Learning Path

  • Course 1

    AWS Certified Solutions Architect - Associate

    • Upcoming Batches
    • Curriculum
      Sl. No. Chapter
      Chapter - 1.0 Designing highly available, cost-efficient, fault-tolerant, scalable systems
      Chapter - 1.1 Identify and recognize cloud architecture considerations, such as fundamental components and effecti
      Chapter - 1.2 Content may include the following:
      Chapter - 1.3 How to design cloud services
      Chapter - 1.4 Planning and design
      Chapter - 1.5 Monitoring and logging
      Chapter - 1.6 Familiarity with:
      Chapter - 1.6.1 Best practices for AWS architecture
      Chapter - 1.6.2 Developing to client specifications, including pricing/cost (e.g., on Demand vs. Reserved vs Spot; R
      Chapter - 1.6.3 Architectural trade-off decisions (e.g., high availability vs. cost, Amazon Relational DatabaseServi
      Chapter - 1.6.4 Hybrid IT architectures (e.g., Direct Connect, Storage Gateway, VPC, Directory Services)
      Chapter - 1.6.5 Elasticity and scalability (e.g., Auto Scaling, SQS, ELB, CloudFront)
      Chapter - 2.0 Implementation/Deployment
      Chapter - 2.1 Identify the appropriate techniques and methods using Amazon EC2, Amazon S3, AWS Elastic Beanstalk,
      Chapter - 2.1.1 Configure an Amazon Machine Image (AMI)
      Chapter - 2.1.2 Operate and extend service management in a hybrid IT architecture
      Chapter - 2.1.3 Configure services to support compliance requirements in the cloud
      Chapter - 2.1.4 Launch instances across the AWS global infrastructure
      Chapter - 2.1.5 Configure IAM policies and best practices
      Chapter - 3.0 Data Security
      Chapter - 3.1 Recognize and implement secure practices for optimum cloud deployment and maintenance. Content may i
      Chapter - 3.1.1 AWS shared responsibility model
      Chapter - 3.1.2 AWS platform compliance
      Chapter - 3.1.3 AWS security attributes (customer workloads down to physical layer)
      Chapter - 3.1.4 AWS administration and security services
      Chapter - 3.1.5 AWS Identity and Access Management (IAM)
      Chapter - 3.1.6 Amazon Virtual Private Cloud (VPC)
      Chapter - 3.1.7 AWS CloudTrail
      Chapter - 3.1.8 Ingress vs. egress filtering, and which AWS services and features fit
      Chapter - 3.1.9 “Core” Amazon EC2 and S3 security feature sets
      Chapter - 3.1.10 Incorporating common conventional security products (Firewall, VPN)
      Chapter - 3.1.11 Design patterns
      Chapter - 3.1.12 DOS mitigation
      Chapter - 3.1.13 Encryption solutions (e.g., key services)
      Chapter - 3.1.14 Complex access controls (building sophisticated security groups, ACLs, etc.)
      Chapter - 3.1.15 Amazon CloudWatch for the security architect
      Chapter - 3.1.16 Trusted Advisor
      Chapter - 3.1.17 CloudW attached Logs
      Chapter - 3.2 Recognize critical disaster recovery techniques and their implementation. Content may include the fo
      Chapter - 3.2.1 Disaster recovery
      Chapter - 3.2.2 Recovery time objective
      Chapter - 3.2.3 Recovery point objective
      Chapter - 3.2.4 Amazon Elastic Block Store
      Chapter - 3.2.5 AWS Import/Export
      Chapter - 3.2.6 AWS Storage Gateway
      Chapter - 3.2.7 Amazon Route53
      Chapter - 3.2.8 Validation of data recovery method
      Chapter - 4.0 Troubleshooting : Content may include the following:
      Chapter - 4.1 General troubleshooting information and questions

    Read More

  • Course 2

    AWS Certified Developer - Associate

    • Upcoming Batches
    • Curriculum
      Sl. No. Chapter
      Chapter - 1.0 AWS Fundamentals
      Chapter - 1.1 Identify and recognize cloud architecture considerations, such as fundamental components and effecti
      Chapter - 1.1.1 How to design cloud services
      Chapter - 1.1.2 Database concepts
      Chapter - 1.1.3 Planning and design
      Chapter - 1.1.4 Familiarity with architectural trade-off decisions (high availability vs. cost, Amazon Relational Da
      Chapter - 1.1.5 Amazon S3, Amazon Simple Workflow Service (SWF), and Messaging
      Chapter - 1.1.6 DynamoDB, AWS Elastic Beanstalk, AWS CloudFormation
      Chapter - 1.1.7 Elasticity and scalability
      Chapter - 2.0 Designing and Developing
      Chapter - 2.1 Identify the appropriate techniques to code a cloud solution.
      Chapter - 2.1.1 Configure an Amazon Machine Image (AMI)
      Chapter - 2.1.2 Programming with AWS APIs
      Chapter - 3.0 Deployment and Security
      Chapter - 3.1 Recognize and implement secure procedures for optimum cloud deployment and maintenance.
      Chapter - 3.1.1 Cloud Security Best Practices
      Chapter - 3.2 Demonstrate ability to implement the right architecture for development, testing, and staging enviro
      Chapter - 3.2.1 Shared Security Responsibility Model
      Chapter - 3.2.2 AWS Platform Compliance
      Chapter - 3.2.3 AWS security attributes (customer workloads down to physical layer)
      Chapter - 3.2.4 Security Services
      Chapter - 3.2.5 AWS Identity and Access Management (IAM)
      Chapter - 3.2.6 Amazon Virtual Private Cloud (VPC)
      Chapter - 3.2.7 CIA and AAA models, ingress vs. egress filtering, and which AWS services and features fit
      Chapter - 4.0 Debugging
      Chapter - 4.1 General troubleshooting information and questions

