Course 1
AWS Certified Solutions Architect - Associate
E-Learning
Sl. No. | Chapter |
---|---|
Chapter - 1.0 | Designing highly available, cost-efficient, fault-tolerant, scalable systems |
Chapter - 1.1 | Identify and recognize cloud architecture considerations, such as fundamental components and effecti |
Chapter - 1.2 | Content may include the following: |
Chapter - 1.3 | How to design cloud services |
Chapter - 1.4 | Planning and design |
Chapter - 1.5 | Monitoring and logging |
Chapter - 1.6 | Familiarity with: |
Chapter - 1.6.1 | Best practices for AWS architecture |
Chapter - 1.6.2 | Developing to client specifications, including pricing/cost (e.g., on Demand vs. Reserved vs Spot; R |
Chapter - 1.6.3 | Architectural trade-off decisions (e.g., high availability vs. cost, Amazon Relational DatabaseServi |
Chapter - 1.6.4 | Hybrid IT architectures (e.g., Direct Connect, Storage Gateway, VPC, Directory Services) |
Chapter - 1.6.5 | Elasticity and scalability (e.g., Auto Scaling, SQS, ELB, CloudFront) |
Chapter - 2.0 | Implementation/Deployment |
Chapter - 2.1 | Identify the appropriate techniques and methods using Amazon EC2, Amazon S3, AWS Elastic Beanstalk, |
Chapter - 2.1.1 | Configure an Amazon Machine Image (AMI) |
Chapter - 2.1.2 | Operate and extend service management in a hybrid IT architecture |
Chapter - 2.1.3 | Configure services to support compliance requirements in the cloud |
Chapter - 2.1.4 | Launch instances across the AWS global infrastructure |
Chapter - 2.1.5 | Configure IAM policies and best practices |
Chapter - 3.0 | Data Security |
Chapter - 3.1 | Recognize and implement secure practices for optimum cloud deployment and maintenance. Content may i |
Chapter - 3.1.1 | AWS shared responsibility model |
Chapter - 3.1.2 | AWS platform compliance |
Chapter - 3.1.3 | AWS security attributes (customer workloads down to physical layer) |
Chapter - 3.1.4 | AWS administration and security services |
Chapter - 3.1.5 | AWS Identity and Access Management (IAM) |
Chapter - 3.1.6 | Amazon Virtual Private Cloud (VPC) |
Chapter - 3.1.7 | AWS CloudTrail |
Chapter - 3.1.8 | Ingress vs. egress filtering, and which AWS services and features fit |
Chapter - 3.1.9 | “Core” Amazon EC2 and S3 security feature sets |
Chapter - 3.1.10 | Incorporating common conventional security products (Firewall, VPN) |
Chapter - 3.1.11 | Design patterns |
Chapter - 3.1.12 | DOS mitigation |
Chapter - 3.1.13 | Encryption solutions (e.g., key services) |
Chapter - 3.1.14 | Complex access controls (building sophisticated security groups, ACLs, etc.) |
Chapter - 3.1.15 | Amazon CloudWatch for the security architect |
Chapter - 3.1.16 | Trusted Advisor |
Chapter - 3.1.17 | CloudW attached Logs |
Chapter - 3.2 | Recognize critical disaster recovery techniques and their implementation. Content may include the fo |
Chapter - 3.2.1 | Disaster recovery |
Chapter - 3.2.2 | Recovery time objective |
Chapter - 3.2.3 | Recovery point objective |
Chapter - 3.2.4 | Amazon Elastic Block Store |
Chapter - 3.2.5 | AWS Import/Export |
Chapter - 3.2.6 | AWS Storage Gateway |
Chapter - 3.2.7 | Amazon Route53 |
Chapter - 3.2.8 | Validation of data recovery method |
Chapter - 4.0 | Troubleshooting : Content may include the following: |
Chapter - 4.1 | General troubleshooting information and questions |
Course 2
AWS Certified Developer - Associate
Sl. No. | Chapter |
---|---|
Chapter - 1.0 | AWS Fundamentals |
Chapter - 1.1 | Identify and recognize cloud architecture considerations, such as fundamental components and effecti |
Chapter - 1.1.1 | How to design cloud services |
Chapter - 1.1.2 | Database concepts |
Chapter - 1.1.3 | Planning and design |
Chapter - 1.1.4 | Familiarity with architectural trade-off decisions (high availability vs. cost, Amazon Relational Da |
Chapter - 1.1.5 | Amazon S3, Amazon Simple Workflow Service (SWF), and Messaging |
Chapter - 1.1.6 | DynamoDB, AWS Elastic Beanstalk, AWS CloudFormation |
Chapter - 1.1.7 | Elasticity and scalability |
Chapter - 2.0 | Designing and Developing |
Chapter - 2.1 | Identify the appropriate techniques to code a cloud solution. |
