New Horizons IT - Complete Collection

Give your IT professionals the training they need to administer your system and networks, develop and maintain applications, and prepare for valuable industry certifications. Our e-Learning courses provide instruction in Networks and Operating Systems, Programming, Web Design and Development, and more. Learning paths are provided for the most current topics like Information Technology Infrastructure Library (ITIL®), and Certified Business Analyst Professional (CBAP). This comprehensive collection includes our valuable simulations, Try It  exercises and Mentoring.

This is an Online ANYTIME course library and includes multiple individual online courses. Online ANYTIME gives you access to a self-paced training solution that uses the same core course content as our world-renowned Instructor-Led Training.

What’s Included

  • .NET Core, C#, and Visual Studio Extensions
  • .NET Development with Visual Studio
  • .NET Overview: Windows, Web, and the Cloud
  • 1Z0-816 - Java SE 11 Programmer II: Arrays & Program Flow Control
  • 1Z0-816 - Java SE 11 Programmer II: Class Concepts & Managing Exceptions
  • 1Z0-816 - Java SE 11 Programmer II: Concurrency Management
  • 1Z0-816 - Java SE 11 Programmer II: Core Java Libraries
  • 1Z0-816 - Java SE 11 Programmer II: Core JVM Enhancements and Features
  • 1Z0-816 - Java SE 11 Programmer II: Database Applications
  • 1Z0-816 - Java SE 11 Programmer II: Functional Programming in Java
  • 1Z0-816 - Java SE 11 Programmer II: Fundamental Language Enhancements
  • 1Z0-816 - Java SE 11 Programmer II: Fundamentals
  • 1Z0-816 - Java SE 11 Programmer II: Generics & Collections in Java
  • 1Z0-816 - Java SE 11 Programmer II: Implementing NIO.2
  • 1Z0-816 - Java SE 11 Programmer II: Java Migration & Service Management
  • 1Z0-816 - Java SE 11 Programmer II: Lambda Operations & Streams
  • 1Z0-816 - Java SE 11 Programmer II: Localization in Java
  • 1Z0-816 - Java SE 11 Programmer II: Object-oriented Programming in Java
  • 1Z0-816 - Java SE 11 Programmer II: Secure Coding in Java SE 11 Applications
  • 1Z0-816 - Java SE 11 Programmer II: Streams & Pipelines
  • 4G Communication Systems
  • A/B Testing, Bayesian Networks, and Support Vector Machine
  • ABAP Fundamentals
  • ABAP Programming I
  • Access Control in Windows Server 2008 R2
  • Accessibility and Design
  • Accessing Data with Spark: An Introduction to Spark
  • Accessing Data with Spark: Data Analysis using Spark SQL
  • Accessing Data with Spark: Data Analysis Using the Spark DataFrame API
  • Accessing Windows Networks Remotely in Windows Server 2008
  • Active Directory Administration in Microsoft Windows Server 2008
  • Active Directory Certificate Services in Windows Server 2008
  • Active Directory Domain Services in Windows Server 2008 R2
  • Active Directory Objects in Windows Server 2008
  • Activities and Tools Used for Business Analysis
  • Adaptive AI, Graphics, and Animation
  • Adaptive App Design
  • Adaptive UI Layout and Caching Strategy
  • Additional Active Directory Server Roles in Windows Server 2008
  • Additional Malware Protection
  • Administer vRealize Automation Components
  • Administer vRealize Orchestrator and Troubleshoot Automation Implementation
  • Administering a SQL Database Infrastructure Expert Live with Encore
  • Administering and Deploying System Center 2012 Configuration Manager Expert Live with Encore
  • Administering Microsoft SQL Server 2012 Databases Expert Live with Encore
  • Administering Microsoft Windows Server 2012 Expert Encore
  • Administering Microsoft Windows Server 2012 R2 Expert Live with Encore
  • Administering System Center Configuration Manager 2012 R2
  • Administrating XenDesktop 7.5 and Hypervisor Management
  • Adobe Captivate 8: Getting Started
  • Adobe Captivate 8: Media and Interactivity
  • Adobe Captivate 9: Getting Started
  • Adobe Captivate 9: Media and Recording
  • Adobe Captivate 9: Publishing and Actions
  • Adobe Captivate 9: Questions and Pools
  • Adobe ColdFusion 10 Fundamentals
  • Adobe Dreamweaver CC 2015 Browsers and HTML
  • Adobe Dreamweaver CC 2015 Fundamentals
  • Adobe Dreamweaver CC 2015 Web Design
  • Adobe Edge Animate CC: Creating and Animating Artwork
  • Adobe Edge Animate CC: Exploring the Interface
  • Adobe Edge Animate CC: Importing Artwork, Text Animation and Typeface Properties
  • Adobe Edge Animate CC: Interactive Compositions
  • Adobe Edge Animate CC: Publishing Compositions
  • Adobe Edge Animate CC: Transitions, Symbols, and Synchronizing Motion
  • Adobe Edge Animate CC: Working with Video and Audio
  • Adobe Flash Professional CC 2015 Animations
  • Adobe Flash Professional CC 2015 Fundamentals
  • Adobe Flash Professional CC 2015 Programming
  • Adobe Flash Professional CC 2015 Tools
  • Adobe Illustrator CC 2015 Advanced Tools and Effects
  • Adobe Illustrator CC 2015 Fundamentals
  • Adobe Illustrator CC 2015 Gradients and Bitmap Images
  • Adobe Illustrator CC 2015 Introduction and New Features
  • Adobe Illustrator CC 2015 Tools
  • Adobe Illustrator CC 2015 Working with the Pen Tools and Objects
  • Adobe InDesign CC 2015 Basic Navigation and Tools
  • Adobe InDesign CC 2015 Fundamentals
  • Adobe Photoshop CC 2015 Basics
  • Adobe Photoshop CC 2015 Cloning and Editing
  • Adobe Photoshop CC 2015 Enhancement Tools and Techniques
  • Adobe Photoshop CC 2015 Paths and Techniques
  • Adobe Photoshop CC 2015: File Types and Color Editing
  • Adobe Photoshop CC 2015: Layers and Type
  • Adobe Photoshop CC 2015: Selection Tools and Techniques
  • Adobe Premiere Elements 13 Essentials
  • Adobe Premiere Elements 13: Adding Video Effects
  • Adobe Premiere Elements 13: Exporting & Sharing Videos
  • Adobe Premiere Elements 13: Getting Started
  • Adobe Premiere Elements 13: Importing Files & Setting Up a Project
  • Adobe Premiere Elements 13: Project Audio Settings
  • Adobe Premiere Elements 13: Trimming & Editing a Video
  • Adobe Premiere Pro CC 2015 Fundamentals
  • Adobe Premiere Pro CC 2015 Movies and Application Extensibility
  • Adobe Premiere Pro CC 2015 Panels and Effects
  • Adobe Reader X
  • Adopting IT Automation
  • Adopting PRINCE2® for your Project Environment (2017 Update)
  • Adopting the DevOps CI/CD Paradigm
  • Adopting the DevOps Mindset
  • Advanced Agile: Software Development Concepts
  • Advanced Agile: Software Project Management
  • Advanced Architecting on Amazon Web Services: Cloud Migration and Architecture
  • Advanced Architecting on Amazon Web Services: Costing
  • Advanced Architecting on Amazon Web Services: Data Storage Architecture
  • Advanced Architecting on Amazon Web Services: Deployment Management
  • Advanced Architecting on Amazon Web Services: HA and Business Continuity
  • Advanced Configuration Options
  • Advanced CSS
  • Advanced Data Access with EF Core
  • Advanced Database Security Development
  • Advanced Deployment
  • Advanced Entity Framework
  • Advanced Features of Akka
  • Advanced Features of JavaScript, CSS3 and HTML5
  • Advanced HR Management: Competencies for Senior HR Professionals Part I
  • Advanced HR Management: Competencies for Senior HR Professionals Part II
  • Advanced HTML5
  • Advanced HTML5
  • Advanced HTML5 and JavaScript
  • Advanced Human Resources Management: People and Organization
  • Advanced Human Resources Management: Workplace and HR Strategy
  • Advanced Input Validation
  • Advanced JsRender Features
  • Advanced Knockout Techniques
  • Advanced Lean, Agile, & Scrum Concepts
  • Advanced LoopBack
  • Advanced Microservices Architecture
  • Advanced Microservices Patterns
  • Advanced Options, Responsive Web Design, and Management with CSS3
  • Advanced PowerShell Desired State Configuration: Advanced Configuration
  • Advanced PowerShell Desired State Configuration: Writing Custom Resources
  • Advanced Prototyping in iRise
  • Advanced Provisioning in Vagrant
  • Advanced Python
  • Advanced Python Topics: Exceptions & Command Line Arguments
  • Advanced Python Topics: File Operations in Python
  • Advanced Python Topics: Migrating from Python 2 to Python 3
  • Advanced Python Topics: Python Modules & Virtual Environments
  • Advanced Querying in Java Hibernate
  • Advanced Rails
  • Advanced Reinforcement Learning: Implementation
  • Advanced Reinforcement Learning: Principles
  • Advanced Scrum for Project Management
  • Advanced Scrum Metrics
  • Advanced Scrum: Addressing Sprint Execution Challenges
  • Advanced Scrum: Developing the Product and Sprint Backlogs
  • Advanced Scrum: Integrating and Customizing Scrum
  • Advanced Selecting, Theming, and Plugins
  • Advanced Solutions of Microsoft Exchange Server 2013 Expert Live with Encore
  • Advanced Solutions of Microsoft SharePoint Server 2013 Expert Live with Encore
  • Advanced TIBCO Spotfire
  • Advanced Windows Store Apps with C# in Visual Studio 2013: Data Management
  • Advanced Windows Store Apps with C# in Visual Studio 2013: Media and Devices
  • Advanced Windows Store Apps with C# in Visual Studio 2013: Security & Optimizing
  • Advanced Windows Store Apps with C# in Visual Studio 2013: Testing & Deployment
  • Advanced Windows Store Apps with C# in Visual Studio 2013: The UI, Printing, WNS
  • Adversarial Problems
  • Aggregating Data in SQL Server 2016
  • Agile and DevOps: Adopting Agile Methodology
  • Agile Architecture, Design, & Collaboration
  • Agile Hybrid Approaches
  • Agile Key Exam Concepts
  • Agile Planning
  • Agile Principles and Methodologies
  • Agile Principles, Methodologies, and Mindset
  • Agile Programming & Testing
  • Agile Project Planning
  • Agile Project Scheduling and Monitoring
  • Agile Software Development - Scrum
  • Agile Software Development - Test-driven Development
  • Agile Software Development Methodologies
  • Agile Software Testing: Methodologies and Testing Approaches
  • Agile Software Testing: Techniques and Tools
  • Agile Stakeholder Engagement and Team Development
  • AI and ML Solutions with Python: Deep Learning and Neural Network Implementation
  • AI and ML Solutions with Python: Implementing ML Algorithm Using scikit-learn
  • AI and ML Solutions with Python: Implementing Robotic Process Automation
  • AI and ML Solutions with Python: Machine Learning and Data Analytics
  • AI and ML Solutions with Python: Supervised, Unsupervised and Deep Learning
  • Ajax API Essentials
  • Ajax Applications and Server Communication
  • Ajax Basics
  • Ajax: Requesting Data and Retrieving Responses
  • Akka Essentials
  • Alexa Architecture and Components
  • Amazon ECS and OpsWorks
  • An Executive's Guide to Security: Protecting Your Information
  • An Executive's Guide to Security: Understanding Security Threats
  • An Overview of Apache Cassandra
  • Analytical Techniques Used for Business Analysis
  • Analytics by Function
  • Analyzing Risk (PMBOK® Guide Sixth Edition)
  • Android Architecture, Protection, and Development Best Practices
  • Android Cardboard and Unity VR
  • Android For .NET Developers: Advanced Design, Build, Android Wear, and Emulator
  • Android For .NET Developers: Android OS
  • Android For .NET Developers: Android User Interface Elements
  • Android For .NET Developers: Different Approaches to Development
  • Android For .NET Developers: Introduction to Xamarin For .NET
  • Android For .NET Developers: Java, Garbage Collection, Debugging, and Runtime
  • Android Lollipop New Features For Developers
  • Android Security Vulnerabilities, Testing, and Enterprise Considerations
  • Angular 2 Template Syntax, Directives, and Pipes
  • Angular 4: Animation
  • Angular 4: Components and Bindings
  • Angular 4: Creating an Application
  • Angular 4: Directives
  • Angular 4: Form Management
  • Angular 4: Model-driven Forms
  • Angular 4: NativeScript
  • Angular 4: Pipes
  • Angular 4: Routing
  • Angular 4: Services, Promises, and Route Protection
  • Angular 5 Features and Changes
  • Angular 5 Material and Universal Components
  • Angular 6 Development: Angular Material and Angular Elements
  • Angular 6 Development: Dependency Injection and ng-bootstrap
  • Angular 6 Development: Introduction
  • Angular 6 Development: Libraries
  • Angular 6 Development: Reactive Programming
  • Angular 6 Development: Testing & TDD
  • Angular and ngrx
  • Angular Security and the Angular CLI
  • Angular, Reactive, and Observable
  • AngularJS and ASP.NET 5 MVC 6: Creating an SPA
  • AngularJS and ASP.NET 5 MVC 6: Data Persistence, Validation, and Security
  • AngularJS and TypeScript
  • AngularJS Security Considerations
  • AngularUI Companion Frameworks
  • AngularUI Utilities and Modules
  • Animation and Internationalization
  • Anomaly Detection: Aspects of Anomaly Detection
  • Anomaly Detection: Network Anomaly Detection
  • ANSI C Language Fundamentals
  • ANTS Performance Profiler
  • Apache Cordova: Exploring the Advanced Features
  • Apache Cordova: Exploring the Basic Features
  • Apache Hadoop
  • Apache Hadoop on Amazon EMR
  • Apache HBase Fundamentals: Access Data through the Shell and Client API
  • Apache HBase Fundamentals: Advanced API, Administration, and MapReduce
  • Apache HBase Fundamentals: Installation, Architecture, and Data Modeling
  • Apache Kafka Development
  • Apache Kafka Operations
  • Apache Solr - Query and Data Management
  • Apache Solr – Deployment and Configuration
  • Apache Spark SQL
  • Apache Storm Introduction - API and Topology
  • Apache Storm Introduction – Architecture and Installation
  • Apache Subversion Fundamentals: Getting to Know Subversion
  • Apache Web Services Advanced
  • API Gateways
  • API Management
  • API Management and DevOps
  • API Security
  • API Test Automation with SoapUI
  • APIs and Machine Learning
  • App Navigation
  • App-to-app Communication and File Storage
  • Appium Concepts with Mac OS X
  • Application Access and Delivery in Microsoft Windows Server 2008
  • Application Development with Node.js: Build Apps using Modules & MEAN Stack
  • Application Development with Node.js: Language Fundamentals
  • Application Development with Node.js: Managing Advanced Application Elements
  • Application Development with Node.js: Microservices
  • Application Development with Node.js: Microservices Frameworks, & Utilities
  • Application Development with Node.js: Node Clusters & Memory Optimizations
  • Application Development with Node.js: Process Managers
  • Application Development with Node.js: Real-time Applications
  • Application Development with Node.js: Security & Middleware Implementation
  • Application Development with Node.js: Working with Features
  • Application Life Cycle
  • Application Security in .NET
  • Application Skills in Microsoft Dynamics CRM 2013
  • Applications of Python
  • Applied Deep Learning: Generative Adversarial Networks and Q-Learning
  • Applied Deep Learning: Unsupervised Data
  • Applied Predictive Modeling
  • Applying Automation Using AWS Tools
  • Applying Design Patterns in DevOps & CloudOps Automation
  • Applying Machine Learning
  • Applying Scrum Development Practices
  • Apps and Gaming
  • Architecting Balance: Designing Hybrid Cloud Solutions
  • Architecting Balance: Hybrid Cloud Implementation with AWS & Azure
  • Architecting Microsoft Azure Solutions: Application Design and Messaging
  • Architecting Microsoft Azure Solutions: Automation with PowerShell, Chef, and Puppet
  • Architecting Microsoft Azure Solutions: Azure External Network Connectivity Design
  • Architecting Microsoft Azure Solutions: Azure Storage Design
  • Architecting Microsoft Azure Solutions: Compute Design Considerations
  • Architecting Microsoft Azure Solutions: Data Services Design
  • Architecting Microsoft Azure Solutions: Implement Azure Automation
  • Architecting Microsoft Azure Solutions: Managing Identities
  • Architecting Microsoft Azure Solutions: Monitoring Resources
  • Architecting Microsoft Azure Solutions: Network Design
  • Architecting Microsoft Azure Solutions: Plan Azure SQL-Compliant Database Usage
  • Architecting Microsoft Azure Solutions: Planning Artificial Intelligence Services
  • Architecting Microsoft Azure Solutions: Planning Azure NoSQL Deployments
  • Architecting Microsoft Azure Solutions: Securing the Azure Environment
  • Architecting Microsoft Azure Solutions: Template and Runbook Automation
  • Architecting Microsoft Azure Solutions: Web Application Design
  • Architecting on Amazon Web Services: Databases and Application Services
  • Architecture and Testable Code
  • Architecture N-Tier/REST: Designing and Building Applications
  • Archiving and External Access
  • Artificial Intelligence: Basic AI Theory
  • Artificial Intelligence: Human-computer Interaction Methodologies
  • Artificial Intelligence: Human-computer Interaction Overview
  • Artificial Intelligence: Types of Artificial Intelligence
  • ASP.NET MVC Databases and Entity Framework
  • ASP.NET MVC Databases and the Entity Framework
  • ASP.NET MVC Web Applications: Adaptive UI Layout and Caching Strategy
  • ASP.NET MVC Web Applications: Asynchronous Tasks
  • ASP.NET MVC Web Applications: Authorization & Exception Handling
  • ASP.NET MVC Web Applications: Claims-Based Authentication
  • ASP.NET MVC Web Applications: Composing the UI Layout
  • ASP.NET MVC Web Applications: Configuring & Deploying
  • ASP.NET MVC Web Applications: Data & State Management
  • ASP.NET MVC Web Applications: Databases & Entity Framework
  • ASP.NET MVC Web Applications: Debugging Web Applications
  • ASP.NET MVC Web Applications: Deployment Architecture
  • ASP.NET MVC Web Applications: Design and Implement UI Behavior
  • ASP.NET MVC Web Applications: Designing Application Architecture
  • ASP.NET MVC Web Applications: Designing Build & Publishing Strategies
  • ASP.NET MVC Web Applications: Distributed Applications
  • ASP.NET MVC Web Applications: Globalization, Azure Events, & NuGet
  • ASP.NET MVC Web Applications: Host Options & WebApp Composition
  • ASP.NET MVC Web Applications: Implementing ASP.NET Authentication
  • ASP.NET MVC Web Applications: Implementing Secure Sites
  • ASP.NET MVC Web Applications: Introduction
  • ASP.NET MVC Web Applications: JSON & XML Data Formats
  • ASP.NET MVC Web Applications: Models and Unit Testing
  • ASP.NET MVC Web Applications: MVC Application Routes
  • ASP.NET MVC Web Applications: MVC Controllers & Actions
  • ASP.NET MVC Web Applications: Optimization & Encryption
  • ASP.NET MVC Web Applications: State & Configuration Management
  • ASP.NET MVC Web Applications: Troubleshooting, HTTP Modules, & Handlers
  • ASP.NET MVC Web Applications: Web API Routes & Controllers
  • Asynchronous Programming with Clojure's core.async Library
  • Asynchronous Tasks in ASP.NET MVC Web Application
  • Attack Vectors and Mitigations
  • Auditing, Logging, and Event Handling
  • Authentication & Encryption: Best Practices
  • Authentication and Identity Management
  • Authentication, Authorization, and App Deployment
  • Authoring Tool Accessibility Guidelines (ATAG)
  • Automated Software Testing
  • Automated Testing with Docker
  • Automating and Managing Databases
  • Automation and High Availability
  • Automation and Machine Learning
  • Automation Design & Robotics
  • Automation Testing for Python
  • Automation Using Bash and Expect
  • AWS Associate Solution Architect: Amazon CloudFront and Route 53
  • AWS Associate Solution Architect: Amazon Machine Images
  • AWS Associate Solution Architect: Architecting for the Cloud
  • AWS Associate Solution Architect: Architecture Security
  • AWS Associate Solution Architect: Auto Scaling
  • AWS Associate Solution Architect: AWS Primer
  • AWS Associate Solution Architect: AWS Storage Solutions
  • AWS Associate Solution Architect: Building and Managing AWS Solutions
  • AWS Associate Solution Architect: Caching
  • AWS Associate Solution Architect: Database Managed Services
  • AWS Associate Solution Architect: High Availability
  • AWS Associate Solution Architect: Loose Coupling
  • AWS Associate Solution Architect: Managing AWS
  • AWS Associate Solution Architect: Optimizing Compute Resources
  • AWS Associate Solution Architect: Optimizing Storage
  • AWS Associate Solution Architect: Scalability and Elasticity
  • AWS Associate Solution Architect: Virtual Private Cloud
  • AWS Associate Solutions Architect 2020: Application Scalability
  • AWS Associate Solutions Architect 2020: AWS Cost Management
  • AWS Associate Solutions Architect 2020: AWS Developer Options
  • AWS Associate Solutions Architect 2020: AWS Review Course 1
  • AWS Associate Solutions Architect 2020: AWS Review Course 2
  • AWS Associate Solutions Architect 2020: Database Solutions
  • AWS Associate Solutions Architect 2020: Identity & Access Management
  • AWS Associate Solutions Architect 2020: Monitoring
  • AWS Associate Solutions Architect 2020: Network Options
  • AWS Associate Solutions Architect 2020: Network Security & Name Resolution
  • AWS Associate Solutions Architect 2020: Security
  • AWS Associate Solutions Architect 2020: Stack Deployment and Caching
  • AWS Associate Solutions Architect 2020: Storage Security & Resiliency
  • AWS Associate Solutions Architect 2020: Storage Solutions
  • AWS Automated Testing: Environments & Services
  • AWS Certified Developer - Associate: Application Development
  • AWS Certified Developer - Associate: Code Management and Monitoring Tools
  • AWS Certified Developer - Associate: Plan Application and Infrastructure Security
  • AWS Certified Developer - Associate: Principles and Essential Services
  • AWS Certified Developer - Associate: Serverless Application and Container Management
  • AWS Certified Developer - Associate: Service Integration and Orchestration
  • AWS Certified SysOps Administrator: Application Infrastructure
  • AWS Certified SysOps Administrator: Compute Services
  • AWS Certified SysOps Administrator: Database Services
  • AWS Certified SysOps Administrator: High Availabilty
  • AWS Certified SysOps Administrator: Introduction
  • AWS Certified SysOps Administrator: Monitoring the AWS Environment
  • AWS Certified SysOps Administrator: Networking Services
  • AWS Certified SysOps Administrator: Preparing for Cloud Service Management
  • AWS Certified SysOps Administrator: Security and IAM Services
  • AWS Certified SysOps Administrator: Storage Services
  • AWS Cloud Practitioner 2019: Architecture Design Principles
  • AWS Cloud Practitioner 2019: AWS Access Management
  • AWS Cloud Practitioner 2019: AWS Cloud and the Value Proposition
  • AWS Cloud Practitioner 2019: AWS Cloud Deployment and Operation
  • AWS Cloud Practitioner 2019: Cloud Economics
  • AWS Cloud Practitioner 2019: Cloud Security & Compliance
  • AWS Cloud Practitioner 2019: Core AWS Services
  • AWS Cloud Practitioner 2019: Security Support Resources
  • AWS Cloud Practitioner 2019: Shared Responsibility
  • AWS Cloud Practitioner 2019: Technology Support Resources
  • AWS Infrastructure Services
  • AWS Lambda
  • AWS Professional Solution Architect: Business Continuity
  • AWS Professional Solution Architect: Cloud Migration
  • AWS Professional Solution Architect: Costing
  • AWS Professional Solution Architect: Data Replication
  • AWS Professional Solution Architect: Data Security
  • AWS Professional Solution Architect: Data Storage
  • AWS Professional Solution Architect: Deployment Management
  • AWS Professional Solution Architect: Hybrid Architecture
  • AWS Professional Solution Architect: Network Design
  • AWS Professional Solution Architect: Scalability and Elasticity
  • AWS Professional Solution Architect: Security Controls
  • AWS Professional Solutions Architect 2020: Account & Centralized Management
  • AWS Professional Solutions Architect 2020: AWS & Data Protection
  • AWS Professional Solutions Architect 2020: AWS Management
  • AWS Professional Solutions Architect 2020: Cryptography & PKI
  • AWS Professional Solutions Architect 2020: Data Processing & Analysis
  • AWS Professional Solutions Architect 2020: Database Solutions
  • AWS Professional Solutions Architect 2020: Desktop & Cost Management
  • AWS Professional Solutions Architect 2020: Developer Managed Services
  • AWS Professional Solutions Architect 2020: Development Strategies
  • AWS Professional Solutions Architect 2020: EC2 Instance Deployment
  • AWS Professional Solutions Architect 2020: High Availability
  • AWS Professional Solutions Architect 2020: IAM Configurations
  • AWS Professional Solutions Architect 2020: IAM Users & Groups
  • AWS Professional Solutions Architect 2020: Migration Strategies
  • AWS Professional Solutions Architect 2020: Name Resolution Solutions
  • AWS Professional Solutions Architect 2020: Network Security & Disaster Recovery
  • AWS Professional Solutions Architect 2020: Resource Monitoring & Performance
  • AWS Professional Solutions Architect 2020: Review Course 1
  • AWS Professional Solutions Architect 2020: Review Course 2
  • AWS Professional Solutions Architect 2020: S3 Management
  • AWS Professional Solutions Architect 2020: S3 Security
  • AWS Professional Solutions Architect 2020: VPC Connectivity
  • AWS Professional Solutions Architect 2020: VPC Management & Peering
  • AWS Serverless Architecture
  • AWS Serverless Monitoring & Security
  • AWS Serverless Storage
  • AWS SysOps Associate: Monitoring, Metrics, Analysis, and Deployment
  • AWS: Cloud Primer
  • AWS: Management Tools
  • AWS: Networking
  • AWS: Other Services
  • AWS: Storage
  • AWS: Virtual Machines and Identity and Access Management
  • AWS: WorkDocs
  • AZ-103 - Microsoft Azure Administrator: Azure Active Directory
  • AZ-103 - Microsoft Azure Administrator: Azure AD Objects
  • AZ-103 - Microsoft Azure Administrator: Azure Backup and Recovery
  • AZ-103 - Microsoft Azure Administrator: Azure Hybrid Identities
  • AZ-103 - Microsoft Azure Administrator: Azure Import/Export
  • AZ-103 - Microsoft Azure Administrator: Azure Load Balancer
  • AZ-103 - Microsoft Azure Administrator: Azure Monitoring
  • AZ-103 - Microsoft Azure Administrator: Azure Multi-Factor Authentication
  • AZ-103 - Microsoft Azure Administrator: Azure Name Resolution & Network Security
  • AZ-103 - Microsoft Azure Administrator: Azure Network Monitoring
  • AZ-103 - Microsoft Azure Administrator: Azure Policies
  • AZ-103 - Microsoft Azure Administrator: Azure Resource Groups
  • AZ-103 - Microsoft Azure Administrator: Azure Storage Accounts
  • AZ-103 - Microsoft Azure Administrator: Azure Storage Accounts
  • AZ-103 - Microsoft Azure Administrator: Azure Virtual Machine Templates
  • AZ-103 - Microsoft Azure Administrator: Azure Virtual Machines (VMs)
  • AZ-103 - Microsoft Azure Administrator: Azure Virtual Network Connectivity
  • AZ-103 - Microsoft Azure Administrator: Azure Virtual Networks
  • AZ-103 - Microsoft Azure Administrator: Integrating Azure On-Premise & Virtual Networks
  • AZ-103 - Microsoft Azure Administrator: Managing Azure Virtual Machines
  • AZ-103 - Microsoft Azure Administrator: Subscriptions
  • AZ-104 - Microsoft Azure Administrator: Availability Solutions
  • AZ-104 - Microsoft Azure Administrator: Azure App Service & Batch Jobs
  • AZ-104 - Microsoft Azure Administrator: Azure Policies
  • AZ-104 - Microsoft Azure Administrator: Manage Azure AD Groups & Devices
  • AZ-104 - Microsoft Azure Administrator: Manage Azure AD Subscriptions and Costs
  • AZ-104 - Microsoft Azure Administrator: Manage Azure AD Users
  • AZ-104 - Microsoft Azure Administrator: Managing Azure DNS & Network Security
  • AZ-104 - Microsoft Azure Administrator: Managing Azure Files
  • AZ-104 - Microsoft Azure Administrator: Managing Azure Network Solutions
  • AZ-104 - Microsoft Azure Administrator: Managing Azure Roles & Tags
  • AZ-104 - Microsoft Azure Administrator: Managing Azure Storage Accounts
  • AZ-104 - Microsoft Azure Administrator: Managing Azure Virtual Machines
  • AZ-104 - Microsoft Azure Administrator: Monitoring Azure Resources
  • AZ-300 - Microsoft Azure Architect Technologies: Architect Azure Networking
  • AZ-300 - Microsoft Azure Architect Technologies: Architecting Azure Solutions I
  • AZ-300 - Microsoft Azure Architect Technologies: Architecting Azure Solutions II
  • AZ-300 - Microsoft Azure Architect Technologies: Architecting Azure Storage
  • AZ-300 - Microsoft Azure Architect Technologies: Azure AD Connect
  • AZ-300 - Microsoft Azure Architect Technologies: Azure AD MFA
  • AZ-300 - Microsoft Azure Architect Technologies: Azure Monitoring
  • AZ-300 - Microsoft Azure Architect Technologies: Azure Roles and Policies
  • AZ-300 - Microsoft Azure Architect Technologies: Azure Virtual Machines
  • AZ-300 - Microsoft Azure Architect Technologies: Azure Web Apps
  • AZ-300 - Microsoft Azure Architect Technologies: DevOps & Azure
  • AZ-300 - Microsoft Azure Architect Technologies: High Availability
  • AZ-300 - Microsoft Azure Architect Technologies: Managing Azure
  • AZ-300 - Microsoft Azure Architect Technologies: Managing Azure Costs
  • AZ-301 - Microsoft Azure Architect Design: Azure AD & RBAC Design
  • AZ-301 - Microsoft Azure Architect Design: Azure AD Connect, MFA, & SSO Design
  • AZ-301 - Microsoft Azure Architect Design: Azure AD Permissions Design
  • AZ-301 - Microsoft Azure Architect Design: Azure App Design
  • AZ-301 - Microsoft Azure Architect Design: Azure Compute Design
  • AZ-301 - Microsoft Azure Architect Design: Azure Cost Management
  • AZ-301 - Microsoft Azure Architect Design: Azure DevOps Planning
  • AZ-301 - Microsoft Azure Architect Design: Azure Key Vault and Key Design
  • AZ-301 - Microsoft Azure Architect Design: Azure Migration Planning
  • AZ-301 - Microsoft Azure Architect Design: Azure Network Design
  • AZ-301 - Microsoft Azure Architect Design: Azure Policy Planning
  • AZ-301 - Microsoft Azure Architect Design: Azure Service Design Part 1
  • AZ-301 - Microsoft Azure Architect Design: Azure Service Design Part 2
  • AZ-301 - Microsoft Azure Architect Design: Azure Site Recovery Design
  • AZ-301 - Microsoft Azure Architect Design: Azure Storage Design
  • AZ-301 - Microsoft Azure Architect Design: Azure VPN Design
  • AZ-400 - MS Azure DevOps Solutions: Application Configuration & Secrets
  • AZ-400 - MS Azure DevOps Solutions: Azure DevOps Infrastructure
  • AZ-400 - MS Azure DevOps Solutions: Dependency Management & Security Compliance
  • AZ-400 - MS Azure DevOps Solutions: Design & Implement Agile Work Management Approach
  • AZ-400 - MS Azure DevOps Solutions: Design a Quality Strategy & Secure Development Process
  • AZ-400 - MS Azure DevOps Solutions: Design and Set Up Release Strategy & Workflow
  • AZ-400 - MS Azure DevOps Solutions: Implement Continuous Feedback
  • AZ-400 - MS Azure DevOps Solutions: Implement Deployment Patterns
  • AZ-400 - MS Azure DevOps Solutions: Implement Infrastructure as Code
  • AZ-400 - MS Azure DevOps Solutions: Infrastructure as Code & Security Compliance
  • AZ-400 - MS Azure DevOps Solutions: Manage Code Quality & Security Policies
  • AZ-400 - MS Azure DevOps Solutions: Migration & Consolidation Strategy for Tools
  • AZ-400 - MS Azure DevOps Solutions: Tool Integration
  • AZ-400 - MS Azure DevOps Solutions: Version & Source Control
  • AZ-500 - Microsoft Azure Security Technologies: Application Containers
  • AZ-500 - Microsoft Azure Security Technologies: Azure AD Connect
  • AZ-500 - Microsoft Azure Security Technologies: Azure AD Group Management
  • AZ-500 - Microsoft Azure Security Technologies: Azure AD User Management
  • AZ-500 - Microsoft Azure Security Technologies: Azure Key Vault
  • AZ-500 - Microsoft Azure Security Technologies: Azure RBAC & Policies
  • AZ-500 - Microsoft Azure Security Technologies: Azure Security Center
  • AZ-500 - Microsoft Azure Security Technologies: Azure Storage Account Security
  • AZ-500 - Microsoft Azure Security Technologies: Data Classification
  • AZ-500 - Microsoft Azure Security Technologies: Database Security
  • AZ-500 - Microsoft Azure Security Technologies: Database User Access
  • AZ-500 - Microsoft Azure Security Technologies: Identity & Access Management
  • AZ-500 - Microsoft Azure Security Technologies: Monitoring, Logging, & Alerts
  • AZ-500 - Microsoft Azure Security Technologies: Network Security
  • AZ-500 - Microsoft Azure Security Technologies: Review Course 1
  • AZ-500 - Microsoft Azure Security Technologies: Review Course 2
  • AZ-500 - Microsoft Azure Security Technologies: VM Security
  • AZ-500 - Microsoft Azure Security Technologies: VPNs
  • AZ-500 - Microsoft Azure Security Technologies: Web Application Security
  • Azure Active Directory and Authentication
  • Azure Active Directory and Collaboration
  • Azure App Services
  • Azure Backup and Recovery
  • Azure Blob Storage
  • Azure Developer: Advanced Scalability Using Azure
  • Azure Developer: Advanced Security & Integration Using Azure Services
  • Azure Developer: Azure Batch & Scheduling Bulk Operations
  • Azure Developer: Azure Cloud Technology Solutions
  • Azure Developer: Blob Storage Solutions
  • Azure Developer: Caching & Content Delivery Solutions
  • Azure Developer: Common Application Design & Connectivity Patterns
  • Azure Developer: Cosmos DB Storage Solutions
  • Azure Developer: Creating Mobile Apps
  • Azure Developer: File Storage Solutions
  • Azure Developer: Implementing Authentication & Access Control
  • Azure Developer: Implementing Secure Data Solutions
  • Azure Developer: Kubernetes Service Solutions
  • Azure Developer: Media Services Solutions
  • Azure Developer: PaaS Web Applications
  • Azure Developer: Relational Database Solutions
  • Azure Developer: Storage Solutions
  • Azure Developer: Storage Tables
  • Azure Developer: Working With Azure Functions
  • Azure Developer: Working with Azure Logic Apps
  • Azure Developer: Working with Azure Service Fabric
  • Azure DevOps: Managing Agile Lifecycle
  • Azure DevOps: Repository & Pipeline Management
  • Azure Diagnostics, Debugging, and Access Control Service
  • Azure Functions and API Management
  • Azure Fundamentals: Azure Data Privacy
  • Azure Fundamentals: Azure Network Security
  • Azure Fundamentals: Azure Security Services
  • Azure Fundamentals: Big Data Analytics
  • Azure Fundamentals: Cloud Computing
  • Azure Fundamentals: Database Solutions
  • Azure Fundamentals: IoT & AI
  • Azure Fundamentals: Monitoring the Azure Environment
  • Azure Fundamentals: Network Components
  • Azure Fundamentals: Storage Components
  • Azure Fundamentals: The Ecosystem
  • Azure Fundamentals: Virtual Machines
  • Azure High Availability Solutions
  • Azure Networking
  • Azure Scalability
  • Azure Security and Monitoring
  • Azure Service Fabric Apps
  • Azure Services
  • Azure SQL Database and Caching
  • Azure SQL Database Encryption
  • Azure SQL Database Security
  • Azure SQL DB and ARM Templates
  • Azure Storage
  • Azure Storage and the Azure Environment
  • Azure Storage Tables and Queues
  • Azure Subscription Messages, Security, and Troubleshooting
  • Azure Virtual Machine Management
  • Azure Virtual Machines
  • Azure Virtual Machines
  • Azure VM Monitoring and Availability
  • Azure VM Scaling and Storage
  • Azure, Node.js, and SQL Server
  • Background Tasks and Reusable Components
  • Backing Up, Recovering, Importing, and Exporting Data in Oracle Database 12c
  • Balancing the Four Vs of Data: The Four Vs of Data
  • Base SAS 9 Programming: Creating Reports
  • Base SAS 9 Programming: Data Structures
  • Base SAS 9 Programming: Inputs and Outputs
  • Base SAS 9 Programming: Introduction to Data Sets
  • Base SAS 9 Programming: The SAS Environment
  • Base SAS 9 Programming: Working with Data Sets
  • Bash Advanced Scripting and File I/O
  • Bash Scripting Flow Control and Data Types
  • Basic Coding with Adobe Dreamweaver CC 2015
  • Basic Concepts of a Microservices Architecture
  • Basic Probability and Statistical Distributions in Six Sigma
  • Basic Programming in Force.com
  • Basic SCCM Maintenance and Managing Operating System Deployment
  • Basic Six Sigma Statistics
  • Basics of Hypothesis Testing and Tests for Means in Six Sigma
  • Basics of Six Sigma Project Management
  • Batch Solutions with Hive and Apache Pig
  • Bayesian Methods: Advanced Bayesian Computation Model
  • Bayesian Methods: Bayesian Concepts & Core Components
  • Bayesian Methods: Implementing Bayesian Model and Computation with PyMC
  • BDD Testing with Cucumber
  • Beginning AngularJS
  • Beginning Cucumber and Behavior-driven Development
  • Beginning Object-Oriented Design
  • Being an Effective Team Member
  • Being an Effective Team Member
  • Best Practices for DevOps Implementation
  • BI with QlikView: Application Deployment and Performance
  • BI with QlikView: Dashboards and Comparative Analysis
  • BI with QlikView: Data Governance and Metadata Management
  • BI with QlikView: Data Modeling
  • BI with QlikView: Getting Started
  • BI with QlikView: Macros and Properties
  • BI with QlikView: Scripting and Designing
  • BI with QlikView: Server
  • Big Data - The Legal Perspective
  • Big Data Corporate Leadership Perspective
  • Big Data Engineering Perspectives
  • Big Data Fundamentals
  • Big Data Interpretation
  • Big Data Marketing Perspective
  • Big Data Opportunities and Challenges
  • Big Data Sales Perspective
  • Big Data Strategic Planning
  • Bitcoin Internals and Wallet Configuration
  • Bitcoin Technology Fundamentals
  • Blockchain and Your Business
  • Blockchain Architectural Components and Platforms
  • Blockchain in Action and IoT
  • Blockchain Trust and Design
  • Blockchains & Ethereum: Introduction
  • Blockchains & Ethereum: Mining and Smart Contracts in Ethereum
  • Blockchains & Ethereum: Performing Transactions in Ethereum
  • Bootstrap and Dashboards with Angular 5
  • Bootstrap Environment, Requirements, and Setup
  • Bootstrap Forms and Layout
  • Build & Integrate React Applications with Redux Capabilities
  • Build and Test SPA Using React and Redux
  • Build Apps Using React: Advanced Features in React
  • Build Apps Using React: In Development & Production
  • Build Apps Using React: Introducing React for Web Applications
  • Build Apps Using React: Local Machine & Online Playgrounds
  • Build Apps Using React: Props & State
  • Build Apps Using React: Working with Events
  • Build Apps Using React: Working with Forms
  • Building & Implementing Test Automation Frameworks
  • Building a Microservice in .NET Core
  • Building an API Project in ASP.NET
  • Building Data Pipelines
  • Building Decentralized Applications for Ethereum: An Introduction to dApps
  • Building Decentralized Applications for Ethereum: Bespoke Ethereum Tokens
  • Building Decentralized Applications for Ethereum: Building the Back End
  • Building Decentralized Applications for Ethereum: Building the Front End
  • Building Dynamic Web Sites with MySQL and PHP
  • Building ML Training Sets: Introduction
  • Building ML Training Sets: Preprocessing Datasets for Classification