    Read More

  • Course 3

    AWS Certified SysOps Administrator - Associate

    • Upcoming Batches
    • Curriculum
      Sl. No. Chapter
      Chapter - 1.0 Monitoring and Metrics
      Chapter - 1.1 Demonstrate ability to monitor availability and performance
      Chapter - 1.2 Demonstrate ability to monitor and manage billing and cost optimization processes
      Chapter - 2.0 High Availability
      Chapter - 2.1 Implement scalability and elasticity based on scenario
      Chapter - 2.2 Ensure level of fault tolerance based on business needs
      Chapter - 3.0 Analysis
      Chapter - 3.1 Optimize the environment to ensure maximum performance
      Chapter - 3.2 Identify performance bottlenecks and implement remedies
      Chapter - 3.3 Identify potential issues on a given application deployment
      Chapter - 4.0 Deployment and Provisioning
      Chapter - 4.1 Demonstrate the ability to build the environment to conform with the architected design
      Chapter - 4.2 Demonstrate the ability to provision cloud resources and manage implementation automation
      Chapter - 5.0 Data Management
      Chapter - 5.1 Demonstrate ability to create backups for different services
      Chapter - 5.2 Demonstrate ability to enforce compliance requirements
      Chapter - 5.3 Manage backup and disaster recovery processes
      Chapter - 6.0 Security
      Chapter - 6.1 Implement and manage security policies
      Chapter - 6.2 Ensure data integrity and access controls when using the AWS platform
      Chapter - 6.3 Demonstrate understanding of the shared responsibility model
      Chapter - 6.4 Demonstrate ability to prepare for security assessment use of AWS
      Chapter - 7.0 Networking
      Chapter - 7.1 Demonstrate ability to implement networking features of AWS
      Chapter - 7.2 Demonstrate ability to implement connectivity features of AWS

    Read More

  • Course 4

    AWS Certified Solutions Architect - Professional

    • Upcoming Batches
    • Curriculum
      Sl. No. Chapter
      Chapter - 1.0 High Availability and Business Continuity
      Chapter - 1.1 Demonstrate ability to architect the appropriate level of availability based on stakeholder requirem
      Chapter - 1.2 Demonstrate ability to implement DR for systems based on RPO and RTO
      Chapter - 1.3 Determine appropriate use of multi-Availability Zones vs. multi-Region architectures
      Chapter - 1.4 Demonstrate ability to implement self-healing capabilities Content may include the following:
      Chapter - 1.4.1 High Availability vs. Fault Tolerance
      Chapter - 2.0 Costing
      Chapter - 2.1 Demonstrate ability to make architectural decisions that minimize and optimize infrastructure cost
      Chapter - 2.2 Apply the appropriate AWS account and billing set-up options based on scenario
      Chapter - 2.3 Ability to compare and contrast the cost implications of different architectures
      Chapter - 3.0 Deployment Management
      Chapter - 3.1 Ability to manage the lifecycle of an application on AWS
      Chapter - 3.2 Demonstrate ability to implement the right architecture for development, testing, and staging enviro
      Chapter - 3.3 Position and select most appropriate AWS deployment mechanism based on scenario
      Chapter - 4.0 Network Design for a complex large scale deployment
      Chapter - 4.1 Demonstrate ability to design and implement networking features of AWS
      Chapter - 4.2 Demonstrate ability to design and implement connectivity features of AWS
      Chapter - 5.0 Data Storage for a complex large scale deployment
      Chapter - 5.1 Demonstrate ability to make architectural trade off decisions involving storage options
      Chapter - 5.2 Demonstrate ability to make architectural trade off decisions involving database options
      Chapter - 5.3 Demonstrate ability to implement the most appropriate data storage architecture
      Chapter - 5.4 Determine use of synchronous versus asynchronous replication
      Chapter - 6.0 Security
      Chapter - 6.1 Design information security management systems and compliance controls
      Chapter - 6.2 Design security controls with the AWS shared responsibility model and global infrastructure
      Chapter - 6.3 Design identity and access management controls
      Chapter - 6.4 Design protection of Data at Rest controls
      Chapter - 6.5 Design protection of Data in Flight and Network Perimeter controls
      Chapter - 7.0 Scalability and Elasticity
      Chapter - 7.1 Demonstrate the ability to design a loosely coupled system
      Chapter - 7.2 Demonstrate ability to implement the most appropriate front-end scaling architecture
      Chapter - 7.3 Demonstrate ability to implement the most appropriate middle-tier scaling architecture
      Chapter - 7.4 Demonstrate ability to implement the most appropriate data storage scaling architecture
      Chapter - 7.5 Determine trade-offs between vertical and horizontal scaling
      Chapter - 8.0 Cloud Migration and Hybrid Architecture
      Chapter - 8.1 Plan and execute for applications migrations
      Chapter - 8.2 Demonstrate ability to design hybrid cloud architectures

