Course 1
AWS Certified Solutions Architect - Associate
E-Learning
| Sl. No. | Chapter |
|---|---|
| Chapter - 1.0 | Designing highly available, cost-efficient, fault-tolerant, scalable systems |
| Chapter - 1.1 | Identify and recognize cloud architecture considerations, such as fundamental components and effecti |
| Chapter - 1.2 | Content may include the following: |
| Chapter - 1.3 | How to design cloud services |
| Chapter - 1.4 | Planning and design |
| Chapter - 1.5 | Monitoring and logging |
| Chapter - 1.6 | Familiarity with: |
| Chapter - 1.6.1 | Best practices for AWS architecture |
| Chapter - 1.6.2 | Developing to client specifications, including pricing/cost (e.g., on Demand vs. Reserved vs Spot; R |
| Chapter - 1.6.3 | Architectural trade-off decisions (e.g., high availability vs. cost, Amazon Relational DatabaseServi |
| Chapter - 1.6.4 | Hybrid IT architectures (e.g., Direct Connect, Storage Gateway, VPC, Directory Services) |
| Chapter - 1.6.5 | Elasticity and scalability (e.g., Auto Scaling, SQS, ELB, CloudFront) |
| Chapter - 2.0 | Implementation/Deployment |
| Chapter - 2.1 | Identify the appropriate techniques and methods using Amazon EC2, Amazon S3, AWS Elastic Beanstalk, |
| Chapter - 2.1.1 | Configure an Amazon Machine Image (AMI) |
| Chapter - 2.1.2 | Operate and extend service management in a hybrid IT architecture |
| Chapter - 2.1.3 | Configure services to support compliance requirements in the cloud |
| Chapter - 2.1.4 | Launch instances across the AWS global infrastructure |
| Chapter - 2.1.5 | Configure IAM policies and best practices |
| Chapter - 3.0 | Data Security |
| Chapter - 3.1 | Recognize and implement secure practices for optimum cloud deployment and maintenance. Content may i |
| Chapter - 3.1.1 | AWS shared responsibility model |
| Chapter - 3.1.2 | AWS platform compliance |
| Chapter - 3.1.3 | AWS security attributes (customer workloads down to physical layer) |
| Chapter - 3.1.4 | AWS administration and security services |
| Chapter - 3.1.5 | AWS Identity and Access Management (IAM) |
| Chapter - 3.1.6 | Amazon Virtual Private Cloud (VPC) |
| Chapter - 3.1.7 | AWS CloudTrail |
| Chapter - 3.1.8 | Ingress vs. egress filtering, and which AWS services and features fit |
| Chapter - 3.1.9 | āCoreā Amazon EC2 and S3 security feature sets |
| Chapter - 3.1.10 | Incorporating common conventional security products (Firewall, VPN) |
| Chapter - 3.1.11 | Design patterns |
| Chapter - 3.1.12 | DOS mitigation |
| Chapter - 3.1.13 | Encryption solutions (e.g., key services) |
| Chapter - 3.1.14 | Complex access controls (building sophisticated security groups, ACLs, etc.) |
| Chapter - 3.1.15 | Amazon CloudWatch for the security architect |
| Chapter - 3.1.16 | Trusted Advisor |
| Chapter - 3.1.17 | CloudW attached Logs |
| Chapter - 3.2 | Recognize critical disaster recovery techniques and their implementation. Content may include the fo |
| Chapter - 3.2.1 | Disaster recovery |
| Chapter - 3.2.2 | Recovery time objective |
| Chapter - 3.2.3 | Recovery point objective |
| Chapter - 3.2.4 | Amazon Elastic Block Store |
| Chapter - 3.2.5 | AWS Import/Export |
| Chapter - 3.2.6 | AWS Storage Gateway |
| Chapter - 3.2.7 | Amazon Route53 |
| Chapter - 3.2.8 | Validation of data recovery method |
| Chapter - 4.0 | Troubleshooting : Content may include the following: |
| Chapter - 4.1 | General troubleshooting information and questions |
Course 2
AWS Certified Developer - Associate
| Sl. No. | Chapter |
|---|---|
| Chapter - 1.0 | AWS Fundamentals |
| Chapter - 1.1 | Identify and recognize cloud architecture considerations, such as fundamental components and effecti |
| Chapter - 1.1.1 | How to design cloud services |
| Chapter - 1.1.2 | Database concepts |
| Chapter - 1.1.3 | Planning and design |
| Chapter - 1.1.4 | Familiarity with architectural trade-off decisions (high availability vs. cost, Amazon Relational Da |
| Chapter - 1.1.5 | Amazon S3, Amazon Simple Workflow Service (SWF), and Messaging |
| Chapter - 1.1.6 | DynamoDB, AWS Elastic Beanstalk, AWS CloudFormation |
| Chapter - 1.1.7 | Elasticity and scalability |
| Chapter - 2.0 | Designing and Developing |
| Chapter - 2.1 | Identify the appropriate techniques to code a cloud solution. |
| Chapter - 2.1.1 | Configure an Amazon Machine Image (AMI) |