  • Building ML Training Sets: Preprocessing Datasets for Linear Regression
  • Building Simple Applications
  • Building Solutions using Kafka and HBase
  • Building the Foundation for an Effective Team
  • Building the Puppet Environment
  • Building the Team Foundation Server Environment
  • Building Web Apps Using Django: Building a Basic Website
  • Building Web Apps Using Django: Generic Views
  • Building Web Apps Using Django: Implementing Login & Logout
  • Building Web Apps Using Django: Introduction to Web Frameworks & Django
  • Building Web Apps Using Django: Models & User Registration
  • Building Web Apps Using Django: Templates & User Administration
  • Business Analysis Activities and Tools
  • Business Analysis Analytical Techniques
  • Business Analysis and RADD: Design Definition
  • Business Analysis and RADD: Requirements Definition
  • Business Analysis and Requirements Life Cycle Management
  • Business Analysis and Solution Evaluation
  • Business Analysis and Strategy Analysis
  • Business Analysis Competencies: Personal Skills
  • Business Analysis Documentation and Criteria
  • Business Analysis Elicitation and Collaboration
  • Business Analysis for Project Management: Practices for Early Project Stages
  • Business Analysis for Project Management: Practices for Later Project Stages
  • Business Analysis Overview
  • Business Analysis Perspectives
  • Business Analysis Planning and Monitoring
  • Business Analysis Professional Effectiveness Competencies
  • Business Analysis Requirements Elicitation
  • Business Analysis Requirements Management and Communication
  • Business Analysis: Enterprise Analysis
  • Business Analysis: Introduction to Requirements Analysis
  • Business Analysis: Solution Assessment and Validation
  • Business Analysis: Verify and Validate Requirements
  • Business Continuity: Cloud Integration
  • Business Continuity: Secure Cloud Computing
  • Business Intelligence: Project Data Analysis
  • Business Management and Strategy: HR and the Strategic Planning Process
  • Business Management and Strategy: HR Functions and Roles
  • Business Management and Strategy: The HR Function and Business Environment
  • Business Orientation: Strategic Organizational Goals
  • Business Strategy: Managing Organizational Value
  • C++ Classes
  • C++ Classes and Object-oriented Programming
  • C++ Fundamentals
  • C++ Standard Template Library Algorithms and Operations
  • C++ Templates and Containers
  • C++11: Programming Fundamentals
  • Capacity Management for Hadoop Clusters
  • Capturing, Analyzing, and Using Project Lessons Learned
  • Cassandra vs. SQL
  • CCENT: Access Control Lists Part 1
  • CCENT: Access Control Lists Part 2
  • CCENT: Device Hardening
  • CCENT: Device Management
  • CCENT: DHCP Configuration
  • CCENT: Discovering Ethernet
  • CCENT: Discovery Protocols
  • CCENT: DNS Configuration
  • CCENT: Functions of Routing
  • CCENT: Initial Device Configuration
  • CCENT: Interswitch Connectivity
  • CCENT: InterVLAN Routing
  • CCENT: IPv4 Addressing Part 1
  • CCENT: IPv4 Addressing Part 2
  • CCENT: IPv4 Configuration
  • CCENT: IPv6 Addressing
  • CCENT: IPv6 Configuration
  • CCENT: NAT Configuration
  • CCENT: Network Cabling
  • CCENT: Network Components, Topologies, and Architecture
  • CCENT: NTP Configuration
  • CCENT: OSI Model
  • CCENT: Overview of Cisco Devices
  • CCENT: Overview of Networking
  • CCENT: Port Security
  • CCENT: RIPv2 Configuration
  • CCENT: Static Routing
  • CCENT: Subnetting Part 1
  • CCENT: Subnetting Part 2
  • CCENT: Subnetting Practice
  • CCENT: Switching Functions
  • CCENT: TCP/IP Model
  • CCENT: Troubleshooting Interfaces and Cables
  • CCENT: Troubleshooting Methodologies
  • CCENT: VLAN Configuration
  • CCNA 2020: AAA Security & VPN Types
  • CCNA 2020: APIs & Cisco DNA Center
  • CCNA 2020: Automation, Network Programmability, & SDN Architectures
  • CCNA 2020: Cisco Wireless Architecture & WLAN Components
  • CCNA 2020: Cisco WLC Configuration & Wireless Management Access
  • CCNA 2020: Configuration Management & JSON Encoded Data
  • CCNA 2020: Configuring & Verifying ACLs
  • CCNA 2020: Configuring & Verifying NAT
  • CCNA 2020: Configuring Port Security, DHCP Snooping, & DAI
  • CCNA 2020: Configuring SSH, FTP, & TFTP
  • CCNA 2020: Dynamic Routing
  • CCNA 2020: IP Addressing Basics & Configuration
  • CCNA 2020: IPv4 Subnetting
  • CCNA 2020: IPv6 Addressing & Configuration
  • CCNA 2020: IT Security Concepts
  • CCNA 2020: L2 Discovery Protocols & L2 and L3 EtherChannel Configuration
  • CCNA 2020: Layer 1 Interfaces & Cabling
  • CCNA 2020: Layer 1 Physical & Configuration Issues
  • CCNA 2020: Network Access, VLAN Configuration, & Interswitch Connectivity
  • CCNA 2020: Network Topology Architectures
  • CCNA 2020: Network Topology Architectures - WAN, Cloud, & SOHO
  • CCNA 2020: Networking Components
  • CCNA 2020: Networking Components - NGFW, NGIPS, & Cisco DNA Center
  • CCNA 2020: Networking Protocols
  • CCNA 2020: NTP, DNS, & DHCP
  • CCNA 2020: Security Program &Password Policy Components
  • CCNA 2020: SNMP, Syslog, & PHB for QoS
  • CCNA 2020: Spanning Tree Protocol
  • CCNA 2020: Static Routing
  • CCNA 2020: Virtualization Concepts
  • CCNA 2020: WLCs, Access Points, Servers, & Endpoints
  • CCSP 2019: Application Development & Security
  • CCSP 2019: Cloud Infrastructure
  • CCSP 2019: Cloud System Architecture Design
  • CCSP 2019: Data Center Security
  • CCSP 2019: Data Retention & Events
  • CCSP 2019: Data Security Technologies
  • CCSP 2019: Identity & Access Management
  • CCSP 2019: Implementing Data Discovery & Classification
  • CCSP 2019: Managing & Securing Cloud Infrastructure
  • CCSP 2019: Operational Controls & Standards
  • CCSP 2019: Secure Cloud Computing
  • CEHv10: Common Web App Threats
  • CEHv10: Denial of Service
  • CEHv10: Ethical Hacking Overview and Threats
  • CEHv10: Evading IDS, Firewalls, and Honeypots Part 2
  • CEHv10: Footprinting
  • CEHv10: Hacking Concepts
  • CEHv10: Hacking Web Servers
  • CEHv10: Hidden Files and Covering Tracks
  • CEHv10: Host Discovery and Scanning with Nmap
  • CEHv10: IoT Hacking and Countermeasures
  • CEHv10: Network Sniffing
  • CEHv10: Password Attacks
  • CEHv10: Password Attacks Part 2
  • CEHv10: Pentesting, Laws, and Standards
  • CEHv10: ProxyChains and Enumeration
  • CEHv10: Security Controls
  • CEHv10: Security Controls Part 2
  • CEHv10: SQL Injection
  • CEHv10: Vulnerability Analysis Concepts and Tools
  • CEHv10: Wireless Hacking Concepts
  • Certificate Services, SANs, and High Availability in Windows Server 2008
  • Certified Business Analysis Professional
  • Certified Ethical Hacker - CEHv10: Cloud Computer Attacks
  • Certified Ethical Hacker - CEHv10: Clouding Computing Concepts
  • Certified Ethical Hacker - CEHv10: Common Web App Threats Part 2
  • Certified Ethical Hacker - CEHv10: Covert Data Gathering
  • Certified Ethical Hacker - CEHv10: Cracking and Mobile Hacking
  • Certified Ethical Hacker - CEHv10: Cryptography Attacks
  • Certified Ethical Hacker - CEHv10: Cryptography Concepts
  • Certified Ethical Hacker - CEHv10: Cryptography Concepts Part 2
  • Certified Ethical Hacker - CEHv10: Cryptography Concepts Part 3
  • Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots
  • Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots Part 3
  • Certified Ethical Hacker - CEHv10: IoT Attacks
  • Certified Ethical Hacker - CEHv10: IoT Concepts
  • Certified Ethical Hacker - CEHv10: Malware Distribution
  • Certified Ethical Hacker - CEHv10: Malware Threats
  • Certified Ethical Hacker - CEHv10: Practical Web App Hacking
  • Certified Ethical Hacker - CEHv10: Privilege Escalation
  • Certified Ethical Hacker - CEHv10: Session Hijacking
  • Certified Ethical Hacker - CEHv10: Social Engineering
  • Certified Ethical Hacker - CEHv10: SQL Injection Types and Tools
  • Certified Ethical Hacker - CEHv10: Wireless Hacking Common Threats
  • Certified Ethical Hacker - CEHv10: Wireless Hacking Tools
  • Certified Information Systems Auditor (CISA) 2019: BCP & Network Security
  • Certified Information Systems Auditor (CISA) 2019: Continuous Monitoring
  • Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk
  • Certified Information Systems Auditor (CISA) 2019: Data Storage & Malware
  • Certified Information Systems Auditor (CISA) 2019: Digital Asset Protection
  • Certified Information Systems Auditor (CISA) 2019: Digital Evidence Gathering
  • Certified Information Systems Auditor (CISA) 2019: IAM & Data Classification
  • Certified Information Systems Auditor (CISA) 2019: Information System Auditing
  • Certified Information Systems Auditor (CISA) 2019: IT Management Frameworks
  • Certified Information Systems Auditor (CISA) 2019: Performance & Management
  • Certified Information Systems Auditor (CISA) 2019: PKI & Data Protection
  • Certified Information Systems Auditor (CISA) 2019: Scenario-Based Practice
  • Certified Information Systems Auditor (CISA) 2019: System Design & Analysis
  • Certified Information Systems Auditor (CISA) 2019: Testing & Vulnerability
  • Certified Information Systems Auditor (CISA) 2019: Virtualization & Cloud
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Abuse Cases & RTMs
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Architectural Risk Assessment, Secure
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Data Classification
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Governance, Risk, & Compliance
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Privacy
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Design Principles
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Lifecycle Management
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Software Testing
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Architecture
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Design Principles
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Requirements
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Vulnerabilities
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Software Deployment & Management
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Supply Chain & Software Acquisition
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Technologies
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Testing for Security & Quality Assura
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Testing Types
  • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Threat Modeling
  • Changes to CISSP 2015
  • Chatting and Conferencing
  • Chef for DevOps: Automate Infrastructure Using Chef Tools & Templates
  • Chef for DevOps: Managing Infrastructure Using Chef
  • Chef Server Basics
  • CI/CD Best Practices: Applying Automated Testing
  • CI/CD Implementation for DevOps
  • CI/CD Pipelines: Full Stack Developer CI/CD
  • CISA Domain: The Process of Auditing Information Systems - Part 1
  • CISA: Governance and Management of IT - Part 1
  • CISA: Governance and Management of IT - Part 2
  • CISA: Information Systems Acquisition, Development, and Implementation
  • CISA: Information Systems Operations, Maintenance, and Service Management
  • CISA: Protection of Information Assets - Part 1
  • CISA: Protection of Information Assets - Part 2
  • CISA: The Process of Auditing Information Systems - Part 1
  • CISA: The Process of Auditing Information Systems - Part 2
  • Cisco SWITCH 2.0: Trunking Using VTP
  • CISM: Information Risk Management Part 1
  • CISM: Information Risk Management Part 2
  • CISM: Information Security Governance Part 1
  • CISM: Information Security Governance Part 2
  • CISM: Information Security Incident Management Part 1
  • CISM: Information Security Incident Management Part 2
  • CISM: Information Security Program Development and Management Part 1
  • CISM: Information Security Program Development and Management Part 2
  • CISSP 2013 Domain: Cryptography
  • CISSP 2013 Domain: Operations Security
  • CISSP 2018 : Communication and Network Security
  • CISSP 2018: (ISC)² and Security Fundamentals
  • CISSP 2018: Conducting Incident Management
  • CISSP 2018: Cryptographic Client-based Systems
  • CISSP 2018: Identity and Access Management (IAM)
  • CISSP 2018: Security and Risk Management (Part 1)
  • CISSP 2018: Security and Risk Management (Part 2)
  • CISSP 2018: Security Architecture and Engineering (Part 1)
  • CISSP 2018: Security Architecture and Engineering (Part 2)
  • CISSP 2018: Security Assessment and Testing
  • CISSP 2018: Security Operations (Part 1)
  • CISSP 2018: Security Operations (Part 2)
  • CISSP 2018: Site and Facility Security Controls
  • CISSP 2018: Software Development Security
  • CISSP: Asset Security
  • CISSP: Communication & Network Security Design
  • CISSP: Identity and Access Management
  • CISSP: Risk Management
  • CISSP: Security Assessment and Testing
  • CISSP: Security Engineering Part 1
  • CISSP: Security Engineering Part 2
  • CISSP: Security Operations Part 1
  • CISSP: Security Operations Part 2
  • CISSP: Security Operations Part 3
  • CISSP: Security Principles, Governance, and Guidelines
  • CISSP: Software Development Security
  • Classes, Functions, and Object-oriented Programming
  • Classifying and Collecting Data
  • CLDFND: Block & File Storage Access
  • CLDFND: Block & File Storage Access
  • CLDFND: Cisco Application Centric Infrastructure
  • CLDFND: Cisco Application Centric Infrastructure
  • CLDFND: Cisco Cloud Virtualization
  • CLDFND: Cisco Cloud Virtualization
  • CLDFND: Cisco CloudCenter
  • CLDFND: Cisco CloudCenter
  • CLDFND: Cisco CloudCenter Components
  • CLDFND: Cisco CloudCenter Components
  • CLDFND: Cisco UCS
  • CLDFND: Cisco UCS
  • CLDFND: Cisco Unified Fabric
  • CLDFND: Cisco Unified Fabric
  • CLDFND: Cloud Characteristics
  • CLDFND: Cloud Characteristics
  • CLDFND: Cloud Service Models
  • CLDFND: Cloud Service Models
  • CLDFND: Community & Hybrid Cloud
  • CLDFND: Community & Hybrid Cloud
  • CLDFND: IaaS, PaaS, & SaaS
  • CLDFND: IaaS, PaaS, & SaaS
  • CLDFND: Integrated Infrastructure & Cisco InterCloud Fabric
  • CLDFND: Integrated Infrastructure & Cisco InterCloud Fabric
  • CLDFND: Public & Private Cloud Deployment Models
  • CLDFND: Public & Private Cloud Deployment Models
  • CLDFND: SAN, NAS, & Cisco Storage Network Devices
  • CLDFND: SAN, NAS, & Cisco Storage Network Devices
  • CLDFND: Server & Infrastructure Virtualization
  • CLDFND: Server & Infrastructure Virtualization
  • CLDFND: Software-Defined Networking
  • CLDFND: Software-Defined Networking
  • CLDFND: Storage Access Technologies
  • CLDFND: Storage Access Technologies
  • CLDFND: Storage Provisioning
  • CLDFND: Storage Provisioning
  • CLDFND: Virtual Application Containers
  • CLDFND: Virtual Application Containers
  • CLDFND: Virtual Networking Services
  • CLDFND: Virtual Networking Services
  • CLDFND: VLANs & VXLANs
  • CLDFND: VLANs & VXLANs
  • CLI Cloud Resource Management
  • Client Configuration
  • Client Connectivity and Administrator Roles in Office 365
  • Client-side Routing and Using HTTP
  • Clojure Data-Driven and Web Application Fundamentals
  • Clojure Fundamentals
  • Cloud Application Security
  • Cloud Blockchains: An Introduction to Blockchain on the Cloud
  • Cloud Blockchains: Building Apps on the Azure Blockchain Workbench
  • Cloud Blockchains: Multi-Organization Networks on Amazon Managed Blockchain
  • Cloud Blockchains: Single Organization Networks on Amazon Managed Blockchain
  • Cloud Computing for the Business User: Concepts and Moving to the Cloud
  • Cloud Computing Fundamentals: Cloud Security
  • Cloud Computing Fundamentals: Identity, Presence, and Privacy
  • Cloud Computing Fundamentals: Migrating to the Cloud
  • Cloud Computing Fundamentals: Overview
  • Cloud Computing Fundamentals: Storing and Managing Cloud Data
  • Cloud Computing Fundamentals: Virtualization and Data Centers
  • Cloud Computing Security: Cloud Management
  • Cloud Data Platform Solutions: SQL Databases
  • Cloud Data Science: Azure AI Gallery and Azure Machine Learning
  • Cloud Data Science: Consume Models and APIs Using Azure Machine Learning Studio
  • Cloud Data Science: Data Cleanup with Azure Machine Learning Studio
  • Cloud Data Science: Deploying Models with Azure Machine Learning Studio
  • Cloud Data Science: Importing and Exporting in Azure Machine Learning Studio
  • Cloud Data Science: Introduction to Azure Machine Learning
  • Cloud Data Science: Microsoft Cognitive Toolkit and Azure Machine Learning
  • Cloud Data Science: Optimize and Validate Models in Azure Machine Learning Studio
  • Cloud Data Science: SQL Server & Azure Machine Learning
  • Cloud Data Science: Summarize Data with Azure Machine Learning Studio
  • Cloud Data Science: Transforming Data in Azure Machine Learning Studio
  • Cloud Data Science: Using Algorithms in Azure Machine Learning Studio
  • Cloud Data Science: Virtual Machines & HDInsight
  • Cloud Data Security
  • Cloud Foundry Architecture
  • Cloud Foundry Command Line Interface
  • Cloud Foundry Overview
  • Cloud Identity Management
  • Cloud Security Administration: Introduction
  • Cloud Service – Legal and Compliance
  • Cloud Service – Operations Management
  • Cloud Services and Enterprise Mobility
  • Cloud Services: Cloud Computing Concepts
  • Cloud Solution Management & Testing
  • Cloud System Architecture – Concepts and Design
  • Cloud System Security - Platform and Infrastructure
  • Cloudera Manager and Hadoop Clusters
  • CloudOps with Azure DevOps Tools
  • CloudOps with Google Cloud Platform Tools
  • CloudOps with Infrastructure as Code
  • Cluster Analysis and Ensemble Learning
  • Clustering Techniques
  • Clustering with Kafka
  • Clustering with VMWare 6.5
  • COBIT 5 Principles and Implementation
  • Code Access Security and Cryptography in .NET
  • Collaboration in Exchange 2016
  • Columnstore Indexes
  • Common DFSS Methodologies, Design for X, and Robust Designs
  • Common Widgets and Animation
  • Communicating Effectively with Customers
  • Communicating with WebSockets and Utilizing Asynchronous Processing
  • Communication Skills
  • Communication, Changes, and Documentation
  • Communications and Security in Windows Server 2008
  • Community Cookbooks and Chef Server Patterns
  • Comparing Manual & Automated Testing
  • Compensation and Benefits: Managing Policies, Programs, and Activities
  • Compensation and Benefits: Organizational Responsibilities
  • Compensation and Benefits: Regulations, Strategies, and Needs Assessment
  • Complex Application Development with Backbone.js
  • Complex Data Types in Python: Shallow & Deep Copies in Python
  • Complex Data Types in Python: Working with Dictionaries & Sets in Python
  • Complex Data Types in Python: Working with Lists & Tuples in Python
  • Complex TestNG Integrations and Implementations
  • Complex Visualizations and Analytics
  • Compliance Issues and Strategies: Data Compliance
  • Components of a SQL Server 2016 Installation
  • Components of Domain-driven Design
  • Composing the UI Layout of an Application
  • Composing the UI Layout of an Application
  • Comprehensive JMeter Operations
  • CompTIA A+ 220-1001: Accessories and Mobile Device Synchronization
  • CompTIA A+ 220-1001: Basic Cable Types
  • CompTIA A+ 220-1001: Cloud Computing
  • CompTIA A+ 220-1001: Common Devices
  • CompTIA A+ 220-1001: Configuring a Wired/Wireless Network
  • CompTIA A+ 220-1001: Connectors
  • CompTIA A+ 220-1001: Custom PC configuration
  • CompTIA A+ 220-1001: Implementing Network Concepts
  • CompTIA A+ 220-1001: Installing Hardware and Display Components
  • CompTIA A+ 220-1001: Installing Hardware and Display Components
  • CompTIA A+ 220-1001: Laptops Features and Mobile Device Types
  • CompTIA A+ 220-1001: Laptops Features and Mobile Device Types
  • CompTIA A+ 220-1001: Mobile Device Network Connectivity and Application Support
  • CompTIA A+ 220-1001: Network Hosts
  • CompTIA A+ 220-1001: Network Types
  • CompTIA A+ 220-1001: Networking
  • CompTIA A+ 220-1001: Networking Tools
  • CompTIA A+ 220-1001: Power Supplies
  • CompTIA A+ 220-1001: Printers
  • CompTIA A+ 220-1001: Random Access Memory
  • CompTIA A+ 220-1001: Resolving Problems
  • CompTIA A+ 220-1001: SOHO Devices
  • CompTIA A+ 220-1001: Storage Solutions
  • CompTIA A+ 220-1001: TCP and UDP ports
  • CompTIA A+ 220-1001: Troubleshooting
  • CompTIA A+ 220-1001: Troubleshooting Printers
  • CompTIA A+ 220-1001: Virtualization
  • CompTIA A+ 220-1001: Wireless Networking Protocols
  • CompTIA A+ 220-1001: Working with Motherboards, CPUs, & Add-On Cards
  • CompTIA A+ 220-1001: Working with Peripheral Devices
  • CompTIA A+ 220-1002: Comparing Common Operating Systems
  • CompTIA A+ 220-1002: Critical Security Concepts
  • CompTIA A+ 220-1002: Microsoft Command Line Tools
  • CompTIA A+ 220-1002: Microsoft Operating System Installation & Upgrade
  • CompTIA A+ 220-1002: MS Operating System Administrative Tools
  • CompTIA A+ 220-1002: Operational Procedures Best Practices
  • CompTIA A+ 220-1002: Security Fundamentals
  • CompTIA A+ 220-1002: System Utilities
  • CompTIA A+ 220-1002: Windows Control Panel Utilities
  • CompTIA A+ 220-801 Expert Encore
  • CompTIA A+ 220-801: BIOS and Motherboards
  • CompTIA A+ 220-801: Laptops
  • CompTIA A+ 220-801: Network Cabling, IP Addressing, Ports, and Protocols
  • CompTIA A+ 220-801: Networking Technologies
  • CompTIA A+ 220-802 Expert Encore
  • CompTIA A+ 220-802: Mobile Devices
  • CompTIA A+ 220-802: System Troubleshooting
  • CompTIA A+ 220-901 Expert Encore
  • CompTIA A+ 220-901: Computer Hardware Troubleshooting
  • CompTIA A+ 220-901: Internet Connectivity
  • CompTIA A+ 220-901: Laptops
  • CompTIA A+ 220-901: Memory and Storage
  • CompTIA A+ 220-901: Mobile Devices
  • CompTIA A+ 220-901: Monitors and Output Devices
  • CompTIA A+ 220-901: Networking
  • CompTIA A+ 220-901: PC Components
  • CompTIA A+ 220-901: Printers
  • CompTIA A+ 220-901: Troubleshooting Networking Devices
  • CompTIA A+ 220-901: Troubleshooting Printers
  • CompTIA A+ 220-902 Expert Encore
  • CompTIA A+ 220-902: A Practical Approach to Troubleshooting
  • CompTIA A+ 220-902: Adding Hardware to Windows and Storage Options
  • CompTIA A+ 220-902: Common Troubleshooting and Security Practices
  • CompTIA A+ 220-902: Desktop Security
  • CompTIA A+ 220-902: Introduction to Mobile Operating Systems
  • CompTIA A+ 220-902: Introduction to Virtualization and Basic Security Concepts
  • CompTIA A+ 220-902: Introduction to Windows
  • CompTIA A+ 220-902: Mac OSX Features and an Introduction to Linux
  • CompTIA A+ 220-902: Mobile Troubleshooting
  • CompTIA A+ 220-902: Monitoring the Windows OS and an Introduction to Other OSs
  • CompTIA A+ 220-902: Networking with the Windows Operating System
  • CompTIA A+ 220-902: Operational Procedures
  • CompTIA A+ 220-902: Safety
  • CompTIA A+ 220-902: Shell and Terminal Commands for Linux or Mac OSX
  • CompTIA A+ 220-902: Various Features and Requirements of Microsoft OS
  • CompTIA A+ 220-902: Windows Applications and Features
  • CompTIA A+ 220-902: Windows Interaction and Personalization
  • CompTIA A+ 220-902: Windows Overview and Installation
  • CompTIA A+ 220-902: Windows Security Features and Management
  • CompTIA A+ 220-902: Windows Utilities and Management
  • CompTIA A+ Exam 220-901: BIOS and Startup
  • CompTIA A+ Exam 220-901: BIOS Motherboards
  • CompTIA A+ Exam 220-901: Broadband Routers
  • CompTIA A+ Exam 220-901: Connectors and Connections
  • CompTIA A+ Exam 220-901: CPUs
  • CompTIA A+ Exam 220-901: Different Computer Form Factors
  • CompTIA A+ Exam 220-901: Display Devices
  • CompTIA A+ Exam 220-901: Internet Connections
  • CompTIA A+ Exam 220-901: Introduction to Networking
  • CompTIA A+ Exam 220-901: Miscellaneous Tools and Connectors
  • CompTIA A+ Exam 220-901: Mobile Computing
  • CompTIA A+ Exam 220-901: Motherboards
  • CompTIA A+ Exam 220-901: Network Protocols and Cabling
  • CompTIA A+ Exam 220-901: Peripheral Devices
  • CompTIA A+ Exam 220-901: Portable Computer Hardware
  • CompTIA A+ Exam 220-901: Printer Maintenance
  • CompTIA A+ Exam 220-901: Printers
  • CompTIA A+ Exam 220-901: RAM
  • CompTIA A+ Exam 220-901: Storage Solutions
  • CompTIA A+ Exam 220-901: Troubleshooting Peripheral and Mobile Devices
  • CompTIA A+ Exam 220-901: Troubleshooting Printers
  • CompTIA A+ Exam 220-901: Wireless Networking
  • CompTIA A+ Exam 220-902: Non-desktop Technologies
  • CompTIA A+ Exam 220-902: Non-Windows Operating Systems
  • CompTIA A+ Exam 220-902: Troubleshooting
  • CompTIA A+ Exam 220-902: Using and Managing Windows
  • CompTIA A+ Exam 220-902: Windows Networking
  • CompTIA A+: Application Installation, Networking, & Tools
  • CompTIA A+: Software Troubleshooting
  • CompTIA CASP CAS-002: Advanced Network Design, Management, and Controls
  • CompTIA CASP CAS-002: Application Vulnerabilities and Security Controls
  • CompTIA CASP CAS-002: Cryptography and Enterprise Storage Concerns
  • CompTIA CASP CAS-002: Industry Influences, Risk Planning, Strategy, and Control
  • CompTIA CASP CAS-002: Integration of Computing, Communications, and Disciplines
  • CompTIA CASP CAS-002: Privacy Policies & Procedures and Incident Recovery
  • CompTIA CASP CAS-002: Research, Analysis and Assessment
  • CompTIA CASP CAS-002: Security Controls for Hosts
  • CompTIA CASP CAS-002: Technical Integration of Enterprise Components
  • CompTIA CASP+ CAS-003: Applying Research Methods for Trend and Impact Analysis
  • CompTIA CASP+ CAS-003: Business and Industry Influences and Risks
  • CompTIA CASP+ CAS-003: Conducting Security Assessments
  • CompTIA CASP+ CAS-003: Implementing Cryptographic Techniques
  • CompTIA CASP+ CAS-003: Implementing Incident Response and Recovery
  • CompTIA CASP+ CAS-003: Implementing Security Activities across the Technology Life Cycle
  • CompTIA CASP+ CAS-003: Integrating and Troubleshooting Advanced AAA Technologies
  • CompTIA CASP+ CAS-003: Integrating Cloud and Virtualization Technologies in the Enterprise
  • CompTIA CASP+ CAS-003: Integrating Controls for Mobile and Small Form Factor Devices
  • CompTIA CASP+ CAS-003: Integrating Hosts, Storage, and Applications in the Enterprise
  • CompTIA CASP+ CAS-003: Integrating Network and Security Components, Concepts, and Architectures
  • CompTIA CASP+ CAS-003: Integrating Security Controls for Host Devices
  • CompTIA CASP+ CAS-003: Interacting across Diverse Business Units
  • CompTIA CASP+ CAS-003: Organizational Security and Privacy Policies
  • CompTIA CASP+ CAS-003: Risk Metric Scenarios for Enterprise Security
  • CompTIA CASP+ CAS-003: Risk Mitigation Strategies and Controls
  • CompTIA CASP+ CAS-003: Secure Communication and Collaboration Solutions
  • CompTIA CASP+ CAS-003: Selecting Software Security Controls
  • CompTIA Cloud+ CV0-002: Disaster Recovery
  • CompTIA Cloud+ CV0-002: Performance Management
  • CompTIA Cloud+ CV0-002: Planning Cloud Compute Resources
  • CompTIA Cloud+ CV0-002: Planning Cloud Deployments
  • CompTIA Cloud+ CV0-002: Planning Cloud Migrations and Extensions
  • CompTIA Cloud+ CV0-002: Planning Cloud Networking
  • CompTIA Cloud+ CV0-002: Planning Cloud Storage Resources
  • CompTIA Cloud+ CV0-002: Security Configurations and Compliance Controls
  • CompTIA Cloud+ CV0-002: Security Technologies and Automation Techniques
  • CompTIA Cloud+ CV0-002: System Patching and Maintenance
  • CompTIA Cloud+ CV0-002: Troubleshooting Deployments
  • CompTIA Cybersecurity Analyst+ CS0-001: Investigate Security Incidents
  • CompTIA Cybersecurity Analyst+ CS0-001: Monitoring for Security Issues
  • CompTIA Cybersecurity Analyst+ CS0-001: Network Architecture and Reconnaissance
  • CompTIA Cybersecurity Analyst+ CS0-001: Reducing Vulnerabilities
  • CompTIA Cybersecurity Analyst+ CS0-001: Threat Identification
  • CompTIA Cybersecurity Analyst+ CS0-001: Threat Mitigation
  • CompTIA Linux+ 2014 Powered By LPI: LX0-103: Advanced GNU and Unix Commands
  • CompTIA Linux+ 2014 Powered By LPI: LX0-103: Devices and Filesystems
  • CompTIA Linux+ 2014 Powered By LPI: LX0-103: GNU and Unix Commands
  • CompTIA Linux+ 2014 Powered By LPI: LX0-103: Installation and Package Management
  • CompTIA Linux+ 2014 Powered By LPI: LX0-103: System Architecture
  • CompTIA Linux+ 2014 Powered By LPI: LX0-104 Essential System Services
  • CompTIA Linux+ 2014 Powered By LPI: LX0-104 Networking Fundamentals
  • CompTIA Linux+ 2014 Powered By LPI: LX0-104 Scripting and Administrative Tasks
  • CompTIA Linux+ 2014 Powered By LPI: LX0-104 Security, Data, and Accessibility
  • CompTIA Linux+ XK0-004: Backup & Restore
  • CompTIA Linux+ XK0-004: Boot Process & Kernel
  • CompTIA Linux+ XK0-004: Bourne-again Shell & Scripting
  • CompTIA Linux+ XK0-004: Disk Partitions & File Systems
  • CompTIA Linux+ XK0-004: File Access & Permissions
  • CompTIA Linux+ XK0-004: Git Version Control
  • CompTIA Linux+ XK0-004: Graphical User Interfaces
  • CompTIA Linux+ XK0-004: Installing & Managing Software
  • CompTIA Linux+ XK0-004: Installing CentOS
  • CompTIA Linux+ XK0-004: Installing Software from Source Code
  • CompTIA Linux+ XK0-004: Installing Ubuntu
  • CompTIA Linux+ XK0-004: Introduction to Linux & the Command Line
  • CompTIA Linux+ XK0-004: Locating & Manipulating Files
  • CompTIA Linux+ XK0-004: Logical Volumes & Filesystem Hierarchy
  • CompTIA Linux+ XK0-004: Managing & Configuring Hardware
  • CompTIA Linux+ XK0-004: Managing Services
  • CompTIA Linux+ XK0-004: Managing Users & Groups
  • CompTIA Linux+ XK0-004: Network Firewall & Traffic Filtering
  • CompTIA Linux+ XK0-004: Scheduling Tasks
  • CompTIA Linux+ XK0-004: Searching & Manipulating File Contents
  • CompTIA Linux+ XK0-004: Security Best Practices
  • CompTIA Linux+ XK0-004: SELinux & AppArmor
  • CompTIA Linux+ XK0-004: TCP/IP & Networking
  • CompTIA Linux+ XK0-004: Troubleshooting Network Connections
  • CompTIA Linux+ XK0-004: Troubleshooting Services
  • CompTIA Linux+ XK0-004: Using vi/vim to Edit Files
  • CompTIA Network+ N10-006 Expert Live with Encore
  • CompTIA Network+ N10-006: Industry Standards, Practices, and Network Theory
  • CompTIA Network+ N10-006: Network Architecture Part 1
  • CompTIA Network+ N10-006: Network Architecture Part 2
  • CompTIA Network+ N10-006: Network Operations Part 1
  • CompTIA Network+ N10-006: Network Operations Part 2
  • CompTIA Network+ N10-006: Network Security
  • CompTIA Network+ N10-006: Troubleshooting Part 1
  • CompTIA Network+ N10-006: Troubleshooting Part 2
  • CompTIA Network+ N10-007: Additional Network Services
  • CompTIA Network+ N10-007: Cloud Concepts, Network Services, & Cabling Solutions
  • CompTIA Network+ N10-007: Documentation and Diagrams & Business Continuity
  • CompTIA Network+ N10-007: Mitigation Techniques
  • CompTIA Network+ N10-007: Network Attacks & Device Hardening
  • CompTIA Network+ N10-007: Network Monitoring & Remote Access Methods
  • CompTIA Network+ N10-007: Network Storage, Virtualization, & WAN Technologies
  • CompTIA Network+ N10-007: Network Topologies & Technologies
  • CompTIA Network+ N10-007: Networking Devices
  • CompTIA Network+ N10-007: Policies and Best Practices
  • CompTIA Network+ N10-007: Ports and Protocols and the OSI Model
  • CompTIA Network+ N10-007: Routing, Switching, & IP Addressing
  • CompTIA Network+ N10-007: Security Devices, Wireless Security, & Access Control
  • CompTIA Network+ N10-007: Troubleshooting Common Network Service Issues
  • CompTIA Network+ N10-007: Troubleshooting Connectivity & Performance Issues
  • CompTIA Network+ N10-007: Troubleshooting Methodology & Tools
  • CompTIA PenTest+: Analyzing Tool and Script Output
  • CompTIA PenTest+: Application-Based vulnerabilities
  • CompTIA PenTest+: Information Gathering
  • CompTIA PenTest+: Local Host Vulnerabilities
  • CompTIA PenTest+: Network-Based Exploits
  • CompTIA PenTest+: Penetration Testing Tools
  • CompTIA PenTest+: Planning for an Engagement
  • CompTIA PenTest+: Post-Exploitation and Facilities Attacks
  • CompTIA PenTest+: Reporting and Communication
  • CompTIA PenTest+: Scoping an Engagement
  • CompTIA PenTest+: Social Engineering and Specialized System Attacks
  • CompTIA PenTest+: Vulnerability Identification
  • CompTIA Project+ (2009 Edition) Expert Live with Encore
  • CompTIA Project+ PK0-004 Expert Live with Encore
  • CompTIA Security+
  • CompTIA Security+ SY0-401: Cryptographic Methods and Public Key Infrastructures
  • CompTIA Security+ SY0-501 Expert Live with Encore
  • CompTIA Security+ SY0-501: Analyzing Output from Security Technologies
  • CompTIA Security+ SY0-501: Application and Service Attacks
  • CompTIA Security+ SY0-501: Business Impact Analysis and Risk Management
  • CompTIA Security+ SY0-501: Cloud, Virtualization, and Resiliency Concepts
  • CompTIA Security+ SY0-501: Common Account Management Practices
  • CompTIA Security+ SY0-501: Components Supporting Organizational Security
  • CompTIA Security+ SY0-501: Cryptographic and Wireless Attacks
  • CompTIA Security+ SY0-501: Cryptography
  • CompTIA Security+ SY0-501: Deploying Mobile Devices Securely
  • CompTIA Security+ SY0-501: Frameworks, Guidelines, and Physical Security
  • CompTIA Security+ SY0-501: Identity and Access Management Controls
  • CompTIA Security+ SY0-501: Identity Concepts and Access Services
  • CompTIA Security+ SY0-501: Impacts from Vulnerability Types
  • CompTIA Security+ SY0-501: Implement Secure Network Architecture Concepts
  • CompTIA Security+ SY0-501: Implementing Secure Protocols
  • CompTIA Security+ SY0-501: Incident Response, Forensics, and Disaster Recovery
  • CompTIA Security+ SY0-501: Penetration Testing and Vulnerability Scanning
  • CompTIA Security+ SY0-501: Policies, Plans, and Procedures
  • CompTIA Security+ SY0-501: Public Key Infrastructure
  • CompTIA Security+ SY0-501: Secure System and Application Design and Deployment
  • CompTIA Security+ SY0-501: Security Assessment Using Software Tools
  • CompTIA Security+ SY0-501: Social Engineering and Related Attacks
  • CompTIA Security+ SY0-501: The Present Threat Landscape
  • CompTIA Security+ SY0-501: Troubleshooting Common Security Issues
  • CompTIA Security+ SY0-501: Types of Malware
  • CompTIA Security+ SY0-501: Wireless Security Settings
  • CompTIA Server+ SK0-004: Networking and Disaster Recovery
  • CompTIA Server+ SK0-004: Security
  • CompTIA Server+ SK0-004: Server Administration I
  • CompTIA Server+ SK0-004: Server Administration II
  • CompTIA Server+ SK0-004: Server Architecture
  • CompTIA Server+ SK0-004: Storage
  • CompTIA Server+ SK0-004: Troubleshooting I
  • CompTIA Server+ SK0-004: Troubleshooting II
  • Conditional Statements & Loops: Advanced Operations Using for Loops in Python
  • Conditional Statements & Loops: If-else Control Structures in Python
  • Conditional Statements & Loops: The Basics of for Loops in Python
  • Conditional Statements & Loops: While Loops in Python
  • Configuration and Troubleshooting in RabbitMQ
  • Configure and Administer vRealize Business Standards and Application Services
  • Configure and Manage Users and Groups in vRealize Automation
  • Configure File and Print Services in Windows Server 2008
  • Configure IP Addressing and Windows Services in Windows Server 2008
  • Configure Network Access in Windows Server 2008
  • Configure Terminal Services in Windows 2008
  • Configure, Manage, and Maintain IP Services in Windows Server 2008
  • Configuring Advanced Windows Server 2012 R2 Services Expert Live with Encore
  • Configuring Advanced Windows Server 2012 Services Expert Encore
  • Configuring and Deploying an ASP.NET MVC Application
  • Configuring and Deploying ASP.NET Web Applications
  • Configuring Azure VM Networking
  • Configuring Citrix XenDesktop 7.6 Components
  • Configuring DNS in Windows Server 2008
  • Configuring Enterprise Voice
  • Configuring Forms with Knockout
  • Configuring Microsoft SharePoint 2010 Expert Encore
  • Configuring Microsoft Windows 10 Expert Live with Encore
  • Configuring Microsoft Windows 8.1 Expert Live with Encore
  • Configuring MVC Controllers and Actions
  • Configuring MVC Controllers and Actions
  • Configuring Network Application Services in Windows Server 2008
  • Configuring Network Services
  • Configuring OpenStack
  • Configuring Puppet Environments and Managing Files
  • Configuring the Puppet Master and Puppet Agent
  • Configuring Tomcat and PHP
  • Configuring Web Service Protocols in Windows Server 2008
  • Configuring Web Services and Security in Windows Server 2008
  • Configuring Windows 10 Devices: Authentication
  • Configuring Windows 10 Devices: Bitlocker, Recovery, and Maintenance
  • Configuring Windows 10 Devices: Data Protection
  • Configuring Windows 10 Devices: Deployment Tools and Procedures
  • Configuring Windows 10 Devices: Devices and Disks
  • Configuring Windows 10 Devices: Installing and Managing Applications
  • Configuring Windows 10 Devices: Introduction to Deployment
  • Configuring Windows 10 Devices: Introduction to Windows 10
  • Configuring Windows 10 Devices: Maintaining Windows 10
  • Configuring Windows 10 Devices: Managing Devices
  • Configuring Windows 10 Devices: Networking
  • Configuring Windows 10 Devices: Remote Connections
  • Configuring Windows 10 Devices: Secure Identities
  • Configuring Windows 10 Devices: Start Menu, Personalization, and Multitasking
  • Configuring Windows 10 Devices: Threat Resistance and UAC
  • Configuring Windows 10 Devices: Threat Resistance Technologies
  • Configuring Windows 10 Devices: Universal Windows Apps
  • Configuring Windows 10 Devices: User Data
  • Configuring Windows 10 Devices: Virtualization Technologies
  • Configuring Windows Server 2008 Availability
  • Configuring Windows Server Hyper-V and Virtual Machines
  • Conflict, Stress, and Time Management
  • Connection Managers and Data Sources
  • Connectivity and Space Management in Oracle Database 12c
  • Constraint Satisfaction Problems
  • Consuming Services, using the ASP.NET Pipeline, and using OData Services
  • Container, Compute, and App Engine with Networking Services
  • Continued Dataproc Operations
  • Continuous Integration and Deployment with Team Foundation Server
  • Control the Project Schedule (PMBOK® Guide Sixth Edition)
  • Controllers and Directives
  • Controlling Conflict, Stress, and Time in a Customer Service Environment
  • Controlling Project Work and Closing
  • ConvNets: Introduction to Convolutional Neural Networks
  • ConvNets: Working with Convolutional Neural Networks
  • Convolutional and Recurrent Neural Networks
  • Core Commerce and the Product Catalog
  • Core Concepts of a Service-oriented Architecture
  • Core PMI® Values and Ethical Standards
  • Core Services on AWS
  • Core Solutions of Microsoft Exchange Server 2013 Expert Live with Encore
  • Core Solutions of Microsoft SharePoint Server 2013 Expert Live with Encore
  • Correlation & Regression
  • Cosmos DB and Azure Search