Chapter - 2.1.1 | Configure an Amazon Machine Image (AMI) |
Chapter - 2.1.2 | Programming with AWS APIs |
Chapter - 3.0 | Deployment and Security |
Chapter - 3.1 | Recognize and implement secure procedures for optimum cloud deployment and maintenance. |
Chapter - 3.1.1 | Cloud Security Best Practices |
Chapter - 3.2 | Demonstrate ability to implement the right architecture for development, testing, and staging enviro |
Chapter - 3.2.1 | Shared Security Responsibility Model |
Chapter - 3.2.2 | AWS Platform Compliance |
Chapter - 3.2.3 | AWS security attributes (customer workloads down to physical layer) |
Chapter - 3.2.4 | Security Services |
Chapter - 3.2.5 | AWS Identity and Access Management (IAM) |
Chapter - 3.2.6 | Amazon Virtual Private Cloud (VPC) |
Chapter - 3.2.7 | CIA and AAA models, ingress vs. egress filtering, and which AWS services and features fit |
Chapter - 4.0 | Debugging |
Chapter - 4.1 | General troubleshooting information and questions |
Course 3
AWS Certified SysOps Administrator - Associate
Sl. No. | Chapter |
---|---|
Chapter - 1.0 | Monitoring and Metrics |
Chapter - 1.1 | Demonstrate ability to monitor availability and performance |
Chapter - 1.2 | Demonstrate ability to monitor and manage billing and cost optimization processes |
Chapter - 2.0 | High Availability |
Chapter - 2.1 | Implement scalability and elasticity based on scenario |
Chapter - 2.2 | Ensure level of fault tolerance based on business needs |
Chapter - 3.0 | Analysis |
Chapter - 3.1 | Optimize the environment to ensure maximum performance |
Chapter - 3.2 | Identify performance bottlenecks and implement remedies |
Chapter - 3.3 | Identify potential issues on a given application deployment |
Chapter - 4.0 | Deployment and Provisioning |
Chapter - 4.1 | Demonstrate the ability to build the environment to conform with the architected design |
Chapter - 4.2 | Demonstrate the ability to provision cloud resources and manage implementation automation |
Chapter - 5.0 | Data Management |
Chapter - 5.1 | Demonstrate ability to create backups for different services |
Chapter - 5.2 | Demonstrate ability to enforce compliance requirements |
Chapter - 5.3 | Manage backup and disaster recovery processes |
Chapter - 6.0 | Security |
Chapter - 6.1 | Implement and manage security policies |
Chapter - 6.2 | Ensure data integrity and access controls when using the AWS platform |
Chapter - 6.3 | Demonstrate understanding of the shared responsibility model |
Chapter - 6.4 | Demonstrate ability to prepare for security assessment use of AWS |
Chapter - 7.0 | Networking |
Chapter - 7.1 | Demonstrate ability to implement networking features of AWS |
Chapter - 7.2 | Demonstrate ability to implement connectivity features of AWS |
Course 4
AWS Certified Solutions Architect - Professional
Sl. No. | Chapter |
---|---|
Chapter - 1.0 | High Availability and Business Continuity |
Chapter - 1.1 | Demonstrate ability to architect the appropriate level of availability based on stakeholder requirem |
Chapter - 1.2 | Demonstrate ability to implement DR for systems based on RPO and RTO |
Chapter - 1.3 | Determine appropriate use of multi-Availability Zones vs. multi-Region architectures |
Chapter - 1.4 | Demonstrate ability to implement self-healing capabilities Content may include the following: |
Chapter - 1.4.1 | High Availability vs. Fault Tolerance |
Chapter - 2.0 | Costing |
Chapter - 2.1 | Demonstrate ability to make architectural decisions that minimize and optimize infrastructure cost |
Chapter - 2.2 | Apply the appropriate AWS account and billing set-up options based on scenario |
Chapter - 2.3 | Ability to compare and contrast the cost implications of different architectures |
Chapter - 3.0 | Deployment Management |
Chapter - 3.1 | Ability to manage the lifecycle of an application on AWS |
Chapter - 3.2 | Demonstrate ability to implement the right architecture for development, testing, and staging enviro |
Chapter - 3.3 | Position and select most appropriate AWS deployment mechanism based on scenario |
Chapter - 4.0 | Network Design for a complex large scale deployment |
Chapter - 4.1 | Demonstrate ability to design and implement networking features of AWS |