    Read More

  • Course 5

    Masters in Cloud Computing

    • Upcoming Batches
    • Curriculum
      Sl. No. Chapter
      Chapter - 1 Cloud Foundations
      Chapter - 2 Containers & Microservices
      Chapter - 3 Big Data Management & Analytics
      Chapter - 4 Cloud Adoption & Migration
      Chapter - 5 Private Cloud
      Chapter - 6 Cloud Computing on AWS
      Chapter - 7 Managed Services on AWS
      Chapter - 8 DevOps on AWS
      Chapter - 9 Developing on Cloud
      Chapter - 10 Solutions Architect-Official AWS Educate Learning Pathway
      Chapter - 11 Application Developer-Official AWS Educate Learning Pathway
      Chapter - 12 Microsoft Azure
      Chapter - 13 Google Cloud
      Chapter - 14 Capstone project

    Read More

  • Course 6

    Configuring BIG-IP APM Access Policy Manager

    • Upcoming Batches
    • Curriculum
      Sl. No. Chapter
      Chapter - 1 Setting Up the BIG-IP System
      Chapter - 1.1 Introducing the BIG-IP System
      Chapter - 1.2 Initially Setting Up the BIG-IP System
      Chapter - 1.3 Creating an Archive of the BIG-IP System
      Chapter - 1.4 Leveraging F5 Support Resources and Tools
      Chapter - 1.5 BIG-IP System Setup Labs
      Chapter - 2 APM Traffic Processing
      Chapter - 2.1 Virtual Servers and Access Profiles
      Chapter - 2.2 APM Configuration Wizards
      Chapter - 2.3 Logging,Sessions
      Chapter - 3 APM Access Policies and Profiles
      Chapter - 3.1 Access Policies Overview,Access Policy Branches
      Chapter - 3.2 Access Policy Endings
      Chapter - 3.3 Configuring Access Policies and Profiles
      Chapter - 3.4 Using Webtops
      Chapter - 3.5 Exporting and Importing Access Profiles
      Chapter - 4 APM Portal Access
      Chapter - 4.1 Portal Access Overview
      Chapter - 4.2 Configuring Portal Access
      Chapter - 4.3 Rewrite Profiles
      Chapter - 4.4 SSO and Credential Caching
      Chapter - 5 APM Network Access
      Chapter - 5.1 Network Access Overview
      Chapter - 5.2 Configuring Network Access
      Chapter - 5.3 BIG-IP Edge Client
      Chapter - 6 APM Access Control Lists
      Chapter - 6.1 Access Control of Resources Overview
      Chapter - 6.2 Access Control Lists
      Chapter - 7 APM Application Access & Webtops
      Chapter - 7.1 Application Access & Webtops Overview
      Chapter - 7.2 Application Access
      Chapter - 7.3 Configuring Remote Desktop Access
      Chapter - 7.4 Configuring Webtops
      Chapter - 8 BIG-IP LTM Concepts
      Chapter - 8.1 LTM Pools and Virtual Servers
      Chapter - 8.2 Monitor Concepts and Configuration
      Chapter - 8.3 Secure Network Address Translation (SNAT)
      Chapter - 9 Web Application Access for LTM
      Chapter - 9.1 Web Applications Access for LTM
      Chapter - 9.2 Configuring APM and LTM Together
      Chapter - 9.3 Profiles
      Chapter - 9.4 Profile Types and Dependencies
      Chapter - 9.5 Configuring and Using Profiles
      Chapter - 9.6 SSL Termination/Initiation
      Chapter - 9.7 SSL Profile Configuration
      Chapter - 10 APM Macros and Authentication Servers
      Chapter - 10.1 Access Policy Macros
      Chapter - 10.2 Configuring Access Policy Macros
      Chapter - 10.3 Authentication with Access Policy Manager
      Chapter - 10.4 Radius Server Authentication
      Chapter - 10.5 LDAP Server Authentication
      Chapter - 10.6 Active Directory Server Authentication
      Chapter - 11 Client-Side Endpoint Security
      Chapter - 11.1 Overview of Client-Side Endpoint Security
      Chapter - 11.2 Client-Side Endpoint Security Part 1
      Chapter - 11.3 Client-Side Endpoint Security Part 2
      Chapter - 12 Session Variables and iRules
      Chapter - 12.1 Session Variables
      Chapter - 12.2 Introducing Tcl
      Chapter - 12.3 Access iRules Events
      Chapter - 12.4 Typical APM iRule Use Case
      Chapter - 12.5 Configuring Access iRules
      Chapter - 13 APM Advanced Topics
      Chapter - 13.1 Server Side Checks
      Chapter - 13.2 General Purpose Actions
      Chapter - 13.3 Dynamic ACLs
      Chapter - 13.4 One-Time Passwords
      Chapter - 14 Customization
      Chapter - 14.1 Customization Overview
      Chapter - 14.2 BIG-IP Edge Client
      Chapter - 14.3 Advanced Edit Mode Customization
      Chapter - 15 SAML
      Chapter - 15.1 SAML Conceptual Overview
      Chapter - 15.2 SAML Configuration Overview
      Chapter - 16 APM Configuration Project