| Chapter - 2.1.2 | Programming with AWS APIs |
| Chapter - 3.0 | Deployment and Security |
| Chapter - 3.1 | Recognize and implement secure procedures for optimum cloud deployment and maintenance. |
| Chapter - 3.1.1 | Cloud Security Best Practices |
| Chapter - 3.2 | Demonstrate ability to implement the right architecture for development, testing, and staging enviro |
| Chapter - 3.2.1 | Shared Security Responsibility Model |
| Chapter - 3.2.2 | AWS Platform Compliance |
| Chapter - 3.2.3 | AWS security attributes (customer workloads down to physical layer) |
| Chapter - 3.2.4 | Security Services |
| Chapter - 3.2.5 | AWS Identity and Access Management (IAM) |
| Chapter - 3.2.6 | Amazon Virtual Private Cloud (VPC) |
| Chapter - 3.2.7 | CIA and AAA models, ingress vs. egress filtering, and which AWS services and features fit |
| Chapter - 4.0 | Debugging |
| Chapter - 4.1 | General troubleshooting information and questions |
Course 3
AWS Certified SysOps Administrator - Associate
| Sl. No. | Chapter |
|---|---|
| Chapter - 1.0 | Monitoring and Metrics |
| Chapter - 1.1 | Demonstrate ability to monitor availability and performance |
| Chapter - 1.2 | Demonstrate ability to monitor and manage billing and cost optimization processes |
| Chapter - 2.0 | High Availability |
| Chapter - 2.1 | Implement scalability and elasticity based on scenario |
| Chapter - 2.2 | Ensure level of fault tolerance based on business needs |
| Chapter - 3.0 | Analysis |
| Chapter - 3.1 | Optimize the environment to ensure maximum performance |
| Chapter - 3.2 | Identify performance bottlenecks and implement remedies |
| Chapter - 3.3 | Identify potential issues on a given application deployment |
| Chapter - 4.0 | Deployment and Provisioning |
| Chapter - 4.1 | Demonstrate the ability to build the environment to conform with the architected design |
| Chapter - 4.2 | Demonstrate the ability to provision cloud resources and manage implementation automation |
| Chapter - 5.0 | Data Management |
| Chapter - 5.1 | Demonstrate ability to create backups for different services |
| Chapter - 5.2 | Demonstrate ability to enforce compliance requirements |
| Chapter - 5.3 | Manage backup and disaster recovery processes |
| Chapter - 6.0 | Security |
| Chapter - 6.1 | Implement and manage security policies |
| Chapter - 6.2 | Ensure data integrity and access controls when using the AWS platform |
| Chapter - 6.3 | Demonstrate understanding of the shared responsibility model |
| Chapter - 6.4 | Demonstrate ability to prepare for security assessment use of AWS |
| Chapter - 7.0 | Networking |
| Chapter - 7.1 | Demonstrate ability to implement networking features of AWS |
| Chapter - 7.2 | Demonstrate ability to implement connectivity features of AWS |
Course 4
AWS Certified Solutions Architect - Professional
| Sl. No. | Chapter |
|---|---|
| Chapter - 1.0 | High Availability and Business Continuity |
| Chapter - 1.1 | Demonstrate ability to architect the appropriate level of availability based on stakeholder requirem |
| Chapter - 1.2 | Demonstrate ability to implement DR for systems based on RPO and RTO |
| Chapter - 1.3 | Determine appropriate use of multi-Availability Zones vs. multi-Region architectures |
| Chapter - 1.4 | Demonstrate ability to implement self-healing capabilities Content may include the following: |
| Chapter - 1.4.1 | High Availability vs. Fault Tolerance |
| Chapter - 2.0 | Costing |
| Chapter - 2.1 | Demonstrate ability to make architectural decisions that minimize and optimize infrastructure cost |
| Chapter - 2.2 | Apply the appropriate AWS account and billing set-up options based on scenario |
| Chapter - 2.3 | Ability to compare and contrast the cost implications of different architectures |
| Chapter - 3.0 | Deployment Management |
| Chapter - 3.1 | Ability to manage the lifecycle of an application on AWS |
| Chapter - 3.2 | Demonstrate ability to implement the right architecture for development, testing, and staging enviro |
| Chapter - 3.3 | Position and select most appropriate AWS deployment mechanism based on scenario |
| Chapter - 4.0 | Network Design for a complex large scale deployment |
| Chapter - 4.1 | Demonstrate ability to design and implement networking features of AWS |
