services
  • TestPrep 70-413 Designing and Implementing a Server Infrastructure
  • TestPrep 70-414 Implementing an Advanced Server Infrastructure
  • TestPrep 70-461 Querying Microsoft SQL Server 2012/2014
  • TestPrep 70-462 Administering Microsoft SQL Server 2012/2014 Databases
  • TestPrep 70-463 Implementing a Data Warehouse with SQL Server 2012/2014
  • TestPrep 70-464 Developing Microsoft SQL Server Databases
  • TestPrep 70-740 Installation, Storage, and Compute with Windows Server 2016
  • TestPrep 70-741 Networking with Windows Server 2016
  • TestPrep 70-742 Identity with Windows Server 2016
  • TestPrep 70-761 Querying Data with Transact SQL
  • TestPrep 98-368 Mobility and Device Fundamentals
  • TestPrep Agile Tester Foundation Extension
  • TestPrep BH0-010 Certified Tester Foundation Level
  • TestPrep CAS-003 CompTIA Advanced Security Practitioner (CASP)
  • TestPrep Certified Associate in Project Management (CAPM) PMBOK Guide 6th Ed.
  • TestPrep Certified Information Security Manager (CISM)
  • TestPrep Certified Information Systems Security Professional (CISSP)
  • TestPrep CS0-001 CompTIA Cybersecurity Analyst (CySA+)
  • TestPrep ITIL Foundation
  • TestPrep JNCIA-Junos (JN0-102)
  • TestPrep LX0-103 CompTIA Linux+ Powered by LPI Exam 1
  • TestPrep LX0-104 CompTIA Linux+ Powered by LPI Exam 2
  • TestPrep N10-007 CompTIA Network+
  • TestPrep PMI Agile Certified Practitioner
  • TestPrep PRINCE2 2017 Foundation
  • TestPrep Professional in Human Resources (PHR)
  • TestPrep Project Management Professional PMBOK 6th Ed
  • TestPrep Senior Professional in Human Resources (SPHR)
  • TestPrep Six Sigma Green Belt (SSGB)
  • TestPrep Six Sigma Yellow Belt (SSYB)
  • TestPrep SK0-004 CompTIA Server+
  • TestPrep SY0-501 CompTIA Security+
  • Tests for Variances and Proportions, ANOVA, and Goodness-of-fit in Six Sigma
  • Text File Processing and RegEx
  • Text Mining & Social Network Analysis
  • The Adobe Dreamweaver CC 2015 Interface
  • The Apache Web Server Engine
  • The BA Elicitation and Collaboration Knowledge Area
  • The BA Planning and Monitoring Knowledge Area
  • The Basics of Blockchain
  • The Basics of Scalding Programming
  • The Big Data Technology Wave
  • The Development of Android Applications
  • The Justinmind Desktop Application Interface
  • The Main Components of Android
  • The Process Groups (PMBOK® Guide Sixth Edition)
  • The R Language and Big Data Processing
  • The Requirements Life Cycle Management Knowledge Area
  • The Solution Evaluation Knowledge Area
  • The Strategy Analysis Knowledge Area
  • The Unix Command Line and GUI
  • The Waterfall Software Development Model
  • Thinking Defensively about Functions, Methods, and Input
  • Threat Detection Solutions
  • Time Series Modeling
  • Tips and Tricks for Developing Secure Mobile Apps
  • TOGAF Fundamentals - Architectural Artifacts and the Enterprise Continuum
  • TOGAF Fundamentals - Security and SOA Governance
  • TOGAF® Advanced - Content Framework And Continuum
  • TOGAF® Advanced - Enterprise Architecture
  • TOGAF® Advanced - Guidelines and Techniques
  • TOGAF® Advanced - Reference Models and Capability Framework
  • TOGAF® Fundamentals - Content Framework and Capability Basics
  • TOGAF® Fundamentals - Enterprise Architecture Basics
  • Tools and C++ Updates
  • Transactions and Isolation Levels
  • Trifacta for Data Wrangling: Wrangling Data
  • Triggers and Functions