    Read More

  • Course 7

    F5 BIG-IP Global Traffic Manager

    • Upcoming Batches
    • Curriculum
      Sl. No. Chapter
      Chapter - 1 Setting Up the BIG-IP System
      Chapter - 1.1 Introducing the BIG-IP System
      Chapter - 1.2 Initially Setting Up the BIG-IP System
      Chapter - 1.3 Creating an Archive of the BIG-IP System
      Chapter - 1.4 F5 Support Resources and Tools
      Chapter - 2 DNS and GTM Systems
      Chapter - 2.1 DNS Overview
      Chapter - 2.2 The Name Resolution Process
      Chapter - 2.3 DNS and GTM System Options
      Chapter - 2.4 Resolution Diagnostic Tools
      Chapter - 3 Accelerated DNS Resolutions
      Chapter - 3.1 Global Traffic Manager and DNS Resolutions
      Chapter - 3.2 Hierarchy of Options Flow Chart
      Chapter - 3.3 Lab Setup Information
      Chapter - 3.4 GTM Listeners
      Chapter - 3.5 Load Balancing DNS Queries
      Chapter - 3.6 DNS Cache
      Chapter - 3.7 DNS Express
      Chapter - 3.8 Introduction to Wide IPs
      Chapter - 3.9 Other DNS Queries
      Chapter - 3.10 Integrating GTM into Existing DNS Systems
      Chapter - 4 Intelligent DNS Resolutions
      Chapter - 4.1 Intelligent DNS Resolutions
      Chapter - 4.2 Metric Collection
      Chapter - 4.3 Intelligent Name Resolution
      Chapter - 4.4 Data Centers
      Chapter - 4.5 Adding GTM Systems
      Chapter - 4.6 Adding LTM Systems
      Chapter - 4.7 GTM-LTM System Communications: iQuery
      Chapter - 4.8 Adding Non-F5 Servers
      Chapter - 4.9 Links
      Chapter - 4.10 Wide IP Pools
      Chapter - 4.11 Wide IPs
      Chapter - 4.12 Changing Object Status
      Chapter - 4.13 Traffic Management Shell (TMSH)
      Chapter - 5 LDNS Probes and Metrics
      Chapter - 5.1 Probes and Metrics Overview
      Chapter - 5.2 LDNS Probe Configuration
      Chapter - 6 Load Balancing
      Chapter - 6.1 Load Balancing Overview
      Chapter - 6.2 Static Load Balancing Modes
      Chapter - 6.3 Dynamic Load Balancing Modes
      Chapter - 6.4 Quality of Service Load Balancing
      Chapter - 6.5 Dynamic Persistence
      Chapter - 6.6 Manual Resume
      Chapter - 6.7 Topology Load Balancing
      Chapter - 7 Monitors
      Chapter - 7.1 Monitors and Metric Collection
      Chapter - 7.2 Monitor Types
      Chapter - 7.3 Monitor Configuration
      Chapter - 7.4 Monitor Assignments
      Chapter - 7.5 Monitor Status Reporting
      Chapter - 7.6 Monitor Results and Best Practices
      Chapter - 8 Configuration Files, Logs, and Notifications
      Chapter - 8.1 BIG-IP Configuration Files
      Chapter - 8.2 Logging and Notification
      Chapter - 8.3 GTM Log Files
      Chapter - 8.4 The Alertd Process
      Chapter - 8.5 LCD Notification
      Chapter - 8.6 Email Notification
      Chapter - 8.7 High-Speed Logging
      Chapter - 8.8 Monitoring the BIG-IP System Remotely with SNMP
      Chapter - 9 Advanced Topics
      Chapter - 9.1 DNSSEC
      Chapter - 9.2 Limits and Thresholds
      Chapter - 9.3 GTM iRules
      Chapter - 9.4 Synchronization Groups
      Chapter - 9.5 BIG-IP iHealth and QKView Diagnostic Files
      Chapter - 9.6 DNS 6 to 4
      Chapter - 9.7 Using tcpdump on the BIG-IP System