| Chapter - 4.2 | Demonstrate ability to design and implement connectivity features of AWS |
| Chapter - 5.0 | Data Storage for a complex large scale deployment |
| Chapter - 5.1 | Demonstrate ability to make architectural trade off decisions involving storage options |
| Chapter - 5.2 | Demonstrate ability to make architectural trade off decisions involving database options |
| Chapter - 5.3 | Demonstrate ability to implement the most appropriate data storage architecture |
| Chapter - 5.4 | Determine use of synchronous versus asynchronous replication |
| Chapter - 6.0 | Security |
| Chapter - 6.1 | Design information security management systems and compliance controls |
| Chapter - 6.2 | Design security controls with the AWS shared responsibility model and global infrastructure |
| Chapter - 6.3 | Design identity and access management controls |
| Chapter - 6.4 | Design protection of Data at Rest controls |
| Chapter - 6.5 | Design protection of Data in Flight and Network Perimeter controls |
| Chapter - 7.0 | Scalability and Elasticity |
| Chapter - 7.1 | Demonstrate the ability to design a loosely coupled system |
| Chapter - 7.2 | Demonstrate ability to implement the most appropriate front-end scaling architecture |
| Chapter - 7.3 | Demonstrate ability to implement the most appropriate middle-tier scaling architecture |
| Chapter - 7.4 | Demonstrate ability to implement the most appropriate data storage scaling architecture |
| Chapter - 7.5 | Determine trade-offs between vertical and horizontal scaling |
| Chapter - 8.0 | Cloud Migration and Hybrid Architecture |
| Chapter - 8.1 | Plan and execute for applications migrations |
| Chapter - 8.2 | Demonstrate ability to design hybrid cloud architectures |
Course 5
Masters in Cloud Computing
| Sl. No. | Chapter |
|---|---|
| Chapter - 1 | Cloud Foundations |
| Chapter - 2 | Containers & Microservices |
| Chapter - 3 | Big Data Management & Analytics |
| Chapter - 4 | Cloud Adoption & Migration |
| Chapter - 5 | Private Cloud |
| Chapter - 6 | Cloud Computing on AWS |
| Chapter - 7 | Managed Services on AWS |
| Chapter - 8 | DevOps on AWS |
| Chapter - 9 | Developing on Cloud |
| Chapter - 10 | Solutions Architect-Official AWS Educate Learning Pathway |
| Chapter - 11 | Application Developer-Official AWS Educate Learning Pathway |
| Chapter - 12 | Microsoft Azure |
| Chapter - 13 | Google Cloud |
| Chapter - 14 | Capstone project |
Course 6
Configuring BIG-IP APM Access Policy Manager
| Sl. No. | Chapter |
|---|---|
| Chapter - 1 | Setting Up the BIG-IP System |
| Chapter - 1.1 | Introducing the BIG-IP System |
| Chapter - 1.2 | Initially Setting Up the BIG-IP System |
| Chapter - 1.3 | Creating an Archive of the BIG-IP System |
| Chapter - 1.4 | Leveraging F5 Support Resources and Tools |
| Chapter - 1.5 | BIG-IP System Setup Labs |
| Chapter - 2 | APM Traffic Processing |
| Chapter - 2.1 | Virtual Servers and Access Profiles |
| Chapter - 2.2 | APM Configuration Wizards |
| Chapter - 2.3 | Logging,Sessions |
| Chapter - 3 | APM Access Policies and Profiles |
| Chapter - 3.1 | Access Policies Overview,Access Policy Branches |
| Chapter - 3.2 | Access Policy Endings |
| Chapter - 3.3 | Configuring Access Policies and Profiles |
| Chapter - 3.4 | Using Webtops |
| Chapter - 3.5 | Exporting and Importing Access Profiles |
| Chapter - 4 | APM Portal Access |
| Chapter - 4.1 | Portal Access Overview |
| Chapter - 4.2 | Configuring Portal Access |
| Chapter - 4.3 | Rewrite Profiles |
| Chapter - 4.4 | SSO and Credential Caching |
| Chapter - 5 | APM Network Access |
| Chapter - 5.1 | Network Access Overview |
| Chapter - 5.2 | Configuring Network Access |
| Chapter - 5.3 | BIG-IP Edge Client |
| Chapter - 6 | APM Access Control Lists |
| Chapter - 6.1 | Access Control of Resources Overview |
| Chapter - 6.2 | Access Control Lists |
| Chapter - 7 | APM Application Access & Webtops |
| Chapter - 7.1 | Application Access & Webtops Overview |
| Chapter - 7.2 | Application Access |
| Chapter - 7.3 | Configuring Remote Desktop Access |
| Chapter - 7.4 | Configuring Webtops |
| Chapter - 8 | BIG-IP LTM Concepts |
| Chapter - 8.1 | LTM Pools and Virtual Servers |
| Chapter - 8.2 | Monitor Concepts and Configuration |
| Chapter - 8.3 | Secure Network Address Translation (SNAT) |
| Chapter - 9 | Web Application Access for LTM |