  • Create and Administer Cloud Networking
  • Create Spark Streaming Applications
  • Create Work Breakdown Structure (PMBOK® Guide Fifth Edition)
  • Create Work Breakdown Structure (PMBOK® Guide Sixth Edition)
  • Creating a Basic Angular Application
  • Creating a LAMP Stack
  • Creating a Project Budget (PMBOK® Guide Sixth Edition)
  • Creating a Project Schedule and Budget
  • Creating a Virtual Reality App with Unity
  • Creating and Configuring Virtual Machines in VMware Workstation 11
  • Creating and Consuming WCF Web Services
  • Creating and Consuming Web API Services
  • Creating and Maintaining Forms
  • Creating and Managing Unix File Systems
  • Creating and Securing MVC 5 Applications
  • Creating and Simulating a Working Prototype
  • Creating and Using Control Charts in Six Sigma
  • Creating and Working with PDFs in Adobe Acrobat 8
  • Creating Application Builds
  • Creating Apps
  • Creating Data APIs Using Node.js
  • Creating Mobile Apps with Appcelerator Titanium
  • Creating Secure C/C++ Code
  • Creating Software Tests
  • Creating Styles with CSS3 and Styling Text
  • Creating Virtual Machines (VMs) and Workloads
  • Cross-Platform Shared Code and Xamarin.Forms in Visual Studio
  • Cryptography Fundamentals: Applying Cryptography
  • Cryptography Fundamentals: Defining Cryptography
  • Cryptography: Introduction to Cryptography Services
  • Cryptography: Introduction to PKI
  • CS0-002 - CompTIA Cybersecurity Analyst+: Attack Types
  • CS0-002 - CompTIA Cybersecurity Analyst+: Business Continuity
  • CS0-002 - CompTIA Cybersecurity Analyst+: Cloud Computing
  • CS0-002 - CompTIA Cybersecurity Analyst+: Data Privacy
  • CS0-002 - CompTIA Cybersecurity Analyst+: Digital Forensics
  • CS0-002 - CompTIA Cybersecurity Analyst+: Encryption & Hashing
  • CS0-002 - CompTIA Cybersecurity Analyst+: Hardware & Security
  • CS0-002 - CompTIA Cybersecurity Analyst+: Intrusion Detection & Traffic Analysis
  • CS0-002 - CompTIA Cybersecurity Analyst+: IT Security Risk Mitigation
  • CS0-002 - CompTIA Cybersecurity Analyst+: Malware Threats
  • CS0-002 - CompTIA Cybersecurity Analyst+: Network Infrastructure Security
  • CS0-002 - CompTIA Cybersecurity Analyst+: Network Scanning & Traffic Analysis
  • CS0-002 - CompTIA Cybersecurity Analyst+: Software Development Security
  • CS0-002 - CompTIA Cybersecurity Analyst+: Threat Intelligence
  • CS0-002 - CompTIA Cybersecurity Analyst+: Threat Monitoring
  • CS0-002 - CompTIA Cybersecurity Analyst+: User Account Security
  • CSSLP: Secure Software Concepts
  • CSSLP: Secure Software Design
  • CSSLP: Secure Software Implementation and Coding
  • CSSLP: Secure Software Requirements
  • CSSLP: Secure Software Testing
  • CSSLP: Software Acceptance, Deployment, Operations, Maintenance, and Disposal
  • CSSLP: Supply Chain and Software Acquisition
  • Cucumber Steps and Scenario Development
  • Customer Interactions
  • Customer Service Automation in Microsoft Dynamics CRM 2013
  • Customer Service Processes and Procedures
  • Customized Mapping and Basic Querying in Java Hibernate
  • Cyber Security Audits
  • Cybersecurity 101: Auditing & Incident Response
  • Cybersecurity 101: Session & Risk Management
  • Cycle Time Reduction and Kaizen in Six Sigma
  • Data Access & Governance Policies: Data Access Oversight and IAM
  • Data Access & Governance Policies: Data Classification, Encryption, and Monitoring
  • Data Access and Binding in Apps
  • Data Access and Services with Microsoft Azure
  • Data Analysis and Root Cause Analysis in Six Sigma
  • Data Analysis Application
  • Data Analysis Concepts
  • Data Analysis Using Spark SQL and Hive
  • Data Analytics using Power BI: Concepts
  • Data Analytics Using Power BI: Data Modeling and Visualization
  • Data Analytics Using Power BI: Data Sourcing and Preparation
  • Data and Analytics Technologies at Work
  • Data and State Management in Clojure
  • Data Architecture - Deep Dive: Design & Implementation
  • Data Architecture - Deep Dive: Microservices & Serverless Computing
  • Data Architecture Primer
  • Data Classification and Machine Learning
  • Data Classification, Sampling, and Collection in Six Sigma
  • Data Collection & Exploration
  • Data Communication and Visualization
  • Data Engineering Fundamentals
  • Data Exploration
  • Data Factory with Hive
  • Data Factory with Oozie and Hue
  • Data Factory with Pig
  • Data Filtering
  • Data Flow for the Hadoop Ecosystem
  • Data Flow Implementation
  • Data Flow, Consuming, and Transmitting Data
  • Data Gathering
  • Data Infrastructure: Databases in FSD Development
  • Data Integration
  • Data Lake: Architectures & Data Management Principles
  • Data Lake: Framework & Design Implementation
  • Data Load Options
  • Data Management and Device Security
  • Data Mining, Data Distributions, & Hypothesis Testing
  • Data Models and JSP
  • Data Preprocessing
  • Data Quality Projects
  • Data Quality Services (DQS) and Master Data Services (MDS)
  • Data Reduction & Exploratory Data Analysis (EDA)
  • Data Refinery with YARN and MapReduce
  • Data Repository with Flume
  • Data Repository with HDFS and HBase
  • Data Repository with Sqoop
  • Data Rollbacks: Transaction Management & Rollbacks in NoSQL
  • Data Rollbacks: Transaction Rollbacks & Their Impact
  • Data Science 10: Data Research Exploration Techniques
  • Data Science 2: Data Driven Organizations
  • Data Science 9: Data Research Techniques
  • Data Science Overview
  • Data Science Statistics: Applied Inferential Statistics
  • Data Science Statistics: Common Approaches to Sampling Data
  • Data Science Statistics: Inferential Statistics
  • Data Science Statistics: Simple Descriptive Statistics
  • Data Science Statistics: Using Python to Compute & Visualize Statistics
  • Data Scientist 14: Data Research Statistical Approaches
  • Data Security Breach Notification Process
  • Data Silos, Lakes, & Streams: Introduction
  • Data Silos, Lakes, & Streams: Sources, Visualizations, & ETL Operations
  • Data Silos, Lakes, and Streams: Data Lakes on AWS
  • Data Sources: Implementing Edge on the Cloud
  • Data Sources: Integration
  • Data Structures & Algorithms in Python: Fundamental Data Structures
  • Data Structures & Algorithms in Python: Implementing Data Structures
  • Data Structures & Algorithms in Python: Implementing Sorting Algorithms
  • Data Structures & Algorithms in Python: Implementing Trees & Graphs
  • Data Structures & Algorithms in Python: Sorting Algorithms
  • Data Structures & Algorithms in Python: Trees & Graphs
  • Data Structures and File Management in ANSI C
  • Data Tools: Machine Learning & Deep Learning in the Cloud
  • Data Tools: Technology Landscape & Tools for Data Management
  • Data Transformation
  • Data Types, Modifiers, Operators, and Flow Control
  • Data Types, Sampling, Collection, and Measurement in Six Sigma
  • Data Visualization and Predictive Analytics
  • Data Visualization: Essentials
  • Data Warehouse Essential: Architecure Frameworks and Implementation
  • Data Warehouse Essential: Concepts
  • Data Warehousing
  • Data Warehousing with Azure: Analytics and Reporting
  • Data Warehousing with Azure: Architecture & Modeling Techniques
  • Data Warehousing with Azure: Data Lake Implementation Using Azure
  • Data Warehousing with Azure: Implementing Azure SQL Data Warehouse
  • Data Warehousing with Azure: Managing Azure Data Lake
  • Data Warehousing with Azure: Working with SQL Data Warehouse Objects
  • Data Warehousing with Hadoop: HDInsight and Retail Sales Implementation Using Hive
  • Data Warehousing with Hadoop: Managing Big Data Using HDInsight Hadoop
  • Data Warehousing with Hadoop: Microsoft Analytics Platform System and Hive
  • Data Warehousing with Hadoop: Spark, HDInsight and Cluster Management
  • Data Wrangler 4: Cleaning Data in R
  • Data Wrangling in R
  • Data Wrangling with Pandas: Advanced Features
  • Data Wrangling with Pandas: Visualizations and Time-Series Data
  • Data Wrangling with Pandas: Working with Series & DataFrames
  • Data, Workflows, and Charting in F#
  • Database Instances
  • Database Maintenance and Performance Tuning in Oracle Database 12c
  • Database Programmability Objects and Non-Relational Data
  • Database Systems and Relational Databases
  • Databases and Advanced Features with the Zend 2 Framework
  • Datacenter Virtualization with vSphere 5: Design and Optimization Expert Live with Encore
  • Dataflow Autoscaling Pipelines
  • Dataproc Architecture
  • Dealing with Customer Service Incidents and Complaints
  • Debugging ASP.NET MVC Web Applications
  • Debugging ASP.NET MVC Web Applications
  • Debugging in R
  • Debugging Tools
  • Decision Making for Software Project Managers
  • Decision Tree and Classification Analysis
  • Decoding TestNG in Detail
  • Deep Dive Cucumber
  • Deep Diving with Hibernate and Queries
  • Deep Learning with Keras
  • Deeper through GCP Analytics and Scaling
  • Defensive Coding for C#
  • Defensive Coding for C/C++
  • Defensive Coding for JavaScript and HTML5
  • Defensive Coding Fundamentals for C#
  • Defensive Coding Fundamentals for C/C++
  • Defensive Coding Fundamentals for JavaScript and HTML5
  • Defensive Programmer: Advanced Concepts
  • Defensive Programmer: Code Samples
  • Defensive Programmer: Cryptography
  • Defensive Programmer: Defensive Concepts
  • Defensive Programmer: Defensive Techniques
  • Defensive Programmer: Secure Testing
  • Defensive Programming in Android: Errors, Exceptions, and Testing
  • Defensive Programming in Android: Input and Methods
  • Defensive Programming in Android: Network Access and Java Defensive Techniques
  • Defensive Programming in Android: Using Standards
  • Defensive Programming in Java: Data Handling, Injection Attacks, and Concurrency
  • Defensive Programming in Java: Data Security and Access Control
  • Defensive Programming in Java: Fundamentals
  • Defensive Programming, MVC, and DDD
  • Define and Sequence Activities (PMBOK® Guide Fifth Edition)
  • Define and Sequence Activities (PMBOK® Guide Sixth Edition)
  • Define End Value for Software Iterations
  • Define the ALM Process
  • Defining a Project Scope and Team
  • Defining Effective End-to-end SDLC Practices
  • Deploy and Install Virtual Machine Manager
  • Deploy and Manage Orchestrator
  • Deploy and Manage Service Management Automation
  • Deploying and Using Jasmine
  • Deploying Applications and Software Updates
  • Deploying Applications to Microsoft Azure SQL Databases
  • Deploying Data Tools: Data Science Tools
  • Deploying FSD Projects: Deployment Overview
  • Deploying Hadoop Clusters
  • Deploying Service Manager
  • Deploying Windows Server 2008 Servers
  • Deploying Your Microservice in Containers
  • Deployment and Delivery on AWS
  • DESGN 3.0: Branch Network Design
  • DESGN 3.0: Campus Design
  • DESGN 3.0: Campus Design Part 2
  • DESGN 3.0: Design Hierarchy
  • DESGN 3.0: Design Lifecycle
  • DESGN 3.0: Design Methodology
  • DESGN 3.0: Design Modularity
  • DESGN 3.0: Design Resiliency
  • DESGN 3.0: Design Scalability
  • DESGN 3.0: Enterprise Architecture
  • DESGN 3.0: Enterprise Network WAN and Edge
  • DESGN 3.0: Fault Domain Design
  • DESGN 3.0: IGP Expansion
  • DESGN 3.0: Implementing Network Design
  • DESGN 3.0: Network Programmability and Data Center Component Design
  • DESGN 3.0: Networking Information Gathering and Auditing
  • DESGN 3.0: OSPF and BGP Expansion
  • DESGN 3.0: Routing Protocol Scalability
  • DESGN 3.0: Scalable Addressing and IP Addressing Schemes
  • DESGN 3.0: Security Control Considerations
  • DESGN 3.0: Virtualization in Network Design
  • DESGN 3.0: Voice and Video Design Considerations
  • DESGN 3.0: Wireless LAN Design
  • DESGN 3.0: Wireless LAN Requirements
  • Design a Distributed ASP.NET MVC Application
  • Design and Implement UI Behavior
  • Design and Implement UI Behavior
  • Design and Secure Remote Access and Multiple Namespaces Solutions
  • Design for Six Sigma and FMEA
  • Design of Experiments in Six Sigma
  • Design Pattern Classification and Architectural Patterns
  • Design Patterns in JavaScript: Constructor, Factory, & Abstract Factory Creational Patterns
  • Design Patterns in JavaScript: Flyweight, Adapter, Composite, & Proxy Structural Patterns
  • Design Patterns in JavaScript: Getting Started
  • Design Patterns in JavaScript: Mediator, State, & Command Behavioral Patterns
  • Design Patterns in JavaScript: Module, Revealing Module, Façade, Decorator, & Mixin Structural Patt
  • Design Patterns in JavaScript: Observer & Iterator Behavioral Patterns
  • Design Patterns in JavaScript: Singleton, Prototype, & Builder Creational Patterns
  • Design Thinking for Innovation: Brainstorming and Ideation
  • Design Thinking for Innovation: Defining Opportunities
  • Design Thinking for Innovation: Prototyping and Testing
  • Design Thinking for Innovation: Stakeholder Engagement
  • Design Thinking Process
  • Designing a Customer Service Strategy
  • Designing a Fact Table
  • Designing and Deploying Microsoft Exchange Server 2016 Expert Live with Encore
  • Designing and Implementing a Server 2012 R2 Infrastructure Expert Live with Encore
  • Designing and Implementing Azure Apps
  • Designing and Implementing Dimensions
  • Designing ASP.NET MVC Application Architecture
  • Designing ASP.NET MVC Application Architecture
  • Designing Batch Processing and Data Security
  • Designing Control Flow
  • Designing Data Flow
  • Designing Data Security and High Availability in Microsoft Windows Server 2008
  • Designing Hadoop Clusters
  • Designing the Active Directory Infrastructure in Microsoft Windows Server 2008
  • Designing the Lambda Architecture and Real-time Processing
  • Designing the Microservices Architecture
  • Designing the User Experience in ASP.NET MVC Web Applications
  • Designing Web Apps
  • Designing with Flexibility and Efficiency in Mind
  • Designing, Conducting, and Analyzing Experiments in Six Sigma
  • Designing, Creating, and Manipulating Android Databases
  • Determining Process Performance and Capability in Six Sigma
  • Determining Requirements by Listening to the Voice of the Customer in Six Sigma
  • DEVASC: API Usage & Authentication
  • DEVASC: Application Infrastructure, Deployment, Security, & CI/CD
  • DEVASC: Code Organization, Design Patterns, & Version Control
  • DEVASC: Coding, Testing, & Managing Cisco Devices
  • DEVASC: Configuring Devices with Bash, Python, & Ansible
  • DEVASC: Development Methodologies & Software Quality
  • DEVASC: DevNet Overview & Setting up Tools in Linux
  • DEVASC: DevOps, Docker, Bash, & Unit Testing Basics
  • DEVASC: HTTP, APIs, & Webhooks
  • DEVASC: IP Services & Operational Planes
  • DEVASC: IPv4 Addressing, Binary Conversion, & Subnetting
  • DEVASC: Network & Network Communication Basics
  • DEVASC: Network Components, Connectivity, & Troubleshooting
  • DEVASC: Network, Collaboration, Security, & Compute Capabilities
  • DEVASC: Python Scripting & Managing WebEx Resources
  • DEVASC: Setting up Development & Virtualization Tools in Windows
  • DEVASC: Software Development Methodologies
  • DEVASC: Working with Data Formats
  • DEVASC: Working with Git
  • Develop and Manage Resources (PMBOK® Guide Sixth Edition)
  • Develop Customer Quality with High Value
  • Develop Real-time Processing Solutions with Apache Storm
  • Develop the Project Schedule (PMBOK® Guide Sixth Edition)
  • Developing a Successful Team
  • Developing Advanced Apple Watch Applications
  • Developing AI and ML Solutions with Java: AI Fundamentals
  • Developing AI and ML Solutions with Java: Expert Systems and Reinforcement Learning
  • Developing AI and ML Solutions with Java: Machine Learning Implementation
  • Developing AI and ML Solutions with Java: Neural Network and Neuroph Framework
  • Developing AI and ML Solutions with Java: Neural Network and NLP Implementation
  • Developing and Deploying Web Applications with MEAN.js
  • Developing and Implementing IoT Solutions: Arduino Language
  • Developing and Implementing IoT Solutions: Azure IoT Hub
  • Developing and Implementing IoT Solutions: Cloud Implementation Using Azure IoT
  • Developing and Implementing IoT Solutions: MicroPython and Security
  • Developing and Implementing IoT Solutions: MicroPython Board
  • Developing and Implementing IoT Solutions: Principles of IoT and Python Basics
  • Developing and Implementing IoT Solutions: Raspi-config and GPIO
  • Developing and Implementing IoT Solutions: Using Raspberry Pi and OpenCV
  • Developing Android Applications: Activities, Connectivity, and Services
  • Developing Android Applications: App Layout
  • Developing Android Applications: App Structure and Formatting
  • Developing Android Applications: Creating an App with Java
  • Developing Android Applications: Debugging and Testing
  • Developing Android Applications: Defensive Programming and Security
  • Developing Android Applications: Introduction
  • Developing ASP.NET Core 1.0 and MVC Applications
  • Developing Azure & Web Services: WCF Transactions & Services
  • Developing Azure and Web Services: API Management and Monitoring
  • Developing Azure and Web Services: Advanced Deployment
  • Developing Azure and Web Services: Azure Scalability
  • Developing Azure and Web Services: Azure Services
  • Developing Azure and Web Services: Azure Storage
  • Developing Azure and Web Services: Configuring Web Applications for Deployment
  • Developing Azure and Web Services: Consuming Services
  • Developing Azure and Web Services: Deployment Strategy
  • Developing Azure and Web Services: Diagnostics, Debugging, and ACS
  • Developing Azure and Web Services: Entity Framework
  • Developing Azure and Web Services: Hosting Web APIs
  • Developing Azure and Web Services: IIS & Web Services
  • Developing Azure and Web Services: Introduction
  • Developing Azure and Web Services: Managing Data
  • Developing Azure and Web Services: Messaging, Security, and Troubleshooting
  • Developing Azure and Web Services: Web API Services
  • Developing Azure and Web Services: Working with Assemblies
  • Developing Basic Apple Watch Applications
  • Developing SQL Databases Expert Live with Encore
  • Developing the User Experience in ASP.NET MVC
  • Developing Windows and Web Applications
  • Developing with Blockchain
  • Device Configuration and Data Access
  • DevOps & AWS: CloudOps Implementation
  • DevOps Agile Development: Agile Processes for DevOps
  • DevOps Agile Development: DevOps Methodologies for Developers
  • DevOps Automation Across Platforms: CloudOps for Multi-cloud Deployments
  • DevOps Automation Across Platforms: Working with Multi-cloud Tools
  • DevOps Automation: Configuration Management
  • DevOps Automation: Delivery Mechanisms
  • DevOps Cloud Automation: Advanced AWS Pipelines and DevOps Using Azure
  • DevOps Cloud Automation: AWS DevOps Tools
  • DevOps Cloud Automation: DevOps with Google Cloud Platform
  • DevOps Collaboration Tools: Tools for Continuous Delivery
  • DevOps Collaboration Tools: Tools for Continuous Integration
  • DevOps Continuous Feedback: Implementing Continuous Feedback
  • DevOps Continuous Feedback: Loop Tools
  • DevOps Continuous Testing: Testing Approaches
  • DevOps Continuous Testing: Testing Methodologies
  • DevOps for Data Scientists: Containers for Data Science
  • DevOps for Data Scientists: Data DevOps Concepts
  • DevOps for Data Scientists: Data Science DevOps
  • DevOps for Data Scientists: Deploying Data DevOps
  • DevOps Fundamentals: Tools, Technologies, and Infrastructures
  • DevOps Management and Capabilities
  • DevOps Methodologies and Development
  • DevOps Mindset: DevOps Implementation Using Tools
  • DevOps Mindset: DevOps Principles & Implementation Approach
  • DevOps Security Considerations: DevSecOps Principles
  • DevOps Security Considerations: Securing DevOps Pipeline
  • DevOps Smart Failure: Fail Fast & DevOps
  • DevOps Testing and Delivery
  • DevOps to CloudOps for Multi-cloud
  • DevOps Tools: Selecting the Right Tools
  • DevOps with Ansible: Introduction to Playbooks and Testing
  • DevOps with Ansible: Overview
  • DevOps with Ansible: Working with Ansible Features
  • DevOps with Docker: Container Management
  • DevOps with Docker: Implementing DevOps Using Docker
  • DevOps with Docker: Management in the Cloud
  • DevOps with Saltstack: Configuration and Components
  • DevOps with Saltstack: Overview
  • DevOps with Saltstack: Remote Execution & State System
  • Digital Forensic Techniques & Investigative Approaches
  • Diving into the World of Spotfire
  • DNS Zones and Replication in Windows Server 2008
  • Docker & Multi-cloud: Managing Multi-cloud with Docker
  • Docker & Multi-cloud: Multi-host, Multi-cloud Management with Docker Enterprise
  • Docker and Windows
  • Docker Configuration and Management
  • Docker Containers, Images, and Swarms
  • Docker for Java Microservices: Containerize Microservices
  • Docker for Java Microservices: Managing Microservices on Docker Using Compose
  • Docker for Java Microservices: Scaling Up and Managing Microservices
  • Docker for Java Microservices: Working with Docker Components
  • Docker Installation and Management
  • Docker Introduction
  • Docker Programmatic Access
  • Documentation and Criteria Used for Business Analysis
  • Domain-Specific Tools in R
  • Drawing in Adobe Illustrator CC 2015
  • Drawing with Adobe Flash Professional CC 2015
  • Drupal 8 First Look
  • EAI Paterns: Fundamentals and Environment Setup
  • EAI Paterns: Language and Transformation Patterns
  • EAI Paterns: Message Routing Pattern Implementation
  • EAI Patterns: Overview of Apache Camel
  • Ecosystem for Hadoop
  • Edge.js, Node.js, and ASP.NET MVC
  • Effective Team Communication
  • Effective Team Communication
  • Elasticsearch Data Management
  • Elements of a Cohesive Team
  • ELK Operations on the Cloud
  • Employee and Labor Relations: Behavioral and Disciplinary Issues and Resolution
  • Employee and Labor Relations: Employment Regulations and Organizational Programs
  • Employee and Labor Relations: Unions and Collective Bargaining
  • Enabling Office 365 Service: Telemetry
  • Enabling Office 365 Services: Collaboration Solutions
  • Enabling Office 365 Services: Configuring and Managing Skype for Business Online
  • Enabling Office 365 Services: Exchange Online Addresses, Mailboxes, Archiving
  • Enabling Office 365 Services: Exchange Online Policy, Migration, and Compliance
  • Enabling Office 365 Services: Managing Client User-driven and IT Deployments
  • Enabling Office 365 Services: SharePoint Online Sharing & Site Collections
  • ENCOR: LISP & VXLAN
  • ENCOR: Overview, Enterprise Network Design, & High Availability
  • ENCOR: QoS & Cisco Express Forwarding
  • Encore Session 1: Active Directory Design and Implementation
  • Encore Session 1: Active Directory Domain Controllers, Accounts, and Permissions
  • Encore Session 1: Computer Network Fundementals
  • Encore Session 1: Configure and Manage High Availability
  • Encore Session 1: Configuring Advanced Services
  • Encore Session 1: Deploy, Manage, and Maintain Servers
  • Encore Session 1: Designing a Farm Topology
  • Encore Session 1: Encryption, Data Access, Permissions, and Auditing
  • Encore Session 1: Exchange Server 2013 SP1 Solution Planning and Implementation
  • Encore Session 1: Initiating a Project
  • Encore Session 1: Initiating a Project
  • Encore Session 1: Inside a Computer
  • Encore Session 1: Install and Configure vCSA and Upgrading vSphere 4 to vSphere 5
  • Encore Session 1: Install and Configure Windows Server 2012 Servers
  • Encore Session 1: Install, Manage, and Use Windows 10
  • Encore Session 1: Installing and Configuring Microsoft SharePoint 2010
  • Encore Session 1: Installing SQL Server Instances and Creating Databases
  • Encore Session 1: Installing, Upgrading, Migrating to Windows 8.1
  • Encore Session 1: Introduction to Clustering and HA
  • Encore Session 1: Introduction to JavaScript
  • Encore Session 1: Introduction to Virtualization and VMware’s ESXi
  • Encore Session 1: IPv4/IPv6 Address and DHCP Management
  • Encore Session 1: Managing a Server Infrastructure
  • Encore Session 1: Plan, Deploy, Manage, and Troubleshoot Mailbox Databases
  • Encore Session 1: Planning and Installing SCCM
  • Encore Session 1: Planning, Configuring, and Managing Site Resilience
  • Encore Session 1: Planning, Install, or Upgrade to SharePoint 2016
  • Encore Session 1: Server Roles and Remote Management
  • Encore Session 1: SharePoint Components and Design
  • Encore Session 1: SQL Server 2016 Database Objects, Indexes, and Views
  • Encore Session 1: The Datacenter and SCVMM
  • Encore Session 1: Threats and Attacks
  • Encore Session 1: Under the Hood - Motherboards & Components
  • Encore Session 1: Understanding Network Security
  • Encore Session 1: Understanding SharePoint 2013 as a Business User
  • Encore Session 1: Understanding Windows
  • Encore Session 1: Upgrading to SharePoint Server 2013
  • Encore Session 1: Upgrading, Managing, and Monitoring
  • Encore Session 1: Windows PowerShell Foundations
  • Encore Session 1: Windows XP
  • Encore Session 2: Active Directory Object Management
  • Encore Session 2: Addressing and Routing
  • Encore Session 2: Backing Up and Restoring Databases
  • Encore Session 2: Clustered VMs and DR
  • Encore Session 2: Columnstore Indexes and Programmability Objects
  • Encore Session 2: Compliance and Operational Security
  • Encore Session 2: Computer Components
  • Encore Session 2: Configure Devices, Storage, & Network Connections in Windows 10
  • Encore Session 2: Configure File and Print Services
  • Encore Session 2: Configure File and Storage Solutions
  • Encore Session 2: Configure Windows Server 2012 Server Roles and Features
  • Encore Session 2: Configuring User Accounts and Policies in Windows 8.1
  • Encore Session 2: Deploying and Managing Network Servers
  • Encore Session 2: Developing the Mailbox Role
  • Encore Session 2: Developing the Mailbox Role
  • Encore Session 2: Disks, NTFS, and Sharing
  • Encore Session 2: Distributed Resource Scheduler
  • Encore Session 2: DNS Name Resolution and Zone Configuration
  • Encore Session 2: Introduction to Design Fundamentals
  • Encore Session 2: JavaScript Data Types
  • Encore Session 2: Manage Data in SQL 2012
  • Encore Session 2: Managing and Maintaining Servers, Images, and Storage Solutions
  • Encore Session 2: Managing Operating System Deployments
  • Encore Session 2: More Windows Options
  • Encore Session 2: OU Design and Implementation to Support Group Policy
  • Encore Session 2: Planning Application Services and Component Deployment
  • Encore Session 2: Planning Configuring and Managing Advanced Security
  • Encore Session 2: Planning for Business Continuity in SharePoint Server 2013
  • Encore Session 2: Planning the Project Scope and Schedule
  • Encore Session 2: Planning the Project Scope and Schedule
  • Encore Session 2: Power and Connection Interfaces
  • Encore Session 2: SharePoint 2016 Security
  • Encore Session 2: Upgrading to Microsoft SharePoint 2010
  • Encore Session 2: Using SharePoint Content
  • Encore Session 2: VM Hosts, Storage, and Networks
  • Encore Session 2: VMware Component Installation for vSphere 6.0
  • Encore Session 2: Vulnerabilities and Organizational Security
  • Encore Session 2: Web and Service Applications
  • Encore Session 2: Windows PowerShell-The Next Level
  • Encore Session 2: Windows Vista
  • Encore Session 3: Advanced Windows Configuration
  • Encore Session 3: Building a Computer
  • Encore Session 3: Cluster Monitoring and Profiles
  • Encore Session 3: Conditional Program Execution
  • Encore Session 3: Configure Network Services and Access
  • Encore Session 3: Configure Windows Server 2012 Hyper-V
  • Encore Session 3: Configuring and Administering SharePoint 2010 Search
  • Encore Session 3: Configuring and Managing Compliance, Archiving, and Discovery Solutions
  • Encore Session 3: Configuring Client Access Services
  • Encore Session 3: Configuring Storage, File Management, and DAC
  • Encore Session 3: Configuring User Applications and Virtualization in Windows 8.1
  • Encore Session 3: Cryptography, Keys, and Wireless Security
  • Encore Session 3: Data Deduplication, Hyper-V Installation and Configuration
  • Encore Session 3: DCD Objectives: Creating a Conceptual vSphere Design
  • Encore Session 3: Deploying Applications and Software Updates
  • Encore Session 3: Establishing Site Owners
  • Encore Session 3: Implement Business Continuity and Disaster Recovery
  • Encore Session 3: Implementing IP Address Management (IPAM)
  • Encore Session 3: Introduction to VMware Basic Networking
  • Encore Session 3: IP Subnetting, DHCP, and NIC Teaming
  • Encore Session 3: Maintaining Active Directory, Trusts and Site Management
  • Encore Session 3: Managing Database Integrity
  • Encore Session 3: Network Infrastructures
  • Encore Session 3: Networking
  • Encore Session 3: Optimizing and Troubleshooting SQL 2012
  • Encore Session 3: Plan and Deploy a Server Infrastructure
  • Encore Session 3: Planning an Upgrade/Migration Strategy and Security Deployment
  • Encore Session 3: Planning and Deploying Client Access Servers
  • Encore Session 3: Planning for Expanded Enterprise SharePoint Support
  • Encore Session 3: Planning for Resources, Risk and Quality
  • Encore Session 3: Planning for Resources, Risks and Quality
  • Encore Session 3: Remote Access Solutions
  • Encore Session 3: Security
  • Encore Session 3: Service Applications in SharePoint 2016
  • Encore Session 3: Support Identities and Authentication in Windows 10
  • Encore Session 3: Threats and Vulnerabilities
  • Encore Session 3: Triggers, Functions, Transactions, and Isolation Levels
  • Encore Session 3: VM Administration and Business Continuity Planning
  • Encore Session 3: Windows 7
  • Encore Session 4: Advanced Resource Management and Basic Design
  • Encore Session 4: Application, Host and Data Security
  • Encore Session 4: Building Up SharePoint Sites
  • Encore Session 4: Clustering, NLB, and Monitoring
  • Encore Session 4: Computer Networking
  • Encore Session 4: Configure a Network Policy Server Infrastructure
  • Encore Session 4: Configure Network Services
  • Encore Session 4: Configuring User Data and Settings in Windows 8.1
  • Encore Session 4: Creating and Configuring Service Applications
  • Encore Session 4: DCD Objectives: Creating a Logical vSphere Design
  • Encore Session 4: Defining Group Policy Objects and Implementing Group Policy Preferences
  • Encore Session 4: Defining Operations Strategy and Business Continuity
  • Encore Session 4: Deploy and Configure Windows Server 2012 Core Network Services
  • Encore Session 4: Deploying and Administering System Center Configuration Manager 2012 R2
  • Encore Session 4: Design and Implement Network Services Part 1
  • Encore Session 4: DHCP, DNS & IPAM
  • Encore Session 4: DNS and Hyper-V
  • Encore Session 4: Events and Functions
  • Encore Session 4: Hyper-V Networking, Containers, and High Availability
  • Encore Session 4: Implementing & Managing Coexistence, Hybrid Scenarios, Migration & Federation
  • Encore Session 4: Laptops & Mobile Devices
  • Encore Session 4: Manage Data Access and Protection in Windows 10
  • Encore Session 4: Managing Database Concurrency
  • Encore Session 4: Monitoring Database Activity, Queries, and SQL Server Instances
  • Encore Session 4: Network Configuration and Basic Storage Concepts
  • Encore Session 4: Network Connectivity, Remote Access, and Securing Remote Authentication
  • Encore Session 4: Network Security
  • Encore Session 4: Other Operating Systems
  • Encore Session 4: Planning and Configuring Message Transport
  • Encore Session 4: Planning and Configuring Message Transport
  • Encore Session 4: Planning for Communication, Procurement and Cost
  • Encore Session 4: Planning for Stakeholders, Communication, Procurement and Cost
  • Encore Session 4: Recovering Databases, Configuring Mail, and Automating Tasks
  • Encore Session 4: Security Protocols and Issues, Identity and Access
  • Encore Session 4: Service Accounts, Account Policies and Fine Grained Password Policies
  • Encore Session 4: SharePoint 2016 Integration
  • Encore Session 4: SharePoint Taxonomy
  • Encore Session 4: Web Applications, Authentication and Application Security Configuration
  • Encore Session 4: Windows Networking on a Client/Desktop
  • Encore Session 5: Access Control and Identity Management
  • Encore Session 5: Active Directory
  • Encore Session 5: Active Directory Certificate Services
  • Encore Session 5: AD Domains and Replication
  • Encore Session 5: Advanced Exchange 2013 Monitoring and Troubleshooting
  • Encore Session 5: Certificate Services
  • Encore Session 5: Compliance Settings and Managing Clients
  • Encore Session 5: Computer Threats and Security
  • Encore Session 5: Configure and Manage Active Directory
  • Encore Session 5: Configure and Manage Applications in Windows 10
  • Encore Session 5: Configure the Active Directory Infrastructure
  • Encore Session 5: Configuring and Managing Storage in vSphere 6.0
  • Encore Session 5: Configuring Devices, Disks, and Network Connections in Windows 8.1
  • Encore Session 5: Configuring SharePoint 2010 Site Collections, Managing Features and Solutions
  • Encore Session 5: Content Management on SharePoint 2016
  • Encore Session 5: DCD Objectives: Creating a Physical vSphere Design
  • Encore Session 5: Design and Implement Network Services Part 2
  • Encore Session 5: Executing the Project
  • Encore Session 5: Executing the Project
  • Encore Session 5: Implementing Failover Clustering and Managing High Availability Solutions
  • Encore Session 5: Implementing Security
  • Encore Session 5: Install and Administer Windows Server 2012 Active Directory
  • Encore Session 5: Manage Exchange 2013 – Infrastructure Management
  • Encore Session 5: Manage Exchange 2013 – Infrastructure Management
  • Encore Session 5: Managing Indexes and Statistics
  • Encore Session 5: Managing Sites
  • Encore Session 5: Network Architecture and Security
  • Encore Session 5: Network Operations
  • Encore Session 5: Optimize SQL Database Objects and Infrastructure
  • Encore Session 5: Planning for SharePoint Business Intelligence
  • Encore Session 5: Planning Search Solutions
  • Encore Session 5: Planning Search Solutions
  • Encore Session 5: Portable Devices
  • Encore Session 5: Printers & Computer Displays
  • Encore Session 5: Security and Mobile Devices
  • Encore Session 5: Supporting Branch Office Technologies
  • Encore Session 5: The Document Object Model
  • Encore Session 5: Understanding and Managing Active Directory
  • Encore Session 5: Update Manager
  • Encore Session 6: AD Federation Services, Web Application Proxy, and AD Rights Management Services
  • Encore Session 6: AD RMS and AD FS
  • Encore Session 6: Advanced Network Infrastructures
  • Encore Session 6: Automating SharePoint with Workflows
  • Encore Session 6: Configure and Manage Group Policy
  • Encore Session 6: Configure Identity and Access Solutions
  • Encore Session 6: Configure Security, Microsoft Edge, Hyper-V, and Power Management in Windows 10
  • Encore Session 6: Configuring, Managing, and Migrating Unified Messaging
  • Encore Session 6: Create and Manage Windows Server 2012 Group Policy
  • Encore Session 6: Cryptography
  • Encore Session 6: Database Instances and Performance Tuning
  • Encore Session 6: DCD Objectives: Implementation Planning
  • Encore Session 6: Design and Implement Network Services Part 3
  • Encore Session 6: Group Policy
  • Encore Session 6: Groups and GPOs
  • Encore Session 6: High Availability
  • Encore Session 6: High Availability and Disaster Recovery
  • Encore Session 6: Implementation and Troubleshooting
  • Encore Session 6: Introduction to Virtual Machine Configuration and Management
  • Encore Session 6: Manage Exchange 2013 – Monitoring and Troubleshooting
  • Encore Session 6: Manage Exchange 2013 – Monitoring and Troubleshooting
  • Encore Session 6: Managing Inventory and Reporting
  • Encore Session 6: Managing Solutions, Apps, and Enterprise Integration
  • Encore Session 6: Mobile Computing, Monitoring, Optimizing, and System Management/Recovery
  • Encore Session 6: Monitoring and Controlling the Project
  • Encore Session 6: Monitoring, Controlling and Closing the Project
  • Encore Session 6: Operational Procedures
  • Encore Session 6: PKI, RMS, and Federation
  • Encore Session 6: Planning Business Solutions
  • Encore Session 6: Printers
  • Encore Session 6: SharePoint 2010 Operational Health and Performance
  • Encore Session 6: SharePoint 2016 Stability and Performance
  • Encore Session 6: The Upgrade Process
  • Encore Session 6: Tools and Techniques
  • Encore Session 6: Trouble Shooting
  • Encore Session 6: Troubleshooting
  • Encore Session 6: User Profiles Maintenance and Monitoring
  • Encore Session 6: Virtualization, Policies, Risk Management, and Disaster Response/Recovery
  • Encore Session 6: VM Movement and Network Load Balancing Solutions
  • Encouraging Team Communication and Collaboration
  • End-to-End Automated Testing: End-to-End Testing Implementation
  • End-User Security: Securing End Users against Attackers
  • End-User Security: The End-User Perspective
  • End-User Security: The Security Administrator Perspective
  • Enhance Reactive Applications with Advanced React
  • Ensuring Delivery of Value and Quality in Agile Projects
  • Ensuring SharePoint 2016 Stability
  • Ensuring Social Media and Application Quality
  • Enterprise Architecture: Architectural Principles & Patterns
  • Enterprise Architecture: Design Architecture for Machine Learning Applications
  • Enterprise DevOps with Docker
  • Enterprise Services: Enterprise Machine Learning with AWS
  • Enterprise Services: Machine Learning Implementation on Google Cloud Platform
  • Enterprise Services: Machine Learning Implementation on Microsoft Azure
  • Errors, Exceptions, and Testing
  • Essential Tools for Ubuntu
  • Establishing Team Goals and Responsibilities
  • Establishing Team Goals and Responsibilities, and Using Feedback Effectively
  • ESXi
  • Ethical Hacker: Account Creation
  • Ethical Hacker: Hacking Techniques
  • Ethical Hacker: Incident Response
  • Ethical Hacker: Risk Assessment
  • Ethical Hacker: Scanning
  • Ethical Hacker: Secure Technology & Applications
  • Ethical Hacker: Security Standards
  • Ethical Standards and PMI® Core Values
  • Ethics and Project Management
  • Events, Manipulating Elements, and AJAX
  • Examining Rails APIs
  • Excel with Python: Constructing Data Visualizations
  • Excel with Python: Performing Advanced Operations
  • Excel with Python: Working with Excel Spreadsheets from Python
  • Exchange 2013 - Core Solutions: Deployment (Update Avail.)