Chapter - 4.2 | Demonstrate ability to design and implement connectivity features of AWS |
Chapter - 5.0 | Data Storage for a complex large scale deployment |
Chapter - 5.1 | Demonstrate ability to make architectural trade off decisions involving storage options |
Chapter - 5.2 | Demonstrate ability to make architectural trade off decisions involving database options |
Chapter - 5.3 | Demonstrate ability to implement the most appropriate data storage architecture |
Chapter - 5.4 | Determine use of synchronous versus asynchronous replication |
Chapter - 6.0 | Security |
Chapter - 6.1 | Design information security management systems and compliance controls |
Chapter - 6.2 | Design security controls with the AWS shared responsibility model and global infrastructure |
Chapter - 6.3 | Design identity and access management controls |
Chapter - 6.4 | Design protection of Data at Rest controls |
Chapter - 6.5 | Design protection of Data in Flight and Network Perimeter controls |
Chapter - 7.0 | Scalability and Elasticity |
Chapter - 7.1 | Demonstrate the ability to design a loosely coupled system |
Chapter - 7.2 | Demonstrate ability to implement the most appropriate front-end scaling architecture |
Chapter - 7.3 | Demonstrate ability to implement the most appropriate middle-tier scaling architecture |
Chapter - 7.4 | Demonstrate ability to implement the most appropriate data storage scaling architecture |
Chapter - 7.5 | Determine trade-offs between vertical and horizontal scaling |
Chapter - 8.0 | Cloud Migration and Hybrid Architecture |
Chapter - 8.1 | Plan and execute for applications migrations |
Chapter - 8.2 | Demonstrate ability to design hybrid cloud architectures |
Course 5
Masters in Cloud Computing
Sl. No. | Chapter |
---|---|
Chapter - 1 | Cloud Foundations |
Chapter - 2 | Containers & Microservices |
Chapter - 3 | Big Data Management & Analytics |
Chapter - 4 | Cloud Adoption & Migration |
Chapter - 5 | Private Cloud |
Chapter - 6 | Cloud Computing on AWS |
Chapter - 7 | Managed Services on AWS |
Chapter - 8 | DevOps on AWS |
Chapter - 9 | Developing on Cloud |
Chapter - 10 | Solutions Architect-Official AWS Educate Learning Pathway |
Chapter - 11 | Application Developer-Official AWS Educate Learning Pathway |
Chapter - 12 | Microsoft Azure |
Chapter - 13 | Google Cloud |
Chapter - 14 | Capstone project |
Course 6
Configuring BIG-IP APM Access Policy Manager
Sl. No. | Chapter |
---|---|
Chapter - 1 | Setting Up the BIG-IP System |
Chapter - 1.1 | Introducing the BIG-IP System |
Chapter - 1.2 | Initially Setting Up the BIG-IP System |
Chapter - 1.3 | Creating an Archive of the BIG-IP System |
Chapter - 1.4 | Leveraging F5 Support Resources and Tools |
Chapter - 1.5 | BIG-IP System Setup Labs |
Chapter - 2 | APM Traffic Processing |
Chapter - 2.1 | Virtual Servers and Access Profiles |
Chapter - 2.2 | APM Configuration Wizards |
Chapter - 2.3 | Logging,Sessions |
Chapter - 3 | APM Access Policies and Profiles |
Chapter - 3.1 | Access Policies Overview,Access Policy Branches |
Chapter - 3.2 | Access Policy Endings |
Chapter - 3.3 | Configuring Access Policies and Profiles |
Chapter - 3.4 | Using Webtops |
Chapter - 3.5 | Exporting and Importing Access Profiles |
Chapter - 4 | APM Portal Access |
Chapter - 4.1 | Portal Access Overview |
Chapter - 4.2 | Configuring Portal Access |
Chapter - 4.3 | Rewrite Profiles |
Chapter - 4.4 | SSO and Credential Caching |
Chapter - 5 | APM Network Access |
Chapter - 5.1 | Network Access Overview |
Chapter - 5.2 | Configuring Network Access |
Chapter - 5.3 | BIG-IP Edge Client |
Chapter - 6 | APM Access Control Lists |
Chapter - 6.1 | Access Control of Resources Overview |
Chapter - 6.2 | Access Control Lists |
Chapter - 7 | APM Application Access & Webtops |
Chapter - 7.1 | Application Access & Webtops Overview |
Chapter - 7.2 | Application Access |
Chapter - 7.3 | Configuring Remote Desktop Access |
Chapter - 7.4 | Configuring Webtops |
Chapter - 8 | BIG-IP LTM Concepts |
Chapter - 8.1 | LTM Pools and Virtual Servers |
Chapter - 8.2 | Monitor Concepts and Configuration |
Chapter - 8.3 | Secure Network Address Translation (SNAT) |