| Chapter - 9.1 | Web Applications Access for LTM |
| Chapter - 9.2 | Configuring APM and LTM Together |
| Chapter - 9.3 | Profiles |
| Chapter - 9.4 | Profile Types and Dependencies |
| Chapter - 9.5 | Configuring and Using Profiles |
| Chapter - 9.6 | SSL Termination/Initiation |
| Chapter - 9.7 | SSL Profile Configuration |
| Chapter - 10 | APM Macros and Authentication Servers |
| Chapter - 10.1 | Access Policy Macros |
| Chapter - 10.2 | Configuring Access Policy Macros |
| Chapter - 10.3 | Authentication with Access Policy Manager |
| Chapter - 10.4 | Radius Server Authentication |
| Chapter - 10.5 | LDAP Server Authentication |
| Chapter - 10.6 | Active Directory Server Authentication |
| Chapter - 11 | Client-Side Endpoint Security |
| Chapter - 11.1 | Overview of Client-Side Endpoint Security |
| Chapter - 11.2 | Client-Side Endpoint Security Part 1 |
| Chapter - 11.3 | Client-Side Endpoint Security Part 2 |
| Chapter - 12 | Session Variables and iRules |
| Chapter - 12.1 | Session Variables |
| Chapter - 12.2 | Introducing Tcl |
| Chapter - 12.3 | Access iRules Events |
| Chapter - 12.4 | Typical APM iRule Use Case |
| Chapter - 12.5 | Configuring Access iRules |
| Chapter - 13 | APM Advanced Topics |
| Chapter - 13.1 | Server Side Checks |
| Chapter - 13.2 | General Purpose Actions |
| Chapter - 13.3 | Dynamic ACLs |
| Chapter - 13.4 | One-Time Passwords |
| Chapter - 14 | Customization |
| Chapter - 14.1 | Customization Overview |
| Chapter - 14.2 | BIG-IP Edge Client |
| Chapter - 14.3 | Advanced Edit Mode Customization |
| Chapter - 15 | SAML |
| Chapter - 15.1 | SAML Conceptual Overview |
| Chapter - 15.2 | SAML Configuration Overview |
| Chapter - 16 | APM Configuration Project |
Course 7
F5 BIG-IP Global Traffic Manager
| Sl. No. | Chapter |
|---|---|
| Chapter - 1 | Setting Up the BIG-IP System |
| Chapter - 1.1 | Introducing the BIG-IP System |
| Chapter - 1.2 | Initially Setting Up the BIG-IP System |
| Chapter - 1.3 | Creating an Archive of the BIG-IP System |
| Chapter - 1.4 | F5 Support Resources and Tools |
| Chapter - 2 | DNS and GTM Systems |
| Chapter - 2.1 | DNS Overview |
| Chapter - 2.2 | The Name Resolution Process |
| Chapter - 2.3 | DNS and GTM System Options |
| Chapter - 2.4 | Resolution Diagnostic Tools |
| Chapter - 3 | Accelerated DNS Resolutions |
| Chapter - 3.1 | Global Traffic Manager and DNS Resolutions |
| Chapter - 3.2 | Hierarchy of Options Flow Chart |
| Chapter - 3.3 | Lab Setup Information |
| Chapter - 3.4 | GTM Listeners |
| Chapter - 3.5 | Load Balancing DNS Queries |
| Chapter - 3.6 | DNS Cache |
| Chapter - 3.7 | DNS Express |
| Chapter - 3.8 | Introduction to Wide IPs |
| Chapter - 3.9 | Other DNS Queries |
| Chapter - 3.10 | Integrating GTM into Existing DNS Systems |
| Chapter - 4 | Intelligent DNS Resolutions |
| Chapter - 4.1 | Intelligent DNS Resolutions |
| Chapter - 4.2 | Metric Collection |
| Chapter - 4.3 | Intelligent Name Resolution |
| Chapter - 4.4 | Data Centers |
| Chapter - 4.5 | Adding GTM Systems |
| Chapter - 4.6 | Adding LTM Systems |
| Chapter - 4.7 | GTM-LTM System Communications: iQuery |
| Chapter - 4.8 | Adding Non-F5 Servers |
| Chapter - 4.9 | Links |
| Chapter - 4.10 | Wide IP Pools |
| Chapter - 4.11 | Wide IPs |
| Chapter - 4.12 | Changing Object Status |
| Chapter - 4.13 | Traffic Management Shell (TMSH) |
| Chapter - 5 | LDNS Probes and Metrics |
| Chapter - 5.1 | Probes and Metrics Overview |
| Chapter - 5.2 | LDNS Probe Configuration |
| Chapter - 6 | Load Balancing |
| Chapter - 6.1 | Load Balancing Overview |
| Chapter - 6.2 | Static Load Balancing Modes |
| Chapter - 6.3 | Dynamic Load Balancing Modes |
| Chapter - 6.4 | Quality of Service Load Balancing |
| Chapter - 6.5 | Dynamic Persistence |
| Chapter - 6.6 | Manual Resume |
| Chapter - 6.7 | Topology Load Balancing |
| Chapter - 7 | Monitors |
| Chapter - 7.1 | Monitors and Metric Collection |
| Chapter - 7.2 | Monitor Types |
| Chapter - 7.3 | Monitor Configuration |
| Chapter - 7.4 | Monitor Assignments |
| Chapter - 7.5 | Monitor Status Reporting |
| Chapter - 7.6 | Monitor Results and Best Practices |
| Chapter - 8 | Configuration Files, Logs, and Notifications |
| Chapter - 8.1 | BIG-IP Configuration Files |
| Chapter - 8.2 | Logging and Notification |