    Read More

  • Course 8

    Microsoft Certified Azure Administrator Associate Training

    • Upcoming Batches
    • Curriculum
      Sl. No. Chapter
      Chapter - 1 Introduction to Microsoft Azure
      Chapter - 2 Virtual Machine Types
      Chapter - 3 Azure Marketplace for Virtual Machines
      Chapter - 4 Azure Functions - Introduction
      Chapter - 5 Demo - Monitoring VMs
      Chapter - 6 Resource Locks
      Chapter -7 Log Analytics Overview
      Chapter - 8 Monitoring VMs
      Chapter - 9 Azure Storage Explorer
      Chapter - 10 Azure Policies
      Chapter - 11 Storage Account PowerShell
      Chapter - 12 Shared Access Signatures
      Chapter - 13 Storage Keys
      Chapter - 14 Import_Export
      Chapter - 15 CDN
      Chapter - 16 Azure Backup
      Chapter - 17 VM Networking

    Read More

  • Course 9

    Administering Microsoft Exchange Server 2016 Training and Certification

    Read More

  • Course 10

    PowerShell for SharePoint Administrators Training & Certification Courses

    • Upcoming Batches
    • Curriculum
      Sl. No. Chapter
      Chapter - 1 Creating Advanced Functions
      Chapter - 1.1 Converting a Command into an Advanced Function
      Chapter - 1.2 Creating a Script Chapter
      Chapter - 1.3 Defining Parameter Attributes and Input Validation
      Chapter - 1.4 Writing Functions that use Multiple Objects
      Chapter - 1.5 Writing Functions that Accept Pipeline Input
      Chapter - 1.6 Producing Complex Function Output
      Chapter - 1.7 Documenting Functions by using Content-Based Help
      Chapter - 1.8 Supporting -What if and -Confirm
      Chapter - Lab-1 Converting a Command into an Advanced Function
      Chapter - Lab-2 Creating a Script Chapter
      Chapter - Lab-3 Defining Parameter Attributes and Input Validation
      Chapter - Lab-4 Writing Functions that use Multiple Objects
      Chapter - Lab-5 Writing Functions that Accept Pipeline Input
      Chapter - Lab-6 Producing Complex Function Output
      Chapter - Lab-7 Documenting Functions by using Content-Based Help
      Chapter - Lab-8 Supporting –What if and -Confirm
      Chapter - 2 Using Cmdlets and Microsoft .NET Context in Windows PowerShell
      Chapter - 2.1 Running Windows PowerShell Commands
      Chapter - 2.2 Using Microsoft .NET Framework in Windows PowerShell
      Chapter - Lab-1 Using .NET Framework in Windows PowerShell
      Chapter - 3 Writing Controller Scripts Lessons
      Chapter - 3.1 Understanding Controller Scripts
      Chapter - 3.2 Lettering Controller Scripts that Show a User Interface
      Chapter -3.3 Lettering Controller Scripts That Produce Reports
      Chapter - Lab-1 Writing Controller Scripts that show a User Interface
      Chapter - Lab-2 Writing Controller Scripts That Produce HTML Reports
      Chapter - 4 Handling Script Errors
      Chapter - 4.1 Understanding Error Handling
      Chapter - 4.2 Handling Errors in a Script
      Chapter - Lab-1 Handling Errors in a Script
      Chapter - 5 Using XML Data Files
      Chapter - 5.1 Reading, Manipulating and Writing Data in XML
      Chapter - Lab-1 Reading, Manipulating and Writing Data in XML
      Chapter - 6 Managing Server outlines by using the Desired State Configuration
      Chapter - 6.1 Understanding Desired State Configuration
      Chapter - 6.2 Creating and Deploying a DSC Configuration
      Chapter - Lab-1 Creating and Deploying a DSC Configuration
      Chapter - 7 Analyzing and Debugging Scripts
      Chapter - 7.1 Debugging in Windows PowerShell
      Chapter - 7.2 Analyzing and Debugging an Existing Script
      Chapter - Lab-1 Analyzing and Debugging an Existing Script
      Chapter - 8 Understanding Windows PowerShell Workflow
      Chapter - 8.1 Understanding Windows PowerShell Workflow.