  • Exchange 2016 Migration, Federation, and Sharing
  • Existing Infrastructures and Branch Deployments in Microsoft Windows Server 2008
  • Expanding Design Patterns
  • Exploring Appium and Windows
  • Exploring Blockchain
  • Exploring Chatbots
  • Exploring TestNG
  • Exploring the Advanced Features of Appcelerator Titanium
  • Exploring the Advanced Features of the Ionic Framework
  • Exploring the Basic Features of the Ionic Framework
  • Extending CSS3 with Sass and Less
  • Extending Oracle Commerce Applications
  • Facing Confrontation in Customer Service
  • Features of the Zend Framework
  • Filter and Modify Data in SQL Server 2016
  • Final Exam: Certified Business Analysis Professional (CBAP) - BABOK V2.0 aligned
  • Final Exam: CompTIA Cloud+
  • Final Exam: Six Sigma Black Belt (2007 BOK): Team Management
  • Final Exam: VMware vSphere 6.5: Install, Configure, & Manage
  • Financial Accounting with SAP
  • Finding Your Bearings as a Project Manager
  • First Encounters with Windows 10
  • First Steps with Chef
  • Flask in Python: An Introduction to Web Frameworks & Flask
  • Flask in Python: Building a Simple Web Site Using Flask
  • Flask in Python: User Authentication in a Flask Application
  • Flask in Python: User Interactions in Flask Applications
  • FMEA and Design for Six Sigma
  • FMEA and Other Nonstatistical Analysis Methods in Six Sigma
  • Form Handling with Pipelines and REST
  • Forms, Positioning, and Layout with CSS3
  • Framing Opportunities for Effective Data-driven Decision Making
  • FSD Development with Python: API Development in Flask
  • FSD Development: Java Spring Framework
  • FSD Front-End Development: Frameworks
  • FSD Front-end Development: Server Tools
  • FSD Front-end Development: Testing Tools
  • FSD Front-End Development: UI Development with ReactJS
  • FSD Getting Started: Introduction to Full Stack Development
  • FSD Programming Languages Primer: FSD Front-end Primer
  • FSD Programming Languages: FSD Back End & Miscellaneous Tools
  • FSD Secure Database Development
  • Full Stack Development: Business Logic and Persistence Layers
  • Full Stack Development: Introduction
  • Full Stack Development: Web Communications Layer
  • Full Stack End-to-End Testing
  • Functions in Python: Gaining a Deeper Understanding of Python Functions
  • Functions in Python: Introduction
  • Functions in Python: Working with Advanced Features of Python Functions
  • Functions, References, Exceptions Strings & Namespaces
  • Functions, Type Checking, Error Handling, and Testing
  • Fundamental Methods for Data Science in R
  • Fundamentals of Apache Web Services
  • Fundamentals of Big Query
  • Fundamentals of C++ Programming
  • Fundamentals of Lean and Six Sigma and their Applications
  • G Suite: E-mail and Calendar Management
  • G Suite: Group and OU Management
  • G Suite: Security, Service, and Mobile Device Management
  • GCP Big Data and Security
  • GCP DevOps: CloudOps with Google Cloud Platform
  • GCP Engineering and Streaming Architecture
  • GCP Network Data Processing Models
  • Generic Database Fundamentals: Architecture and Normalization Concepts
  • Generic Database Fundamentals: Relation Algebra, SQL, and Concurrency Concepts
  • Generic Design and Modeling Databases: Concepts and Conceptual Design
  • Generic Design and Modeling Databases: Logical and Physical Design
  • Genymotion: Testing Android Apps
  • Getting Familiar With Windows 8.1 UI and Layout
  • Getting Started with ADO.NET 4 Connections and Commands Using Visual Basic 2010
  • Getting Started with Amazon Web Services
  • Getting Started with ASP.NET MVC Web Applications in Visual Studio 2013
  • Getting Started with Backbone.js
  • Getting Started With Entity Framework
  • Getting Started with F#
  • Getting Started with Hadoop: Advanced Operations Using MapReduce
  • Getting Started with Hadoop: Developing a Basic MapReduce Application
  • Getting Started with Hadoop: Filtering Data Using MapReduce
  • Getting Started with Hadoop: Fundamentals & MapReduce
  • Getting Started with Hadoop: MapReduce Applications With Combiners
  • Getting Started with Hello, World!
  • Getting Started with Hibernate
  • Getting Started with Hive: Bucketing & Window Functions
  • Getting Started with Hive: Introduction
  • Getting Started with Hive: Loading and Querying Data
  • Getting Started with Hive: Optimizing Query Executions
  • Getting Started with Hive: Optimizing Query Executions with Partitioning
  • Getting Started with Hive: Viewing and Querying Complex Data
  • Getting Started with Java Hibernate
  • Getting Started with LINQ
  • Getting Started with LoopBack
  • Getting Started with Maven
  • Getting Started with Microsoft Azure HDInsight and Administering clusters
  • Getting Started with Microsoft R
  • Getting Started with Python: Introduction
  • Getting Started with REST and .NET Core
  • Getting Started with the Software and Integrating Data
  • Getting Started with Typekit
  • Getting Started with WCF 4 using VB 2010
  • Getting the Big Picture by Defining the Project's Scope and Team
  • Git & GitHub: Introduction
  • Git & GitHub: Using GitHub for Source Code Management
  • Git & GitHub: Working with Git Repositories
  • GitHub Extension for Visual Studio
  • Google Cloud
  • Google Cloud Basics
  • Google Cloud Big Data and Machine Learning
  • Google Cloud Data Storage
  • Google Cloud Dataproc
  • Google Cloud Design
  • Google Cloud Network Components
  • Google Cloud Platform Fundamentals
  • Google Cloud Platform Storage and Analytics
  • Google Cloud Programmatic Access
  • Google Cloud Security
  • Google Cloud SQL for Developers: Instance Management in the Developers Console
  • Google Cloud SQL for Developers: Interacting, Connecting, and Management
  • Google Cloud Troubleshooting
  • Google Cloud Virtual Machine Configuration
  • Google Cloud Virtual Machine Deployment
  • Google Cloud Web Applications and Name Resolution
  • Google G Suite Admin: User Management
  • Graphics, Web Hosting and Grunt Performance
  • Group Policy Objects Strategy in Windows Server 2008
  • Guiding the Analysis for Effective Data-driven Decision Making
  • Hadoop Cluster Availability
  • Hadoop Clusters
  • Hadoop Distributed File System
  • Hadoop HDFS: File Permissions
  • Hadoop HDFS: Introduction
  • Hadoop HDFS: Introduction to the Shell
  • Hadoop HDFS: Working with Files
  • Hadoop in the Cloud
  • Hadoop Maintenance and Distributions
  • Hadoop Ranger
  • Handling Team Conflict
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Hands-On Labs
  • Heap, Thread, and Monitor Dump Analyzer
  • Helper Functions and Advanced Ajax
  • High Availability
  • High Availability and Disaster Recovery
  • HP LoadRunner 12 Essentials: Enhancing Vuser Scripts
  • HP LoadRunner 12 Essentials: Working with Controller and Analysis
  • HP LoadRunner 12 Essentials: Working with VuGen
  • HP UFT: Functional Test Automation
  • HR Competencies: Business Acumen and Relationship Management
  • HR Competencies: Consultation and Critical Evaluation
  • HR Competencies: Global and Cultural Effectiveness and Communication
  • HR Competencies: Leadership and Ethical Practice
  • HTML5 and Accessibility
  • HTML5 and Advanced CSS3
  • HTML5 and CSS3
  • HTML5 and JavaScript
  • HTML5 APIs and Local Data Storage
  • HTML5 APIs and Media
  • HTML5 Forms
  • HTML5 Graphics and Canvas
  • HTML5 Layout
  • HTML5 Layout with CSS3
  • HTML5 with JavaScript & CSS3: Advanced Input Validation
  • HTML5 with JavaScript & CSS3: APIs & Data Storage
  • HTML5 with JavaScript & CSS3: Data Flow, Consuming, & Transmitting Data
  • HTML5 with JavaScript & CSS3: HTML5 & Javascript
  • HTML5 with JavaScript & CSS3: Introduction
  • HTML5 with JavaScript & CSS3: Styling HTML5 & JavaScript
  • HTML5 with JavaScript & CSS3: WebSockets & Asynchronous Processing
  • Human Resource Development: Employee Training
  • Human Resource Development: Performance Appraisal and Talent Management
  • Human Resource Development: Regulations and Organizational Development
  • Human Resource Strategy Management: Business and HR Strategy
  • Human Resource Strategy Management: Strategic Planning
  • Human Resources Core Knowledge: Functions and Activities
  • Human Resources Core Knowledge: Skills, Concepts, and Tools
  • Hybrid Cloud Architecture & Deployment: Adopting Migration Strategies
  • Hybrid Cloud Architecture & Deployment: AWS Data & Service Migration
  • Hybrid Cloud Architecture & Deployment: AWS Migration Management
  • Hybrid Cloud Architecture & Deployment: AWS Services & Application Migration
  • Hybrid Cloud Architecture & Deployment: Azure IaaS & Data Migration tools
  • Hybrid Cloud Architecture & Deployment: Azure Migration Tools & Best Practices
  • Hybrid Cloud Architecture & Deployment: Cloud Migration Essentials
  • Hybrid Cloud Architecture & Deployment: Implementing Migration in Azure
  • Hybrid SQL Server Solutions
  • Hypothesis Tests for Variances and Proportions in Six Sigma
  • IBM BigInsights Fundamentals: Analyzing, Querying, and Extracting Big Data
  • IBM BigInsights Fundamentals: Hadoop Solution
  • IBM Memory Analyzer and Visualizer
  • IBM Pattern Modeling Analysis Tool
  • ICND2 3.0: Switch Aggregation and Threat Mitigation
  • ICND2 3.0: Configuring ACLs
  • ICND2 3.0: Configuring and Verifying EIGRP
  • ICND2 3.0: Configuring and Verifying OSPFv3
  • ICND2 3.0: Configuring EtherChannel
  • ICND2 3.0: Configuring Multiarea OSPFv2
  • ICND2 3.0: Configuring OSPFv2
  • ICND2 3.0: Configuring Trunking
  • ICND2 3.0: Device Monitoring, Management, and Programmability
  • ICND2 3.0: Implementing EIGRP
  • ICND2 3.0: Implementing VLANs
  • ICND2 3.0: Infrastructure Services
  • ICND2 3.0: InterVLAN Routing
  • ICND2 3.0: OSPFv2 Operations
  • ICND2 3.0: PortFast and BPDU guard
  • ICND2 3.0: QoS Overview
  • ICND2 3.0: Routing Protocols
  • ICND2 3.0: SNMP Monitoring
  • ICND2 3.0: Spanning Tree Configuration and Verification
  • ICND2 3.0: Spanning Tree Overview
  • ICND2 3.0: Troubleshooting Connectivity
  • ICND2 3.0: Trunking Overview
  • ICND2 3.0: WAN Topologies and Connectivity
  • ICND2 3.0: Wide Area Networks Using GRE and eBGP
  • ICND2 3.0: Wide Area Networks Using PPP
  • Identifying Risk (PMBOK® Guide Sixth Edition)
  • Identifying Six Sigma Projects
  • Identity with Windows Server 2016 Expert Live with Encore
  • IINS 3.0: AnyConnect VPN Using ASDM
  • IINS 3.0: ASA Security and Policies
  • IINS 3.0: Attack Mitigation
  • IINS 3.0: Auto Secure
  • IINS 3.0: Clientless SSL VPN & ASDM
  • IINS 3.0: Configuring Cisco IPS
  • IINS 3.0: Control Plane Policing
  • IINS 3.0: Cryptographic Key Exchange
  • IINS 3.0: Encryption Methods
  • IINS 3.0: Firewall Features
  • IINS 3.0: Firewall Technology
  • IINS 3.0: Introduction to Cisco Security
  • IINS 3.0: Introduction to Network Attacks
  • IINS 3.0: IPS Deployment Configuration
  • IINS 3.0: IPsec and VPN
  • IINS 3.0: IPSec Site-to-Site VPN
  • IINS 3.0: Malware and Data Loss
  • IINS 3.0: Management Plane Access
  • IINS 3.0: Network Access Control
  • IINS 3.0: Network Address Translation
  • IINS 3.0: Network Time Protocol
  • IINS 3.0: Network Topologies
  • IINS 3.0: OSPF and EIGRP Authentication
  • IINS 3.0: Port Based Access Control, BYOD, and MDM
  • IINS 3.0: PVLANs and VLAN Security
  • IINS 3.0: SCP and AAA Technologies
  • IINS 3.0: Secure CLI Access
  • IINS 3.0: Secure Device Management
  • IINS 3.0: SIEM Technology and Security Terminology
  • IINS 3.0: Simple Network Management Protocol
  • IINS 3.0: Specific Network Attacks
  • IINS 3.0: TACACS+
  • IINS 3.0: Threat Mitigation for Email, Web, and Endpoints
  • IINS 3.0: Zone-Based Firewall Configuration
  • IIS and Web Services
  • Impact on Stakeholders and Benchmarking for Six Sigma
  • Implement ASP.NET Authorization and Exception Handling Strategy
  • Implement ASP.NET Claims-Based Authentication
  • Implement Globalization, Azure Role Life Cycle and Search Engine Optimization
  • Implementation
  • Implementations with BigQuery for Big Data
  • Implementing a SQL Database
  • Implementing an Advanced Server 2012 R2 Infrastructure Expert Live with Encore
  • Implementing ASP.NET Authentication
  • Implementing ASP.NET Authentication and Authorization
  • Implementing Cisco IP Routing (ROUTE) 2.0 | Bootcamp with Expert Replay (ITPRO.TV)
  • Implementing Cisco IP Switched Networks (SWITCH) 2.0 | Bootcamp with Expert Replay (ITPRO.TV)
  • Implementing Cisco Network Security (IINS) 3.0 | Bootcamp with Expert Replay (ITPRO.TV)
  • Implementing Communication and Messaging Strategies
  • Implementing Control Flow
  • Implementing Deep Learning: Optimized Deep Learning Applications
  • Implementing Deep Learning: Practical Deep Learning Using Frameworks & Tools
  • Implementing Disk Encryption
  • Implementing File Encryption
  • Implementing Governance Strategies
  • Implementing OpenStack
  • Implementing Secure Sites with ASP.NET
  • Implementing Server Patching and Updating
  • Implementing Smart Contracts Using Ethereum
  • Implementing Unit Testing Best Practices
  • Implementing WebLOAD Solutions
  • Implementing Workload-specific Security Part I
  • Implementing Workload-specific Security Part II
  • Importing and Manipulating Data
  • Improvements to Role Services in Windows Server 2008 R2
  • Improving Neural Networks: Data Scaling & Regularization
  • Improving Neural Networks: Loss Function & Optimization
  • Improving Neural Networks: Neural Network Performance Management
  • Improving Your Technical Writing Skills
  • In Depth with NoSQL
  • Incident Tracking & Response
  • Indexers, Clusters, and Advanced Search
  • Information Security Incident Management (Part 1)
  • Information Security Program Development and Management (Part 2)
  • Information Security: APT Defenses
  • Information Security: Continual Infrastructure Testing
  • Information Security: Hardened Security Topologies
  • Information Security: Honeypots
  • Information Security: NACs & Gateways
  • Information Security: Pen Testing
  • Information Security: Securing Networking Protocols
  • Information Security: Security Governance
  • Information Security: Subnetting & DNS for Security Architects
  • Information Systems Security and Audit Professional
  • Ingesting Data and Computing for Batch Processing
  • Ingesting Data and Computing for Real-time Processing
  • Install and Configure vRealize Suite
  • Install and Manage Windows 10 Applications and Universal Windows Apps
  • Installation of Hadoop
  • Installation, Storage, and Compute with Windows Server 2016 Expert Live with Encore
  • Installing and Configuring Microsoft Windows Server 2012 Expert Encore
  • Installing and Configuring Microsoft Windows Server 2012 R2 Expert Live with Encore
  • Installing and Configuring a Microsoft IIS Server Service
  • Installing and Configuring VMware Workstation 11
  • Installing and Configuring WebSphere Commerce
  • Installing and Configuring Windows 10: Configuring Core Services
  • Installing and Configuring Windows 10: Implementing Windows
  • Installing and Configuring Windows 10: Managing and Maintaining Windows
  • Installing and Configuring Windows 10: Managing Updates and Monitoring Windows
  • Installing and Monitoring Data Protection Manager
  • Installing and Upgrading SQL Server 2016
  • Installing and Using Grunt
  • Installing Operations Manager
  • Installing System Center Configuration Manager
  • Installing Unix
  • Integrate Development and Operations (DevOps)
  • Integrating jQuery Mobile with PhoneGap
  • Intelligent Orchestration: Automating Security Incident Processing
  • Interacting with Customers
  • Interactive Processing using Apache Phoenix on HBase
  • Interactive Queries with Spark SQL and Interactive Hive
  • Interconnecting Cisco Networking Devices, Part 1 (ICND1) 3.0 | Bootcamp with Expert Replay (ITPRO.TV
  • Interconnecting Cisco Networking Devices, Part 2 (ICND2) 3.0 | Bootcamp with Expert Replay (ITPRO.TV
  • Interconnecting SharePoint 2016
  • Intermediate Programming in Force.com
  • Internet of Things and UI/UX
  • Internet of Things Applications
  • Internet of Things Hardware
  • Internet Site Development
  • Interpreting Stakeholder Needs: Managing and Engaging Stakeholders
  • Introducing Cloud Computing
  • Introducing Git
  • Introducing Gulp.js to Web Development
  • Introducing Natural Language Processing
  • Introducing the Windows 10 Creators Update
  • Introducing UWP and Basic App Layouts
  • Introducing Visual Studio
  • Introducing Windows Server 2008
  • Introduction to Agile Software Development
  • Introduction to Algorithms and Data Structures
  • Introduction to Apache Spark
  • Introduction to Appium Testing
  • Introduction to Application Performance Engineering
  • Introduction to Artificial Intelligence
  • Introduction to ASP.NET Core 1.0
  • Introduction to ASP.NET MVC Web Applications
  • Introduction to Automated Testing with Selenium
  • Introduction to Automation with Terraform
  • Introduction to Balsamiq Mockups
  • Introduction to Bash Scripting
  • Introduction to Business Analysis
  • Introduction to Business Analysis and Essential Competencies
  • Introduction to Business Analysis Planning
  • Introduction to Clean Coding
  • Introduction to COBIT 5
  • Introduction to CQRS
  • Introduction to Data Modeling in Hadoop
  • Introduction to Debugging
  • Introduction to Designing a Relational Database
  • Introduction to Digital Currency
  • Introduction to Directives
  • Introduction to Domain-driven Design
  • Introduction to Eclipse
  • Introduction to Express
  • Introduction to Hadoop
  • Introduction to HTML5
  • Introduction to HTML5 and CSS
  • Introduction to HTML5 and CSS3
  • Introduction to Hypothesis Testing and Tests for Means in Six Sigma
  • Introduction to Java EE 6
  • Introduction to jQuery
  • Introduction to Justinmind
  • Introduction to Kotlin
  • Introduction to Kubernetes
  • Introduction to Machine Learning and Supervised Learning
  • Introduction to Microservices
  • Introduction to Models
  • Introduction to Popular Frameworks
  • Introduction to PowerShell 5.0
  • Introduction to Project Management (PMBOK® Guide Fifth Edition)
  • Introduction to R Programming
  • Introduction to RabbitMQ
  • Introduction to Rails
  • Introduction to Reactive Programming
  • Introduction to ReactJS and Grunt
  • Introduction to Secure Programming
  • Introduction to SOLID
  • Introduction to SOLID
  • Introduction to SQL
  • Introduction to SQL: Managing Table Design
  • Introduction to SQL: Multiple Tables and Advanced Queries
  • Introduction to SQL: Views, Transactions, and SQL Security Architecture
  • Introduction to the Entity Framework
  • Introduction to Ubuntu
  • Introduction To UI/UX
  • Introduction to Using PyCharm IDE
  • Introduction to Views
  • Introduction to Virtual Reality
  • Introduction to Web Accessibility
  • Introduction to Web Services
  • Introduction to Windows 10
  • Intrusion Detection: Best Practices
  • Intrusion Prevention: Best Practices
  • iOS 12 Development: Augmented Reality and HealthKit
  • iOS 12 Development: Best Practices in iOS Security
  • iOS 12 Development: Getting Started with Xcode and iOS
  • iOS 12 Development: Testing and Error Handling
  • iOS 12 Development: Working With Data and Gestures
  • iOS 12 Development: Working With Layout and Controls in iOS
  • iOS Application Development: Application Lifecycle Management
  • iOS Application Development: Creating a Basic iOS App
  • iOS Application Development: Creating Adaptive Apps
  • iOS Application Development: Data, Graphics and Media
  • iOS Application Development: iOS 10 Features
  • iOS Application Development: Layout and Controls
  • iOS Application Development: Optimizing Apps
  • iOS Security Architecture and Application Data Protection
  • IPv6 Fundamentals
  • iRise Editor Basics
  • IT Infrastructure Automation: Automated Monitoring
  • IT Infrastructure Automation: Automation and Scalability
  • IT Infrastructure Automation: Introduction to Automation
  • IT Infrastructure Automation: Python Automation Programming
  • IT Infrastructure Automation: Text File Processing and RegEx
  • IT Infrastructure Automation: Version Control and GIT
  • IT Security for End Users: IT Security Fundamentals
  • IT Security for End Users: Secure Corporate Communications and Networking
  • IT Security for End Users: Using Corporate Devices Securely
  • Iterations, Functions and Pointers in ANSI C
  • ITIL ® Operational Support & Analysis
  • ITIL® 2011 Edition Foundation: Continual Service Improvement
  • ITIL® 2011 Edition Foundation: Introduction to Service Operation
  • ITIL® 2011 Edition Foundation: ITIL® and the Service Lifecycle
  • ITIL® 2011 Edition Foundation: Service Design Fundamentals
  • ITIL® 2011 Edition Foundation: Service Design Processes
  • ITIL® 2011 Edition Foundation: Service Operation Processes
  • ITIL® 2011 Edition Foundation: Service Strategy Fundamentals
  • ITIL® 2011 Edition Foundation: Service Strategy Processes
  • ITIL® 2011 Edition Foundation: Service Transition Processes and Policies
  • ITIL® 2011 Edition OSA: Function Activities
  • ITIL® 2011 Edition OSA: Incident Management Interactions
  • ITIL® 2011 Edition OSA: Introduction to Access Management
  • ITIL® 2011 Edition OSA: Introduction to Event Management
  • ITIL® 2011 Edition OSA: Introduction to Functions
  • ITIL® 2011 Edition OSA: Introduction to Incident Management
  • ITIL® 2011 Edition OSA: Introduction to Operational Support and Analysis
  • ITIL® 2011 Edition OSA: Introduction to Problem Management
  • ITIL® 2011 Edition OSA: Introduction to Request Fulfillment
  • ITIL® 2011 Edition OSA: Introduction to the Service Desk
  • ITIL® 2011 Edition OSA: Problem Management Process Interfaces and Challenges
  • ITIL® 2011 Edition OSA: Request Fulfillment Process Interfaces and Challenges
  • ITIL® 2011 Edition OSA: Service Desk Metrics and Outsourcing
  • ITIL® 2011 Edition OSA: Technology and Implementation Considerations
  • ITIL® 2011 Edition Overview: Certification and Benefits
  • ITIL® 2011 Edition Overview: Creating a Service Culture
  • ITIL® 2011 Edition Overview: Introduction to the ITIL® Framework
  • ITIL® 4 Foundation: General Management Practices
  • ITIL® 4 Foundation: Introduction
  • ITIL® 4 Foundation: Key Concepts
  • ITIL® 4 Foundation: Key Concepts of Service Management
  • ITIL® 4 Foundation: Service Management Practices (Part 1)
  • ITIL® 4 Foundation: Service Management Practices (Part 2)
  • ITIL® 4 Foundation: The Guiding Principles
  • ITIL® 4 Foundation: The Service Value Chain
  • ITIL® 4 Foundation: The Service Value System
  • ITIL® Continual Service Improvement
  • ITIL® Service Design Concepts
  • ITIL® Service Design Processes
  • ITIL® Service Operation Concepts
  • ITIL® Service Operation Processes
  • ITIL® Service Strategy Concepts
  • ITIL® Service Strategy Processes
  • ITIL® Service Transition Concepts and Processes
  • Java Application Performance Analysis Tools
  • Java ASYNC Interface
  • Java Development with Eclipse
  • Java EE 7 Back-end Server Application Development: Business Logic
  • Java EE 7 Back-end Server Application Development: Communication and Security
  • Java EE 7 Back-end Server Application Development: EJB Timers and Security
  • Java EE 7 Back-end Server Application Development: Getting Started
  • Java EE 7 Back-end Server Application Development: JAXB and JAX-WS Web Services
  • Java EE 7 Back-end Server Application Development: Web Services
  • Java EE 7 Back-end Web Application Development: Transaction Support
  • Java EE 7 Front End Web Application Development: Business Logic and Persistence
  • Java EE 7 Front End Web Application Development: Communication and Security
  • Java EE 7 Front End Web Application Development: Getting Started
  • Java EE 7 Front End Web Application Development: Presentation with JSF
  • Java EE 7 Front End Web Application Development: Transaction Support
  • Java EE 7 Front End Web Application Development: Web Components
  • Java EE 7 Front End Web Application Development: Web Services
  • Java Multi-Tenant Cloud Application Programming Fundamentals
  • Java OOP: Access Modifiers for Regulating Access
  • Java OOP: Interfaces & Anonymous Classes
  • Java OOP: Multi-level Inheritance
  • Java OOP: Run-time & Compile-time Polymorphism
  • Java OOP: The Role of Constructors in Inheritance
  • Java OOP: The Semantics of the final & abstract Keywords
  • Java OOP: Understanding Inheritance & Polymorphism in Java
  • Java OOP: Understanding Overriding & Hiding in Inheritance
  • Java Programming: Arithmetic & Logical Operations
  • Java Programming: Conditional Evaluation
  • Java Programming: Introduction
  • Java Programming: Iterative Evaluation
  • Java Programming: Working with Primitive Data Types
  • Java Programming: Working with Strings & Wrapper Objects
  • Java SE 11: Encapsulation
  • Java SE 11: Exception Handling
  • Java SE 11: Expressions, Arrays, and Loops
  • Java SE 11: Flow Control & Debugging
  • Java SE 11: Inheritance, Lists, Inference, and Lambda Expressions
  • Java SE 11: Inheritance, Polymorphism, and Abstraction
  • Java SE 11: Introduction to Java SE and the NetBeans IDE
  • Java SE 11: JDK Objects and Nested Loops
  • Java SE 11: JShell
  • Java SE 11: Modular Design
  • Java SE 11: Objects & Classes
  • Java SE 11: Strings and Primitive Data Types
  • Java SE 11: Variables and Operators
  • Java SE 13: Byte & Character Streams in Java
  • Java SE 13: Constructors & Other Methods
  • Java SE 13: Correctly Using Try-Catch-Finally Blocks
  • Java SE 13: More Operations on Member Variables & Methods
  • Java SE 13: Semantics of Method Invocation & Nested Classes
  • Java SE 13: Streams for Primitive Types, Objects, & Buffered IO
  • Java SE 13: Try-with-resources & Custom Exceptions
  • Java SE 13: Understanding Classes & Objects in Java
  • Java SE 13: Understanding Exception Handling in java
  • Java SE 13: Working with Files & Directories
  • Java SE 8 Fundamentals: Classes and Objects
  • Java SE 8 Fundamentals: Data Manipulation and Inheritance
  • Java SE 8 Fundamentals: Interfaces, Exceptions, and Deployment
  • Java SE 8 Fundamentals: Introduction to Java
  • Java SE 8 Fundamentals: Methods, Encapsulation, and Conditionals
  • Java SE 8 Programming: Concurrency, Parallelism, the JDBC API, and Localization
  • Java SE 8 Programming: Date/Time API, I/O and File I/O (NIO.2), and Concurrency
  • Java SE 8 Programming: Encapsulation, Polymorphism, and Abstraction
  • Java SE 8 Programming: Inheritance, Interfaces, Exceptions, and Deployment
  • Java SE 8 Programming: Interfaces, Lambda Expressions, Collections, and Generics
  • Java SE7 Fundamentals: Decision Constructs, Arrays, and Loops
  • Java SE7 Fundamentals: Handling Errors and Deploying Applications
  • Java SE7 Fundamentals: Introduction to Java
  • Java SE7 Fundamentals: Overloading, Validation, and Object-Oriented Concepts
  • Java SE7 Fundamentals: Variables, Operators, and Objects
  • Java SE7 New Features: I/O, Network, and Desktop Enhancements
  • Java SE7 New Features: Java Language and Technology Enhancements
  • Java SE7 Professional: File I/O, Concurrency, JDBC, and Localization
  • Java SE7 Professional: Generics, Errors, and I/O
  • Java SE7 Professional: Syntax and Class Design
  • Java Spring: Adding Security Using the Spring Security Project
  • Java Spring: Annotation Configuration and Java Configuration in Spring
  • Java Spring: Aspect-Oriented Programming Using Spring AOP
  • Java Spring: Creating Web Applications Using Spring MVC
  • Java Spring: Spring Application Basics
  • Java Spring: Working with Data in Spring
  • JavaScript - Ember.js Fundamentals
  • JavaScript Data, Decision Making, and Arrays
  • JavaScript Front End Development: Frameworks
  • JavaScript Front End Development: Front End Development Basics
  • JavaScript Front End Development: Functions and Objects
  • JavaScript Front-end Development: Errors, Events, Objects, & New Features
  • JavaScript Fundamentals
  • JavaScript Fundamentals Expert Live with Encore
  • JavaScript Language Basics
  • JavaScript Objects and Event Handlers
  • JavaScript Operators, Arrays, and Functions
  • JavaScript Sencha: Ext JS
  • JavaScript Sencha: Sencha Touch
  • JavaScript SPA: Adding Views and Handling View Navigation in Durandal
  • JavaScript SPA: Connecting to and Managing Data
  • JavaScript SPA: Durandal Modules and Lifecycle events
  • JavaScript SPA: Getting Started with SPA in Visual Studio 2013
  • JavaScript SPA: Managing Application Data
  • JavaScript SPA: SPA Views and Routes
  • JavaScript SPA: Working with Rich Application Data
  • JavaScript SPA: Working With Validation
  • JavaScript: Advanced Browser Scripting and DHTML
  • JavaScript: Advanced Function Operations
  • JavaScript: Browser Scripting Fundamentals
  • JavaScript: Closures & Prototypes
  • JavaScript: Form Validation & Async Programming in JavaScript
  • JavaScript: Functions & Arrays in JavaScript
  • JavaScript: Getting Started with JavaScript Programming
  • JavaScript: Introduction
  • JavaScript: Objects
  • JavaScript: Types, Operators, & Control Structures in JavaScript
  • JavaScript: Working with the DOM & Events
  • Jenkins 2 Nuts and Bolts
  • Jenkins Administration
  • Jenkins for DevOps: Automated Testing & Advanced Jobs Using Jenkins
  • Jenkins for DevOps: Jenkins Configuration for DevOps
  • JIRA Cloud: Configuring & Managing Boards
  • JIRA Cloud: Creating & Setting Up Projects
  • JIRA Cloud: Planning & Working on a Software Project
  • JIRA Cloud: Reporting in Jira Software
  • JMeter Architecture and Operations
  • jQuery and TypeScript
  • jQuery Mobile – App Basics, UI Controls and Navigation
  • jQuery Mobile – Forms, Lists, Sets and Tables
  • jQuery: Advanced Features and Functions
  • jQuery: Basic Setup and Features
  • jQuery: Using Essential Features and Functions
  • JSON and XML Data Formats
  • JSON Essentials
  • JsRender Fundamentals
  • Juniper Networks Junos Essentials: Configuration Basics
  • Juniper Networks Junos Essentials: Junos OS Fundamentals
  • Juniper Networks Junos Essentials: Monitoring and Maintenance
  • Juniper Networks Junos Essentials: Networking Fundamentals
  • Juniper Networks Junos Essentials: Routing Fundamentals
  • Juniper Networks Junos Essentials: Routing Policy & Firewall Filters
  • JUnit Fundamentals
  • K-Nearest Neighbor (k-NN) & Artificial Neural Networks
  • Kafka Integration with Spark
  • Kafka Integration with Storm
  • Kafka Real-time Applications
  • Kanban Fundamentals: Using Kanban in IT and Software Development
  • Keeping Your Project on Budget (PMBOK® Guide Sixth Edition)
  • Kendo UI: HTML Helpers for ASP.NET MVC
  • Kendo UI: Installation and Overview
  • Kendo UI: Mobile API
  • Key Statistical Concepts
  • Kibana and Reporting Capabilities
  • Knockout Fundamentals
  • Kotlin IDEs
  • Kotlin Loops and Functions
  • Kotlin Objects and Classes
  • Kotlin Syntax
  • Kubernetes & Automation Testing
  • Kubernetes API and Components
  • Kubernetes Clusters
  • Kubernetes Concepts
  • Kubernetes on Google Cloud Platform
  • LAMP Overview and Deployment
  • Leading a Cross-functional Team
  • Leading Teams: Building Trust and Commitment
  • Leading Teams: Dealing with Conflict
  • Leading Teams: Developing the Team and its Culture
  • Leading Teams: Establishing Goals, Roles, and Guidelines
  • Leading Teams: Fostering Effective Communication and Collaboration
  • Leading Teams: Launching a Successful Team
  • Leading Teams: Managing Virtual Teams
  • Leading Teams: Motivating and Optimizing Performance
  • Lean and Six Sigma
  • Lean Improvement Methods and Implementation Planning in Six Sigma
  • Lean in Scrum: Lean Development Practices
  • Lean Principles and Six Sigma Projects
  • Lean Principles in Six Sigma Projects
  • Lean Tools and FMEA
  • Lean Tools and FMEA in Six Sigma
  • Lean Tools for Process Control in Six Sigma
  • Leveraging the JIRA Platform for Development Projects
  • Linear and Logistic Regression
  • Linear Regression Models: An Introduction to Logistic Regression
  • Linear Regression Models: Building Simple Regression Models with Scikit Learn and Keras
  • Linear Regression Models: Introduction to Linear Regression
  • Linear Regression Models: Multiple and Parsimonious Linear Regression
  • Linear Regression Models: Simplifying Regression and Classification with Estimators
  • Live Session 1: Introduction to Virtualization and VMware’s ESXi
  • Live Session 1: Active Directory Design and Implementation
  • Live Session 1: Active Directory Domain Controllers, Accounts, and Permissions
  • Live Session 1: Computer Network Fundementals
  • Live Session 1: Configure and Manage High Availability
  • Live Session 1: Configuring Advanced Services
  • Live Session 1: Deploy, Manage, and Maintain Servers
  • Live Session 1: Encryption, Data Access, Permissions, and Auditing
  • Live Session 1: Exchange Server 2013 SP1 Solution Planning and Implementation
  • Live Session 1: Initiating a Project
  • Live Session 1: Initiating a Project
  • Live Session 1: Install and Configure vCSA and Upgrading vSphere 4 to vSphere 5
  • Live Session 1: Install and Configure Windows Server 2012 Servers
  • Live Session 1: Install, Manage, and Use Windows 10
  • Live Session 1: Installing SQL Server Instances and Creating Databases
  • Live Session 1: Installing, Upgrading, Migrating to Windows 8.1
  • Live Session 1: Introduction to Clustering and HA
  • Live Session 1: Introduction to JavaScript
  • Live Session 1: IPv4/IPv6 Address and DHCP Management
  • Live Session 1: Managing a Server Infrastructure
  • Live Session 1: Plan, Deploy, Manage, and Troubleshoot Mailbox Databases
  • Live Session 1: Planning and Installing SCCM
  • Live Session 1: Planning, Configuring, and Managing Site Resilience
  • Live Session 1: Planning, Install, or Upgrade to SharePoint 2016
  • Live Session 1: Server Roles and Remote Management
  • Live Session 1: SharePoint Components and Design
  • Live Session 1: SQL Server 2016 Database Objects, Indexes, and Views
  • Live Session 1: The Datacenter and SCVMM
  • Live Session 1: Threats and Attacks
  • Live Session 1: Understanding SharePoint 2013 as a Business User
  • Live Session 1: Upgrading to SharePoint Server 2013
  • Live Session 1: Upgrading, Managing, and Monitoring
  • Live Session 1: Windows PowerShell Foundations
  • Live Session 2: Active Directory Object Management
  • Live Session 2: Addressing and Routing
  • Live Session 2: Backing Up and Restoring Databases