Chapter - 9 | Web Application Access for LTM |
Chapter - 9.1 | Web Applications Access for LTM |
Chapter - 9.2 | Configuring APM and LTM Together |
Chapter - 9.3 | Profiles |
Chapter - 9.4 | Profile Types and Dependencies |
Chapter - 9.5 | Configuring and Using Profiles |
Chapter - 9.6 | SSL Termination/Initiation |
Chapter - 9.7 | SSL Profile Configuration |
Chapter - 10 | APM Macros and Authentication Servers |
Chapter - 10.1 | Access Policy Macros |
Chapter - 10.2 | Configuring Access Policy Macros |
Chapter - 10.3 | Authentication with Access Policy Manager |
Chapter - 10.4 | Radius Server Authentication |
Chapter - 10.5 | LDAP Server Authentication |
Chapter - 10.6 | Active Directory Server Authentication |
Chapter - 11 | Client-Side Endpoint Security |
Chapter - 11.1 | Overview of Client-Side Endpoint Security |
Chapter - 11.2 | Client-Side Endpoint Security Part 1 |
Chapter - 11.3 | Client-Side Endpoint Security Part 2 |
Chapter - 12 | Session Variables and iRules |
Chapter - 12.1 | Session Variables |
Chapter - 12.2 | Introducing Tcl |
Chapter - 12.3 | Access iRules Events |
Chapter - 12.4 | Typical APM iRule Use Case |
Chapter - 12.5 | Configuring Access iRules |
Chapter - 13 | APM Advanced Topics |
Chapter - 13.1 | Server Side Checks |
Chapter - 13.2 | General Purpose Actions |
Chapter - 13.3 | Dynamic ACLs |
Chapter - 13.4 | One-Time Passwords |
Chapter - 14 | Customization |
Chapter - 14.1 | Customization Overview |
Chapter - 14.2 | BIG-IP Edge Client |
Chapter - 14.3 | Advanced Edit Mode Customization |
Chapter - 15 | SAML |
Chapter - 15.1 | SAML Conceptual Overview |
Chapter - 15.2 | SAML Configuration Overview |
Chapter - 16 | APM Configuration Project |
Course 7
F5 BIG-IP Global Traffic Manager
Sl. No. | Chapter |
---|---|
Chapter - 1 | Setting Up the BIG-IP System |
Chapter - 1.1 | Introducing the BIG-IP System |
Chapter - 1.2 | Initially Setting Up the BIG-IP System |
Chapter - 1.3 | Creating an Archive of the BIG-IP System |
Chapter - 1.4 | F5 Support Resources and Tools |
Chapter - 2 | DNS and GTM Systems |
Chapter - 2.1 | DNS Overview |
Chapter - 2.2 | The Name Resolution Process |
Chapter - 2.3 | DNS and GTM System Options |
Chapter - 2.4 | Resolution Diagnostic Tools |
Chapter - 3 | Accelerated DNS Resolutions |
Chapter - 3.1 | Global Traffic Manager and DNS Resolutions |
Chapter - 3.2 | Hierarchy of Options Flow Chart |
Chapter - 3.3 | Lab Setup Information |
Chapter - 3.4 | GTM Listeners |
Chapter - 3.5 | Load Balancing DNS Queries |
Chapter - 3.6 | DNS Cache |
Chapter - 3.7 | DNS Express |
Chapter - 3.8 | Introduction to Wide IPs |
Chapter - 3.9 | Other DNS Queries |
Chapter - 3.10 | Integrating GTM into Existing DNS Systems |
Chapter - 4 | Intelligent DNS Resolutions |
Chapter - 4.1 | Intelligent DNS Resolutions |
Chapter - 4.2 | Metric Collection |
Chapter - 4.3 | Intelligent Name Resolution |
Chapter - 4.4 | Data Centers |
Chapter - 4.5 | Adding GTM Systems |
Chapter - 4.6 | Adding LTM Systems |
Chapter - 4.7 | GTM-LTM System Communications: iQuery |
Chapter - 4.8 | Adding Non-F5 Servers |
Chapter - 4.9 | Links |
Chapter - 4.10 | Wide IP Pools |
Chapter - 4.11 | Wide IPs |
Chapter - 4.12 | Changing Object Status |
Chapter - 4.13 | Traffic Management Shell (TMSH) |
Chapter - 5 | LDNS Probes and Metrics |
Chapter - 5.1 | Probes and Metrics Overview |
Chapter - 5.2 | LDNS Probe Configuration |
Chapter - 6 | Load Balancing |
Chapter - 6.1 | Load Balancing Overview |
Chapter - 6.2 | Static Load Balancing Modes |
Chapter - 6.3 | Dynamic Load Balancing Modes |
Chapter - 6.4 | Quality of Service Load Balancing |
Chapter - 6.5 | Dynamic Persistence |
Chapter - 6.6 | Manual Resume |
Chapter - 6.7 | Topology Load Balancing |
Chapter - 7 | Monitors |
Chapter - 7.1 | Monitors and Metric Collection |
Chapter - 7.2 | Monitor Types |
Chapter - 7.3 | Monitor Configuration |
Chapter - 7.4 | Monitor Assignments |
Chapter - 7.5 | Monitor Status Reporting |
Chapter - 7.6 | Monitor Results and Best Practices |
Chapter - 8 | Configuration Files, Logs, and Notifications |
Chapter - 8.1 | BIG-IP Configuration Files |
Chapter - 8.2 | Logging and Notification |