    Read More

  • Course 11

    AZ-300 Microsoft Azure Architect Technologies

    • Upcoming Batches
    • Curriculum
      Sl. No. Chapter
      Chapter - 1 Introduction to Microsoft Azure and Its Services
      Chapter - 1.1 Azure Subscriptions
      Chapter - 1.2 Azure Resources
      Chapter - 1.3 Azure Free Tier Account
      Chapter - 1.4 Azure Resource Manager
      Chapter - 1.5 Azure Resource Manager Template
      Chapter - 1.6 Azure Storage
      Chapter - 1.7 Types of Azure Storage
      Chapter - 2 Azure Virtual Machines and Networking
      Chapter - 2.1 Azure Resource Manager Virtual Machine
      Chapter - 2.2 Virtual Machines in ARM Template
      Chapter - 2.3 Overview of Azure Virtual Machine
      Chapter - 2.4 Azure Managed Disks
      Chapter - 2.5 Azure Blob Storage
      Chapter - 2.6 Networking in Azure
      Chapter - 2.7 Subnets, NIC, NSG, IP Addresses, DNS
      Chapter - 3 Azure VMSS and Availability Zones
      Chapter - 3.1 Resiliency
      Chapter - 3.2 Azure Availability Sets
      Chapter - 3.3 Azure Availability Zone
      Chapter - 3.4 Autoscaling
      Chapter - 3.5 Virtual Machine Scale Set
      Chapter - 3.6 Fault Domain
      Chapter - 3.7 Update Domain
      Chapter - 3.8 Load Balancer
      Chapter - 3.9 Application Gateway
      Chapter - 3.10 Azure Disk Encryption
      Chapter - 4 Azure App Services and Its Features
      Chapter - 4.1 Azure App Service Web Apps
      Chapter - 4.2 App Service Security
      Chapter - 4.3 Serverless Computing Concepts
      Chapter - 4.4 Function Apps
      Chapter - 4.5 Azure Event Grid
      Chapter - 4.6 Azure Service Bus
      Chapter - 4.7 Azure App Service Logic App
      Chapter - 4.8 Using Shell Commands to create Web App
      Chapter - 4.9 Background Tasks
      Chapter - 4.10 Swagger tool
      Chapter - 5 Advanced Azure Hybrid Connectivity and Site Recovery
      Chapter - 5.1 Hybrid Connectivity
      Chapter - 5.2 VNet S2S VPN
      Chapter - 5.3 VNet Peering
      Chapter - 5.4 Service Chaining
      Chapter - 5.5 Azure VPN Gateway
      Chapter - 5.6 Policy-Based Gateway
      Chapter - 5.7 Route Based Gateway
      Chapter - 5.8 Swagger tool
      Chapter - 5.9 Gateway Connections
      Chapter - 5.10 Express Route
      Chapter - 5.11 VNet Routing
      Chapter - 5.12 User-Defined Route
      Chapter - 5.13 Border Gateway Protocol
      Chapter - 5 Advanced Azure Hybrid Connectivity and Site Recovery
      Chapter - 5.1 Hybrid Connectivity
      Chapter - 5.2 VNet S2S VPN
      Chapter - 5.3 VNet Peering
      Chapter - 5.4 Service Chaining
      Chapter - 5.5 Azure VPN Gateway
      Chapter - 5.6 Policy-Based Gateway
      Chapter - 5.7 Route Based Gateway
      Chapter - 5.8 Swagger tool
      Chapter - 5.9 Gateway Connections
      Chapter - 5.10 Express Route
      Chapter - 5.11 VNet Routing
      Chapter - 5.12 User-Defined Route
      Chapter - 5.13 Border Gateway Protocol
      Chapter - 6 Azure Storage Solution and Design Patterns
      Chapter - 6.1 Cloud design patterns
      Chapter - 6.2 Cache-aside pattern
      Chapter - 6.3 Sharding Pattern
      Chapter - 6.4 Azure SQL DB
      Chapter - 6.5 Azure Elastic Pool
      Chapter - 6.6 Azure Data Lakes
      Chapter - 6.7 Azure Data Factory
      Chapter - 6.8 Azure Cosmos DB
      Chapter - 7 Azure Kubernetes Service
      Chapter - 7.1 Application Environment Components
      Chapter - 7.2 Docker
      Chapter - 7.3 DockerFile
      Chapter - 7.4 Docker Image
      Chapter - 7.5 Azure Container Registry
      Chapter - 7.6 Azure Container Instance
      Chapter - 7.7 Orchestration
      Chapter - 7.8 Azure Kubernetes Service
      Chapter - 7.9 Diagnostics Logs
      Chapter - 7 Azure Kubernetes Service
      Chapter - 7.1 Application Environment Components
      Chapter - 7.2 Docker
      Chapter - 7.3 DockerFile
      Chapter - 7.4 Docker Image
      Chapter - 7.5 Azure Container Registry
      Chapter - 7.6 Azure Container Instance
      Chapter - 7.7 Orchestration
      Chapter - 7.8 Azure Kubernetes Service
      Chapter - 7.9 Diagnostics Logs
      Chapter - 8 Azure Active Directory and Role-Based Access Control Topics
      Chapter - 8.1 Access Control
      Chapter - 8.2 Role-Based Access Control
      Chapter - 8.3 Validation in applications (permits, Azure AD, Azure AD Connect, token-based)
      Chapter - 8.4 Multi-factor authentication (MFA)
      Chapter - 8.5 Claims-based authorization
      Chapter - 8.6 Role-based access control (RBAC) authorization
      Chapter - 8.7 End-to-end encryption
      Chapter - 8.8 Azure confidential computing
      Chapter - 8.9 SSL and TLS communications
      Chapter - 8.10 Azure Key Vault
      Chapter - 8.11 Configure Fraud alerts
      Chapter - 8.12 Bypass option trusted IPs
      Chapter - 8.13 Managed Service Identity
      Chapter - 8.14 Service Principal authentication
      Chapter - 9 Azure Messaging Service (Events, Hubs, Queue and Bus)
      Chapter - 9.1 Azure Messaging Service
      Chapter - 9.2 Azure Service Bus
      Chapter - 9.3 Azure Events Hub
      Chapter - 9.4 Azure Events Grid
      Chapter - 9.5 Azure Notifications Hub
      Chapter - 9.6 Auto Scale Ruling in Azure
      Chapter - 9.7 Transient Fault Handling
      Chapter - 10 Azure Monitoring and Insights Service
      Chapter - 10.1 Azure Monitoring
      Chapter - 10.2 Azure Analytics
      Chapter - 10.3 Azure Alerts
      Chapter - 10.4 Azure Resource Metrics
      Chapter - 10.5 Azure Activity Log
      Chapter - 10.6 Service Health
      Chapter - 10.7 Azure Log Analytics
      Chapter - 10.8 Azure App Insights