  • Live Session 2: Clustered VMs and DR
  • Live Session 2: Columnstore Indexes and Programmability Objects
  • Live Session 2: Configure Devices, Storage, & Network Connections in Windows 10
  • Live Session 2: Configure File and Print Services
  • Live Session 2: Configure File and Storage Solutions
  • Live Session 2: Configure Windows Server 2012 Server Roles and Features
  • Live Session 2: Configuring User Accounts and Policies in Windows 8.1
  • Live Session 2: Deploying and Managing Network Servers
  • Live Session 2: Developing the Mailbox Role
  • Live Session 2: Developing the Mailbox Role
  • Live Session 2: Disks, NTFS, and Sharing
  • Live Session 2: Distributed Resource Scheduler
  • Live Session 2: DNS Name Resolution and Zone Configuration
  • Live Session 2: Introduction to Design Fundamentals
  • Live Session 2: JavaScript Data Types
  • Live Session 2: Manage Data in SQL 2012
  • Live Session 2: Managing and Maintaining Servers, Images, and Storage Solutions
  • Live Session 2: Managing Operating System Deployments
  • Live Session 2: OU Design and Implementation to Support Group Policy
  • Live Session 2: Planning Configuring and Managing Advanced Security
  • Live Session 2: Planning for Business Continuity in SharePoint Server 2013
  • Live Session 2: Planning the Project Scope and Schedule
  • Live Session 2: Planning the Project Scope and Schedule
  • Live Session 2: SharePoint 2016 Security
  • Live Session 2: Using SharePoint Content
  • Live Session 2: VM Hosts, Storage, and Networks
  • Live Session 2: VMware Component Installation for vSphere 6.0
  • Live Session 2: Vulnerabilities and Organizational Security
  • Live Session 2: Web and Service Applications
  • Live Session 2: Windows PowerShell-The Next Level
  • Live Session 3: Cluster Monitoring and Profiles
  • Live Session 3: Conditional Program Execution
  • Live Session 3: Configure Network Services and Access
  • Live Session 3: Configure Windows Server 2012 Hyper-V
  • Live Session 3: Configuring and Managing Compliance, Archiving, and Discovery Solutions
  • Live Session 3: Configuring Client Access Services
  • Live Session 3: Configuring Storage, File Management, and DAC
  • Live Session 3: Configuring User Applications and Virtualization in Windows 8.1
  • Live Session 3: Cryptography, Keys, and Wireless Security
  • Live Session 3: Data Deduplication, Hyper-V Installation and Configuration
  • Live Session 3: DCD Objectives: Creating a Conceptual vSphere Design
  • Live Session 3: Deploying Applications and Software Updates
  • Live Session 3: Establishing Site Owners
  • Live Session 3: Implement Business Continuity and Disaster Recovery
  • Live Session 3: Implementing IP Address Management (IPAM)
  • Live Session 3: Introduction to VMware Basic Networking
  • Live Session 3: IP Subnetting, DHCP, and NIC Teaming
  • Live Session 3: Maintaining Active Directory, Trusts and Site Management
  • Live Session 3: Managing Database Integrity
  • Live Session 3: Network Infrastructures
  • Live Session 3: Optimizing and Troubleshooting SQL 2012
  • Live Session 3: Plan and Deploy a Server Infrastructure
  • Live Session 3: Planning and Deploying Client Access Servers
  • Live Session 3: Planning for Expanded Enterprise SharePoint Support
  • Live Session 3: Planning for Resources, Risk and Quality
  • Live Session 3: Planning for Resources, Risks and Quality
  • Live Session 3: Remote Access Solutions
  • Live Session 3: Security
  • Live Session 3: Service Applications in SharePoint 2016
  • Live Session 3: Support Identities and Authentication in Windows 10
  • Live Session 3: Triggers, Functions, Transactions, and Isolation Levels
  • Live Session 3: VM Administration and Business Continuity Planning
  • Live Session 4: Advanced Resource Management and Basic Design
  • Live Session 4: Building Up SharePoint Sites
  • Live Session 4: Clustering, NLB, and Monitoring
  • Live Session 4: Configure a Network Policy Server Infrastructure
  • Live Session 4: Configure Network Services
  • Live Session 4: Configuring User Data and Settings in Windows 8.1
  • Live Session 4: Creating and Configuring Service Applications
  • Live Session 4: DCD Objectives: Creating a Logical vSphere Design
  • Live Session 4: Defining Group Policy Objects and Implementing Group Policy Preferences
  • Live Session 4: Deploy and Configure Windows Server 2012 Core Network Services
  • Live Session 4: Deploying and Administering System Center Configuration Manager 2012 R2
  • Live Session 4: Design and Implement Network Services Part 1
  • Live Session 4: DHCP, DNS & IPAM
  • Live Session 4: DNS and Hyper-V
  • Live Session 4: Events and Functions
  • Live Session 4: Hyper-V Networking, Containers, and High Availability
  • Live Session 4: Implementing & Managing Coexistence, Hybrid Scenarios, Migration & Federation
  • Live Session 4: Manage Data Access and Protection in Windows 10
  • Live Session 4: Managing Database Concurrency
  • Live Session 4: Monitoring Database Activity, Queries, and SQL Server Instances
  • Live Session 4: Network Configuration and Basic Storage Concepts
  • Live Session 4: Network Connectivity, Remote Access, and Securing Remote Authentication
  • Live Session 4: Network Security
  • Live Session 4: Planning and Configuring Message Transport
  • Live Session 4: Planning and Configuring Message Transport
  • Live Session 4: Planning for Communication, Procurement and Cost
  • Live Session 4: Planning for Stakeholders, Communication, Procurement and Cost
  • Live Session 4: Recovering Databases, Configuring Mail, and Automating Tasks
  • Live Session 4: Security Protocols and Issues, Identity and Access
  • Live Session 4: Service Accounts, Account Policies and Fine Grained Password Policies
  • Live Session 4: SharePoint 2016 Integration
  • Live Session 4: SharePoint Taxonomy
  • Live Session 5: Active Directory
  • Live Session 5: Active Directory Certificate Services
  • Live Session 5: AD Domains and Replication
  • Live Session 5: Advanced Exchange 2013 Monitoring and Troubleshooting
  • Live Session 5: Certificate Services
  • Live Session 5: Compliance Settings and Managing Clients
  • Live Session 5: Configure and Manage Active Directory
  • Live Session 5: Configure and Manage Applications in Windows 10
  • Live Session 5: Configure the Active Directory Infrastructure
  • Live Session 5: Configuring and Managing Storage in vSphere 6.0
  • Live Session 5: Configuring Devices, Disks, and Network Connections in Windows 8.1
  • Live Session 5: Content Management on SharePoint 2016
  • Live Session 5: DCD Objectives: Creating a Physical vSphere Design
  • Live Session 5: Design and Implement Network Services Part 2
  • Live Session 5: Executing the Project
  • Live Session 5: Executing the Project
  • Live Session 5: Implementing Failover Clustering and Managing High Availability Solutions
  • Live Session 5: Implementing Security
  • Live Session 5: Install and Administer Windows Server 2012 Active Directory
  • Live Session 5: Manage Exchange 2013 – Infrastructure Management
  • Live Session 5: Managing Indexes and Statistics
  • Live Session 5: Managing Sites
  • Live Session 5: Network Architecture and Security
  • Live Session 5: Network Operations
  • Live Session 5: Optimize SQL Database Objects and Infrastructure
  • Live Session 5: Plan, Deploy, and Manage Compliance, Archiving, eDiscovery, and Auditing
  • Live Session 5: Planning for SharePoint Business Intelligence
  • Live Session 5: Planning Search Solutions
  • Live Session 5: Supporting Branch Office Technologies
  • Live Session 5: The Document Object Model
  • Live Session 5: Understanding and Managing Active Directory
  • Live Session 5: Update Manager
  • Live Session 5: VPN
  • Live Session 6: AD Federation Services, Web Application Proxy, and AD Rights Management Services
  • Live Session 6: AD RMS and AD FS
  • Live Session 6: Advanced Network Infrastructures
  • Live Session 6: Automating SharePoint with Workflows
  • Live Session 6: Configure and Manage Group Policy
  • Live Session 6: Configure Identity and Access Solutions
  • Live Session 6: Configure Security, Microsoft Edge, Hyper-V, and Power Management in Windows 10
  • Live Session 6: Configuring, Managing, and Migrating Unified Messaging
  • Live Session 6: Create and Manage Windows Server 2012 Group Policy
  • Live Session 6: Database Instances and Performance Tuning
  • Live Session 6: DCD Objectives: Implementation Planning
  • Live Session 6: Design and Implement Network Services Part 3
  • Live Session 6: Group Policy
  • Live Session 6: Groups and GPOs
  • Live Session 6: High Availability
  • Live Session 6: High Availability and Disaster Recovery
  • Live Session 6: Implementation and Troubleshooting
  • Live Session 6: Implementing & Managing Coexistence, Hybrid Scenarios, Migration & Federation
  • Live Session 6: Introduction to Virtual Machine Configuration and Management
  • Live Session 6: Manage Exchange 2013 – Monitoring and Troubleshooting
  • Live Session 6: Managing Inventory and Reporting
  • Live Session 6: Managing Solutions, Apps, and Enterprise Integration
  • Live Session 6: Mobile Computing, Monitoring, Optimizing, and System Management/Recovery
  • Live Session 6: Monitoring and Controlling the Project
  • Live Session 6: Monitoring, Controlling and Closing the Project
  • Live Session 6: PKI, RMS, and Federation
  • Live Session 6: SharePoint 2016 Stability and Performance
  • Live Session 6: The Upgrade Process
  • Live Session 6: Tools and Techniques
  • Live Session 6: User Profiles Maintenance and Monitoring
  • Live Session 6: Virtualization, Policies, Risk Management, and Disaster Response/Recovery
  • Live Session 6: VM Movement and Network Load Balancing Solutions
  • Logging, Scaling, and High Availability
  • Logstash for Data Ingestion in Elasticsearch
  • Machine Learning
  • Machine Learning Examples for Data Science in R
  • Machine Learning with TensorFlow and Cloud ML
  • Machine Learning, Propensity Score, & Segmentation Modeling
  • Malware Removal: Analyzing an Infected System
  • Malware Removal: Identifying Malware Types & Classification Approaches
  • Manage and Control Quality (PMBOK® Guide Sixth Edition)
  • Manage Virtual Machine Manager
  • Manage vRealize Automation Resources
  • Managed and User-provided Services
  • Management and Planning Tools for Six Sigma
  • Management Improvements in Windows Server 2008 R2
  • Management of People: Employee Engagement
  • Management of People: Learning and Development
  • Management of People: Talent Acquisition and Retention
  • Management of People: Total Rewards
  • Management of Relational Database Data
  • Managing a Citrix XenDesktop 7.6 Environment
  • Managing a Project to Minimize Risk and Maximize Quality
  • Managing Activities and Data for Azure Big Data Analytics
  • Managing Agile Software Development
  • Managing an Oracle Database 12c Instance
  • Managing and Monitoring Azure Storage
  • Managing Azure VMs
  • Managing Big Data Operations
  • Managing Database Concurrency
  • Managing File Servers and Data Provisioning in Windows Server 2008
  • Managing HDInsight Data, Jobs, and Security
  • Managing Identities in Office 365
  • Managing IIS in Windows Server 2008
  • Managing Inventory and Reporting
  • Managing Microservices and REST Architecture
  • Managing Microsoft SharePoint Server 2016 Expert Live with Encore
  • Managing Multi-cloud Containers Using Kubernetes
  • Managing Network Interaction
  • Managing Object Construction and Behavior Using Patterns
  • Managing Office 365 Cloud Identities, Synchronization, and Clients
  • Managing Office 365 Identities Using Azure AD Connect
  • Managing Office 365 Identities with PowerShell
  • Managing Privileged Identities Part I
  • Managing Privileged Identities Part II
  • Managing Project Work (PMBOK® Guide Sixth Edition)
  • Managing Projects Using Kanban
  • Managing Server 2016 Malware Solutions
  • Managing Stacks and Application Deployment
  • Managing Stakeholder Engagement (PMBOK® Guide Sixth Edition)
  • Managing Virtual Machine Devices and Resources in VMware Workstation 11
  • Managing XenDesktop 7.5 Desktops and Applications
  • Managing, Troubleshooting, and Automating Software Tests
  • Manipulating the VR Environment
  • Manipulating XML with the XML DOM and Ajax
  • MapReduce Essentials
  • Marketing Automation in Microsoft Dynamics CRM 2013
  • Mastering the Details of a Project's Schedule and Budget
  • Math for Data Science & Machine Learning
  • MATLAB Fundamentals
  • Maven Fundamentals: Documentation, Resources, Plugins, Releases, IDE Integration
  • MD-100 - Windows 10: Active Directory Management
  • MD-100 - Windows 10: Configure Networking
  • MD-100 - Windows 10: Configure Remote Connectivity
  • MD-100 - Windows 10: Configure System & Data Recovery
  • MD-100 - Windows 10: Deployment
  • MD-100 - Windows 10: Manage Devices & Data
  • MD-100 - Windows 10: Manage Updates
  • MD-100 - Windows 10: Monitor a& Manage Windows
  • MD-100 - Windows 10: Perform Post-Installation Configuration
  • MD-100 - Windows 10: Policy-Based Management
  • MD-100 - Windows 10: Prepare for Deployment
  • MD-101 - Managing Modern Desktops: Co-Management
  • MD-101 - Managing Modern Desktops: Conditional Access & Compliance
  • MD-101 - Managing Modern Desktops: Deploy & Update Applications
  • MD-101 - Managing Modern Desktops: Device Authentication
  • MD-101 - Managing Modern Desktops: Device Profiles
  • MD-101 - Managing Modern Desktops: Dynamic Deployments
  • MD-101 - Managing Modern Desktops: Intune Device Enrollment
  • MD-101 - Managing Modern Desktops: Managing Updates
  • MD-101 - Managing Modern Desktops: Mobile Application Management
  • MD-101 - Managing Modern Desktops: Monitoring Devices
  • MD-101 - Managing Modern Desktops: Upgrading Devices
  • MD-101 - Managing Modern Desktops: User Profiles
  • MD-101 - Managing Modern Desktops: Windows Autopilot
  • MD-101 - Managing Modern Desktops: Windows Defender
  • MEAN for FSD Development: Introduction to the MEAN Stack
  • MEAN Stack Development
  • Measurement System Analysis in Six Sigma
  • Measuring and Modeling Relationships between Variables in Six Sigma
  • MERN: Advanced MERN Development
  • Message Handling and Clustering in RabbitMQ
  • Message Records Management
  • Microservice Refactoring Patterns
  • Microservices and Netflix
  • Microservices Architecture
  • Microservices Architecture and Design Patterns
  • Microservices Containers
  • Microservices Current and Future Trends
  • Microservices Deep Dive
  • Microservices Deployment and Continuous Integration
  • Microservices Testing Strategies, Scaling, Monitoring, and Security
  • Microsoft .NET Framework 4.0: Web Applications with Visual Studio 2010 and Visual Basic 2010
  • Microsoft 365 Fundamentals: Mobile Management & Security and Compliance
  • Microsoft 365 Mobility & Security: Implementing Mobile Device Management
  • Microsoft Advanced Windows Store App Development with HTML5: Data and Security
  • Microsoft Advanced Windows Store App Development with HTML5: Localize and Deploy
  • Microsoft Advanced Windows Store App Development with HTML5: Media and Devices
  • Microsoft Advanced Windows Store App Development with HTML5: User Interaction
  • Microsoft Advanced Windows Store Apps with HTML5: Animations and Custom Controls
  • Microsoft Advanced Windows Store Apps with HTML5: Enhancing Performance
  • Microsoft Azure - Implementing Infrastructure Solutions: Virtual Networks
  • Microsoft Azure Architect Technologies: Azure Active Directory
  • Microsoft Azure Architect Technologies: Azure Files and Databases
  • Microsoft Azure Architect Technologies: Azure Remote Connectivity
  • Microsoft Azure Architect Technologies: Load Balancing
  • Microsoft Azure SQL Database Security
  • Microsoft Azure: Introduction
  • Microsoft Azure: Networks and Storage
  • Microsoft Azure: Publishing and Caching
  • Microsoft Dynamics CRM 2013 - Customization and Configuration: Entities
  • Microsoft Dynamics CRM 2013 - Customization and Configuration: Introduction
  • Microsoft Dynamics CRM 2013 - Customization and Configuration: Relationships
  • Microsoft Dynamics CRM 2013: Forms, Marketing, Contacts, and Processes
  • Microsoft Enterprise Library
  • Microsoft Exchange Server 2013 - Advanced Solutions: Advanced Security
  • Microsoft Exchange Server 2013 - Advanced Solutions: Availability
  • Microsoft Exchange Server 2013 - Advanced Solutions: Compliance and Discovery
  • Microsoft Exchange Server 2013 - Advanced Solutions: Migration and Federation
  • Microsoft Exchange Server 2013 - Advanced Solutions: Site-resilience Solutions
  • Microsoft Exchange Server 2013 - Advanced Solutions: Troubleshooting
  • Microsoft Exchange Server 2013 - Advanced Solutions: Unified Messaging
  • Microsoft Exchange Server 2013 - Core Solutions: Monitoring and Troubleshooting
  • Microsoft Lync Server 2013: Administration and Data Resiliency Overview
  • Microsoft Lync Server 2013: Configuration and Maintenance
  • Microsoft PowerShell and Exchange Server: Distribution Groups and Databases
  • Microsoft PowerShell and Exchange Server: Getting Started
  • Microsoft PowerShell and Exchange Server: Managing Mailboxes
  • Microsoft PowerShell and SharePoint: Getting Started
  • Microsoft PowerShell and SharePoint: Managing Sites
  • Microsoft PowerShell and SQL Server: Database Management
  • Microsoft PowerShell and SQL Server: Introduction
  • Microsoft PowerShell for Windows: Aliases, Providers, and Objects
  • Microsoft PowerShell for Windows: Getting Started with PowerShell
  • Microsoft PowerShell for Windows: Remoting and Modules
  • Microsoft Security Fundamentals: Network Security
  • Microsoft Security Fundamentals: Operating System Security
  • Microsoft Security Fundamentals: Security Layers
  • Microsoft Security Fundamentals: Security Software
  • Microsoft SharePoint 2010 Administration Expert Encore
  • Microsoft SharePoint 2013 for Site Owners Expert Live with Encore
  • Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Applications
  • Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Content Support
  • Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Continuity
  • Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Search Services
  • Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Solutions
  • Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Support Service
  • Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Upgrading
  • Microsoft SharePoint Server 2013 - Developing Core Solutions: Business Processes
  • Microsoft SharePoint Server 2013 - Developing Core Solutions: Create Office Apps
  • Microsoft SharePoint Server 2013 - Developing Core Solutions: Implement Security
  • Microsoft SharePoint Server 2013 - Developing Core Solutions: Manage Solutions
  • Microsoft SharePoint Server 2013 - Developing Core Solutions: Managing Data
  • Microsoft SharePoint Server 2013 - Developing Core Solutions: Planning Sites
  • Microsoft SharePoint Server 2013 - Developing Core Solutions: User Experience
  • Microsoft SQL Server 2012 – Developing Databases: CLR Integration
  • Microsoft SQL Server 2012 – Developing Databases: Implementing Indexes
  • Microsoft SQL Server 2012 – Developing Databases: Implementing Tables and Views
  • Microsoft SQL Server 2012 – Developing Databases: Managing and Troubleshooting
  • Microsoft SQL Server 2012 – Developing Databases: Stored Procedures
  • Microsoft SQL Server 2012 – Developing Databases: Tuning and Optimizing Queries
  • Microsoft SQL Server 2012 – Developing Databases: Working with Data
  • Microsoft SQL Server 2012 – Developing Databases: Working with XML Data
  • Microsoft SQL Server 2012 – Implementing a Data Warehouse: Design and Deployment
  • Microsoft SQL Server 2012 – Implementing a Data Warehouse: ETL Solutions
  • Microsoft SQL Server 2012: Configuring High Availability
  • Microsoft SQL Server 2012: Creating Database Objects
  • Microsoft SQL Server 2012: Creating Functions and Triggers
  • Microsoft SQL Server 2012: Creating Programming Objects and Optimizing Queries
  • Microsoft SQL Server 2012: Instance Configuration and Database Creation
  • Microsoft SQL Server 2012: Managing Database Data
  • Microsoft SQL Server 2012: Managing Databases and Automating Tasks
  • Microsoft SQL Server 2012: Managing XML Data
  • Microsoft SQL Server 2012: Manipulate Data Using Operators and Functions
  • Microsoft SQL Server 2012: Querying Basics and Modifying Data
  • Microsoft SQL Server 2014 - Designing BI Solutions: Availability and Recovery
  • Microsoft SQL Server 2014 - Designing BI Solutions: BI Infrastructure Design
  • Microsoft SQL Server 2014 - Designing BI Solutions: Data Models
  • Microsoft SQL Server 2014 - Designing BI Solutions: Extract, Transform, and Load
  • Microsoft SQL Server 2014 - Designing BI Solutions: MDX Queries and Performance
  • Microsoft SQL Server 2014 - Designing BI Solutions: Reporting Services
  • Microsoft SQL Server 2014 - Designing BI Solutions: SharePoint Integration
  • Microsoft SQL Server 2014 - Designing Solutions: Backup and Recovery
  • Microsoft SQL Server 2014 - Designing Solutions: Clustering and AlwaysOn
  • Microsoft SQL Server 2014 - Designing Solutions: High Availability
  • Microsoft SQL Server 2014 - Designing Solutions: Planning Infrastructure
  • Microsoft SQL Server 2014 - Designing Solutions: Private Clouds
  • Microsoft SQL Server 2014 - Designing Solutions: Windows Azure SQL Database
  • Microsoft SQL Server 2014 - Developing Databases: New Features
  • Microsoft SQL Server 2014: Create and Manage Tabular Data Models
  • Microsoft SQL Server 2014: Design and Implement Dimensions
  • Microsoft SQL Server 2014: Design and Install Analysis Services and Tools
  • Microsoft SQL Server 2014: Design Reports and Create Data Sources and Datasets
  • Microsoft SQL Server 2014: Designing Multidimensional Models and Data Sources
  • Microsoft SQL Server 2014: Manage Reporting Services
  • Microsoft SQL Server 2014: Manage, Maintain, and Troubleshoot SSAS
  • Microsoft SQL Server 2014: MDX Queries, Process Models, and Deploy Databases
  • Microsoft SQL Server 2014: Process Report and Create Subscriptions and Schedules
  • Microsoft SQL Server 2014: Report Formatting and Interactivity
  • Microsoft SQL Server 2016 First Look: Preview
  • Microsoft SQL Server 2016: Auditing
  • Microsoft SQL Server 2016: Backing Up Databases
  • Microsoft SQL Server 2016: Data Access and Permissions
  • Microsoft SQL Server 2016: Encryption
  • Microsoft SQL Server 2016: High Availability and Disaster Recovery
  • Microsoft SQL Server 2016: Managing Database Integrity
  • Microsoft SQL Server 2016: Managing Indexes and Statistics
  • Microsoft SQL Server 2016: Monitoring Database Activity and Queries
  • Microsoft SQL Server 2016: Monitoring SQL Server Instances
  • Microsoft SQL Server 2016: Restoring Databases
  • Microsoft SQL Server Data Warehousing and Business Intelligence Overview
  • Microsoft SQL Server: Implement and Configure Cubes
  • Microsoft SQL Server: Implement Partitions and Custom Logic
  • Microsoft System Center 2012 R2 – Configure and Deploy: Application Delivery
  • Microsoft System Center 2012 R2 – Configure and Deploy: Automation
  • Microsoft System Center 2012 R2 – Configure and Deploy: Building Private Clouds
  • Microsoft System Center 2012 R2 – Configure and Deploy: DPM
  • Microsoft System Center 2012 R2 – Configure and Deploy: Extending & Maintaining
  • Microsoft System Center 2012 R2 – Configure and Deploy: Monitoring
  • Microsoft System Center 2012 R2 – Configure and Deploy: Service Management
  • Microsoft System Center 2012 R2 – Configure and Deploy: VMM Overview
  • Microsoft System Center 2012 R2 – Monitor and Operate: Backup and Recovery
  • Microsoft System Center 2012 R2 – Monitor and Operate: Compliance
  • Microsoft System Center 2012 R2 – Monitor and Operate: Deploying Cloud Services
  • Microsoft System Center 2012 R2 – Monitor and Operate: Monitoring Cloud Services
  • Microsoft System Center 2012 R2 – Monitor and Operate: Private Cloud Overview
  • Microsoft System Center 2012 R2 – Monitor and Operate: Problem Management
  • Microsoft System Center 2012 R2 – Monitor and Operate: Service Management
  • Microsoft System Center 2012 R2 – Monitor and Operate: SLAs Widgets & Dashboards
  • Microsoft Team Foundation Server 2013: Clients, Workspaces, and Version Control
  • Microsoft Team Foundation Server 2013: Customization for Team Use
  • Microsoft Team Foundation Server 2013: Installation and Configuration
  • Microsoft Team Foundation Server 2013: Managing an Implementation
  • Microsoft Visual Studio 2012: Advanced HTML5 and JavaScript
  • Microsoft Visual Studio 2012: Consuming and Transmitting Data with HTML5
  • Microsoft Visual Studio 2012: HTML5 and JavaScript
  • Microsoft Visual Studio 2012: HTML5 APIs and Local Storage
  • Microsoft Visual Studio 2012: HTML5 Graphics and Animation
  • Microsoft Visual Studio 2012: HTML5, CSS3, and Adaptive UIs
  • Microsoft Visual Studio 2012: Introduction to HTML5 and CSS3
  • Microsoft Visual Studio 2012: Utilizing the HTML5 WebSocket API and Web Workers
  • Microsoft Windows - Deploying Windows Devices and Apps: Assessment Strategies
  • Microsoft Windows - Deploying Windows Devices and Enterprise Apps: Activation
  • Microsoft Windows - Deploying Windows Devices and Enterprise Apps: Compatibility
  • Microsoft Windows - Deploying Windows Devices and Enterprise Apps: Images & PXE
  • Microsoft Windows - Deploying Windows Devices and Enterprise Apps: MDT and LTI
  • Microsoft Windows - Deploying Windows Devices and Enterprise Apps: ZTI and SCCM
  • Microsoft Windows - Managing Enterprise Devices and Apps: Client Management
  • Microsoft Windows - Managing Enterprise Devices and Apps: Compliance
  • Microsoft Windows - Managing Enterprise Devices and Apps: Desktops and Devices
  • Microsoft Windows - Managing Enterprise Devices and Apps: Inventory and Assets
  • Microsoft Windows - Managing Enterprise Devices and Apps: Managing Applications
  • Microsoft Windows - Managing Enterprise Devices and Apps: Preparing SCCM
  • Microsoft Windows - Managing Enterprise Devices and Apps: Site Management
  • Microsoft Windows - Managing Enterprise Devices and Apps: Software Updates
  • Microsoft Windows 10 First Look: Configuration
  • Microsoft Windows 10 First Look: Interface and New Features
  • Microsoft Windows 10: Implementing Windows
  • Microsoft Windows 10: Supporting Authentication, Permissions, and Data Security
  • Microsoft Windows 10: Supporting Client Compliance and Managing Clients
  • Microsoft Windows 10: Supporting Connectivity and Data Storage
  • Microsoft Windows 10: Supporting Hardware, Performance, and Mobile Devices
  • Microsoft Windows 10: Supporting Operating System and Application Installation
  • Microsoft Windows Nano Server: Nano Server First Look
  • Microsoft Windows Performance Monitoring Basics
  • Microsoft Windows Performance Monitoring Best Practice
  • Microsoft Windows Performance Tools In Windows Operating Systems
  • Microsoft Windows Server 2012 R2 - Administration: Deploying and Managing WDS
  • Microsoft Windows Server 2012 R2 - Administration: File Services and Encryption
  • Microsoft Windows Server 2012 R2 - Administration: Group Policy Processing
  • Microsoft Windows Server 2012 R2 - Administration: Managing Active Directory
  • Microsoft Windows Server 2012 R2 - Administration: Managing GPOs and Preferences
  • Microsoft Windows Server 2012 R2 - Administration: Network Services and Access
  • Microsoft Windows Server 2012 R2 - Administration: RADIUS, NPS, and NAP
  • Microsoft Windows Server 2012 R2 - Administration: Service Accounts and Policies
  • Microsoft Windows Server 2012 R2 - Administration: Updating and Monitoring
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: AD RMS and AD FS
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Business Continuity
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Certificate Services
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Clustering and NLB
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Monitoring
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Storage and Networks
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Updates
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: VM Administration
  • Microsoft Windows Server 2012 R2 - Advanced Infrastructure: VM hosts and guests
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: AD Domains
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: AD Replication
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: DAC
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: DHCP & DNS
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: Federation
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: HA
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: PKI
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: Storage
  • Microsoft Windows Server 2012 R2 - Configuring Advanced Services: VMs and DR
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: Active Directory
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: AD Groups & GPOs
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: DNS
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: Hyper - V
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: Networking
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: Print Services
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: Security
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: Servers
  • Microsoft Windows Server 2012 R2 - Installing and Configuring: Storage
  • Microsoft Windows Server 2012 R2: Server Infrastructure - AD Design
  • Microsoft Windows Server 2012 R2: Server Infrastructure - AD DS
  • Microsoft Windows Server 2012 R2: Server Infrastructure - DHCP Design
  • Microsoft Windows Server 2012 R2: Server Infrastructure - DNS, File and Storage
  • Microsoft Windows Server 2012 R2: Server Infrastructure - Implement NPS and WAP
  • Microsoft Windows Server 2012 R2: Server Infrastructure - IPAM and VPN
  • Microsoft Windows Server 2012 R2: Server Infrastructure - Network Protection
  • Microsoft Windows Server 2012 R2: Server Infrastructure - OU and Group Policy
  • Microsoft Windows Server 2012 R2: Server Infrastructure – DirectAccess
  • Microsoft Windows Server 2012 R2: Server Infrastructure – Server Deployment
  • Microsoft Windows Server 2016 (First Look): Active Directory and Networking
  • Microsoft Windows Store App Essentials with HTML5: Deployment
  • Microsoft Windows Store App Essentials with HTML5: Input Devices and User Touch
  • Microsoft Windows Store App Essentials with HTML5: Managing Data
  • Microsoft Windows Store App Essentials with HTML5: Navigation, Contacts, Tiles
  • Microsoft Windows Store App Essentials with HTML5: Overview
  • Microsoft Windows Store App Essentials with HTML5: PLM and Contracts
  • Microsoft Windows Store App Essentials with HTML5: Security
  • Microsoft Windows Store App Essentials with HTML5: The UI and Layout Controls
  • Migrating Client Applications
  • ML/DL Best Practices: Building Pipelines with Applied Rules
  • ML/DL Best Practices: Machine Learning Workflow Best Practices
  • Mobile App Development: An Introduction Android Development
  • Mobile App Development: Authentication in an Android App
  • Mobile App Development: Building a Basic Android App
  • Mobile App Development: Coding the Behavior of an Android App
  • Mobile App Development: Defining the UI for an Android App
  • Mobile App Development: Testing an Android App
  • Mobile Center for Xamarin and React Native
  • Mobile Center Identity and Troubleshooting
  • Mobile Center SDK for Android and iOS
  • Mobile Center Tools
  • Model Development, Validation, & Evaluation
  • Model Life Cycle Management
  • Modifying and Summarizing Data
  • Module-based Testing: Automated Testing with Model-based Testing
  • MongoDB for Data Wrangling: Aggregation
  • MongoDB for Data Wrangling: Querying
  • MongoDB: Backups, Monitoring, and Stats
  • MongoDB: Cloud and Hadoop Deployments
  • MongoDB: Indexes and Query Optimization
  • MongoDB: Installation Overview
  • MongoDB: Integration with Python
  • MongoDB: Integration with Spark
  • MongoDB: Java REST and GridFS
  • MongoDB: Map Reduce, Atomic Counters, and Binary Data
  • MongoDB: Replication and Security
  • MongoDB: System Management
  • MongoDB: User Management
  • MongoDB: Write, Read, and Aggregate Data
  • Monitor Network Infrastructure in Windows Server 2008
  • Monitor Project Communications (PMBOK® Guide Sixth Edition)
  • Monitor, Tune, and Troubleshoot SharePoint 2016
  • Monitoring & Logging
  • Monitoring & Securing System Configuration
  • Monitoring a Citrix XenDesktop 7.6 Environment
  • Monitoring Office 365 Usage
  • Monitoring, Backups, and Recovery in Windows Server 2008
  • More Advanced HTML5 and CSS3
  • More Spotfire Visualization Techniques
  • Motivating Action with a Compelling and Data-driven Story
  • MS Azure DevOps Solutions: Code Flow & Mobile DevOps
  • MS-100 - Microsoft 365 Identity and Services: Application Access
  • MS-100 - Microsoft 365 Identity and Services: Application Deployment
  • MS-100 - Microsoft 365 Identity and Services: Authentication
  • MS-100 - Microsoft 365 Identity and Services: Designing a Hybrid Identity
  • MS-100 - Microsoft 365 Identity and Services: External Users
  • MS-100 - Microsoft 365 Identity and Services: Identity Strategy
  • MS-100 - Microsoft 365 Identity and Services: Manage Azure AD Identities
  • MS-100 - Microsoft 365 Identity and Services: Migrating Users & Data
  • MS-100 - Microsoft 365 Identity and Services: Multi-Factor Authentication (MFA)
  • MS-100 - Microsoft 365 Identity and Services: Office 365 Workload Deployment
  • MS-100 - Microsoft 365 Identity and Services: Planning a Microsoft Implementation
  • MS-100 - Microsoft 365 Identity and Services: Subscription & Tenant Health
  • MS-100 - Microsoft 365 Identity and Services: Tenancy & Subscriptions
  • MS-100 - Microsoft 365 Identity and Services: User Roles
  • MS-101 - Microsoft 365 Mobility & Security: Auditing
  • MS-101 - Microsoft 365 Mobility & Security: Azure Information Protection
  • MS-101 - Microsoft 365 Mobility & Security: Cloud App Security
  • MS-101 - Microsoft 365 Mobility & Security: Data Governance
  • MS-101 - Microsoft 365 Mobility & Security: Data Loss Prevention
  • MS-101 - Microsoft 365 Mobility & Security: Devices & Apps
  • MS-101 - Microsoft 365 Mobility & Security: eDiscovery