| Chapter - 8.3 | GTM Log Files |
| Chapter - 8.4 | The Alertd Process |
| Chapter - 8.5 | LCD Notification |
| Chapter - 8.6 | Email Notification |
| Chapter - 8.7 | High-Speed Logging |
| Chapter - 8.8 | Monitoring the BIG-IP System Remotely with SNMP |
| Chapter - 9 | Advanced Topics |
| Chapter - 9.1 | DNSSEC |
| Chapter - 9.2 | Limits and Thresholds |
| Chapter - 9.3 | GTM iRules |
| Chapter - 9.4 | Synchronization Groups |
| Chapter - 9.5 | BIG-IP iHealth and QKView Diagnostic Files |
| Chapter - 9.6 | DNS 6 to 4 |
| Chapter - 9.7 | Using tcpdump on the BIG-IP System |
Course 8
Microsoft Certified Azure Administrator Associate Training
E-Learning
| Sl. No. | Chapter |
|---|---|
| Chapter - 1 | Introduction to Microsoft Azure |
| Chapter - 2 | Virtual Machine Types |
| Chapter - 3 | Azure Marketplace for Virtual Machines |
| Chapter - 4 | Azure Functions - Introduction |
| Chapter - 5 | Demo - Monitoring VMs |
| Chapter - 6 | Resource Locks |
| Chapter -7 | Log Analytics Overview |
| Chapter - 8 | Monitoring VMs |
| Chapter - 9 | Azure Storage Explorer |
| Chapter - 10 | Azure Policies |
| Chapter - 11 | Storage Account PowerShell |
| Chapter - 12 | Shared Access Signatures |
| Chapter - 13 | Storage Keys |
| Chapter - 14 | Import_Export |
| Chapter - 15 | CDN |
| Chapter - 16 | Azure Backup |
| Chapter - 17 | VM Networking |
Course 9
Administering Microsoft Exchange Server 2016 Training and Certification
| Sl. No. | Chapter |
|---|
Course 10
PowerShell for SharePoint Administrators Training & Certification Courses
| Sl. No. | Chapter |
|---|---|
| Chapter - 1 | Creating Advanced Functions |
| Chapter - 1.1 | Converting a Command into an Advanced Function |
| Chapter - 1.2 | Creating a Script Chapter |
| Chapter - 1.3 | Defining Parameter Attributes and Input Validation |
| Chapter - 1.4 | Writing Functions that use Multiple Objects |
| Chapter - 1.5 | Writing Functions that Accept Pipeline Input |
| Chapter - 1.6 | Producing Complex Function Output |
| Chapter - 1.7 | Documenting Functions by using Content-Based Help |
| Chapter - 1.8 | Supporting -What if and -Confirm |
| Chapter - Lab-1 | Converting a Command into an Advanced Function |
| Chapter - Lab-2 | Creating a Script Chapter |
| Chapter - Lab-3 | Defining Parameter Attributes and Input Validation |
| Chapter - Lab-4 | Writing Functions that use Multiple Objects |
| Chapter - Lab-5 | Writing Functions that Accept Pipeline Input |
| Chapter - Lab-6 | Producing Complex Function Output |
| Chapter - Lab-7 | Documenting Functions by using Content-Based Help |
| Chapter - Lab-8 | Supporting āWhat if and -Confirm |
| Chapter - 2 | Using Cmdlets and Microsoft .NET Context in Windows PowerShell |
| Chapter - 2.1 | Running Windows PowerShell Commands |
| Chapter - 2.2 | Using Microsoft .NET Framework in Windows PowerShell |
| Chapter - Lab-1 | Using .NET Framework in Windows PowerShell |
| Chapter - 3 | Writing Controller Scripts Lessons |
| Chapter - 3.1 | Understanding Controller Scripts |
| Chapter - 3.2 | Lettering Controller Scripts that Show a User Interface |
| Chapter -3.3 | Lettering Controller Scripts That Produce Reports |
| Chapter - Lab-1 | Writing Controller Scripts that show a User Interface |
| Chapter - Lab-2 | Writing Controller Scripts That Produce HTML Reports |
| Chapter - 4 | Handling Script Errors |
| Chapter - 4.1 | Understanding Error Handling |
| Chapter - 4.2 | Handling Errors in a Script |
| Chapter - Lab-1 | Handling Errors in a Script |
| Chapter - 5 | Using XML Data Files |
| Chapter - 5.1 | Reading, Manipulating and Writing Data in XML |
| Chapter - Lab-1 | Reading, Manipulating and Writing Data in XML |
| Chapter - 6 | Managing Server outlines by using the Desired State Configuration |
| Chapter - 6.1 | Understanding Desired State Configuration |
| Chapter - 6.2 | Creating and Deploying a DSC Configuration |
| Chapter - Lab-1 | Creating and Deploying a DSC Configuration |
| Chapter - 7 | Analyzing and Debugging Scripts |
| Chapter - 7.1 | Debugging in Windows PowerShell |
| Chapter - 7.2 | Analyzing and Debugging an Existing Script |
| Chapter - Lab-1 | Analyzing and Debugging an Existing Script |
| Chapter - 8 | Understanding Windows PowerShell Workflow |
| Chapter - 8.1 | Understanding Windows PowerShell Workflow. |
Course 11