  • Troubleshooting a Citrix XenDesktop 7.6 Environment
  • Troubleshooting Data Integration
  • Troubleshooting Office 365 Usage
  • Troubleshooting Runtime Issues and HTTP Modules & Handlers
  • Troubleshooting Skype for Business
  • Troubleshooting SQL Database Errors
  • TSHOOT 2.0 : BGP IPv6 Troubleshooting
  • TSHOOT 2.0 : BGP Troubleshooting Part 1
  • TSHOOT 2.0 : BGP Troubleshooting Part 2
  • TSHOOT 2.0 : EIGRP Troubleshooting Part 1
  • TSHOOT 2.0 : EIGRP Troubleshooting Part 2
  • TSHOOT 2.0 : EIGRP Troubleshooting Part 3
  • TSHOOT 2.0 : EtherChannel & Spanning Tree Troubleshooting
  • TSHOOT 2.0 : HSRP Troubleshooting
  • TSHOOT 2.0 : Layer 2 Troubleshooting Part 1
  • TSHOOT 2.0 : Layer 2 Troubleshooting Part 2
  • TSHOOT 2.0 : Layer 2 Troubleshooting Part 3
  • TSHOOT 2.0 : Layer 3 Troubleshooting
  • TSHOOT 2.0 : Logging & Path Verification
  • TSHOOT 2.0 : Miscellaneous Troubleshooting
  • TSHOOT 2.0 : Network Traffic Viewing, Reporting, & Monitoring
  • TSHOOT 2.0 : OSPF Troubleshooting Part 1
  • TSHOOT 2.0 : OSPF Troubleshooting Part 2
  • TSHOOT 2.0 : OSPF Troubleshooting Part 3
  • TSHOOT 2.0 : Response Automation & Backups
  • TSHOOT 2.0 : Routing Troubleshooting Part 1
  • TSHOOT 2.0 : Routing Troubleshooting Part 2
  • TSHOOT 2.0 : Troubleshooting & Manipulating Output
  • TSHOOT 2.0 : Troubleshooting Basics
  • TSHOOT 2.0 : VRRP Troubleshooting
  • TypeScript Essentials: Advanced TypeScript
  • TypeScript Essentials: Getting Started
  • UI Patterns and Troubleshooting
  • UI/UX for Chatbot and Voice Interface AIs
  • Uncertainty
  • Underscore.js: Array, Object, and Utility Functions
  • Underscore.js: Collection Functions and Function Functions
  • Understanding DOE and Planning Experiments in Six Sigma
  • Understanding Mailflow and Auditing
  • Understanding Malware
  • Unix Hardening and Maintenance
  • Unix Software Management
  • Unsupervised Learning
  • Upgrading and Updating SharePoint 2016
  • User Interfaces in Virtual Reality
  • User Interfaces, Controls, and Fragments
  • User Security and Auditing in Oracle Database 12c
  • Users, Groups, and Authentication
  • Using and Creating Widgets
  • Using Animation and Supporting Mobile Devices
  • Using AWS CodeDeploy
  • Using Basic Statistics and Graphical Methods in Six Sigma
  • Using Business and Financial Measures in Six Sigma
  • Using Data to Find Data: Correction & Categorization
  • Using Data to Find Data: Data Discovery & Exploration
  • Using Docker: Benefits and Installation
  • Using Docker: Customizing and Clustering
  • Using Docker: Dockerizing Applications
  • Using Eclipse
  • Using Eclipse with Subversive
  • Using Express and Express Middleware
  • Using Fine-Grained Access Control in Oracle Database 11g
  • Using Functions in SQL Server 2016
  • Using GoogleVR and Unreal
  • Using Lean Control Tools and Maintaining Controls in Six Sigma
  • Using Mouse, Touch, and Keyboard Input
  • Using MVC 5 with EF6, Web API 2, SignalR, and Azure
  • Using Other Device Input Methods
  • Using Splunk for Data Analysis
  • Using Swift Advanced Language Features
  • Using the Repository
  • Using Typekit Fonts on Web Sites
  • Using Vagrant: Configuration
  • Using Vagrant: Introduction
  • Using Your Data with Splunk
  • UX Design Foundations: Design Principles and Strategies
  • UX Design Foundations: Navigation, Layout, and Content
  • UX Design Foundations: Techniques and Tools
  • Vagrant Advanced Administration