  • MS-101 - Microsoft 365 Mobility & Security: Managing Device Compliance
  • MS-101 - Microsoft 365 Mobility & Security: Security Reports & Alerts
  • MS-101 - Microsoft 365 Mobility & Security: Threat Management
  • MS-101 - Microsoft 365 Mobility & Security: Windows 10 Deployment
  • MS-101 - Microsoft 365 Mobility & Security: Windows Defender Threat Protection
  • MS-200 - Configuring a Messaging Platform: Client Access
  • MS-200 - Configuring a Messaging Platform: Connectors
  • MS-200 - Configuring a Messaging Platform: Database Availability Groups
  • MS-200 - Configuring a Messaging Platform: Database Management
  • MS-200 - Configuring a Messaging Platform: Disaster Recovery
  • MS-200 - Configuring a Messaging Platform: Mail Flow
  • MS-200 - Configuring a Messaging Platform: Messaging Infrastructure Lifecycle
  • MS-200 - Configuring a Messaging Platform: Mobile Devices
  • MS-200 - Configuring a Messaging Platform: Recipient Resources
  • MS-200 - Configuring a Messaging Platform: Transport Pipeline
  • MS-200 - Configuring a Messaging Platform: Troubleshooting Mail Flow Problems
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Address Lists
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Advanced Threat Protection (ATP)
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Compliance
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Deploying Hybrid Environments
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: E-mail Address Policies and Workload M
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Message Hygiene
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Migration
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Offline Address Books (OAB)
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Planning Hybrid Environments
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Public Folders
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Retention & Data Loss Prevention
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Role-based Permissions
  • MS-201 - Implementing a Hybrid and Secure Messaging Platform: Sharing
  • MS-300 - Deploying Microsoft 365 Teamwork: Customizations, Apps, & Metadata
  • MS-300 - Deploying Microsoft 365 Teamwork: Guest Access
  • MS-300 - Deploying Microsoft 365 Teamwork: Manage and Monitor SharePoint Online
  • MS-300 - Deploying Microsoft 365 Teamwork: Monitoring OneDrive
  • MS-300 - Deploying Microsoft 365 Teamwork: OneDrive Users & Groups
  • MS-300 - Deploying Microsoft 365 Teamwork: Sharing & Security
  • MS-300 - Deploying Microsoft 365 Teamwork: Site Collections & Hub Sites
  • MS-300: Deploying Microsoft 365 Teamwork: Identity and Authentication for Teams
  • MS-300: Deploying Microsoft 365 Teamwork: Managing & Monitoring the Teams Environment & Service
  • MS-300: Deploying Microsoft 365 Teamwork: OneDrive for Business
  • MS-300: Deploying Microsoft 365 Teamwork: Teams Settings
  • MS-900 - Microsoft 365 Fundamentals: Azure AD & Access Management
  • MS-900 - Microsoft 365 Fundamentals: Cloud Benefits & Considerations
  • MS-900 - Microsoft 365 Fundamentals: Cloud Services & Principles
  • MS-900 - Microsoft 365 Fundamentals: Deployment Planning, Azure, & Updates
  • MS-900 - Microsoft 365 Fundamentals: Microsoft 365 Pricing and Support
  • MS-900 - Microsoft 365 Fundamentals: Microsoft 365 Purchasing & Support
  • MS-900 - Microsoft 365 Fundamentals: Microsoft 365, Exchange, & SharePoint
  • MS-900 - Microsoft 365 Fundamentals: Office 365 & Collaboration
  • MS-900 - Microsoft 365 Fundamentals: Protecting Your Information
  • MS-900 - Microsoft 365 Fundamentals: Skype for Business, Teams, & Collaboration
  • MS-900 - Microsoft 365 Fundamentals: Understanding Cloud Concepts
  • MS-900 - Microsoft 365 Fundamentals: Windows 10 & Admin Center
  • MS-900 - Microsoft 365 Fundamentals: Windows 10 Enterprise
  • MS-900 - Microsoft 365 Fundamentals: Windows 10, Autopilot, & Azure
  • MS300 - Deploying Microsoft 365 Teamwork: Integrate Microsoft 365 Workloads
  • MS300 - Deploying Microsoft 365 Teamwork: Microsoft 365 and External Data & Systems
  • MS300 - Deploying Microsoft 365 Teamwork: Stream Capabilities
  • MS300 - Deploying Microsoft 365 Teamwork: Yammer
  • Multi-vari Studies, Correlation, and Linear Regression in Six Sigma
  • Multivariate Tools and Nonparametric Tests in Six Sigma
  • MVC Application Routes
  • MVC Application Routes
  • MySQL as a Datastore
  • MySQL Database Development: Database Design Fundamentals
  • MySQL Database Development: DDL Statements
  • MySQL Database Development: GIS, Cloud, and Connectors for MySQL
  • MySQL Database Development: Introduction
  • MySQL Database Development: Manipulating Data
  • MySQL Database Development: Query and Performance Optimization
  • MySQL Database Development: SELECT Statement and Operators
  • MySQL Database Development: Stored Routines, Triggers, and the InnoDB memcached Plugin
  • MySQL Database Development: Working with Functions
  • MySQL: Administration, Transactions, Optimization, Scaling, Backup, and Recovery
  • MySQL: Advanced Routines, Optimization, and DCL
  • MySQL: Creating & Updating Tables
  • MySQL: Database Concepts, Design, and Installation
  • MySQL: General Syntax, Advanced Queries, and Stored Programs
  • MySQL: Getting Started
  • MySQL: Grouping & Aggregation Operations
  • MySQL: Performance Monitoring, Database Health and Integrity, and Security
  • MySQL: Querying Data
  • MySQL: Querying Data Using the SELECT Statement
  • MySQL: Storage Engines, Advanced Indexing, and Maintenance
  • MySQL: Transactions, Savepoints, & Locks
  • MySQL: Triggers & Stored Procedures
  • MySQL: Understanding & Implementing Joins
  • MySQL: Using the Data Manipulation and Definition Statements
  • MySQL: Views, Indices, & Normal Forms
  • Name Resolution in Windows Server 2008
  • Navigating Software Testing Tools: Types of Software Testing Tools
  • Navigating through Changes and Conflicts in Projects
  • Navigation and Layout in Windows Store Apps
  • Navigation Elements and Animations with CSS3
  • Need for Design Patterns and the Principles Guiding Design Patterns
  • Network Access in Microsoft Windows Server 2008
  • Network Access Security in Windows Server 2008
  • Network Survey & Extraction: Network Analysis
  • Network Survey & Extraction: Network Monitoring
  • Networking Fundamentals: Configuring Wired and Wireless Networks and Firewalls
  • Networking Fundamentals: Remote Connections, Shares, and Mac OSX Networking
  • Networking with Windows Server 2016 Expert Live with Encore
  • Neural Networks
  • New Features of Android 7
  • New Project Manager Essentials
  • NHibernate Advanced Techniques
  • NHibernate Essentials
  • NLP for ML with Python: Advanced NLP Using spaCy & Scikit-learn
  • NLP for ML with Python: NLP Using Python & NLTK
  • NoSQL Concepts and Background
  • NoSQL for FSD Development
  • NoSQL Models and Applications
  • Notifications with Toasts and Tiles
  • Object-oriented Programming Fundamentals
  • Office 365 and Azure AD Connect
  • Office 365 Configuring Domains
  • Office 365 DNS Records and Rights Management
  • Office 365 Federated Identities (Single Sign-On)
  • Office 365 Federated Identities - Single Sign-On
  • Office 365 Managing AD FS Servers
  • Office 365 Pilot Deployment
  • Office 365 Services: Configuring Exchange Online and Lync Online
  • Office 365 Services: SharePoint Online Site Collections
  • Office 365 Tenancy and Licensing
  • Online Prototyping with iRise
  • Operating Hadoop Clusters
  • Operationalize and Design with Spark
  • Operations Manager
  • Operators and Expressions in SQL Server 2016
  • Optimize SQL Database Objects and Infrastructure
  • Optimizing and Debugging ANSI C Programs
  • Optimizing and Protecting Application Data
  • Optimizing Application Data
  • Optimizing Clojure Projects
  • Optimizing for Unity VR
  • Optimizing jQuery Mobile Apps
  • Optimizing the Customer Experience
  • Oracle 12c Performance Tuning: Application Monitoring and SQL Diagnostics
  • Oracle 12c Performance Tuning: Automatic Workload Repository
  • Oracle 12c Performance Tuning: Introduction
  • Oracle 12c Performance Tuning: Measuring and Maintaining SQL Performance
  • Oracle 12c Performance Tuning: Metrics and Monitoring
  • Oracle 12c Performance Tuning: Performance Tuning Summary
  • Oracle 12c Performance Tuning: Tuning Instance Memory
  • Oracle 12c Performance Tuning: Tuning Problem SQL Statements
  • Oracle Commerce Application Structure and Deployment
  • Oracle Database 11g Release 2: Application Performance Enhancements
  • Oracle Database 11g Release 2: ASM, Storage and Partitioning Enhancements
  • Oracle Database 11g Release 2: Backup and Recovery
  • Oracle Database 11g Release 2: Backup, Recover, Archive, and Repair Data
  • Oracle Database 11g Release 2: Database Architecture and Installation
  • Oracle Database 11g Release 2: Database Architecture and Recovery Operations
  • Oracle Database 11g Release 2: Database Creation and Instance Management
  • Oracle Database 11g Release 2: Database Diagnostics and Flashback Technologies
  • Oracle Database 11g Release 2: Diagnosability Enhancements
  • Oracle Database 11g Release 2: Installation and Oracle Restart
  • Oracle Database 11g Release 2: Intelligent Infrastructure Enhancements
  • Oracle Database 11g Release 2: Managing Concurrency, Undo, and Auditing
  • Oracle Database 11g Release 2: Managing Database Maintenance and Performance
  • Oracle Database 11g Release 2: Managing Database Memory and Performance
  • Oracle Database 11g Release 2: Managing Database Resources and the Scheduler
  • Oracle Database 11g Release 2: Managing Database Space and Duplication
  • Oracle Database 11g Release 2: Moving Data and Oracle Support
  • Oracle Database 11g Release 2: Oracle Partitioning and Security Features
  • Oracle Database 11g Release 2: Oracle Scheduler and Secure Backup
  • Oracle Database 11g Release 2: Performing Restore and Recovery Tasks
  • Oracle Database 11g Release 2: SQL Monitoring and Performance Enhancements
  • Oracle Database 11g Release 2: Storage Structures and User Security
  • Oracle Database 11g Release 2: The ASM Instance and Network Connectivity
  • Oracle Database 11g Release 2: The RMAN Catalog and Creating Backups
  • Oracle Database 11g Release 2: Using Change Management Solutions
  • Oracle Database 11g Release 2: Using, Monitoring and Tuning RMAN
  • Oracle Database 11g: Configure, Manage, and Use Services in RAC
  • Oracle Database 11g: Installation of Clusterware and RAC
  • Oracle Database 12c - Backup and Recovery: Configuring for Recoverability
  • Oracle Database 12c - Backup and Recovery: Duplicating Databases and Tuning RMAN
  • Oracle Database 12c - Backup and Recovery: Failure and Recovery Concepts
  • Oracle Database 12c - Backup and Recovery: Perform Recovery and Secure Backup
  • Oracle Database 12c - Backup and Recovery: Performing and Managing Backups
  • Oracle Database 12c - Backup and Recovery: Transporting Data and Performing PITR
  • Oracle Database 12c - Backup and Recovery: Using Flashback Technologies
  • Oracle Database 12c - Introduction to SQL: Data Conversion and Aggregating Data
  • Oracle Database 12c - Introduction to SQL: Data Manipulation Language
  • Oracle Database 12c - Introduction to SQL: Relational Database and SQL Developer
  • Oracle Database 12c - Introduction to SQL: Restrict, Sort, and Customize Output
  • Oracle Database 12c - Introduction to SQL: SQL*Plus and SELECT Statement
  • Oracle Database 12c - Introduction to SQL: Working with Joins and Subqueries
  • Oracle Database 12c - Introduction to SQL: Working with SET Operators and DDL
  • Oracle Database 12c – Install and Upgrade: Database Architecture
  • Oracle Database 12c – Install and Upgrade: Installation
  • Oracle Database 12c – Install and Upgrade: Upgrading
  • Oracle Database 12c R2 SQL: Controlling User Access
  • Oracle Database 12c R2 SQL: Conversion Functions and Conditional Expressions
  • Oracle Database 12c R2 SQL: Creating Other Schema Objects
  • Oracle Database 12c R2 SQL: Data Definition Language (DDL)
  • Oracle Database 12c R2 SQL: Data Manipulation Language and Transaction Control Language
  • Oracle Database 12c R2 SQL: Displaying Data from Multiple Tables
  • Oracle Database 12c R2 SQL: Managing Objects with Data Dictionary Views 
  • Oracle Database 12c R2 SQL: Managing Schema Objects    
  • Oracle Database 12c R2 SQL: Manipulating Data Using Advanced Queries
  • Oracle Database 12c R2 SQL: Reporting Aggregated Data Using the Group Functions   
  • Oracle Database 12c R2 SQL: Restricting and Sorting Data
  • Oracle Database 12c R2 SQL: SQL*Plus
  • Oracle Database 12c R2 SQL: Using Basic SELECT statements
  • Oracle Database 12c R2 SQL: Using Single-Row Functions to Customize Output   
  • Oracle Database 12c R2 SQL: Using Structured Query Language (SQL)
  • Oracle Database 12c R2 SQL: Using Subqueries to Solve Queries 
  • Oracle Database 12c R2 SQL: Using the Set Operators
  • Oracle Database 12c RAC Administration: Backup and Recovery
  • Oracle Database 12c RAC Administration: Client Connections and QoS
  • Oracle Database 12c RAC Administration: Day-to-Day Administration
  • Oracle Database 12c RAC Administration: Global Resource Management
  • Oracle Database 12c RAC Administration: Installing, Configuring, and Patching
  • Oracle Database 12c RAC Administration: Introduction to Oracle RAC
  • Oracle Database 12c RAC Administration: Monitoring and Tuning
  • Oracle Database 12c RAC Administration: Services and Multitenant Architecture
  • Oracle Database 12c: Enterprise Manager Cloud Control and Creating CDB and PDB
  • Oracle Database 12c: High Availability and Database Management
  • Oracle Database 12c: Managing CDB and PDB, and Data Optimization
  • Oracle Database 12c: Managing Security
  • Oracle Database 12c: Resource Manager, Online Operations, and ADR
  • Oracle Database 12c: Transporting Databases and Managing Data
  • Oracle Database 12c: Tuning SQL and Using ADDM
  • Oracle Database 12c: Using Automatic Data Optimization, Storage, and Archiving
  • Orchestrator Performance and Requirements
  • Organization and HR: Employee Relations
  • Organization and HR: Organizational Effectiveness and Development
  • Organization and HR: Structure of the HR Function
  • Organization and HR: Workforce Management and Using Technology and Data
  • Organizational Goals and Six Sigma
  • OSs, Regulations, & Laws
  • Overview & Prerequisite Setup for System Center Configuration Manager 2012 R2
  • Overview of the ITIL® Service Lifecycle
  • Overview of the Scrum Development Process
  • OWASP A10 and A9: API and Component Attacks
  • OWASP A4 and A2: Broken Applications
  • OWASP A5 and A1: Security and Injection
  • OWASP A7 and A6: Leaky and Unprepared Applications
  • OWASP A8 and A3: Cross-site Attacks
  • OWASP Overview
  • OWASP Top 10: List Item Overview
  • OWASP: Top 10 & Web Applications
  • OWASP: Top 10 Item A10
  • OWASP: Top 10 Items A3, A2, & A1
  • OWASP: Top 10 Items A6, A5, & A4
  • OWASP: Top 10 Items A9, A8, & A7
  • OWASP: Web Application Security
  • Packages and Data Types
  • Patch Management and Securing and Monitoring Servers in Windows Server 2008
  • Patterns in Programming: API Design Patterns
  • PAWS and LAPS
  • Pen Testing Awareness: Results Management
  • Pen Testing: Advanced Pen Testing Techniques
  • Pen Testing: End-user Behavior
  • Penetration Testing Fundamentals
  • Perform Quality Assurance and Quality Control (PMBOK® Guide Fifth Edition)
  • Performance Analyzer Features
  • Performance Metrics for Six Sigma
  • Performance Monitoring
  • Performance Testing and JMeter
  • Performance Tuning
  • Performance Tuning of Hadoop Clusters
  • Perl Language Essentials
  • Perl Programming Techniques
  • Personal Skills for Effective Business Analysis
  • Perspectives for Effective Business Analysis
  • PhoneGap: Exploring Advanced Features
  • PhoneGap: Exploring Basic Features
  • Physical Penetration Testing
  • Plan and Acquire Resources (PMBOK® Guide Sixth Edition)
  • Plan and Define Project Scope (PMBOK® Guide Sixth Edition)
  • Plan and Manage Communications (PMBOK® Guide Sixth Edition)
  • Planning Active Directory and Group Policy for Windows Server 2008
  • Planning AI Implementation
  • Planning an Agile Software Development Project
  • Planning and Controlling the Project Schedule
  • Planning and Installing SharePoint 2016
  • Planning Business Analysis Communication and Monitoring
  • Planning for and Deploying Mailbox Servers
  • Planning for Data Protection Manager
  • Planning Measures: Incident Response Planning
  • Planning Name Resolution and IP Addressing in Microsoft Windows Server 2008
  • Planning Project Quality (PMBOK® Guide Fifth Edition)
  • Planning Quality Management (PMBOK® Guide Sixth Edition)
  • Planning Risk Management (PMBOK® Guide Sixth Edition)
  • Planning Stakeholder Engagement (PMBOK® Guide Sixth Edition)
  • Planning Windows Server 2008 Deployment
  • Planning, Installation, and Upgrading
  • PMP Practical Exercises (PMBOK® Guide Fifth Edition)
  • Policy & Governance: Incident Response
  • Polishing Your Skills for Excellent Customer Service
  • Positioning Powerful Messages to Enable Action
  • Post-Test 1: Under the Hood - Motherboards & Components
  • Post-Test 1: Windows XP
  • Post-Test 1: Active Directory Design and Implementation
  • Post-Test 1: Active Directory Domain Controllers, Accounts, and Permissions
  • Post-Test 1: Computer Network Fundementals
  • Post-Test 1: Configure and Manage High Availability
  • Post-Test 1: Configuring Advanced Services
  • Post-Test 1: Deploy, Manage, and Maintain Servers
  • Post-Test 1: Designing a Farm Topology
  • Post-Test 1: Encryption, Data Access, Permissions, and Auditing
  • Post-Test 1: Exchange Server 2013 SP1 Solution Planning and Implementation
  • Post-Test 1: Initiating a Project
  • Post-Test 1: Initiating a Project
  • Post-Test 1: Inside a Computer
  • Post-Test 1: Install and Configure Windows Server 2012 Servers
  • Post-Test 1: Install, Manage, and Use Windows 10
  • Post-Test 1: Installing and Configuring Microsoft SharePoint 2010
  • Post-Test 1: Installing SQL Server Instances and Creating Databases
  • Post-Test 1: Installing, Upgrading, Migrating to Windows 8
  • Post-Test 1: Introduction to Clustering and HA
  • Post-Test 1: Introduction to JavaScript
  • Post-Test 1: Introduction to Virtualization and VMware’s ESXi
  • Post-Test 1: IPv4/IPv6 Address and DHCP Management
  • Post-Test 1: Managing a Server Infrastructure
  • Post-Test 1: Plan, Deploy, Manage, and Troubleshoot Mailbox Databases
  • Post-Test 1: Planning and Installing SCCM
  • Post-Test 1: Planning, Configuring, and Managing Site Resilience
  • Post-Test 1: Planning, Install, or Upgrade to SharePoint 2016
  • Post-Test 1: Server Roles and Remote Management
  • Post-Test 1: SharePoint Components and Design
  • Post-Test 1: SQL Server 2016 Database Objects, Indexes, and Views
  • Post-Test 1: The Datacenter and SCVMM
  • Post-Test 1: Threats and Attacks
  • Post-Test 1: Understanding Network Security
  • Post-Test 1: Understanding SharePoint 2013 as a Business User
  • Post-Test 1: Understanding Windows
  • Post-Test 1: Upgrading to SharePoint Server 2013
  • Post-Test 1: Upgrading, Managing, and Monitoring
  • Post-Test 1: Windows PowerShell Foundations
  • Post-Test 2: Active Directory Object Management
  • Post-Test 2: Addressing and Routing
  • Post-Test 2: Backing Up and Restoring Databases
  • Post-Test 2: Clustered VMs and DR
  • Post-Test 2: Columnstore Indexes and Programmability Objects
  • Post-Test 2: Compliance and Operational Security
  • Post-Test 2: Computer Components
  • Post-Test 2: Configure Devices, Storage, & Network Connections in Windows 10
  • Post-Test 2: Configure File and Print Services
  • Post-Test 2: Configure File and Storage Solutions
  • Post-Test 2: Configure Windows Server 2012 Server Roles and Features
  • Post-Test 2: Configuring User Accounts and Policies in Windows 8
  • Post-Test 2: Deploying and Managing Network Servers
  • Post-Test 2: Developing the Mailbox Role
  • Post-Test 2: Developing the Mailbox Role
  • Post-Test 2: Disks, NTFS, and Sharing
  • Post-Test 2: Distributed Resource Scheduler
  • Post-Test 2: DNS Name Resolution and Zone Configuration
  • Post-Test 2: JavaScript Data Types
  • Post-Test 2: Manage Data in SQL 2012
  • Post-Test 2: Managing and Maintaining Servers, Images, and Storage Solutions
  • Post-Test 2: Managing Operating System Deployments
  • Post-Test 2: More Windows Options
  • Post-Test 2: OU Design and Implementation to Support Group Policy
  • Post-Test 2: Planning Application Services and Component Deployment
  • Post-Test 2: Planning Configuring and Managing Advanced Security
  • Post-Test 2: Planning for Business Continuity in SharePoint Server 2013
  • Post-Test 2: Planning the Project Scope and Schedule
  • Post-Test 2: Planning the Project Scope and Schedule
  • Post-Test 2: Power and Connection Interfaces
  • Post-Test 2: SharePoint 2016 Security
  • Post-Test 2: Upgrading to Microsoft SharePoint 2010
  • Post-Test 2: Using SharePoint Content
  • Post-Test 2: VM Hosts, Storage, and Networks
  • Post-Test 2: VMware Component Installation for vSphere 6.0
  • Post-Test 2: Vulnerabilities and Organizational Security
  • Post-Test 2: Web and Service Applications
  • Post-Test 2: Windows PowerShell-The Next Level
  • Post-Test 2: Windows Vista
  • Post-Test 3: Advanced Windows Configuration
  • Post-Test 3: Building a Computer
  • Post-Test 3: Cluster Monitoring and Profiles
  • Post-Test 3: Conditional Program Execution
  • Post-Test 3: Configure Network Services and Access
  • Post-Test 3: Configure Windows Server 2012 Hyper-V
  • Post-Test 3: Configuring and Administering SharePoint 2010 Search
  • Post-Test 3: Configuring and Managing Compliance, Archiving, and Discovery Solutions
  • Post-Test 3: Configuring Client Access Services
  • Post-Test 3: Configuring Storage, File Management, and DAC
  • Post-Test 3: Configuring User Applications and Virtualization in Windows 8
  • Post-Test 3: Cryptography, Keys, and Wireless Security
  • Post-Test 3: Data Deduplication, Hyper-V Installation and Configuration
  • Post-Test 3: Deploying Applications and Software Updates
  • Post-Test 3: Establishing Site Owners
  • Post-Test 3: Implement Business Continuity and Disaster Recovery
  • Post-Test 3: Implementing IP Address Management (IPAM)
  • Post-Test 3: Introduction to VMware Basic Networking
  • Post-Test 3: IP Subnetting, DHCP, and NIC Teaming
  • Post-Test 3: Maintaining Active Directory, Trusts and Site Management
  • Post-Test 3: Managing Database Integrity
  • Post-Test 3: Network Infrastructures
  • Post-Test 3: Networking
  • Post-Test 3: Optimizing and Troubleshooting SQL 2012
  • Post-Test 3: Plan and Deploy a Server Infrastructure
  • Post-Test 3: Planning an Upgrade/Migration Strategy and Security Deployment
  • Post-Test 3: Planning and Deploying Client Access Servers
  • Post-Test 3: Planning for Expanded Enterprise SharePoint Support
  • Post-Test 3: Planning for Resources, Risk and Quality
  • Post-Test 3: Planning for Resources, Risks and Quality
  • Post-Test 3: Remote Access Solutions
  • Post-Test 3: Security
  • Post-Test 3: Service Applications in SharePoint 2016
  • Post-Test 3: Support Identities and Authentication in Windows 10
  • Post-Test 3: Threats and Vulnerabilities
  • Post-Test 3: Triggers, Functions, Transactions, and Isolation Levels
  • Post-Test 3: VM Administration and Business Continuity Planning
  • Post-Test 3: Windows 7
  • Post-Test 4: Advanced Resource Management and Basic Design
  • Post-Test 4: Application, Host and Data Security
  • Post-Test 4: Building Up SharePoint Sites
  • Post-Test 4: Clustering, NLB, and Monitoring
  • Post-Test 4: Computer Networking
  • Post-Test 4: Configure a Network Policy Server Infrastructure
  • Post-Test 4: Configure Network Services
  • Post-Test 4: Configuring User Data and Settings in Windows 8
  • Post-Test 4: Creating and Configuring Service Applications
  • Post-Test 4: Defining Group Policy Objects and Implementing Group Policy Preferences
  • Post-Test 4: Defining Operations Strategy and Business Continuity
  • Post-Test 4: Deploy and Configure Windows Server 2012 Core Network Services
  • Post-Test 4: Deploying and Administering System Center Configuration Manager 2012 R2
  • Post-Test 4: Design and Implement Network Services Part 1
  • Post-Test 4: DHCP, DNS & IPAM
  • Post-Test 4: DNS and Hyper-V
  • Post-Test 4: Events and Functions
  • Post-Test 4: Hyper-V Networking, Containers, and High Availability
  • Post-Test 4: Implementing & Managing Coexistence, Hybrid Scenarios, Migration & Federation
  • Post-Test 4: Laptops & Mobile Devices
  • Post-Test 4: Manage Data Access and Protection in Windows 10
  • Post-Test 4: Managing Database Concurrency
  • Post-Test 4: Monitoring Database Activity, Queries, and SQL Server Instances
  • Post-Test 4: Network Configuration and Basic Storage Concepts
  • Post-Test 4: Network Connectivity, Remote Access, and Securing Remote Authentication
  • Post-Test 4: Network Security
  • Post-Test 4: Other Operating Systems
  • Post-Test 4: Planning and Configuring Message Transport
  • Post-Test 4: Planning and Configuring Message Transport
  • Post-Test 4: Planning for Communication, Procurement and Cost
  • Post-Test 4: Planning for Stakeholders, Communication, Procurement and Cost
  • Post-Test 4: Recovering Databases, Configuring Mail, and Automating Tasks
  • Post-Test 4: Security Protocols and Issues, Identity and Access
  • Post-Test 4: Service Accounts, Account Policies and Fine Grained Password Policies
  • Post-Test 4: SharePoint 2016 Integration
  • Post-Test 4: SharePoint Taxonomy
  • Post-Test 4: Web Applications, Authentication and Application Security Configuration
  • Post-Test 4: Windows Networking on a Client/Desktop
  • Post-Test 5: Access Control and Identity Management
  • Post-Test 5: Active Directory
  • Post-Test 5: Active Directory Certificate Services
  • Post-Test 5: AD Domains and Replication
  • Post-Test 5: Advanced Exchange 2013 Monitoring and Troubleshooting
  • Post-Test 5: Certificate Services
  • Post-Test 5: Compliance Settings and Managing Clients
  • Post-Test 5: Computer Threats and Security
  • Post-Test 5: Configure and Manage Active Directory
  • Post-Test 5: Configure and Manage Applications in Windows 10
  • Post-Test 5: Configure the Active Directory Infrastructure
  • Post-Test 5: Configuring and Managing Storage in vSphere 6.0
  • Post-Test 5: Configuring Devices, Disks, and Network Connections in Windows 8
  • Post-Test 5: Configuring SharePoint 2010 Site Collections, Managing Features and Solutions
  • Post-Test 5: Content Management on SharePoint 2016
  • Post-Test 5: Design and Implement Network Services Part 2
  • Post-Test 5: Executing the Project
  • Post-Test 5: Executing the Project
  • Post-Test 5: Implementing Failover Clustering and Managing High Availability Solutions
  • Post-Test 5: Implementing Security
  • Post-Test 5: Install and Administer Windows Server 2012 Active Directory
  • Post-Test 5: Manage Exchange 2013 – Infrastructure Management
  • Post-Test 5: Managing Indexes and Statistics
  • Post-Test 5: Managing Sites
  • Post-Test 5: Network Architecture and Security
  • Post-Test 5: Network Operations
  • Post-Test 5: Optimize SQL Database Objects and Infrastructure
  • Post-Test 5: Plan, Deploy, and Manage Compliance, Archiving, eDiscovery, and Auditing
  • Post-Test 5: Planning for SharePoint Business Intelligence
  • Post-Test 5: Planning Search Solutions
  • Post-Test 5: Planning Search Solutions
  • Post-Test 5: Portable Devices
  • Post-Test 5: Printers & Computer Displays
  • Post-Test 5: Security and Mobile Devices
  • Post-Test 5: Supporting Branch Office Technologies
  • Post-Test 5: The Document Object Model
  • Post-Test 5: Understanding and Managing Active Directory
  • Post-Test 5: Update Manager
  • Post-Test 6: AD Federation Services, Web Application Proxy, and AD Rights Management Services
  • Post-Test 6: AD RMS and AD FS
  • Post-Test 6: Advanced Network Infrastructures
  • Post-Test 6: Automating SharePoint with Workflows
  • Post-Test 6: Configure and Manage Group Policy
  • Post-Test 6: Configure Identity and Access Solutions
  • Post-Test 6: Configure Security, Microsoft Edge, Hyper-V, and Power Management in Windows 10
  • Post-Test 6: Configuring, Managing, and Migrating Unified Messaging
  • Post-Test 6: Create and Manage Windows Server 2012 Group Policy
  • Post-Test 6: Cryptography
  • Post-Test 6: Database Instances and Performance Tuning
  • Post-Test 6: Design and Implement Network Services Part 3
  • Post-Test 6: Group Policy
  • Post-Test 6: Groups and GPOs
  • Post-Test 6: High Availability
  • Post-Test 6: High Availability and Disaster Recovery
  • Post-Test 6: Implementation and Troubleshooting
  • Post-Test 6: Implementing & Managing Coexistence, Hybrid Scenarios, Migration & Federation
  • Post-Test 6: Introduction to Virtual Machine Configuration and Management
  • Post-Test 6: Manage Exchange 2013 – Monitoring and Troubleshooting
  • Post-Test 6: Managing Inventory and Reporting
  • Post-Test 6: Managing Solutions, Apps, and Enterprise Integration
  • Post-Test 6: Mobile Computing, Monitoring, Optimizing, and System Management/Recovery
  • Post-Test 6: Monitoring and Controlling the Project
  • Post-Test 6: Monitoring, Controlling and Closing the Project
  • Post-Test 6: Operational Procedures
  • Post-Test 6: PKI, RMS, and Federation
  • Post-Test 6: Planning Business Solutions
  • Post-Test 6: Printers
  • Post-Test 6: SharePoint 2010 Operational Health and Performance
  • Post-Test 6: SharePoint 2016 Stability and Performance
  • Post-Test 6: The Upgrade Process
  • Post-Test 6: Tools and Techniques
  • Post-Test 6: Trouble Shooting
  • Post-Test 6: Troubleshooting
  • Post-Test 6: User Profiles Maintenance and Monitoring
  • Post-Test 6: Virtualization, Policies, Risk Management, and Disaster Response/Recovery
  • Post-Test 6: VM Movement and Network Load Balancing Solutions
  • PostgreSQL Database Fundamentals Part #1
  • PostgreSQL Database Fundamentals Part #2
  • Powering Recommendation Engines: Recommendation Engines
  • PowerShell 5.0 Aliases, Providers, and Objects
  • PowerShell 5.0 Cmdlet Structure and Help
  • PowerShell 5.0 Configuration, Advanced Help, and Queries
  • PowerShell 5.0 Desired State Configuration (DSC)
  • PowerShell 5.0 DSC and Azure
  • PowerShell 5.0 DSC Resources
  • PowerShell 5.0 DSC with Linux and JEA
  • PowerShell 5.0 DSC, Configurations, and Repositories
  • PowerShell 5.0 Local Configuration Manager (LCM)
  • PowerShell 5.0 Output Formatting, Modules, and Customization
  • PowerShell 5.0 Remote Management
  • PowerShell 5.0 Resource Creation and Configuration
  • PowerShell 5.0 Syntax, Help, and Conditionals
  • Practice Exam 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND1)
  • Practice Exam 200-105 Interconnecting Cisco Networking Devices Part 2 (ICND2)
  • Practice Exam 70-740 Installation, Storage, and Compute with Windows Server 2016
  • Practice Exam: 210-260 Implementing Cisco Network Security (IINS)
  • Practice Exam: Administering Microsoft Windows Server 2012
  • Practice Exam: Administering Microsoft Windows Server 2012 R2
  • Practice Exam: Advanced Solutions of Microsoft Exchange Server 2013
  • Practice Exam: Advanced Solutions of Microsoft SharePoint Server 2013
  • Practice Exam: CompTIA A+ 220-801
  • Practice Exam: CompTIA A+ 220-802
  • Practice Exam: CompTIA A+ 220-901
  • Practice Exam: CompTIA A+ 220-902
  • Practice Exam: CompTIA Network+ N10-006
  • Practice Exam: CompTIA Project+ (2009 Edition)
  • Practice Exam: CompTIA Security+ 2012
  • Practice Exam: Configuring Advanced Windows Server 2012 R2
  • Practice Exam: Configuring Advanced Windows Server 2012 Services
  • Practice Exam: Configuring Microsoft SharePoint 2010
  • Practice Exam: Configuring Microsoft Windows 8
  • Practice Exam: Core Solutions of Microsoft Exchange Server 2013
  • Practice Exam: Core Solutions of Microsoft SharePoint Server 2013
  • Practice Exam: Designing and Implementing a Server 2012 Infrastructure
  • Practice Exam: Implementing an Advanced Server 2012 Infrastructure
  • Practice Exam: Implementing Cisco IP Routing (ROUTE) 2.0
  • Practice Exam: Implementing Cisco Switched Networks (SWITCH) 2.0
  • Practice Exam: Installing and Configuring Microsoft Windows Server 2012
  • Practice Exam: Installing and Configuring Microsoft Windows Server 2012 R2
  • Practice Exam: Microsoft SharePoint 2010 Administration
  • Practice Exam: Microsoft SharePoint Site Owner
  • Practice Exam: SQL 2012 Admin
  • Pre-Test 1: Under the Hood - Motherboards & Components
  • Pre-Test 1: Windows XP
  • Pre-Test 1: Active Directory Design and Implementation
  • Pre-Test 1: Active Directory Domain Controllers, Accounts, and Permissions
  • Pre-Test 1: Computer Network Fundementals
  • Pre-Test 1: Configure and Manage High Availability
  • Pre-Test 1: Configuring Advanced Services
  • Pre-Test 1: Deploy, Manage, and Maintain Servers
  • Pre-Test 1: Designing a Farm Topology
  • Pre-Test 1: Encryption, Data Access, Permissions, and Auditing
  • Pre-Test 1: Exchange Server 2013 SP1 Solution Planning and Implementation
  • Pre-Test 1: Initiating a Project
  • Pre-Test 1: Initiating a Project
  • Pre-Test 1: Inside a Computer
  • Pre-Test 1: Install and Configure Windows Server 2012 Servers
  • Pre-Test 1: Install, Manage, and Use Windows 10
  • Pre-Test 1: Installing and Configuring Microsoft SharePoint 2010
  • Pre-Test 1: Installing SQL Server Instances and Creating Databases
  • Pre-Test 1: Installing, Upgrading, Migrating to Windows 8
  • Pre-Test 1: Introduction to Clustering and HA
  • Pre-Test 1: Introduction to JavaScript
  • Pre-Test 1: Introduction to Virtualization and VMware’s ESXi
  • Pre-Test 1: IPv4/IPv6 Address and DHCP Management
  • Pre-Test 1: Managing a Server Infrastructure
  • Pre-Test 1: Plan, Deploy, Manage, and Troubleshoot Mailbox Databases
  • Pre-Test 1: Planning and Installing SCCM
  • Pre-Test 1: Planning, Configuring, and Managing Site Resilience
  • Pre-Test 1: Planning, Install, or Upgrade to SharePoint 2016
  • Pre-Test 1: Server Roles and Remote Management
  • Pre-Test 1: SharePoint Components and Design
  • Pre-Test 1: SQL Server 2016 Database Objects, Indexes, and Views
  • Pre-Test 1: The Datacenter and SCVMM
  • Pre-Test 1: Threats and Attacks
  • Pre-Test 1: Understanding Network Security