AZ-300 Microsoft Azure Architect Technologies
| Sl. No. | Chapter |
|---|---|
| Chapter - 1 | Introduction to Microsoft Azure and Its Services |
| Chapter - 1.1 | Azure Subscriptions |
| Chapter - 1.2 | Azure Resources |
| Chapter - 1.3 | Azure Free Tier Account |
| Chapter - 1.4 | Azure Resource Manager |
| Chapter - 1.5 | Azure Resource Manager Template |
| Chapter - 1.6 | Azure Storage |
| Chapter - 1.7 | Types of Azure Storage |
| Chapter - 2 | Azure Virtual Machines and Networking |
| Chapter - 2.1 | Azure Resource Manager Virtual Machine |
| Chapter - 2.2 | Virtual Machines in ARM Template |
| Chapter - 2.3 | Overview of Azure Virtual Machine |
| Chapter - 2.4 | Azure Managed Disks |
| Chapter - 2.5 | Azure Blob Storage |
| Chapter - 2.6 | Networking in Azure |
| Chapter - 2.7 | Subnets, NIC, NSG, IP Addresses, DNS |
| Chapter - 3 | Azure VMSS and Availability Zones |
| Chapter - 3.1 | Resiliency |
| Chapter - 3.2 | Azure Availability Sets |
| Chapter - 3.3 | Azure Availability Zone |
| Chapter - 3.4 | Autoscaling |
| Chapter - 3.5 | Virtual Machine Scale Set |
| Chapter - 3.6 | Fault Domain |
| Chapter - 3.7 | Update Domain |
| Chapter - 3.8 | Load Balancer |
| Chapter - 3.9 | Application Gateway |
| Chapter - 3.10 | Azure Disk Encryption |
| Chapter - 4 | Azure App Services and Its Features |
| Chapter - 4.1 | Azure App Service Web Apps |
| Chapter - 4.2 | App Service Security |
| Chapter - 4.3 | Serverless Computing Concepts |
| Chapter - 4.4 | Function Apps |
| Chapter - 4.5 | Azure Event Grid |
| Chapter - 4.6 | Azure Service Bus |
| Chapter - 4.7 | Azure App Service Logic App |
| Chapter - 4.8 | Using Shell Commands to create Web App |
| Chapter - 4.9 | Background Tasks |
| Chapter - 4.10 | Swagger tool |
| Chapter - 5 | Advanced Azure Hybrid Connectivity and Site Recovery |
| Chapter - 5.1 | Hybrid Connectivity |
| Chapter - 5.2 | VNet S2S VPN |
| Chapter - 5.3 | VNet Peering |
| Chapter - 5.4 | Service Chaining |
| Chapter - 5.5 | Azure VPN Gateway |
| Chapter - 5.6 | Policy-Based Gateway |
| Chapter - 5.7 | Route Based Gateway |
| Chapter - 5.8 | Swagger tool |
| Chapter - 5.9 | Gateway Connections |
| Chapter - 5.10 | Express Route |
| Chapter - 5.11 | VNet Routing |
| Chapter - 5.12 | User-Defined Route |
| Chapter - 5.13 | Border Gateway Protocol |
| Chapter - 5 | Advanced Azure Hybrid Connectivity and Site Recovery |
| Chapter - 5.1 | Hybrid Connectivity |
| Chapter - 5.2 | VNet S2S VPN |
| Chapter - 5.3 | VNet Peering |
| Chapter - 5.4 | Service Chaining |
| Chapter - 5.5 | Azure VPN Gateway |
| Chapter - 5.6 | Policy-Based Gateway |
| Chapter - 5.7 | Route Based Gateway |
| Chapter - 5.8 | Swagger tool |
| Chapter - 5.9 | Gateway Connections |
| Chapter - 5.10 | Express Route |
| Chapter - 5.11 | VNet Routing |
| Chapter - 5.12 | User-Defined Route |
| Chapter - 5.13 | Border Gateway Protocol |
| Chapter - 6 | Azure Storage Solution and Design Patterns |
| Chapter - 6.1 | Cloud design patterns |
| Chapter - 6.2 | Cache-aside pattern |
| Chapter - 6.3 | Sharding Pattern |
| Chapter - 6.4 | Azure SQL DB |
| Chapter - 6.5 | Azure Elastic Pool |
| Chapter - 6.6 | Azure Data Lakes |
| Chapter - 6.7 | Azure Data Factory |
| Chapter - 6.8 | Azure Cosmos DB |
| Chapter - 7 | Azure Kubernetes Service |
| Chapter - 7.1 | Application Environment Components |
| Chapter - 7.2 | Docker |
| Chapter - 7.3 | DockerFile |
| Chapter - 7.4 | Docker Image |
| Chapter - 7.5 | Azure Container Registry |
| Chapter - 7.6 | Azure Container Instance |
| Chapter - 7.7 | Orchestration |
| Chapter - 7.8 | Azure Kubernetes Service |
| Chapter - 7.9 | Diagnostics Logs |
| Chapter - 7 | Azure Kubernetes Service |
| Chapter - 7.1 | Application Environment Components |
| Chapter - 7.2 | Docker |
| Chapter - 7.3 | DockerFile |
| Chapter - 7.4 | Docker Image |
| Chapter - 7.5 | Azure Container Registry |
| Chapter - 7.6 | Azure Container Instance |
| Chapter - 7.7 | Orchestration |
| Chapter - 7.8 | Azure Kubernetes Service |
| Chapter - 7.9 | Diagnostics Logs |
| Chapter - 8 | Azure Active Directory and Role-Based Access Control Topics |
| Chapter - 8.1 | Access Control |
| Chapter - 8.2 | Role-Based Access Control |
| Chapter - 8.3 | Validation in applications (permits, Azure AD, Azure AD Connect, token-based) |
| Chapter - 8.4 | Multi-factor authentication (MFA) |