  • Validate and Control Scope (PMBOK® Guide Sixth Edition)
  • vCenter
  • Virtual Machines
  • Virtualizing Enterprise Desktops and Apps: App-V Clients and App Sequencing
  • Virtualizing Enterprise Desktops and Apps: Plan App Virtualization and Use MAP
  • Virtualizing Enterprise Desktops and Apps: Plan for Resilient Virtualized Apps
  • Virtualizing Enterprise Desktops and Apps: RemoteApps
  • Virtualizing Enterprise Desktops and Apps: VM-based and Session-based RDS
  • Visual Studio 2013 Debugging
  • Visual Studio 2017 Installation and New Features
  • Visual Studio Code Cross-platform Code Editor: Basics
  • Visual Studio Frameworks and Tools
  • Visual Studio Mobile Center Introduction and New Features
  • Visualization Using Kibana
  • VMware Business Mobility Solutions
  • VMware Cloud Services Solutions
  • VMware Data Center Virtualization Overview
  • VMware Desktop Virtualization Overview
  • VMware NSX Network Virtualization: Configuring NSX Virtual Networks
  • VMware NSX Network Virtualization: Configuring vSphere Networking
  • VMware NSX Network Virtualization: Installing and Upgrading
  • VMware NSX Network Virtualization: NSX Network Security
  • VMware NSX Network Virtualization: NSX Network Services
  • VMware NSX Network Virtualization: NSX Operations
  • VMware NSX Network Virtualization: Physical Infrastructure Requirements
  • VMware NSX Network Virtualization: Technology and Architecture
  • VMware VCA: Cloud Overview
  • VMware VCA: vCloud Connector and vSphere
  • VMware VCA: vRealize Automation and vRealize Operations Manager
  • VMware vSphere 6 Install, Configure, Manage - Part 1: Storage and VMs
  • VMware vSphere 6 Install, Configure, Manage - Part 1: Virtual Networks
  • VMware vSphere 6 Install, Configure, Manage - Part 1: vSphere 6 Overview
  • VMware vSphere 6 Install, Configure, Manage - Part 1: vSphere Installation
  • VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 Clustering
  • VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 Design
  • VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 DRS
  • VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 Monitoring
  • VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 Updating
  • VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 Upgrading
  • VMware Workstation 11 Networking and Remote Connectivity
  • Voice User Interfaces
  • vSphere 6.5 Distributed Resource Scheduler (DRS)
  • vSphere 6.5 High Availability Clusters
  • vSphere 6.5 Installation
  • vSphere 6.5 Monitoring and Compliance
  • vSphere 6.5 Networking
  • vSphere 6.5 Overview
  • vSphere 6.5 Resource Management
  • vSphere 6.5 Storage
  • vSphere 6.5 Update Manager
  • vSphere 6.5 Virtual Machine Creation
  • vSphere 6.5 Virtual Machine Management
  • Vulnerabilities and Exploits
  • WCAG 2.0 Accessibility Standards
  • WCF Essentials: Building Clients
  • WCF Essentials: Contracts
  • WCF Essentials: Distributed Applications
  • WCF Essentials: Hosting
  • WCF Essentials: Interoperability and Integration
  • WCF Essentials: Introduction to the Framework
  • WCF Essentials: Managing Transactions
  • WCF Essentials: Services
  • WCF Essentials: Tools
  • WCF Services
  • WCF Transactions, Pipelines, and Extensibility
  • Wearable Technology and UI/UX
  • Web 2.0 Fundamentals
  • Web API Advanced
  • Web API Essentials
  • Web Application Libraries
  • Web Browsing and Cortana
  • Web Building and Testing with Gulp.js
  • Web Design Basics