Chapter - 8.3 | GTM Log Files |
Chapter - 8.4 | The Alertd Process |
Chapter - 8.5 | LCD Notification |
Chapter - 8.6 | Email Notification |
Chapter - 8.7 | High-Speed Logging |
Chapter - 8.8 | Monitoring the BIG-IP System Remotely with SNMP |
Chapter - 9 | Advanced Topics |
Chapter - 9.1 | DNSSEC |
Chapter - 9.2 | Limits and Thresholds |
Chapter - 9.3 | GTM iRules |
Chapter - 9.4 | Synchronization Groups |
Chapter - 9.5 | BIG-IP iHealth and QKView Diagnostic Files |
Chapter - 9.6 | DNS 6 to 4 |
Chapter - 9.7 | Using tcpdump on the BIG-IP System |
Course 8
Microsoft Certified Azure Administrator Associate Training
E-Learning
Sl. No. | Chapter |
---|---|
Chapter - 1 | Introduction to Microsoft Azure |
Chapter - 2 | Virtual Machine Types |
Chapter - 3 | Azure Marketplace for Virtual Machines |
Chapter - 4 | Azure Functions - Introduction |
Chapter - 5 | Demo - Monitoring VMs |
Chapter - 6 | Resource Locks |
Chapter -7 | Log Analytics Overview |
Chapter - 8 | Monitoring VMs |
Chapter - 9 | Azure Storage Explorer |
Chapter - 10 | Azure Policies |
Chapter - 11 | Storage Account PowerShell |
Chapter - 12 | Shared Access Signatures |
Chapter - 13 | Storage Keys |
Chapter - 14 | Import_Export |
Chapter - 15 | CDN |
Chapter - 16 | Azure Backup |
Chapter - 17 | VM Networking |
Course 9
Administering Microsoft Exchange Server 2016 Training and Certification
Sl. No. | Chapter |
---|
Course 10
PowerShell for SharePoint Administrators Training & Certification Courses
Sl. No. | Chapter |
---|---|
Chapter - 1 | Creating Advanced Functions |
Chapter - 1.1 | Converting a Command into an Advanced Function |
Chapter - 1.2 | Creating a Script Chapter |
Chapter - 1.3 | Defining Parameter Attributes and Input Validation |
Chapter - 1.4 | Writing Functions that use Multiple Objects |
Chapter - 1.5 | Writing Functions that Accept Pipeline Input |
Chapter - 1.6 | Producing Complex Function Output |
Chapter - 1.7 | Documenting Functions by using Content-Based Help |
Chapter - 1.8 | Supporting -What if and -Confirm |
Chapter - Lab-1 | Converting a Command into an Advanced Function |
Chapter - Lab-2 | Creating a Script Chapter |
Chapter - Lab-3 | Defining Parameter Attributes and Input Validation |
Chapter - Lab-4 | Writing Functions that use Multiple Objects |
Chapter - Lab-5 | Writing Functions that Accept Pipeline Input |
Chapter - Lab-6 | Producing Complex Function Output |
Chapter - Lab-7 | Documenting Functions by using Content-Based Help |
Chapter - Lab-8 | Supporting –What if and -Confirm |
Chapter - 2 | Using Cmdlets and Microsoft .NET Context in Windows PowerShell |
Chapter - 2.1 | Running Windows PowerShell Commands |
Chapter - 2.2 | Using Microsoft .NET Framework in Windows PowerShell |
Chapter - Lab-1 | Using .NET Framework in Windows PowerShell |
Chapter - 3 | Writing Controller Scripts Lessons |
Chapter - 3.1 | Understanding Controller Scripts |
Chapter - 3.2 | Lettering Controller Scripts that Show a User Interface |
Chapter -3.3 | Lettering Controller Scripts That Produce Reports |
Chapter - Lab-1 | Writing Controller Scripts that show a User Interface |
Chapter - Lab-2 | Writing Controller Scripts That Produce HTML Reports |
Chapter - 4 | Handling Script Errors |
Chapter - 4.1 | Understanding Error Handling |
Chapter - 4.2 | Handling Errors in a Script |
Chapter - Lab-1 | Handling Errors in a Script |
Chapter - 5 | Using XML Data Files |
Chapter - 5.1 | Reading, Manipulating and Writing Data in XML |
Chapter - Lab-1 | Reading, Manipulating and Writing Data in XML |
Chapter - 6 | Managing Server outlines by using the Desired State Configuration |
Chapter - 6.1 | Understanding Desired State Configuration |
Chapter - 6.2 | Creating and Deploying a DSC Configuration |
Chapter - Lab-1 | Creating and Deploying a DSC Configuration |
Chapter - 7 | Analyzing and Debugging Scripts |
Chapter - 7.1 | Debugging in Windows PowerShell |
Chapter - 7.2 | Analyzing and Debugging an Existing Script |
Chapter - Lab-1 | Analyzing and Debugging an Existing Script |
Chapter - 8 | Understanding Windows PowerShell Workflow |
Chapter - 8.1 | Understanding Windows PowerShell Workflow. |
Course 11