| Chapter - 8.5 | Claims-based authorization |
| Chapter - 8.6 | Role-based access control (RBAC) authorization |
| Chapter - 8.7 | End-to-end encryption |
| Chapter - 8.8 | Azure confidential computing |
| Chapter - 8.9 | SSL and TLS communications |
| Chapter - 8.10 | Azure Key Vault |
| Chapter - 8.11 | Configure Fraud alerts |
| Chapter - 8.12 | Bypass option trusted IPs |
| Chapter - 8.13 | Managed Service Identity |
| Chapter - 8.14 | Service Principal authentication |
| Chapter - 9 | Azure Messaging Service (Events, Hubs, Queue and Bus) |
| Chapter - 9.1 | Azure Messaging Service |
| Chapter - 9.2 | Azure Service Bus |
| Chapter - 9.3 | Azure Events Hub |
| Chapter - 9.4 | Azure Events Grid |
| Chapter - 9.5 | Azure Notifications Hub |
| Chapter - 9.6 | Auto Scale Ruling in Azure |
| Chapter - 9.7 | Transient Fault Handling |
| Chapter - 10 | Azure Monitoring and Insights Service |
| Chapter - 10.1 | Azure Monitoring |
| Chapter - 10.2 | Azure Analytics |
| Chapter - 10.3 | Azure Alerts |
| Chapter - 10.4 | Azure Resource Metrics |
| Chapter - 10.5 | Azure Activity Log |
| Chapter - 10.6 | Service Health |
| Chapter - 10.7 | Azure Log Analytics |
| Chapter - 10.8 | Azure App Insights |
Course 12
AWS Certified Security - Specialty ( Security Engineering on AWS ) Training & Certification
| Sl. No. | Chapter |
|---|
Course 13
HP Data Protector Training
| Sl. No. | Chapter |
|---|---|
| Chapter - 1 | HP Adaptive Backup and Recovery Solutions |
| Chapter - 1.1 | Data Protector 9.0 |
| Chapter - 1.2 | HP Backup Navigator |
| Chapter - 1.3 | Data Protector Management pack |
| Chapter - 2 | HP Data Protector Architecture |
| Chapter - 2.1 | Backup and Replication Methods |
| Chapter - 2.2 | The Cell Concept |
| Chapter - 2.3 | Data Protector Architecture |
| Chapter - 2.4 | Cell Manager and Installation Server |
| Chapter - 2.5 | Disk, Media and Integration Agents |
| Chapter - 2.6 | Internal Database |
| Chapter - 2.7 | Typical Data Protector session |
| Chapter - 2.8 | Data Protector tuning |
| Chapter - 3 | Licensing and Product Structure |
| Chapter - 3.1 | Data Protector licensing |
| Chapter - 3.2 | Product Structure overview |
| Chapter - 3.3 | License Reporting and checking |
| Chapter - 4 | Quick Start |
| Chapter - 4.1 | Concept Backup Specification |
| Chapter - 4.2 | Configure Media Pool and Device |
| Chapter - 4.3 | Configure and run a Backup |
| Chapter - 4.4 | Monitor the Backup session |
| Chapter - 4.5 | Start a Restore |
| Chapter - 4.6 | Run a Single Session Report |
| Chapter - 5 | HP Data Protector Software Installation |
| Chapter - 5.1 | Installation Overview, Planning, and Methods |
| Chapter - 5.2 | Cell Manager Installation on Windows |
| Chapter - 5.3 | Cell Manager Installation on Unix |
| Chapter - 5.4 | Client Push Installation |
| Chapter - 5.5 | Export and Import of Clients |
| Chapter - 5.6 | Adding Components to Clients |
| Chapter - 6 | Upgrade |
| Chapter - 6.1 | Upgrade Overview |
| Chapter - 6.2 | Supported Upgrade Paths |
| Chapter - 6.3 | Upgrading a Windows Cell Manager |
| Chapter - 6.4 | Upgrading a Unix Cell Manager |
| Chapter - 6.5 | Migrating the Cell Manager to an altered stage |
| Chapter - 7 | Media Management |
| Chapter - 7.1 | Media Pool concept |
| Chapter - 7.2 | Media Pool Properties |
| Chapter - 7.3 | Creating a Media Pool |
| Chapter - 7.4 | Free Pool Concept and Implementation |
| Chapter - 7.5 | Medium properties |
| Chapter - 7.6 | Location Tracking and Priority |
| Chapter - 7.7 | Formatting Tape Media |
| Chapter - 7.8 | Vaulting with Media Pools |
| Chapter - 8 | Backup Device |
| Chapter - 8.1 | Overview |
| Chapter - 8.2 | Logical Device concept |
| Chapter - 8.3 | Data Protector Tape Format |
| Chapter - 8.4 | Configure Tape based Storage Devices |
| Chapter - 8.5 | Configure Disk-based Storage Devices |
| Chapter - 8.6 | De-duplication Devices |
| Chapter - 8.7 | Device and Library Tools |
| Chapter - 9 | Backup |
| Chapter - 9.1 | Backup Specification Types |
| Chapter - 9.2 | Backup Features |
| Chapter - 9.3 | Static and Dynamic Device Allocation |
| Chapter - 9.4 | Load Balancing ā Object Allocation |
| Chapter - 9.5 | Backup Mirroring |
| Chapter - 9.6 | Create and start a Backup Specification |
| Chapter - 9.7 | The Backup Process Flow |