  • Pre-Test 1: Understanding SharePoint 2013 as a Business User
  • Pre-Test 1: Understanding Windows
  • Pre-Test 1: Upgrading to SharePoint Server 2013
  • Pre-Test 1: Upgrading, Managing, and Monitoring
  • Pre-Test 1: Windows PowerShell Foundations
  • Pre-Test 2: Active Directory Object Management
  • Pre-Test 2: Addressing and Routing
  • Pre-Test 2: Backing Up and Restoring Databases
  • Pre-Test 2: Clustered VMs and DR
  • Pre-Test 2: Columnstore Indexes and Programmability Objects
  • Pre-Test 2: Compliance and Operational Security
  • Pre-Test 2: Computer Components
  • Pre-Test 2: Configure Devices, Storage, & Network Connections in Windows 10
  • Pre-Test 2: Configure File and Print Services
  • Pre-Test 2: Configure File and Storage Solutions
  • Pre-Test 2: Configure Windows Server 2012 Server Roles and Features
  • Pre-Test 2: Configuring User Accounts and Policies in Windows 8
  • Pre-Test 2: Deploying and Managing Network Servers
  • Pre-Test 2: Developing the Mailbox Role
  • Pre-Test 2: Developing the Mailbox Role
  • Pre-Test 2: Disks, NTFS, and Sharing
  • Pre-Test 2: Distributed Resource Scheduler
  • Pre-Test 2: DNS Name Resolution and Zone Configuration
  • Pre-Test 2: JavaScript Data Types
  • Pre-Test 2: Manage Data in SQL 2012
  • Pre-Test 2: Managing and Maintaining Servers, Images, and Storage Solutions
  • Pre-Test 2: Managing Operating System Deployments
  • Pre-Test 2: More Windows Options
  • Pre-Test 2: OU Design and Implementation to Support Group Policy
  • Pre-Test 2: Planning Application Services and Component Deployment
  • Pre-Test 2: Planning Configuring and Managing Advanced Security
  • Pre-Test 2: Planning for Business Continuity in SharePoint Server 2013
  • Pre-Test 2: Planning the Project Scope and Schedule
  • Pre-Test 2: Planning the Project Scope and Schedule
  • Pre-Test 2: Power and Connection Interfaces
  • Pre-Test 2: SharePoint 2016 Security
  • Pre-Test 2: Upgrading to Microsoft SharePoint 2010
  • Pre-Test 2: Using SharePoint Content
  • Pre-Test 2: VM Hosts, Storage, and Networks
  • Pre-Test 2: VMware Component Installation for vSphere 6.0
  • Pre-Test 2: Vulnerabilities and Organizational Security
  • Pre-Test 2: Web and Service Applications
  • Pre-Test 2: Windows PowerShell-The Next Level
  • Pre-Test 2: Windows Vista
  • Pre-Test 3: Advanced Windows Configuration
  • Pre-Test 3: Building a Computer
  • Pre-Test 3: Cluster Monitoring and Profiles
  • Pre-Test 3: Conditional Program Execution
  • Pre-Test 3: Configure Network Services and Access
  • Pre-Test 3: Configure Windows Server 2012 Hyper-V
  • Pre-Test 3: Configuring and Administering SharePoint 2010 Search
  • Pre-Test 3: Configuring and Managing Compliance, Archiving, and Discovery Solutions
  • Pre-Test 3: Configuring Client Access Services
  • Pre-Test 3: Configuring Storage, File Management, and DAC
  • Pre-Test 3: Configuring User Applications and Virtualization in Windows 8
  • Pre-Test 3: Cryptography, Keys, and Wireless Security
  • Pre-Test 3: Data Deduplication, Hyper-V Installation and Configuration
  • Pre-Test 3: Deploying Applications and Software Updates
  • Pre-Test 3: Establishing Site Owners
  • Pre-Test 3: Implement Business Continuity and Disaster Recovery
  • Pre-Test 3: Implementing IP Address Management (IPAM)
  • Pre-Test 3: Introduction to VMware Basic Networking
  • Pre-Test 3: IP Subnetting, DHCP, and NIC Teaming
  • Pre-Test 3: Maintaining Active Directory, Trusts and Site Management
  • Pre-Test 3: Managing Database Integrity
  • Pre-Test 3: Network Infrastructures
  • Pre-Test 3: Networking
  • Pre-Test 3: Optimizing and Troubleshooting SQL 2012
  • Pre-Test 3: Plan and Deploy a Server Infrastructure
  • Pre-Test 3: Planning an Upgrade/Migration Strategy and Security Deployment
  • Pre-Test 3: Planning and Deploying Client Access Servers
  • Pre-Test 3: Planning for Expanded Enterprise SharePoint Support
  • Pre-Test 3: Planning for Resources, Risk and Quality
  • Pre-Test 3: Planning for Resources, Risks and Quality
  • Pre-Test 3: Remote Access Solutions
  • Pre-Test 3: Security
  • Pre-Test 3: Service Applications in SharePoint 2016
  • Pre-Test 3: Support Identities and Authentication in Windows 10
  • Pre-Test 3: Threats and Vulnerabilities
  • Pre-Test 3: Triggers, Functions, Transactions, and Isolation Levels
  • Pre-Test 3: VM Administration and Business Continuity Planning
  • Pre-Test 3: Windows 7
  • Pre-Test 4: Advanced Resource Management and Basic Design
  • Pre-Test 4: Application, Host and Data Security
  • Pre-Test 4: Building Up SharePoint Sites
  • Pre-Test 4: Clustering, NLB, and Monitoring
  • Pre-Test 4: Computer Networking
  • Pre-Test 4: Configure a Network Policy Server Infrastructure
  • Pre-Test 4: Configure Network Services
  • Pre-Test 4: Configuring User Data and Settings in Windows 8
  • Pre-Test 4: Creating and Configuring Service Applications
  • Pre-Test 4: Defining Group Policy Objects and Implementing Group Policy Preferences
  • Pre-Test 4: Defining Operations Strategy and Business Continuity
  • Pre-Test 4: Deploy and Configure Windows Server 2012 Core Network Services
  • Pre-Test 4: Deploying and Administering System Center Configuration Manager 2012 R2
  • Pre-Test 4: Design and Implement Network Services Part 1
  • Pre-Test 4: DHCP, DNS & IPAM
  • Pre-Test 4: DNS and Hyper-V
  • Pre-Test 4: Events and Functions
  • Pre-Test 4: Hyper-V Networking, Containers, and High Availability
  • Pre-Test 4: Implementing & Managing Coexistence, Hybrid Scenarios, Migration & Federation
  • Pre-Test 4: Laptops & Mobile Devices
  • Pre-Test 4: Manage Data Access and Protection in Windows 10
  • Pre-Test 4: Managing Database Concurrency
  • Pre-Test 4: Monitoring Database Activity, Queries, and SQL Server Instances
  • Pre-Test 4: Network Configuration and Basic Storage Concepts
  • Pre-Test 4: Network Connectivity, Remote Access, and Securing Remote Authentication
  • Pre-Test 4: Network Security
  • Pre-Test 4: Other Operating Systems
  • Pre-Test 4: Planning and Configuring Message Transport
  • Pre-Test 4: Planning and Configuring Message Transport
  • Pre-Test 4: Planning for Communication, Procurement and Cost
  • Pre-Test 4: Planning for Stakeholders, Communication, Procurement and Cost
  • Pre-Test 4: Recovering Databases, Configuring Mail, and Automating Tasks
  • Pre-Test 4: Security Protocols and Issues, Identity and Access
  • Pre-Test 4: Service Accounts, Account Policies and Fine Grained Password Policies
  • Pre-Test 4: SharePoint 2016 Integration
  • Pre-Test 4: SharePoint Taxonomy
  • Pre-Test 4: Web Applications, Authentication and Application Security Configuration
  • Pre-Test 4: Windows Networking on a Client/Desktop
  • Pre-Test 5: Access Control and Identity Management
  • Pre-Test 5: Active Directory
  • Pre-Test 5: Active Directory Certificate Services
  • Pre-Test 5: AD Domains and Replication
  • Pre-Test 5: Advanced Exchange 2013 Monitoring and Troubleshooting
  • Pre-Test 5: Certificate Services
  • Pre-Test 5: Compliance Settings and Managing Clients
  • Pre-Test 5: Computer Threats and Security
  • Pre-Test 5: Configure and Manage Active Directory
  • Pre-Test 5: Configure and Manage Applications in Windows 10
  • Pre-Test 5: Configure the Active Directory Infrastructure
  • Pre-Test 5: Configuring and Managing Storage in vSphere 6.0
  • Pre-Test 5: Configuring Devices, Disks, and Network Connections in Windows 8
  • Pre-Test 5: Configuring SharePoint 2010 Site Collections, Managing Features and Solutions
  • Pre-Test 5: Content Management on SharePoint 2016
  • Pre-Test 5: Design and Implement Network Services Part 2
  • Pre-Test 5: Executing the Project
  • Pre-Test 5: Executing the Project
  • Pre-Test 5: Implementing Failover Clustering and Managing High Availability Solutions
  • Pre-Test 5: Implementing Security
  • Pre-Test 5: Install and Administer Windows Server 2012 Active Directory
  • Pre-Test 5: Manage Exchange 2013 – Infrastructure Management
  • Pre-Test 5: Managing Indexes and Statistics
  • Pre-Test 5: Managing Sites
  • Pre-Test 5: Network Architecture and Security
  • Pre-Test 5: Network Operations
  • Pre-Test 5: Optimize SQL Database Objects and Infrastructure
  • Pre-Test 5: Plan, Deploy, and Manage Compliance, Archiving, eDiscovery, and Auditing
  • Pre-Test 5: Planning for SharePoint Business Intelligence
  • Pre-Test 5: Planning Search Solutions
  • Pre-Test 5: Planning Search Solutions
  • Pre-Test 5: Portable Devices
  • Pre-Test 5: Printers & Computer Displays
  • Pre-Test 5: Security and Mobile Devices
  • Pre-Test 5: Supporting Branch Office Technologies
  • Pre-Test 5: The Document Object Model
  • Pre-Test 5: Understanding and Managing Active Directory
  • Pre-Test 5: Update Manager
  • Pre-Test 6: AD Federation Services, Web Application Proxy, and AD Rights Management Services
  • Pre-Test 6: AD RMS and AD FS
  • Pre-Test 6: Advanced Network Infrastructures
  • Pre-Test 6: Automating SharePoint with Workflows
  • Pre-Test 6: Configure and Manage Group Policy
  • Pre-Test 6: Configure Identity and Access Solutions
  • Pre-Test 6: Configure Security, Microsoft Edge, Hyper-V, and Power Management in Windows 10
  • Pre-Test 6: Configuring, Managing, and Migrating Unified Messaging
  • Pre-Test 6: Create and Manage Windows Server 2012 Group Policy
  • Pre-Test 6: Cryptography
  • Pre-Test 6: Database Instances and Performance Tuning
  • Pre-Test 6: Design and Implement Network Services Part 3
  • Pre-Test 6: Group Policy
  • Pre-Test 6: Groups and GPOs
  • Pre-Test 6: High Availability
  • Pre-Test 6: High Availability and Disaster Recovery
  • Pre-Test 6: Implementation and Troubleshooting
  • Pre-Test 6: Implementing & Managing Coexistence, Hybrid Scenarios, Migration & Federation
  • Pre-Test 6: Introduction to Virtual Machine Configuration and Management
  • Pre-Test 6: Manage Exchange 2013 – Monitoring and Troubleshooting
  • Pre-Test 6: Managing Inventory and Reporting
  • Pre-Test 6: Managing Solutions, Apps, and Enterprise Integration
  • Pre-Test 6: Mobile Computing, Monitoring, Optimizing, and System Management/Recovery
  • Pre-Test 6: Monitoring and Controlling the Project
  • Pre-Test 6: Monitoring, Controlling and Closing the Project
  • Pre-Test 6: Operational Procedures
  • Pre-Test 6: PKI, RMS, and Federation
  • Pre-Test 6: Planning Business Solutions
  • Pre-Test 6: Printers
  • Pre-Test 6: SharePoint 2010 Operational Health and Performance
  • Pre-Test 6: SharePoint 2016 Stability and Performance
  • Pre-Test 6: The Upgrade Process
  • Pre-Test 6: Tools and Techniques
  • Pre-Test 6: Trouble Shooting
  • Pre-Test 6: Troubleshooting
  • Pre-Test 6: User Profiles Maintenance and Monitoring
  • Pre-Test 6: Virtualization, Policies, Risk Management, and Disaster Response/Recovery
  • Pre-Test 6: VM Movement and Network Load Balancing Solutions
  • Predictive Analytics & Big Data
  • Predictive Modelling Best Practices: Applying Predictive Analytics
  • Preemptive Troubleshooting: Concepts & Strategies
  • Preparing and Packaging Applications For Deployment
  • Preparing Impactful Presentations that Drive Decision Makers to Action
  • PRINCE2® Control, Manage, and Close Projects (2017 Update)
  • PRINCE2® Practitioner Exam Information
  • PRINCE2® Project Control, Management, and Closure (2009-aligned)
  • PRINCE2® Project Management Overview (2009-aligned)
  • PRINCE2® Project Management Overview (2017 Update)
  • PRINCE2® Project Planning and Risk Management (2009-aligned)
  • PRINCE2® Project Planning and Risk Management (2017 Update)
  • PRINCE2® Project Quality and Control (2017 Update)
  • PRINCE2® Project Quality Planning and Control (2009-aligned)
  • PRINCE2® Project Start Up, Initiation, and Direction (2009-aligned)
  • PRINCE2® Start, Direct, and Initiate Projects (2017 Update)
  • Probability and Probability Distributions in Six Sigma
  • Process & Application
  • Process and Performance Capability Measurement in Six Sigma
  • Process Documentation and Analysis in Six Sigma
  • Process Flow Metrics and Analysis Tools for Six Sigma
  • Procurement Management (PMBOK® Guide Sixth Edition)
  • Procurement Planning (PMBOK® Guide Sixth Edition)
  • Product Development Practices
  • Professional in Human Resources: Business Environment
  • Professional in Human Resources: Business Planning
  • Professional in Human Resources: Introduction to PHR® Exam
  • Professional in Human Resources: PHR® Exam Summary
  • Programmability Objects
  • Programming Apps with Java SE 6
  • Programming Apps with Java SE 7
  • Programming Fundamentals
  • Programming in C#: Creating and Using Types
  • Programming in C#: Creating Types
  • Programming in C#: Creating Types
  • Programming in C#: Debugging and Security Implementation
  • Programming in C#: Debugging and Security Implementation
  • Programming in C#: Implementing Data Access
  • Programming in C#: Implementing Data Access
  • Programming in C#: Managing Multithreating
  • Programming in C#: Managing Multithreating
  • Programming in C#: Managing Program Flow
  • Programming in C#: Managing Program Flow
  • Programming in C#: Managing Program Flow
  • Programming in C#: Manipulating and Retrieving Data
  • Programming in C#: Manipulating and Retrieving Data
  • Programming in C#: Memory Management and String Operations
  • Programming in C#: Using Types
  • Programming in C#: Using Types
  • Programming in C++: Program Structure and Exceptions
  • Programming in C++: Structure and Data Types
  • Programming in C++: Tools and Techniques
  • Programming in Go
  • Programming in HTML5: Adaptive AI, Graphics, & Animation
  • Programming in HTML5: More Advanced HTML5 & CSS3
  • Programming in the IoT Arena
  • Programming Techniques
  • Programming Techniques in R
  • Programming with NoSQL
  • Project Changes and Closing (PMBOK® Guide Sixth Edition)
  • Project Documents and Terminology
  • Project Evaluation: Defining Success Metrics
  • Project Fundamentals (PMBOK® Guide Sixth Edition)
  • Project Initiation and Planning (PMBOK® Guide Sixth Edition)
  • Project Management Fundamentals
  • Project Management Introduction (PMBOK® Guide Sixth Edition)
  • Project Management Practical Exercises
  • Project Management: Scrum Framework for Software Development
  • Project Planning Documents
  • Project Selection and Initiation
  • Promoting DevOps Discipline: DevOps Practices for the Enterprise
  • Protecting Data in iOS Apps
  • Prototyping Design Thinking
  • Providing Effective Internal Customer Service
  • Providing On-site Customer Service
  • Providing Telephone Customer Service
  • Provisioning an Azure Data Factory
  • Puppet Refactoring Patterns
  • Python Applications
  • Python Classes & Inheritance: Advanced Functionality Using Python Classes
  • Python Classes & Inheritance: Getting Started with Classes in Python
  • Python Classes & Inheritance: Working with Inheritance in Python
  • Python Classes and Inheritance: Introduction
  • Python Concurrent Programming: Asynchronous Executions in Python
  • Python Concurrent Programming: Introduction to Concurrent Programming
  • Python Concurrent Programming: Multiprocessing in Python
  • Python Concurrent Programming: Multithreading in Python
  • Python Data Processing
  • Python Design Patterns: Principles of Good Design
  • Python Design Patterns: Working with Behavioral Design Patterns
  • Python Design Patterns: Working with Creational Design Patterns
  • Python Design Patterns: Working with Structural Design Patterns
  • Python for Data Science – Introduction to Python for Data Science
  • Python for Data Science: Advanced Data Visualization Using Seaborn
  • Python for Data Science: Advanced Operations with NumPy Arrays
  • Python for Data Science: Basic Data Visualization Using Seaborn
  • Python for Data Science: Introduction to NumPy for Multi-dimentional Data
  • Python for Data Science: Introduction to Pandas
  • Python for Data Science: Manipulating and Analyzing Data in Pandas DataFrames
  • Python Fundamentals
  • Python Language Basics
  • Python Requests: HTTP Requests with Python
  • Python Unit Testing: Advanced Python Testing Using the unittest Framework
  • Python Unit Testing: An Introduction to Python's unittest Framework
  • Python Unit Testing: Testing Python Code Using doctest
  • Python Unit Testing: Testing Python Code Using pytest
  • Python: Classes and Modules
  • Python: Data Science Fundamentals
  • Python: Iteration and Exceptions
  • Python: The Basics
  • Python: Web Application Development
  • Python: web2py and Test-driven Development
  • Quality and Procurement Planning
  • Quality and Security of Big Data Operations
  • Quality Methodologies and Standards for Project Management
  • Querying and Manipulating Data
  • Querying and Manipulating Data with the Entity Framework
  • Querying XML Data with XPath and XQuery
  • R for Data Science: Classification & Clustering
  • R for Data Science: Data Exploration
  • R for Data Science: Data Structures
  • R for Data Science: Data Visualization
  • R for Data Science: Importing and Exporting Data
  • R for Data Science: Regression Methods
  • RADD Knowledge Area: Part 1
  • RADD Knowledge Area: Part 2
  • Random Forests & Uplift Models
  • Rapport Building in Customer Service
  • RavenDB Integration
  • RavenDB Overview
  • Raw Data to Insights: Data Ingestion & Statistical Analysis
  • Raw Data to Insights: Data Management & Decision Making
  • React and Flux: An Overview
  • React and Flux: Creating Simple React Components
  • React and Flux: React Router and Forms
  • React and Flux: Working with Flux
  • Reactive Programming Methods
  • Reactive Programming Using Redux
  • Recovering SQL Databases
  • Recovery Strategies And Client Access Services
  • Red Hat Certified System Administrator: Administration and Permissions
  • Red Hat Certified System Administrator: Advanced Networking
  • Red Hat Certified System Administrator: Boot Process and Installation
  • Red Hat Certified System Administrator: File Systems and Device Management
  • Red Hat Certified System Administrator: Introduction to Virtualization
  • Red Hat Certified System Administrator: Processes, Networking, and Logging
  • Red Hat Certified System Administrator: Remote Connections and Access
  • Red Hat Certified System Administrator: Scripting and Scheduling
  • Red Hat Certified System Administrator: SELinux and Troubleshooting
  • Red Hat Certified System Administrator: The Command Line
  • Red Hat Certified System Administrator: The Environment
  • Refactoring ML/DL Algorithms: Refactor Machine Learning Algorithms
  • Refactoring ML/DL Algorithms: Techniques & Principles
  • Regression Analysis
  • Regulation Conformance for Incidence Response
  • Regulatory Mandates: Security Program Regulatory Integration
  • Reinforcement Learning
  • Replay Session 1
  • Replay Session 1
  • Replay Session 1
  • Replay Session 1
  • Replay Session 1
  • Replay Session 1
  • Replay Session 2
  • Replay Session 2
  • Replay Session 2
  • Replay Session 2
  • Replay Session 2
  • Replay Session 2
  • Replay Session 3
  • Replay Session 3
  • Replay Session 3
  • Replay Session 3
  • Replay Session 3
  • Replay Session 3
  • Replay Session 4
  • Replay Session 4
  • Replay Session 4
  • Replay Session 4
  • Replay Session 4
  • Replay Session 4
  • Replay Session 5
  • Replay Session 5
  • Replay Session 5
  • Replay Session 5
  • Replay Session 5
  • Replay Session 6
  • Replay Session 6
  • Replay Session 6
  • Replay Session 6
  • Replay Session 6
  • Replay Session 6
  • Reporting and User Management
  • Research Topics in ML and DL
  • Resource and Risk Planning
  • Responding to Risk (PMBOK® Guide Sixth Edition)
  • Responsive Web Design: Flexible Data and UIs, Devices, Process and Performance
  • Responsive Web Design: Flexible Grids, Images, and Media Queries
  • REST API with Java: Java APIs with JSON, Maven, & Spring
  • REST API with Java: REST APIs with POSTMAN & CRUD
  • REST API with Java: Spring Boot with Java
  • REST API with Java: Spring JPA & Apache Derby
  • REST API: Exploring the Advanced Features
  • REST API: Exploring the Basic Features
  • RESTful Services for FSD: Building & Testing RESTful Services
  • Reusable Components and iRise Administration
  • Reusing Content in Dreamweaver CS5
  • Risk Analysis: Security Risk Management
  • Risk Management: Organizational Risk and Safety and Health Legislation
  • Risk Management: Project Risk Assessment
  • Risk Management: Workplace Safety, Security, and Privacy
  • Role of Testing in Managing Clean Code
  • Root Cause Analysis and Waste Elimination in Six Sigma
  • ROUTE 2.0: Routing Policies
  • ROUTE 2.0: Access Control
  • ROUTE 2.0: Administrative Distance and Passive Interfaces
  • ROUTE 2.0: Authentication, Authorization, and Accounting
  • ROUTE 2.0: BGP Attributes
  • ROUTE 2.0: BGP Loopback and Propagation
  • ROUTE 2.0: Border Gateway Protocol Introduction
  • ROUTE 2.0: Default Routes
  • ROUTE 2.0: Device Management
  • ROUTE 2.0: DHCP IPv6 Stateless Server
  • ROUTE 2.0: DHCP Server
  • ROUTE 2.0: Dynamic Multipoint, Easy VPN, and Ipsec
  • ROUTE 2.0: EIGRP Authentication
  • ROUTE 2.0: EIGRP Load Balancing and Metrics
  • ROUTE 2.0: EIGRP Neighbors
  • ROUTE 2.0: EIGRP Over IPv6
  • ROUTE 2.0: EIGRP Stubs
  • ROUTE 2.0: Frame Relay Operations
  • ROUTE 2.0: Generic Routing Encapsulation Tunnels
  • ROUTE 2.0: Introduction to EIGRP
  • ROUTE 2.0: Introduction to Networking
  • ROUTE 2.0: IP Addressing and DHCP
  • ROUTE 2.0: IP Operations
  • ROUTE 2.0: IPv4 Addressing Types
  • ROUTE 2.0: IPv6 Addressing
  • ROUTE 2.0: IPv6 Addressing and DHCP
  • ROUTE 2.0: Logging and Debugging
  • ROUTE 2.0: Loop Prevention Using Built-In Mechanisms
  • ROUTE 2.0: Loop Prevention Using Route Tags and Maps
  • ROUTE 2.0: Multiprotocol BGP
  • ROUTE 2.0: NetFlow
  • ROUTE 2.0: Network Address Translation
  • ROUTE 2.0: Network Migration
  • ROUTE 2.0: OSPF Area Types
  • ROUTE 2.0: OSPF Configuration
  • ROUTE 2.0: OSPF IPv6 Routing
  • ROUTE 2.0: OSPF Network and LSA Types
  • ROUTE 2.0: OSPF Packet Types
  • ROUTE 2.0: OSPF Route Types
  • ROUTE 2.0: OSPF Virtual Links and Paths
  • ROUTE 2.0: Point-to-Point Networking
  • ROUTE 2.0: Route Filtering
  • ROUTE 2.0: Route Filtering for EIGRP, OSPF, and BGP
  • ROUTE 2.0: Route Redistribution with OSPF
  • ROUTE 2.0: Route Redistribution with RIP and EIGRP
  • ROUTE 2.0: Router Summarization for EIGRP and OSPF
  • ROUTE 2.0: Router Summarization for RIP
  • ROUTE 2.0: Routing Information Protocol
  • ROUTE 2.0: Routing Protocol Types
  • ROUTE 2.0: Security Features
  • ROUTE 2.0: SLAs and Object Tracking
  • ROUTE 2.0: SNMP and NTP
  • ROUTE 2.0: Static Routing
  • ROUTE 2.0: TCP and UDP Operations
  • ROUTE 2.0: Using VRF Lite
  • Ruby Full Stack Development: Flow Control and Data Types
  • Ruby Full Stack Development: Introduction
  • Ruby Full Stack Development: Object-Oriented Programming with Ruby
  • Ruby Full Stack Development: RegEx and I/O with Ruby
  • Ruby Full Stack Development: Threads and Security
  • Ruby Full Stack Development: Unit Testing and Behavior Driven Development
  • Sales Automation in Microsoft Dynamics CRM 2013
  • SAP Administration
  • SAP Business One - Introduction for End Users
  • SAP BusinessObjects: Business Intelligence
  • SAP BusinessObjects: Crystal Reports
  • SAP BusinessObjects: Dashboards and Analytics
  • SAP BusinessObjects: InfoView
  • SAP BusinessObjects: Overview
  • SAP BusinessObjects: Web Intelligence
  • SAP Customer Relationship Management (CRM)
  • SAP Enterprise Resource Planning (ERP)
  • SAP Product Lifecycle Management
  • SAP Supplier Relationship Management
  • SAP Supply Chain Management
  • Scala Expressions and Parallel Computation
  • Scala Functional Programming and Collections
  • Scala Introduction
  • Scala Pattern Matching, Interoperability, and Concurrency
  • Scala Tooling
  • Scaling an Organization's Scrum Process
  • Scaling Cloud Solutions
  • Scaling DevOps: Infrastructure at Scale
  • Scaling DevOps: Pipelines at Scale
  • Scaling Scrum: Challenges
  • Scaling Scrum: Choosing Scaled Agile Frameworks
  • SCCM 2012 R2 Boundaries and Security Considerations
  • SCCM 2012 R2 Compliance Settings and Managing Clients
  • SCCM 2012 R2 Performance and Health Monitoring
  • Scope, Schedule and Cost Planning
  • Script Components
  • Scripting with Spotfire
  • Scrum Business Value: Accessing the Business Value of Scrum
  • Scrum Concepts & the Product Owner
  • Scrum Foundations: Transitioning to Scrum
  • Scrum Master: Scrum for the Team
  • Scrum Master: Sprint Goals & Planning
  • SCRUM Meetings: On-target Daily Meetings
  • Scrum Practices: Managing the Scrum Project
  • Scrum Product: Defining the Why & How of the Product
  • Scrum Sprint: Retrospective
  • Scrum Sprint: Review
  • Scrum Team Velocity: Exploring Team Velocity
  • Scrum: Creating Effective Product Backlogs
  • Scrum: Product Backlog
  • Scrum: Product Development Framework
  • Search Problems
  • SECFND: ACLs & Filtering
  • SECFND: Attacks and Evasion
  • SECFND: Basic Networking Protocols
  • SECFND: Basic Networking Services
  • SECFND: Cryptographic Encryption Algorithms
  • SECFND: Cryptographic Hashing Algorithms
  • SECFND: Cryptography
  • SECFND: Data Loss & Defense in Depth
  • SECFND: Digital Signatures
  • SECFND: Endpoint Security
  • SECFND: Filtering and Packet Capture
  • SECFND: Interpreting Log Data
  • SECFND: Linux Host Terminology
  • SECFND: Monitoring Network Protocols
  • SECFND: Network Addressing
  • SECFND: Network and Web Attacks
  • SECFND: Network Data Types
  • SECFND: Network Data Types and Security Monitoring
  • SECFND: Network Devices Operations & Security
  • SECFND: Network Models
  • SECFND: Network Monitoring
  • SECFND: Next Generation Firewalls
  • SECFND: Overview and Network Models
  • SECFND: Packet Analysis
  • SECFND: Security Attack Concepts
  • SECFND: Security Concepts
  • SECFND: Security Management Part 1
  • SECFND: Security Management Part 2
  • SECFND: SSL/TLS Components
  • SECFND: VLANS and Data Visibility
  • SECFND: Windows Host Terminology
  • SecOps Engineer: Cloud & IoT security
  • SecOps Engineer: Secure Coding
  • SecOps Engineer: Security Engineering
  • SecOps Engineer: System Infrastructure Security
  • SecOps Engineer: Threat Mitigation
  • SECOPS: Analyzing Intrusion Impact
  • SECOPS: Analyzing Threat Mitigation Reports
  • SECOPS: Categorize and Classify Intrusions
  • SECOPS: CSIRT Goals and Cybersec Elements
  • SECOPS: Data Normalization and 5-Tuple Correlation
  • SECOPS: Examining Intrusion Events
  • SECOPS: Firepower Management Console and Analysis Methods
  • SECOPS: Handling Incident Events and Evidence
  • SECOPS: HTTP Headers
  • SECOPS: ICMP Intrusion
  • SECOPS: ICMP Intrusion Part 2
  • SECOPS: Identifying Forensic Evidence
  • SECOPS: Identifying NetFlow v5 Records
  • SECOPS: Interpreting Regular Expressions
  • SECOPS: Intrusion Event Technologies
  • SECOPS: IP Header Security
  • SECOPS: Protocol Header Security
  • SECOPS: Responding to Incidents
  • SECOPS: Scoring with CVSS 3.0
  • SECOPS: Securing File Systems
  • SECOPS: Transport Layer Headers
  • Secure Agile Programming: Agile Concepts
  • Secure Agile Programming: Agile Modeling
  • Secure Agile Programming: Agile Techniques
  • Secure Agile Programming: Testing
  • Secure Full Stack Developer Programming
  • Secure Programmer: Attacks
  • Secure Programmer: Coding Practices
  • Secure Programmer: Intro to Programming Standards
  • Secure Programmer: Resiliency Coding
  • Secure Programmer: Security Concepts
  • Secure Programmer: Software Design Techniques
  • Secure Programmer: Software Modeling Techniques
  • Secure Programmer: Software Testing
  • Secure Programmer: Vulnerabilities
  • Secure Programming for C/C++
  • Secure Programming: Encryption
  • Securing .NET Programming
  • Securing a Network Infrastructure with Windows Firewalls
  • Securing a Virtualization Infrastructure
  • Securing Against Threats, Securing for Enterprise, and Jailbreaking Devices
  • Securing Blockchain Implementations
  • Securing C/C++ Applications
  • Securing Hadoop Clusters
  • Securing Microservices
  • Securing Mobile Devices in the Enterprise: Configuring Enterprise-level Security
  • Securing Mobile Devices in the Enterprise: Mobile Security Technologies
  • Securing Mobile Devices in the Enterprise: Mobile Security Threat Mitigation
  • Securing Mobile Devices in the Enterprise: Mobile Security Threats
  • Securing Network Infrastructure Traffic
  • Securing Unix Systems
  • Securing User Accounts: Authorization, Registration, and Passwords
  • Securing User Accounts: Fundamental Security Concepts
  • Securing User Accounts: Logon, Logoff, Account Changes, and Attack Mitigation
  • Securing Your Microservices
  • Securing, Testing, and Deploying MEAN Applications
  • Security and WCF Streams
  • Security Architect: Ethical Hacking Best Practices
  • Security Architect: Secure Coding Concepts
  • Security Architectures: Defensible Security
  • Security Best Practices: Network Appliance Security
  • Security Fundamentals: Authentication
  • Security Fundamentals: Authentication, Passwords & Audit Policies
  • Security Fundamentals: Client and Email Security
  • Security Fundamentals: Core Security
  • Security Fundamentals: Encryption and Malware
  • Security Fundamentals: Firewalls
  • Security Fundamentals: Internet and Wireless Security
  • Security Fundamentals: Network Isolation
  • Security Fundamentals: Permissions
  • Security Fundamentals: Protocol Security
  • Security Fundamentals: Server Protection
  • Security Incident Triage
  • Security Measures: Implementing Security Controls
  • Security Programming: Code Identification
  • Security Programming: Command Line Essentials
  • Security Programming: Scripting Essentials
  • Security Programming: System Essentials
  • Security Rules: Rules of Engagement
  • Security Software Assessments: Security Software Assessments
  • Security Strategies
  • Security Strategy: Patch Management Strategies
  • Security Topologies: Developing Secure Networks
  • Security Vulnerabilities: Managing Threats & Vulnerabilities
  • Selecting Structural Patterns for Simplified Designs
  • Selenium IDE - Advanced Features and Debugging
  • Selenium IDE - Locating, Verifying, and Testing Elements
  • Selenium IDE: Scripts & Commands
  • Selenium: Using Selenium for Continuous Testing
  • SENSS 1.0: ASA Firewall Access Control
  • SENSS 1.0: ASA Firewall Configuration & Access Control
  • SENSS 1.0: Centralized Logging & Device Management
  • SENSS 1.0: Cisco Port-Based Traffic Control
  • SENSS 1.0: DHCP Snooping & IP Source Guard
  • SENSS 1.0: High Availability & Private VLANs
  • SENSS 1.0: IOS Security Configuration
  • SENSS 1.0: IPv6 Support & Traffic Inspection
  • SENSS 1.0: Role-Based Access Control
  • SENSS 1.0: Traffic & Device Monitoring
  • SENSS 1.0: Transparent Firewalls & Security Contexts
  • SENSS 1.0: Twice NAT & Network Object NAT
  • SENSS 1.0: Zone-Based Firewalls
  • Server 2012 R2 - Administration: Deploying and Managing WDS (Update Avail.)
  • Server 2012 R2 - Administration: File Services and Encryption (Update Avail.)
  • Server 2012 R2 - Administration: Group Policy Processing (Update Avail.)
  • Server 2012 R2 - Administration: Managing Active Directory (Update Avail.)
  • Server 2012 R2 - Administration: Managing GPOs and Preferences (Update Avail.)
  • Server 2012 R2 - Administration: Network Services and Access (Update Avail.)
  • Server 2012 R2 - Administration: RADIUS, NPS, and NAP (Update Avail.)
  • Server 2012 R2 - Administration: Service Accounts and Policies (Update Avail.)
  • Server 2012 R2 - Administration: Updating and Monitoring (Update Avail.)
  • Server 2012 R2 - Advanced Infrastructure: AD RMS and AD FS (Update Avail.)
  • Server 2012 R2 - Advanced Infrastructure: Business Continuity (Update Avail.)
  • Server 2012 R2 - Advanced Infrastructure: Certificate Services (Update Avail.)
  • Server 2012 R2 - Advanced Infrastructure: Clustering and NLB (Update Avail.)
  • Server 2012 R2 - Advanced Infrastructure: Monitoring (Update Avail.)
  • Server 2012 R2 - Advanced Infrastructure: Storage and networks (Update Avail.)
  • Server 2012 R2 - Advanced Infrastructure: Updates (Update Avail.)
  • Server 2012 R2 - Advanced Infrastructure: VM Administration (Update Avail.)
  • Server 2012 R2 - Advanced Infrastructure: VM hosts and guests (Update Avail.)
  • Server 2012 R2 - Configuring Advanced Services: AD Domains (Update Avail.)
  • Server 2012 R2 - Configuring Advanced Services: AD Replication (Update Avail.)
  • Server 2012 R2 - Configuring Advanced Services: DAC (Update Avail.)
  • Server 2012 R2 - Configuring Advanced Services: DHCP & DNS (Update Avail.)
  • Server 2012 R2 - Configuring Advanced Services: Federation (Update Avail.)
  • Server 2012 R2 - Configuring Advanced Services: HA (Update Avail.)
  • Server 2012 R2 - Configuring Advanced Services: PKI (Update Avail.)
  • Server 2012 R2 - Configuring Advanced Services: Storage (Update Avail.)
  • Server 2012 R2 - Configuring Advanced Services: VMs and DR (Update Avail.)
  • Server 2012 R2 - Installing and Configuring: Active Directory (Update Avail.)
  • Server 2012 R2 - Installing and Configuring: AD Groups & GPOs (Update Avail.)
  • Server 2012 R2 - Installing and Configuring: DNS (Update Avail.)
  • Server 2012 R2 - Installing and Configuring: Hyper - V (Update Avail.)
  • Server 2012 R2 - Installing and Configuring: Networking (Update Avail.)
  • Server 2012 R2 - Installing and Configuring: Print Services (Update Avail.)
  • Server 2012 R2 - Installing and Configuring: Security (Update Avail.)
  • Server 2012 R2 - Installing and Configuring: Servers (Update Avail.)
  • Server 2012 R2 - Installing and Configuring: Storage (Update Avail.)
  • Server 2012 R2: Server Infrastructure - AD Design (Update Avail.)
  • Server 2012 R2: Server Infrastructure - AD DS (Update Avail.)
  • Server 2012 R2: Server Infrastructure - DHCP Design (Update Avail.)
  • Server 2012 R2: Server Infrastructure - DNS, File and Storage (Update Avail.)
  • Server 2012 R2: Server Infrastructure - Implement NPS and WAP (Update Avail.)
  • Server 2012 R2: Server Infrastructure - IPAM and VPN (Update Avail.)
  • Server 2012 R2: Server Infrastructure - Network Protection (Update Avail.)
  • Server 2012 R2: Server Infrastructure - OU and Group Policy (Update Avail.)
  • Server 2012 R2: Server Infrastructure – DirectAccess (Update Avail.)
  • Server 2012 R2: Server Infrastructure – Server Deployment (Update Avail.)