  • Web Design Enhancements
  • Web Development Fundamentals
  • Web Development Using the Yeoman Stack: Essential Development Tools
  • Web Services and XML
  • WebSphere Commerce Advanced Topics
  • WebSphere Commerce Application Development and Customization
  • WebSphere Commerce Basics
  • WebSphere Commerce Security, Performance, and Troubleshooting
  • Whole Page Controls and Extending Bootstrap
  • Windows 10: Designing for Cloud and Hybrid Identity
  • Windows 10: Designing for Data Access, Protection, and Remote Access
  • Windows 10: Designing for Device Access and Protection
  • Windows 10: Planning for Apps, Updates, and Recovery
  • Windows 7 Deployment Strategies
  • Windows Embedded 8.1 Industry
  • Windows Ink and Paint 3D
  • Windows Performance Monitoring: Additional Performance Tools
  • Windows PowerShell Desired State Configuration Fundamentals
  • Windows Server 2008: Domain Controller Placement
  • Windows Server 2008: RAID
  • Windows Server 2008: What's new and how does it help me?
  • Windows Server: Troubleshooting Network Issues
  • Windows Store Applications and Databases
  • Windows Store, Security, and Browsing
  • WordPress Advanced Themes and Administration
  • WordPress Introduction and Basic Configuration
  • WordPress Networking and Security
  • Working with ASK API Using Node.js and Java
  • Working with ASP.NET MVC Models and Unit Testing
  • Working with ASP.NET Web API Routes and Controllers
  • Working with Balsamiq Versions and Plugins
  • Working with Bitcoin
  • Working with Cassandra
  • Working with Data in AngularJS
  • Working with Data Mapping, Jobs, and Automation
  • Working with Docker Machine, Security, and APIs
  • Working with Git
  • Working with GitHub
  • Working with HDInsight Clusters
  • Working with Images and Exporting Files in Adobe InDesign CC 2015
  • Working with Jenkins: Fundamentals
  • Working with JSON and XML Data Formats
  • Working with JUnit Tests
  • Working with Knockout
  • Working with Node.js and .NET
  • Working with Objects and Editing Tools in Adobe InDesign CC 2015
  • Working with Pages in Adobe InDesign CC 2015
  • Working with Sinatra
  • Working with Smart Home and Business
  • Working with SSML and AVS
  • Working with Text in Adobe Illustrator CC 2015
  • Working with Text in Adobe InDesign CC 2015
  • Working with the Features of Node.js Applications
  • Working with WebLOAD
  • Workplace Management: Corporate Social Responsibility
  • Workplace Management: Employment Laws and Regulations
  • Workplace Management: Global HR, Diversity, and Inclusion
  • Workplace Management: Risk Management
  • WPF Fundamentals with XAML and C#
  • WSUS and Windows 7
  • Xamarin Android and iOS Projects in Cross-Platform Solutions in Visual Studio
  • XAML App Controls
  • XML Language Basics
  • XML Transformation Using XSLT and XSL-FO
  • Yeoman Stack: Advanced Usage of Generator and Polymer
  • Yeoman Stack: Application Development
  • Yeoman Stack: Managing the Environment for Productivity
  • Yeoman Stack: Working with NPM and Adopting Testing Strategies

Online ANYTIME Testimonial

I am really enjoying the class learning about the new features in Server 2008. I enjoy the hands on element of the virtual labs and your very flexible method of instruction. Being able to ask questions at any time is a great thing IMO.

Thanks for the class and I will definitely push my Dept for more training dollars to take more classes.
Charlie P.