AZ-300 Microsoft Azure Architect Technologies
Sl. No. | Chapter |
---|---|
Chapter - 1 | Introduction to Microsoft Azure and Its Services |
Chapter - 1.1 | Azure Subscriptions |
Chapter - 1.2 | Azure Resources |
Chapter - 1.3 | Azure Free Tier Account |
Chapter - 1.4 | Azure Resource Manager |
Chapter - 1.5 | Azure Resource Manager Template |
Chapter - 1.6 | Azure Storage |
Chapter - 1.7 | Types of Azure Storage |
Chapter - 2 | Azure Virtual Machines and Networking |
Chapter - 2.1 | Azure Resource Manager Virtual Machine |
Chapter - 2.2 | Virtual Machines in ARM Template |
Chapter - 2.3 | Overview of Azure Virtual Machine |
Chapter - 2.4 | Azure Managed Disks |
Chapter - 2.5 | Azure Blob Storage |
Chapter - 2.6 | Networking in Azure |
Chapter - 2.7 | Subnets, NIC, NSG, IP Addresses, DNS |
Chapter - 3 | Azure VMSS and Availability Zones |
Chapter - 3.1 | Resiliency |
Chapter - 3.2 | Azure Availability Sets |
Chapter - 3.3 | Azure Availability Zone |
Chapter - 3.4 | Autoscaling |
Chapter - 3.5 | Virtual Machine Scale Set |
Chapter - 3.6 | Fault Domain |
Chapter - 3.7 | Update Domain |
Chapter - 3.8 | Load Balancer |
Chapter - 3.9 | Application Gateway |
Chapter - 3.10 | Azure Disk Encryption |
Chapter - 4 | Azure App Services and Its Features |
Chapter - 4.1 | Azure App Service Web Apps |
Chapter - 4.2 | App Service Security |
Chapter - 4.3 | Serverless Computing Concepts |
Chapter - 4.4 | Function Apps |
Chapter - 4.5 | Azure Event Grid |
Chapter - 4.6 | Azure Service Bus |
Chapter - 4.7 | Azure App Service Logic App |
Chapter - 4.8 | Using Shell Commands to create Web App |
Chapter - 4.9 | Background Tasks |
Chapter - 4.10 | Swagger tool |
Chapter - 5 | Advanced Azure Hybrid Connectivity and Site Recovery |
Chapter - 5.1 | Hybrid Connectivity |
Chapter - 5.2 | VNet S2S VPN |
Chapter - 5.3 | VNet Peering |
Chapter - 5.4 | Service Chaining |
Chapter - 5.5 | Azure VPN Gateway |
Chapter - 5.6 | Policy-Based Gateway |
Chapter - 5.7 | Route Based Gateway |
Chapter - 5.8 | Swagger tool |
Chapter - 5.9 | Gateway Connections |
Chapter - 5.10 | Express Route |
Chapter - 5.11 | VNet Routing |
Chapter - 5.12 | User-Defined Route |
Chapter - 5.13 | Border Gateway Protocol |
Chapter - 5 | Advanced Azure Hybrid Connectivity and Site Recovery |
Chapter - 5.1 | Hybrid Connectivity |
Chapter - 5.2 | VNet S2S VPN |
Chapter - 5.3 | VNet Peering |
Chapter - 5.4 | Service Chaining |
Chapter - 5.5 | Azure VPN Gateway |
Chapter - 5.6 | Policy-Based Gateway |
Chapter - 5.7 | Route Based Gateway |
Chapter - 5.8 | Swagger tool |
Chapter - 5.9 | Gateway Connections |
Chapter - 5.10 | Express Route |
Chapter - 5.11 | VNet Routing |
Chapter - 5.12 | User-Defined Route |
Chapter - 5.13 | Border Gateway Protocol |
Chapter - 6 | Azure Storage Solution and Design Patterns |
Chapter - 6.1 | Cloud design patterns |
Chapter - 6.2 | Cache-aside pattern |
Chapter - 6.3 | Sharding Pattern |
Chapter - 6.4 | Azure SQL DB |
Chapter - 6.5 | Azure Elastic Pool |
Chapter - 6.6 | Azure Data Lakes |
Chapter - 6.7 | Azure Data Factory |
Chapter - 6.8 | Azure Cosmos DB |
Chapter - 7 | Azure Kubernetes Service |
Chapter - 7.1 | Application Environment Components |
Chapter - 7.2 | Docker |
Chapter - 7.3 | DockerFile |
Chapter - 7.4 | Docker Image |
Chapter - 7.5 | Azure Container Registry |
Chapter - 7.6 | Azure Container Instance |
Chapter - 7.7 | Orchestration |
Chapter - 7.8 | Azure Kubernetes Service |
Chapter - 7.9 | Diagnostics Logs |
Chapter - 7 | Azure Kubernetes Service |
Chapter - 7.1 | Application Environment Components |
Chapter - 7.2 | Docker |
Chapter - 7.3 | DockerFile |
Chapter - 7.4 | Docker Image |
Chapter - 7.5 | Azure Container Registry |
Chapter - 7.6 | Azure Container Instance |
Chapter - 7.7 | Orchestration |
Chapter - 7.8 | Azure Kubernetes Service |
Chapter - 7.9 | Diagnostics Logs |
Chapter - 8 | Azure Active Directory and Role-Based Access Control Topics |
Chapter - 8.1 | Access Control |
Chapter - 8.2 | Role-Based Access Control |
Chapter - 8.3 | Validation in applications (permits, Azure AD, Azure AD Connect, token-based) |
Chapter - 8.4 | Multi-factor authentication (MFA) |
Chapter - 8.5 | Claims-based authorization |