    Read More

  • Course 12

    AWS Certified Security - Specialty ( Security Engineering on AWS ) Training & Certification

    Read More

  • Course 13

    HP Data Protector Training

    • Upcoming Batches
    • Curriculum
      Sl. No. Chapter
      Chapter - 1 HP Adaptive Backup and Recovery Solutions
      Chapter - 1.1 Data Protector 9.0
      Chapter - 1.2 HP Backup Navigator
      Chapter - 1.3 Data Protector Management pack
      Chapter - 2 HP Data Protector Architecture
      Chapter - 2.1 Backup and Replication Methods
      Chapter - 2.2 The Cell Concept
      Chapter - 2.3 Data Protector Architecture
      Chapter - 2.4 Cell Manager and Installation Server
      Chapter - 2.5 Disk, Media and Integration Agents
      Chapter - 2.6 Internal Database
      Chapter - 2.7 Typical Data Protector session
      Chapter - 2.8 Data Protector tuning
      Chapter - 3 Licensing and Product Structure
      Chapter - 3.1 Data Protector licensing
      Chapter - 3.2 Product Structure overview
      Chapter - 3.3 License Reporting and checking
      Chapter - 4 Quick Start
      Chapter - 4.1 Concept Backup Specification
      Chapter - 4.2 Configure Media Pool and Device
      Chapter - 4.3 Configure and run a Backup
      Chapter - 4.4 Monitor the Backup session
      Chapter - 4.5 Start a Restore
      Chapter - 4.6 Run a Single Session Report
      Chapter - 5 HP Data Protector Software Installation
      Chapter - 5.1 Installation Overview, Planning, and Methods
      Chapter - 5.2 Cell Manager Installation on Windows
      Chapter - 5.3 Cell Manager Installation on Unix
      Chapter - 5.4 Client Push Installation
      Chapter - 5.5 Export and Import of Clients
      Chapter - 5.6 Adding Components to Clients
      Chapter - 6 Upgrade
      Chapter - 6.1 Upgrade Overview
      Chapter - 6.2 Supported Upgrade Paths
      Chapter - 6.3 Upgrading a Windows Cell Manager
      Chapter - 6.4 Upgrading a Unix Cell Manager
      Chapter - 6.5 Migrating the Cell Manager to an altered stage
      Chapter - 7 Media Management
      Chapter - 7.1 Media Pool concept
      Chapter - 7.2 Media Pool Properties
      Chapter - 7.3 Creating a Media Pool
      Chapter - 7.4 Free Pool Concept and Implementation
      Chapter - 7.5 Medium properties
      Chapter - 7.6 Location Tracking and Priority
      Chapter - 7.7 Formatting Tape Media
      Chapter - 7.8 Vaulting with Media Pools
      Chapter - 8 Backup Device
      Chapter - 8.1 Overview
      Chapter - 8.2 Logical Device concept
      Chapter - 8.3 Data Protector Tape Format
      Chapter - 8.4 Configure Tape based Storage Devices
      Chapter - 8.5 Configure Disk-based Storage Devices
      Chapter - 8.6 De-duplication Devices
      Chapter - 8.7 Device and Library Tools
      Chapter - 9 Backup
      Chapter - 9.1 Backup Specification Types
      Chapter - 9.2 Backup Features
      Chapter - 9.3 Static and Dynamic Device Allocation
      Chapter - 9.4 Load Balancing – Object Allocation
      Chapter - 9.5 Backup Mirroring
      Chapter - 9.6 Create and start a Backup Specification
      Chapter - 9.7 The Backup Process Flow
      Chapter - 9.8 Monitor the backup session
      Chapter - 9.9 Restart failed Backups
      Chapter - 10 Advanced Scheduler
      Chapter - 10.1 Schedule a Backup
      Chapter - 10.2 Manage missed Job Executions
      Chapter - 11 Restore
      Chapter - 11.1 Performing Restores
      Chapter - 11.2 Restore Sequence
      Chapter - 11.3 Object and Session Restore
      Chapter - 11.4 Single or Parallel Restore
      Chapter - 11.5 Checkpoint Restore
      Chapter - 12 Monitoring, Reporting, and Notifications
      Chapter - 12.1 Monitoring and Reporting
      Chapter - 12.2 Session Monitoring
      Chapter - 12.3 Report Categories and Delivery Methods
      Chapter - 12.4 Configure and schedule Reports