  • Server 2016 - Identity: Active Directory Accounts & Permissions
  • Server 2016 - Identity: Active Directory Certificate Services
  • Server 2016 - Identity: Active Directory Domain Controllers
  • Server 2016 - Identity: Active Directory Federation Services & Web Application Proxy
  • Server 2016 - Identity: Active Directory Group Policy Objects
  • Server 2016 - Identity: Active Directory Group Policy Preferences
  • Server 2016 - Identity: Active Directory Group Policy Processing
  • Server 2016 - Identity: Active Directory Group Policy Settings
  • Server 2016 - Identity: Active Directory Groups & Organizational Units
  • Server 2016 - Identity: Active Directory Rights Management Services
  • Server 2016 - Identity: Active Directory Service Authentication & Account Policies
  • Server 2016 - Identity: Active Directory Trusts & Sites
  • Server 2016 - Identity: Active Directroy Maintenance & Recovery
  • Server 2016 - Identity: AD Federation Services and Web Application Proxy
  • Server 2016 - Install, Store, and Compute: Upgrading, Managing, and Monitoring
  • Server 2016: Install, Store, and Compute: Backup Strategies & Server Monitoring
  • Server 2016: Install, Store, and Compute: Data Deduplication & Hyper-V Setup
  • Server 2016: Install, Store, and Compute: Disk & Volume Configuration
  • Server 2016: Install, Store, and Compute: Failover Clustering Strategies
  • Server 2016: Install, Store, and Compute: Hyper-V Networking Configuration
  • Server 2016: Install, Store, and Compute: Hyper-V Storage Configuration
  • Server 2016: Install, Store, and Compute: Image Deployment Management
  • Server 2016: Install, Store, and Compute: Installation Options
  • Server 2016: Install, Store, and Compute: Managing High Availability Solutions
  • Server 2016: Install, Store, and Compute: Server Storage Solutions
  • Server 2016: Install, Store, and Compute: Upgrades, Migrations, & Activation Models
  • Server 2016: Install, Store, and Compute: Virtual Machine (VM) Settings
  • Server 2016: Install, Store, and Compute: VM Motion and Network Load Balancing
  • Server 2016: Install, Store, and Compute: Windows Container Deployment
  • Server 2016: Install, Store, and Compute: Windows Container Management and Hyper-V
  • Server 2016: Networking: Advanced Network Infrastructures
  • Server 2016: Networking: DHCP Configuration
  • Server 2016: Networking: DHCP Management
  • Server 2016: Networking: Distributed File System & Branch Office Solutions
  • Server 2016: Networking: DNS & DHCP Management Using IPAM
  • Server 2016: Networking: DNS Configuration
  • Server 2016: Networking: DNS Zones & Records
  • Server 2016: Networking: IP Address Management Configuration
  • Server 2016: Networking: IPv4 & IPv6 Address Management
  • Server 2016: Networking: Network Connectivity & Remote Access
  • Server 2016: Networking: Network Policy Server
  • Server 2016: Securing Remote Authentication
  • Server and Application Virtualization in Microsoft Windows Server 2008
  • Service Management Automation and Runbooks
  • Service Manager
  • Services and Routing
  • Serving Digital Customers with Omnichannel
  • Session 1 Homework: Install, Manage, and Use Windows 10
  • Session 2 Homework: Configure Devices, Storage, & Network Connections in Windows 10
  • Session 3 Homework: Support Identities and Authentication in Windows 10
  • Session 4 Homework: Manage Data Access and Protection in Windows 10
  • Session 6 Homework: Configure Security, Microsoft Edge, Hyper-V, and Power Management in Windows 10
  • SharePoint 2016 Content Management
  • SharePoint 2016 Security
  • SharePoint 2016 Service Applications
  • SharePoint 2016 Taxonomy and Search
  • SharePoint Online
  • Shell Scripting
  • Sinatra Fundamentals
  • Six Sigma and Lean Foundations and Principles
  • Six Sigma and Lean: Foundations and Principles
  • Six Sigma and Organizational Goals
  • Six Sigma Business Case, Project Charter, and Tools
  • Six Sigma Control Charts
  • Six Sigma Control Tools and Documentation
  • Six Sigma Correlation, Regression, and Hypothesis Testing
  • Six Sigma Cycle-time Reduction and Kaizen Blitz
  • Six Sigma Data Classification, Sampling, and Collection
  • Six Sigma Design of Experiments
  • Six Sigma Exploratory Data Analysis
  • Six Sigma Hypothesis Testing Fundamentals
  • Six Sigma Hypothesis Tests for Variances and Proportions
  • Six Sigma Management and Planning Tools
  • Six Sigma Measurement System Analysis
  • Six Sigma Measurement Systems Analysis
  • Six Sigma Measurement Systems and Metrology
  • Six Sigma Performance Metrics
  • Six Sigma Probability and Statistical Distributions
  • Six Sigma Process and Performance Capability Measurement
  • Six Sigma Process Control Tools
  • Six Sigma Process Documentation and Analysis
  • Six Sigma Project Identification
  • Six Sigma Project Management Essentials
  • Six Sigma Project Selection, Roles, and Responsibilities
  • Six Sigma Project Team Dynamics and Performance
  • Six Sigma Root Cause Analysis and Waste Elimination
  • Six Sigma Statistical Process Control Basics
  • Six Sigma Statistics and Graphical Presentation
  • Six Sigma Strategic Planning and Deployment
  • Six Sigma Team Basics, Roles, and Responsibilities
  • Six Sigma Team Dynamics and Training
  • Six Sigma Team Dynamics, Roles, and Success Factors
  • Six Sigma Team Facilitation and Leadership
  • Six Sigma Techniques for Improvement
  • Six Sigma Voice of the Customer
  • Six Sigma: Identifying Projects
  • Six Sigma: Metrics
  • Six Sigma: Project Management Basics
  • Six Sigma: Quality Tools
  • Six Sigma: Team Basics, Roles, and Responsibilities
  • Skill Development Using Alexa Components
  • Skills for Project Analysts: Negotiation Skills
  • SOA Fundamentals
  • SOAP and Development of Microservices
  • Socket Programming in Python: Advanced Topics
  • Socket Programming in Python: Introduction
  • Software Data Analysis: Project Management Metrics
  • Software Debugging in Windows
  • Software Defined Networking Fundamentals
  • Software Development Concepts: Software Development Glossary
  • Software PM Communication: Software Project Management Communication Skills
  • Software Practices (SCRUM): SCRUM Meetings
  • Software Practices (SCRUM): SCRUM Roles
  • Software Programming Fundamentals: Best Practices for Maintaining Code
  • Software Programming Fundamentals: Design and Development Best Practices
  • Software Programming Fundamentals: Software Security Best Practices
  • Software Programming Fundamentals: Source Coding Best Practices
  • Software Projects: Recruiting the Project Team
  • Software Quality Assurance
  • Software Testing Cycle: Agile Testing
  • Software Testing for DevOps: DevOps Test Tools
  • Software Testing for DevOps: DevOps Testing Pipeline
  • Software Testing for DevOps: Testing & DevOps Overview
  • Software Testing Foundation 2018: Black-box & White-box Testing Techniques
  • Software Testing Foundation 2018: Fundamentals
  • Software Testing Foundation 2018: Risk & Defect Management
  • Software Testing Foundation 2018: Static Testing
  • Software Testing Foundation 2018: Test Management
  • Software Testing Foundation 2018: Test Monitoring & Control
  • Software Testing Foundation 2018: Test Process Fundamentals
  • Software Testing Foundation 2018: Test Tool Support
  • Software Testing Foundation 2018: Test Types & Maintenance Testing
  • Software Testing Foundation 2018: Testing & the Software Development Lifecycle
  • Software Testing Foundation 2018: Testing Techniques
  • Software Testing Foundations: Static, Dynamic, Black-box, and White-box Testing
  • Software Testing Foundations: Test Planning, Management, and Tool Support
  • Software Testing Foundations: Testing throughout the Software Life Cycle
  • Software Testing with Visual Studio: Create and Configure Test Plans
  • Software Testing with Visual Studio: Manage Test Cases
  • Software Testing with Visual Studio: Manage Test Execution Part 1
  • Software Testing with Visual Studio: Manage Test Execution Part 2
  • Software Updates and Compliance Management in Microsoft Windows Server 2008
  • SOLID Fundamentals
  • Source Control on AWS
  • Spark Monitoring and Tuning
  • Spark Security
  • Speech Input and Cortana
  • Splunk Administration
  • Splunk Fundamentals
  • Splunk Visualizations and Dashboards
  • Spotfire Automation, Analyzation, and Visualization
  • Spotfire Basics
  • Spotfire Data Combinations
  • Spotfire Visualizations and Relationships
  • SQL Server 2016 Database Objects
  • SQL Server 2016 Indexes and Views
  • SQL Server Database Fundamentals: Creating, Optimizing, and Securing Databases
  • SQL Server Database Fundamentals: Design Principles and Data Manipulation
  • SQL Server Database Security
  • SQL Server Instances and Storage Considerations
  • SQL Server Performance Settings
  • SQL Server Virtual Machines on Azure
  • SQL Tuning, Resource Management, and Job Scheduling in Oracle Database 12c
  • SSCP Domain : Networks and Telecommunications Part 2
  • SSCP Domain: Access Controls
  • SSIS Components
  • SSIS Package Execution and Script Tasks
  • SSIS Packages
  • SSIS Security
  • SSIS Solutions
  • SSIS Variables
  • Stabilizing Hadoop Clusters
  • Statistical Process Control (SPC) and Control Charts in Six Sigma
  • Statistical Process Control and Control Plans in Six Sigma
  • Statistics and Graphical Presentation in Six Sigma
  • Strategic HR for SPHR Exam Candidates Part I
  • Strategic HR for SPHR Exam Candidates Part II
  • Strategically Focused Project Management
  • Strategies for Building a Cohesive Team
  • Streaming Data Architectures: An Introduction to Streaming Data
  • Streaming Data Architectures: Processing Streaming Data
  • Streaming Pipelines and Analytics
  • Structured Streaming
  • Styling HTML5 and JavaScript
  • Styling Page Elements using CSS3
  • Subqueries and Predicate
  • Supervised Learning Models
  • Sustaining Six Sigma Improvements
  • Swift Language Basics
  • SWITCH 2.0 : DHCP Snooping, IPSG, and DAI
  • SWITCH 2.0 : EtherChannel
  • SWITCH 2.0 : Hot Standby Router Protocol
  • SWITCH 2.0 : L2 Attacks and Port Security
  • SWITCH 2.0 : Layer 2 Network Discovery
  • SWITCH 2.0 : Layer 3 Switching
  • SWITCH 2.0 : Rapid and Multiple Spanning Tree
  • SWITCH 2.0 : SPAN, RSPAN, and StackWise Clustering
  • SWITCH 2.0 : Spanning Tree and Per VLAN Spanning Tree
  • SWITCH 2.0 : Storm Control and Port-Based Authentication
  • SWITCH 2.0 : STP Enhancements
  • SWITCH 2.0 : STP Timers and Failover
  • SWITCH 2.0 : Switch Overview and Administartion
  • SWITCH 2.0 : Trunking Using DTP, Dot1Q, & ISL
  • SWITCH 2.0 : Virtual LANs
  • SWITCH 2.0 : VLAN ACLs and Private VLANs
  • SWITCH 2.0 : VLAN Trunk Protocol Pruning
  • SWITCH 2.0 : VRRP and GLBP
  • Syntax, Variables, Objects, and Classes
  • SYO-601 - CompTIA Security+: Analyzing Application & Network Attacks
  • SYO-601 - CompTIA Security+: Social Engineering Techniques & Attack Types
  • System Center Configuration Manager Introduction and Planning
  • System Security Certified Practitioner (SSCP 2018): Asset & Change Management
  • System Security Certified Practitioner (SSCP 2018): Business Continuity
  • System Security Certified Practitioner (SSCP 2018): Controlling Resource Access
  • System Security Certified Practitioner (SSCP 2018): Cryptography Primer
  • System Security Certified Practitioner (SSCP 2018): Digital Forensics
  • System Security Certified Practitioner (SSCP 2018): Identity Management
  • System Security Certified Practitioner (SSCP 2018): Malware & Endpoint Security
  • System Security Certified Practitioner (SSCP 2018): Network Fundamentals
  • System Security Certified Practitioner (SSCP 2018): Network Security
  • System Security Certified Practitioner (SSCP 2018): Public Key Infrastructure
  • System Security Certified Practitioner (SSCP 2018): Risk Management
  • System Security Certified Practitioner (SSCP 2018): Securing Environments
  • System Security Certified Practitioner (SSCP 2018): Security Assessments
  • System Security Certified Practitioner (SSCP 2018): Security Concepts
  • System Security Certified Practitioner (SSCP 2018): Security Controls
  • Systems Security Certified Practitioner: Access Controls
  • Systems Security Certified Practitioner: Cryptography
  • Systems Security Certified Practitioner: Incident Response and Recovery
  • Systems Security Certified Practitioner: Network and Communications Security
  • Systems Security Certified Practitioner: Risk Management
  • Systems Security Certified Practitioner: Security Administration
  • Systems Security Certified Practitioner: Security Operations
  • Systems Security Certified Practitioner: Systems and Application Security
  • T-SQL Querying
  • Tableau Advanced Visualizations
  • Tableau Calculations
  • Tableau Charts
  • Tableau Dashboards and Data Organization
  • Tableau Data Connections
  • Tableau Desktop: Real Time Dashboards
  • Tableau Interface and Sharing
  • Tableau Maps
  • Tableau Scripting
  • Tableau Time Dimensions
  • Tableau Visualization
  • Tableau Visualization Design
  • Tailoring PRINCE2® for your Project Environment (2009-aligned)
  • Taking Final Steps to Bring a Project to its Close
  • Team and Customer Relationships
  • Team Dynamics and Performance for Six Sigma Projects
  • Team Foundation Server Administration and Configuration
  • Tensorflow: Building Autoencoders in TensorFlow
  • TensorFlow: Convolutional Neural Networks for Image Classification
  • TensorFlow: Convolutional Neural Networks for Image Classification
  • TensorFlow: Deep Neural Networks and Image Classification
  • TensorFlow: Introduction to Machine Learning
  • Tensorflow: K-means Clustering with TensorFlow
  • Tensorflow: Sentiment Analysis with Recurrent Neural Networks
  • TensorFlow: Simple Regression and Classification Models
  • Tensorflow: Word Embeddings & Recurrent Neural Networks
  • Tensorflow: Word Embeddings & Recurrent Neural Networks
  • Teradata Basics: Communication and Database Security
  • Teradata Basics: Data Storage and Access Methods
  • Teradata Basics: Relational Database and Data Warehouse Basics
  • Teradata SQL: DDL, DML, and SQL Optimization
  • Teradata SQL: Functions, Data Conversions, and Working with Time
  • Teradata SQL: The SELECT Statement, Joins, and Subqueries
  • Terminal Services Resource Access in Windows 2008
  • Terraform Configurations
  • Terraform Infrastructure
  • Terraform Provisioning and Modules
  • Terraform Variables
  • Test Driven Development: Implementing TDD
  • Test Framework Modification
  • Test-driven Cookbooks
  • TestComplete: Test Automation with TestComplete
  • Testing and Continuous Integration
  • Testing Angular Apps
  • Testing AngularJS
  • Testing with WebLOAD
  • TestPrep 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND1)
  • TestPrep 1Z0-050 Oracle Database 11g: New Features for Administrators
  • TestPrep 1Z0-052 Oracle Database 11g: Administration I
  • TestPrep 1Z0-053 Oracle Database 11g: Administration II
  • TestPrep 1Z0-060 Upgrade to Oracle Database 12c
  • TestPrep 1Z0-061 Oracle Database 12c: SQL Fundamentals
  • TestPrep 1Z0-071 Oracle Database SQL
  • TestPrep 1Z0-808 Java SE 8 Programmer I
  • TestPrep 1Z0-809 Java SE 8 Programmer II
  • TestPrep 200-105 Interconnecting Cisco Networking Devices Part 2 (ICND2)
  • TestPrep 200-125 CCNA Routing and Switching
  • TestPrep 200-310 Designing for Cisco Internetwork Solutions (DESGN)
  • TestPrep 210-060 Implementing Cisco Collaboration Devices (CICD)
  • TestPrep 210-065 Implementing Cisco Video Network Devices (CICD)
  • TestPrep 210-260 Implementing Cisco Network Security (IINS)
  • TestPrep 210-451 Understanding Cisco Cloud Fundamentals (CLDFND)
  • TestPrep 220-1001 CompTIA A+
  • TestPrep 220-901 CompTIA A+
  • TestPrep 220-902 CompTIA A+
  • TestPrep 300-070 Implementing Cisco IP Telephony & Video, Part 1 (CIPTV1)
  • TestPrep 300-101 Implementing Cisco IP Routing (ROUTE)
  • TestPrep 300-115 Implementing Cisco IP Switched Networks (SWITCH)
  • TestPrep 300-135 Troubleshooting and Maintaining Cisco IP Networks (TSHOOT)
  • TestPrep 300-206 Implementing Cisco Edge Network Security Solutions (SENSS)
  • TestPrep 300-208 Implementing Cisco Secure Access Solutions (SISAS)
  • TestPrep 300-209 Implementing Cisco Secure Mobility Solutions (SIMOS)
  • TestPrep 312-50 Certified Ethical Hacker (CEH)
  • TestPrep 640-875 Building Cisco Service Provider Networks, Part 1 (SPNGN1)
  • TestPrep 70-246 Monitoring and Operating a Private Cloud, System Center 2012
  • TestPrep 70-247 Configuring and Deploying a Private Cloud, System Center 2012
  • TestPrep 70-410 Installing and Configuring Windows Server 2012
  • TestPrep 70-411 Administering Windows Server 2012
  • TestPrep 70-412 Configuring Advanced Windows Server 2012 Services
  • TestPrep 70-413 Designing and Implementing a Server Infrastructure
  • TestPrep 70-414 Implementing an Advanced Server Infrastructure
  • TestPrep 70-461 Querying Microsoft SQL Server 2012/2014
  • TestPrep 70-462 Administering Microsoft SQL Server 2012/2014 Databases
  • TestPrep 70-463 Implementing a Data Warehouse with SQL Server 2012/2014
  • TestPrep 70-464 Developing Microsoft SQL Server Databases
  • TestPrep 70-480 Programming in HTML5 with JavaScript and CSS3
  • TestPrep 70-483 Programming in C#
  • TestPrep 70-486 Developing ASP.NET MVC Web Applications
  • TestPrep 70-487 Developing Microsoft Azure and Web Services
  • TestPrep 70-697 Configuring Windows Devices
  • TestPrep 70-698 Installing and Configuring Windows 10
  • TestPrep 70-740 Installation, Storage, and Compute with Windows Server 2016
  • TestPrep 70-741 Networking with Windows Server 2016
  • TestPrep 70-742 Identity with Windows Server 2016
  • TestPrep 70-761 Querying Data with Transact SQL
  • TestPrep 98-368 Mobility and Device Fundamentals
  • TestPrep Agile Tester Foundation Extension
  • TestPrep BH0-010 Certified Tester Foundation Level
  • TestPrep CAS-003 CompTIA Advanced Security Practitioner (CASP)
  • TestPrep Certified Associate in Project Management (CAPM) PMBOK Guide 5th Ed.
  • TestPrep Certified Associate in Project Management (CAPM) PMBOK Guide 6th Ed.
  • TestPrep Certified Information Security Manager (CISM)
  • TestPrep Certified Information Systems Security Professional (CISSP)
  • TestPrep Certified Information Systems Security Professional (CISSP)
  • TestPrep CS0-001 CompTIA Cybersecurity Analyst (CySA+)
  • TestPrep ITIL 4 Foundation
  • TestPrep ITIL Foundation
  • TestPrep JNCIA-Junos (JN0-102)
  • TestPrep LX0-103 CompTIA Linux+ Powered by LPI Exam 1
  • TestPrep LX0-104 CompTIA Linux+ Powered by LPI Exam 2
  • TestPrep MB0-001 CompTIA Mobility+
  • TestPrep N10-006 CompTIA Network+
  • TestPrep N10-007 CompTIA Network+
  • TestPrep PMI Agile Certified Practitioner
  • TestPrep PRINCE2 2017 Foundation
  • TestPrep PRINCE2®: Foundation
  • TestPrep Professional in Human Resources (PHR)
  • TestPrep Project Management Professional PMBOK 6th Ed
  • TestPrep Senior Professional in Human Resources (SPHR)
  • TestPrep Six Sigma Green Belt (SSGB)
  • TestPrep Six Sigma Yellow Belt (SSYB)
  • TestPrep SK0-004 CompTIA Server+
  • TestPrep SY0-501 CompTIA Security+
  • TestPrep Systems Security Certified Practitioner (SSCP)
  • TestPrep Systems Security Certified Practitioner (SSCP) 2018
  • TestPrep XK0-004 CompTIA Linux+
  • Tests for Variances and Proportions, ANOVA, and Goodness-of-fit in Six Sigma
  • Text Mining & Social Network Analysis
  • The Active Directory Infrastructure in Windows Server 2008
  • The Adobe Dreamweaver CC 2015 Interface
  • The Apache Web Server Engine
  • The BA Elicitation and Collaboration Knowledge Area
  • The BA Planning and Monitoring Knowledge Area
  • The Basics of Blockchain
  • The Basics of Scalding Programming
  • The Big Data Technology Wave
  • The Certificate Services Infrastructure in Microsoft Windows Server 2008
  • The Customer Service Representative (CSR)
  • The Development of Android Applications
  • The Justinmind Desktop Application Interface
  • The Language of DevOps: DevOps Principles & Practices
  • The Language of DevOps: DevOps Tools & Processes
  • The Main Components of Android
  • The Process Groups (PMBOK® Guide Sixth Edition)
  • The R Language and Big Data Processing
  • The Requirements Life Cycle Management Knowledge Area
  • The Role of Ethics in Project Management
  • The Solution Evaluation Knowledge Area
  • The Strategy Analysis Knowledge Area
  • The Unix Command Line and GUI
  • The Waterfall Software Development Model
  • Thinking Defensively about Functions, Methods, and Input
  • Threat Detection Solutions
  • Time Series Modeling
  • Tips and Tricks for Developing Secure Mobile Apps
  • TOGAF Fundamentals - Architectural Artifacts and the Enterprise Continuum
  • TOGAF Fundamentals - Security and SOA Governance
  • TOGAF® Advanced - Content Framework And Continuum
  • TOGAF® Advanced - Enterprise Architecture
  • TOGAF® Advanced - Guidelines and Techniques
  • TOGAF® Advanced - Reference Models and Capability Framework
  • TOGAF® Fundamentals - Content Framework and Capability Basics
  • TOGAF® Fundamentals - Enterprise Architecture Basics
  • Tool Support in Software Testing
  • Tools and C++ Updates
  • Transactions and Isolation Levels
  • Transition to Scrum: Agile Foundation to Scrum
  • Transitioning into a Project Management Role
  • Trifacta for Data Wrangling: Wrangling Data
  • Triggers and Functions
  • Troubleshooting a Citrix XenDesktop 7.6 Environment
  • Troubleshooting and Closing the Project
  • Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) 2.0 | Bootcamp with Expert Replay (ITPRO.
  • Troubleshooting Data Integration
  • Troubleshooting Office 365 Usage
  • Troubleshooting Runtime Issues and HTTP Modules & Handlers
  • Troubleshooting Skype for Business
  • Troubleshooting SQL Database Errors
  • TSHOOT 2.0 : BGP IPv6 Troubleshooting
  • TSHOOT 2.0 : BGP Troubleshooting Part 1
  • TSHOOT 2.0 : BGP Troubleshooting Part 2
  • TSHOOT 2.0 : EIGRP Troubleshooting Part 1
  • TSHOOT 2.0 : EIGRP Troubleshooting Part 2
  • TSHOOT 2.0 : EIGRP Troubleshooting Part 3
  • TSHOOT 2.0 : EtherChannel & Spanning Tree Troubleshooting
  • TSHOOT 2.0 : HSRP Troubleshooting
  • TSHOOT 2.0 : Layer 2 Troubleshooting Part 1
  • TSHOOT 2.0 : Layer 2 Troubleshooting Part 2
  • TSHOOT 2.0 : Layer 2 Troubleshooting Part 3
  • TSHOOT 2.0 : Layer 3 Troubleshooting
  • TSHOOT 2.0 : Logging & Path Verification
  • TSHOOT 2.0 : Miscellaneous Troubleshooting
  • TSHOOT 2.0 : Network Traffic Viewing, Reporting, & Monitoring
  • TSHOOT 2.0 : OSPF Troubleshooting Part 1
  • TSHOOT 2.0 : OSPF Troubleshooting Part 2
  • TSHOOT 2.0 : OSPF Troubleshooting Part 3
  • TSHOOT 2.0 : Response Automation & Backups
  • TSHOOT 2.0 : Routing Troubleshooting Part 1
  • TSHOOT 2.0 : Routing Troubleshooting Part 2
  • TSHOOT 2.0 : Troubleshooting & Manipulating Output
  • TSHOOT 2.0 : Troubleshooting Basics
  • TSHOOT 2.0 : VRRP Troubleshooting
  • TypeScript Essentials: Advanced TypeScript
  • TypeScript Essentials: Getting Started
  • UI Patterns and Troubleshooting
  • UI/UX for Chatbot and Voice Interface AIs
  • Uncertainty
  • Underscore.js: Array, Object, and Utility Functions
  • Underscore.js: Collection Functions and Function Functions
  • Understanding and Raising Analytics Maturity
  • Understanding Bots: Amazon Alexa Skills Development
  • Understanding Bots: Building Bots with Dialogflow
  • Understanding Bots: Chatbot Advanced Concepts and Features
  • Understanding Bots: Chatbot Architecture
  • Understanding DOE and Planning Experiments in Six Sigma
  • Understanding Mailflow and Auditing
  • Understanding the Digital Customer
  • Unified Security: Playbook Approach to Security
  • Unit Testing in DevOps Software Development
  • Unit Testing in JavaScript: Exploring & Configuring the Mocha Testing Framework
  • Unit Testing in JavaScript: Mocha & Chai
  • Unit Testing in JavaScript: Mocha & Unit.js
  • Unit Testing in JavaScript: Should.js & Must.js
  • Unit Testing in JavaScript: SinonJS
  • Unix Hardening and Maintenance
  • Unix Software Management
  • Unsupervised Learning
  • Updating to Server 2019 : Windows Server 2019 Features
  • Updating to Server 2019: PowerShell for Windows Server
  • Updating to Server 2019: Server Configuration
  • Updating to Server 2019: Server Roles
  • Updating to Server 2019: Storage, Failover Clustering, & Application Platform
  • Updating to Server 2019: Windows Server Installations
  • Upgrading and Updating SharePoint 2016
  • User Interfaces in Virtual Reality
  • User Interfaces, Controls, and Fragments
  • User Security and Auditing in Oracle Database 12c
  • Users, Groups, and Authentication
  • Using and Creating Widgets
  • Using Animation and Supporting Mobile Devices
  • Using AWS CodeDeploy
  • Using AWS to Set Up DevOps and CloudOps Automation Frameworks
  • Using Basic Statistics and Graphical Methods in Six Sigma
  • Using Business and Financial Measures in Six Sigma
  • Using Data to Find Data: Correction & Categorization
  • Using Data to Find Data: Data Discovery & Exploration
  • Using Docker for DevOps: Configuring Docker for Continuous Delivery
  • Using Docker for DevOps: Introduction to Docker
  • Using Docker: Benefits and Installation
  • Using Docker: Customizing and Clustering
  • Using Docker: Dockerizing Applications
  • Using Eclipse
  • Using Eclipse with Subversive
  • Using Express and Express Middleware
  • Using Feedback to Improve Team Performance
  • Using Functions in SQL Server 2016
  • Using Git for DevOps: Managing Conflict & Effectively Using Git Workflow
  • Using Git for DevOps: Using Git Effectively
  • Using GoogleVR and Unreal
  • Using Lean Control Tools and Maintaining Controls in Six Sigma
  • Using Mouse, Touch, and Keyboard Input
  • Using MVC 5 with EF6, Web API 2, SignalR, and Azure
  • Using Other Device Input Methods
  • Using Splunk for Data Analysis
  • Using Swift Advanced Language Features
  • Using the Repository
  • Using Typekit Fonts on Web Sites
  • Using Vagrant: Configuration
  • Using Vagrant: Introduction
  • Using Your Data with Splunk
  • UX Design Foundations: Design Principles and Strategies
  • UX Design Foundations: Navigation, Layout, and Content
  • UX Design Foundations: Techniques and Tools
  • Vagrant Advanced Administration
  • Validate and Control Scope (PMBOK® Guide Sixth Edition)
  • Value-driven Delivery: Delivering Value in Agile Projects
  • vCenter
  • Virtual Machines
  • Virtualization with VMware: An Overview
  • Virtualizing Enterprise Desktops and Apps: App-V Clients and App Sequencing
  • Virtualizing Enterprise Desktops and Apps: Plan App Virtualization and Use MAP
  • Virtualizing Enterprise Desktops and Apps: Plan for Resilient Virtualized Apps
  • Virtualizing Enterprise Desktops and Apps: RemoteApps
  • Virtualizing Enterprise Desktops and Apps: VM-based and Session-based RDS
  • Visual Studio 2013 Debugging
  • Visual Studio 2017 Installation and New Features
  • Visual Studio Code Cross-platform Code Editor: Basics
  • Visual Studio Frameworks and Tools
  • Visual Studio Mobile Center Introduction and New Features
  • Visualization Using Kibana
  • VMware Business Mobility Solutions
  • VMware Cloud Services Solutions
  • VMware Data Center Virtualization Overview
  • VMware Datacenter Overview
  • VMware Desktop Overview
  • VMware Desktop Virtualization Overview
  • VMware NSX Network Virtualization: Configuring NSX Virtual Networks
  • VMware NSX Network Virtualization: Configuring vSphere Networking
  • VMware NSX Network Virtualization: Installing and Upgrading
  • VMware NSX Network Virtualization: NSX Network Security
  • VMware NSX Network Virtualization: NSX Network Services
  • VMware NSX Network Virtualization: NSX Operations
  • VMware NSX Network Virtualization: Physical Infrastructure Requirements
  • VMware NSX Network Virtualization: Technology and Architecture
  • VMware Server Overview
  • VMware VCA: Cloud Overview
  • VMware VCA: vCloud Connector and vSphere
  • VMware VCA: vRealize Automation and vRealize Operations Manager
  • VMware vSphere 5 - Datacenter Design VMs, Management, and Implementation
  • VMware vSphere 5 - Part 1: An Overview of Virtual Network Creation
  • VMware vSphere 5 - Part 1: Configuring and Managing Virtual Machines
  • VMware vSphere 5 - Part 1: Configuring and Managing Virtual Networks
  • VMware vSphere 5 - Part 1: Creating Virtual Machines
  • VMware vSphere 5 - Part 1: ESXi Installation and Configuration
  • VMware vSphere 5 - Part 1: Introduction to Virtualization
  • VMware vSphere 5 - Part 1: Introduction to vSphere Storage Concepts
  • VMware vSphere 5 - Part 1: vCenter Server Administration
  • VMware vSphere 5 - Part 1: vCenter Server Installation
  • VMware vSphere 5 - Part 1: vCenter Server Management
  • VMware vSphere 5 - Part 1: vSphere Client and vCenter Server Configuration
  • VMware vSphere 5 - Part 2: DRS, Resource Pools, and vApps
  • VMware vSphere 5 - Part 2: High Availability and Fault Tolerance
  • VMware vSphere 5 - Part 2: Host Profiles, Update Manager, and Auto Deploy
  • VMware vSphere 5 - Part 2: Logging and Performance
  • VMware vSphere 5 - Part 2: Processor and Resource Management
  • VMware vSphere 5 - Part 2: Securing Hosts, Internal Components, Certificate Use
  • VMware vSphere 5 - Part 2: Upgrading Hosts and Virtual Machines
  • VMware vSphere 5 - Part 2: vCenter Server Appliance Deployments and Upgrades
  • VMware vSphere 5 - Part 2: VSphere Clustering
  • VMware vSphere 5 - Part 2: vSphere Security
  • VMware vSphere 5 – Datacenter Design: Creating vSphere Conceptual and Logical Designs
  • VMware vSphere 5 – Datacenter Design: Introducing vSphere Design Fundamentals
  • VMware vSphere 5 – Datacenter Design: vSphere Network and Storage Design
  • VMware vSphere 5 – Part 1: Storage Configuration and Management
  • VMware vSphere 5 – Part 1: vCenter Server Inventory
  • VMware vSphere 6 Install, Configure, Manage - Part 1: Storage and VMs
  • VMware vSphere 6 Install, Configure, Manage - Part 1: Virtual Networks
  • VMware vSphere 6 Install, Configure, Manage - Part 1: vSphere 6 Overview
  • VMware vSphere 6 Install, Configure, Manage - Part 1: vSphere Installation
  • VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 Clustering
  • VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 Design
  • VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 DRS
  • VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 Monitoring
  • VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 Updating
  • VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 Upgrading
  • VMware Workstation 11 Networking and Remote Connectivity
  • VMware Workstation 7: Getting started with Virtual Machines
  • VMware Workstation 7: Managing Virtual Machines
  • Voice of the Customer in Six Sigma
  • Voice User Interfaces
  • VoIP Technologies
  • vSphere 6.0 ICM Part One Expert Live with Encore
  • vSphere 6.0 ICM Part Two Expert Live with Encore
  • vSphere 6.5 Distributed Resource Scheduler (DRS)
  • vSphere 6.5 High Availability Clusters
  • vSphere 6.5 Installation
  • vSphere 6.5 Monitoring and Compliance
  • vSphere 6.5 Networking
  • vSphere 6.5 Overview
  • vSphere 6.5 Resource Management
  • vSphere 6.5 Storage
  • vSphere 6.5 Update Manager
  • vSphere 6.5 Virtual Machine Creation
  • vSphere 6.5 Virtual Machine Management
  • Vue.js: Component Communication & Routing
  • Vue.js: Getting Started
  • Vue.js: Working with Components
  • Vue.js: Working With Forms & Unit Testing
  • Vue.js: Working with Vue State & Data
  • Vulnerabilities and Exploits
  • WCAG 2.0 Accessibility Standards
  • WCF Essentials: Building Clients
  • WCF Essentials: Contracts
  • WCF Essentials: Distributed Applications
  • WCF Essentials: Hosting
  • WCF Essentials: Interoperability and Integration
  • WCF Essentials: Introduction to the Framework
  • WCF Essentials: Managing Transactions
  • WCF Essentials: Queues & Reliable Sessions
  • WCF Essentials: Services
  • WCF Essentials: Tools
  • WCF Instancing and Concurrency and WCF Data Services
  • WCF Services
  • WCF Transactions, Pipelines, and Extensibility
  • Wearable Technology and UI/UX
  • Web 2.0 Fundamentals
  • Web API Advanced
  • Web API Essentials
  • Web Application Libraries
  • Web Browsing and Cortana
  • Web Building and Testing with Gulp.js
  • Web Design Basics
  • Web Design Enhancements
  • Web Development Fundamentals
  • Web Development Using the Yeoman Stack: Essential Development Tools
  • Web Services and XML
  • WebSphere Commerce Advanced Topics
  • WebSphere Commerce Application Development and Customization
  • WebSphere Commerce Basics
  • WebSphere Commerce Security, Performance, and Troubleshooting
  • Whole Page Controls and Extending Bootstrap
  • Wi-Fi Penetration Testing
  • Windows 10: Designing for Cloud and Hybrid Identity
  • Windows 10: Designing for Data Access, Protection, and Remote Access
  • Windows 10: Designing for Device Access and Protection
  • Windows 10: Planning for Apps, Updates, and Recovery
  • Windows Application Development with Visual Basic 2010
  • Windows Embedded 8.1 Industry
  • Windows Ink and Paint 3D
  • Windows Performance Monitoring: Additional Performance Tools
  • Windows PowerShell 101 Expert Live with Encore
  • Windows PowerShell Desired State Configuration Fundamentals
  • Windows Server 2008 Application Server Management and Application Provisioning
  • Windows Server 2008 Application Servers and Services
  • Windows Server 2008 Backup and Recovery
  • Windows Server 2008 Management and Delegation
  • Windows Store Applications and Databases
  • Windows Store, Security, and Browsing
  • WordPress Advanced Themes and Administration
  • WordPress Introduction and Basic Configuration
  • WordPress Networking and Security
  • Workforce Planning and Employment: Employment Legislation
  • Workforce Planning and Employment: Orientation, Onboarding, and Exit Strategies
  • Workforce Planning and Employment: Recruitment Strategies
  • Workforce Planning and Employment: Sourcing and Selecting Candidates
  • Working with ASK API Using Node.js and Java
  • Working with ASP.NET MVC Models
  • Working with ASP.NET MVC Models and Unit Testing
  • Working with ASP.NET Web API Routes and Controllers
  • Working with Balsamiq Versions and Plugins
  • Working with Bitcoin
  • Working with Cassandra
  • Working With Charms and Contracts
  • Working With Data and Files
  • Working with Data for Effective Decision Making
  • Working with Data in AngularJS
  • Working with Data Mapping, Jobs, and Automation
  • Working with Docker Machine, Security, and APIs
  • Working with Forms, the Canvas, and Media in HTML5
  • Working with Git
  • Working with GitHub
  • Working with HDInsight Clusters
  • Working with Images and Exporting Files in Adobe InDesign CC 2015
  • Working with Jenkins: Fundamentals
  • Working with JSON and XML Data Formats
  • Working with JUnit Tests
  • Working with Knockout
  • Working With Local Data Access Technologies
  • Working with Node.js and .NET
  • Working with Objects and Editing Tools in Adobe InDesign CC 2015
  • Working with Pages in Adobe InDesign CC 2015
  • Working with Sinatra
  • Working with Smart Home and Business
  • Working with SSML and AVS
  • Working with Text in Adobe Illustrator CC 2015
  • Working with Text in Adobe InDesign CC 2015
  • Working With The App Bar, Semantic Zoom, User Input, and Process Lifetime Management
  • Working with WebLOAD
  • Workplace Management: Corporate Social Responsibility
  • Workplace Management: Employment Laws and Regulations
  • Workplace Management: Global HR, Diversity, and Inclusion
  • Workplace Management: Risk Management
  • WPF Fundamentals with XAML and C#
  • Xamarin Android and iOS Projects in Cross-Platform Solutions in Visual Studio
  • XAML App Controls
  • XML Language Basics
  • XML Transformation Using XSLT and XSL-FO
  • Yeoman Stack: Advanced Usage of Generator and Polymer
  • Yeoman Stack: Application Development
  • Yeoman Stack: Managing the Environment for Productivity
  • Yeoman Stack: Working with NPM and Adopting Testing Strategies