Chapter - 8.6 | Role-based access control (RBAC) authorization |
Chapter - 8.7 | End-to-end encryption |
Chapter - 8.8 | Azure confidential computing |
Chapter - 8.9 | SSL and TLS communications |
Chapter - 8.10 | Azure Key Vault |
Chapter - 8.11 | Configure Fraud alerts |
Chapter - 8.12 | Bypass option trusted IPs |
Chapter - 8.13 | Managed Service Identity |
Chapter - 8.14 | Service Principal authentication |
Chapter - 9 | Azure Messaging Service (Events, Hubs, Queue and Bus) |
Chapter - 9.1 | Azure Messaging Service |
Chapter - 9.2 | Azure Service Bus |
Chapter - 9.3 | Azure Events Hub |
Chapter - 9.4 | Azure Events Grid |
Chapter - 9.5 | Azure Notifications Hub |
Chapter - 9.6 | Auto Scale Ruling in Azure |
Chapter - 9.7 | Transient Fault Handling |
Chapter - 10 | Azure Monitoring and Insights Service |
Chapter - 10.1 | Azure Monitoring |
Chapter - 10.2 | Azure Analytics |
Chapter - 10.3 | Azure Alerts |
Chapter - 10.4 | Azure Resource Metrics |
Chapter - 10.5 | Azure Activity Log |
Chapter - 10.6 | Service Health |
Chapter - 10.7 | Azure Log Analytics |
Chapter - 10.8 | Azure App Insights |
Course 12
AWS Certified Security - Specialty ( Security Engineering on AWS ) Training & Certification
Sl. No. | Chapter |
---|
Course 13
HP Data Protector Training
Sl. No. | Chapter |
---|---|
Chapter - 1 | HP Adaptive Backup and Recovery Solutions |
Chapter - 1.1 | Data Protector 9.0 |
Chapter - 1.2 | HP Backup Navigator |
Chapter - 1.3 | Data Protector Management pack |
Chapter - 2 | HP Data Protector Architecture |
Chapter - 2.1 | Backup and Replication Methods |
Chapter - 2.2 | The Cell Concept |
Chapter - 2.3 | Data Protector Architecture |
Chapter - 2.4 | Cell Manager and Installation Server |
Chapter - 2.5 | Disk, Media and Integration Agents |
Chapter - 2.6 | Internal Database |
Chapter - 2.7 | Typical Data Protector session |
Chapter - 2.8 | Data Protector tuning |
Chapter - 3 | Licensing and Product Structure |
Chapter - 3.1 | Data Protector licensing |
Chapter - 3.2 | Product Structure overview |
Chapter - 3.3 | License Reporting and checking |
Chapter - 4 | Quick Start |
Chapter - 4.1 | Concept Backup Specification |
Chapter - 4.2 | Configure Media Pool and Device |
Chapter - 4.3 | Configure and run a Backup |
Chapter - 4.4 | Monitor the Backup session |
Chapter - 4.5 | Start a Restore |
Chapter - 4.6 | Run a Single Session Report |
Chapter - 5 | HP Data Protector Software Installation |
Chapter - 5.1 | Installation Overview, Planning, and Methods |
Chapter - 5.2 | Cell Manager Installation on Windows |
Chapter - 5.3 | Cell Manager Installation on Unix |
Chapter - 5.4 | Client Push Installation |
Chapter - 5.5 | Export and Import of Clients |
Chapter - 5.6 | Adding Components to Clients |
Chapter - 6 | Upgrade |
Chapter - 6.1 | Upgrade Overview |
Chapter - 6.2 | Supported Upgrade Paths |
Chapter - 6.3 | Upgrading a Windows Cell Manager |
Chapter - 6.4 | Upgrading a Unix Cell Manager |
Chapter - 6.5 | Migrating the Cell Manager to an altered stage |
Chapter - 7 | Media Management |
Chapter - 7.1 | Media Pool concept |
Chapter - 7.2 | Media Pool Properties |
Chapter - 7.3 | Creating a Media Pool |
Chapter - 7.4 | Free Pool Concept and Implementation |
Chapter - 7.5 | Medium properties |
Chapter - 7.6 | Location Tracking and Priority |
Chapter - 7.7 | Formatting Tape Media |
Chapter - 7.8 | Vaulting with Media Pools |
Chapter - 8 | Backup Device |
Chapter - 8.1 | Overview |
Chapter - 8.2 | Logical Device concept |
Chapter - 8.3 | Data Protector Tape Format |
Chapter - 8.4 | Configure Tape based Storage Devices |
Chapter - 8.5 | Configure Disk-based Storage Devices |
Chapter - 8.6 | De-duplication Devices |
Chapter - 8.7 | Device and Library Tools |
Chapter - 9 | Backup |
Chapter - 9.1 | Backup Specification Types |
Chapter - 9.2 | Backup Features |
Chapter - 9.3 | Static and Dynamic Device Allocation |
Chapter - 9.4 | Load Balancing – Object Allocation |
Chapter - 9.5 | Backup Mirroring |
Chapter - 9.6 | Create and start a Backup Specification |
Chapter - 9.7 | The Backup Process Flow |
Chapter - 9.8 | Monitor the backup session |
Chapter - 9.9 | Restart failed Backups |