      Chapter - 12.5 Web Reporting Interface
      Chapter - 12.6 Default Notification overview
      Chapter - 12.7 Adding Notifications
      Chapter - 13 Media and Object Replication
      Chapter - 13.1 Interactive Media Copy
      Chapter - 13.2 Automated Media Operation
      Chapter - 14 Internal Database (IDB)
      Chapter - 14.1 Concept Embedded database
      Chapter - 14.2 Architecture
      Chapter - 14.3 IDB Directory Structure
      Chapter - 14.4 Internal Database Size Limits
      Chapter - 14.5 Administration Tasks
      Chapter - 14.6 Manage IDB Grow
      Chapter - 14.7 IDB Maintenance
      Chapter - 15 Security
      Chapter - 15.1 Access control
      Chapter - 15.2 User Groups and User Rights
      Chapter - 15.3 Adding Users and Groups
      Chapter - 15.4 User Restrictions
      Chapter - 15.5 LDAP Integration
      Chapter - 15.6 Client and Cell Security
      Chapter - 15.7 Inet Impersonation
      Chapter - 15.8 Changing the Web Interface Password
      Chapter - 16 Auditing
      Chapter - 16.1 Auditing Overview
      Chapter - 16.2 Backup session auditing
      Chapter - 16.3 Enhanced Event Logging
      Chapter - 17 Disaster Recovery
      Chapter - 17.1 Disaster Recovery methods
      Chapter - 17.2 Disaster Recovery phases
      Chapter - 17.3 Create a Disaster Recovery Image
      Chapter - 17.4 Booting the Recovery Image
      Chapter - 17.5 Using the Recovery Progress Monitor
      Chapter - 17.6 Disaster Recovery on Dissimilar Hardware
      Chapter - 18 Troubleshooting
      Chapter - 18.1 Log and Trace Files
      Chapter - 18.2 Debug Traces Generation
      Chapter - 18.3 Debug Log Collector
      Chapter - 18.4 Troubleshoot Network issues
      Chapter - 18.5 Troubleshoot Devices issues
      Chapter - 18.6 Typical Backup and Restore issues
      Chapter - 18.7 omnihealthcheck
      Chapter - 18.8 Object Copy
      Chapter - 18.9 Interactive Object Copy
      Chapter - 18.10 Post Backup and scheduled Object Copy
      Chapter - 18.11 Object Copy and Library Filtering
      Chapter - 18.12 Automatic Device Selection
      Chapter - 18.13 Copy Specification options
      Chapter - 19 Object Consolidation
      Chapter - 19.1 Enhanced Incremental Backups
      Chapter - 19.2 Synthetic Full Backups
      Chapter - 19.3 Virtual Full Backups
      Chapter - 19.4 Interactive Object Consolidation
      Chapter - 19.5 Post Backup and scheduled Object Consolidation
      Chapter - 19.6 Consolidation Specification options
      Chapter - 19.7 Use case scenarios

    Read More

  • Course 14

    AWS Certification Training

    Read More

  • Course 15

    Google Cloud Platform Fundamentals (CP100A) Certification Training

    Read More

  • Course 16

    Cloud Computing Fundamental

    • Upcoming Batches
    • Curriculum
      Sl. No. Chapter
      Chapter - 1 What is cloud computing?
      Chapter - 2 Why the rush to the cloud?
      Chapter - 3 Cloud computing building blocks.
      Chapter - 4 Cloud Offerings: Private Cloud, Private Cloud, Hybrid Cloud.
      Chapter - 5 Cloud Service Models: SaaS, PaaS, IaaS
      Chapter - 6 IT roles in the cloud: developer, administrator, architect.
      Chapter - 7 To cloud or not to cloud: Risk assessment
      Chapter - 8 Governance: How will industry standards be monitored?
      Chapter - 9 Bandwidth requirements, Financial impact.
      Chapter - 10 Popular Cloud Companies, Services & Products.
      Chapter - 11 Cloud Security.

    Read More

  • Course 17

    Microsoft Certified Azure Developer Associate AZ-203 Certification Training

    Read More

  • Course 18

    Microsoft Certified Azure Architect Design AZ-301 Certification Training

    Read More

  • Course 19

    Microsoft Azure Solutions Architect Certification Training for AZ 300-301

    Read More

Top