Chapter - 10 | Advanced Scheduler |
Chapter - 10.1 | Schedule a Backup |
Chapter - 10.2 | Manage missed Job Executions |
Chapter - 11 | Restore |
Chapter - 11.1 | Performing Restores |
Chapter - 11.2 | Restore Sequence |
Chapter - 11.3 | Object and Session Restore |
Chapter - 11.4 | Single or Parallel Restore |
Chapter - 11.5 | Checkpoint Restore |
Chapter - 12 | Monitoring, Reporting, and Notifications |
Chapter - 12.1 | Monitoring and Reporting |
Chapter - 12.2 | Session Monitoring |
Chapter - 12.3 | Report Categories and Delivery Methods |
Chapter - 12.4 | Configure and schedule Reports |
Chapter - 12.5 | Web Reporting Interface |
Chapter - 12.6 | Default Notification overview |
Chapter - 12.7 | Adding Notifications |
Chapter - 13 | Media and Object Replication |
Chapter - 13.1 | Interactive Media Copy |
Chapter - 13.2 | Automated Media Operation |
Chapter - 14 | Internal Database (IDB) |
Chapter - 14.1 | Concept Embedded database |
Chapter - 14.2 | Architecture |
Chapter - 14.3 | IDB Directory Structure |
Chapter - 14.4 | Internal Database Size Limits |
Chapter - 14.5 | Administration Tasks |
Chapter - 14.6 | Manage IDB Grow |
Chapter - 14.7 | IDB Maintenance |
Chapter - 15 | Security |
Chapter - 15.1 | Access control |
Chapter - 15.2 | User Groups and User Rights |
Chapter - 15.3 | Adding Users and Groups |
Chapter - 15.4 | User Restrictions |
Chapter - 15.5 | LDAP Integration |
Chapter - 15.6 | Client and Cell Security |
Chapter - 15.7 | Inet Impersonation |
Chapter - 15.8 | Changing the Web Interface Password |
Chapter - 16 | Auditing |
Chapter - 16.1 | Auditing Overview |
Chapter - 16.2 | Backup session auditing |
Chapter - 16.3 | Enhanced Event Logging |
Chapter - 17 | Disaster Recovery |
Chapter - 17.1 | Disaster Recovery methods |
Chapter - 17.2 | Disaster Recovery phases |
Chapter - 17.3 | Create a Disaster Recovery Image |
Chapter - 17.4 | Booting the Recovery Image |
Chapter - 17.5 | Using the Recovery Progress Monitor |
Chapter - 17.6 | Disaster Recovery on Dissimilar Hardware |
Chapter - 18 | Troubleshooting |
Chapter - 18.1 | Log and Trace Files |
Chapter - 18.2 | Debug Traces Generation |
Chapter - 18.3 | Debug Log Collector |
Chapter - 18.4 | Troubleshoot Network issues |
Chapter - 18.5 | Troubleshoot Devices issues |
Chapter - 18.6 | Typical Backup and Restore issues |
Chapter - 18.7 | omnihealthcheck |
Chapter - 18.8 | Object Copy |
Chapter - 18.9 | Interactive Object Copy |
Chapter - 18.10 | Post Backup and scheduled Object Copy |
Chapter - 18.11 | Object Copy and Library Filtering |
Chapter - 18.12 | Automatic Device Selection |
Chapter - 18.13 | Copy Specification options |
Chapter - 19 | Object Consolidation |
Chapter - 19.1 | Enhanced Incremental Backups |
Chapter - 19.2 | Synthetic Full Backups |
Chapter - 19.3 | Virtual Full Backups |
Chapter - 19.4 | Interactive Object Consolidation |
Chapter - 19.5 | Post Backup and scheduled Object Consolidation |
Chapter - 19.6 | Consolidation Specification options |
Chapter - 19.7 | Use case scenarios |
Course 15
Google Cloud Platform Fundamentals (CP100A) Certification Training
Sl. No. | Chapter |
---|
Course 16
Cloud Computing Fundamental
Sl. No. | Chapter |
---|---|
Chapter - 1 | What is cloud computing? |
Chapter - 2 | Why the rush to the cloud? |
Chapter - 3 | Cloud computing building blocks. |
Chapter - 4 | Cloud Offerings: Private Cloud, Private Cloud, Hybrid Cloud. |
Chapter - 5 | Cloud Service Models: SaaS, PaaS, IaaS |
Chapter - 6 | IT roles in the cloud: developer, administrator, architect. |
Chapter - 7 | To cloud or not to cloud: Risk assessment |
Chapter - 8 | Governance: How will industry standards be monitored? |
Chapter - 9 | Bandwidth requirements, Financial impact. |
Chapter - 10 | Popular Cloud Companies, Services & Products. |
Chapter - 11 | Cloud Security. |
Course 17
Microsoft Certified Azure Developer Associate AZ-203 Certification Training
Sl. No. | Chapter |
---|
Course 18
Microsoft Certified Azure Architect Design AZ-301 Certification Training
Sl. No. | Chapter |
---|
Course 19
Microsoft Azure Solutions Architect Certification Training for AZ 300-301
Sl. No. | Chapter |
---|