| Chapter - 9.8 | Monitor the backup session |
| Chapter - 9.9 | Restart failed Backups |
| Chapter - 10 | Advanced Scheduler |
| Chapter - 10.1 | Schedule a Backup |
| Chapter - 10.2 | Manage missed Job Executions |
| Chapter - 11 | Restore |
| Chapter - 11.1 | Performing Restores |
| Chapter - 11.2 | Restore Sequence |
| Chapter - 11.3 | Object and Session Restore |
| Chapter - 11.4 | Single or Parallel Restore |
| Chapter - 11.5 | Checkpoint Restore |
| Chapter - 12 | Monitoring, Reporting, and Notifications |
| Chapter - 12.1 | Monitoring and Reporting |
| Chapter - 12.2 | Session Monitoring |
| Chapter - 12.3 | Report Categories and Delivery Methods |
| Chapter - 12.4 | Configure and schedule Reports |
| Chapter - 12.5 | Web Reporting Interface |
| Chapter - 12.6 | Default Notification overview |
| Chapter - 12.7 | Adding Notifications |
| Chapter - 13 | Media and Object Replication |
| Chapter - 13.1 | Interactive Media Copy |
| Chapter - 13.2 | Automated Media Operation |
| Chapter - 14 | Internal Database (IDB) |
| Chapter - 14.1 | Concept Embedded database |
| Chapter - 14.2 | Architecture |
| Chapter - 14.3 | IDB Directory Structure |
| Chapter - 14.4 | Internal Database Size Limits |
| Chapter - 14.5 | Administration Tasks |
| Chapter - 14.6 | Manage IDB Grow |
| Chapter - 14.7 | IDB Maintenance |
| Chapter - 15 | Security |
| Chapter - 15.1 | Access control |
| Chapter - 15.2 | User Groups and User Rights |
| Chapter - 15.3 | Adding Users and Groups |
| Chapter - 15.4 | User Restrictions |
| Chapter - 15.5 | LDAP Integration |
| Chapter - 15.6 | Client and Cell Security |
| Chapter - 15.7 | Inet Impersonation |
| Chapter - 15.8 | Changing the Web Interface Password |
| Chapter - 16 | Auditing |
| Chapter - 16.1 | Auditing Overview |
| Chapter - 16.2 | Backup session auditing |
| Chapter - 16.3 | Enhanced Event Logging |
| Chapter - 17 | Disaster Recovery |
| Chapter - 17.1 | Disaster Recovery methods |
| Chapter - 17.2 | Disaster Recovery phases |
| Chapter - 17.3 | Create a Disaster Recovery Image |
| Chapter - 17.4 | Booting the Recovery Image |
| Chapter - 17.5 | Using the Recovery Progress Monitor |
| Chapter - 17.6 | Disaster Recovery on Dissimilar Hardware |
| Chapter - 18 | Troubleshooting |
| Chapter - 18.1 | Log and Trace Files |
| Chapter - 18.2 | Debug Traces Generation |
| Chapter - 18.3 | Debug Log Collector |
| Chapter - 18.4 | Troubleshoot Network issues |
| Chapter - 18.5 | Troubleshoot Devices issues |
| Chapter - 18.6 | Typical Backup and Restore issues |
| Chapter - 18.7 | omnihealthcheck |
| Chapter - 18.8 | Object Copy |
| Chapter - 18.9 | Interactive Object Copy |
| Chapter - 18.10 | Post Backup and scheduled Object Copy |
| Chapter - 18.11 | Object Copy and Library Filtering |
| Chapter - 18.12 | Automatic Device Selection |
| Chapter - 18.13 | Copy Specification options |
| Chapter - 19 | Object Consolidation |
| Chapter - 19.1 | Enhanced Incremental Backups |
| Chapter - 19.2 | Synthetic Full Backups |
| Chapter - 19.3 | Virtual Full Backups |
| Chapter - 19.4 | Interactive Object Consolidation |
| Chapter - 19.5 | Post Backup and scheduled Object Consolidation |
| Chapter - 19.6 | Consolidation Specification options |
| Chapter - 19.7 | Use case scenarios |
Course 15
Google Cloud Platform Fundamentals (CP100A) Certification Training
| Sl. No. | Chapter |
|---|
Course 16
Cloud Computing Fundamental
| Sl. No. | Chapter |
|---|---|
| Chapter - 1 | What is cloud computing? |
| Chapter - 2 | Why the rush to the cloud? |
| Chapter - 3 | Cloud computing building blocks. |
| Chapter - 4 | Cloud Offerings: Private Cloud, Private Cloud, Hybrid Cloud. |
| Chapter - 5 | Cloud Service Models: SaaS, PaaS, IaaS |
| Chapter - 6 | IT roles in the cloud: developer, administrator, architect. |
| Chapter - 7 | To cloud or not to cloud: Risk assessment |
| Chapter - 8 | Governance: How will industry standards be monitored? |
| Chapter - 9 | Bandwidth requirements, Financial impact. |
| Chapter - 10 | Popular Cloud Companies, Services & Products. |
| Chapter - 11 | Cloud Security. |
Course 17
Microsoft Certified Azure Developer Associate AZ-203 Certification Training
| Sl. No. | Chapter |
|---|
Course 18
Microsoft Certified Azure Architect Design AZ-301 Certification Training
| Sl. No. | Chapter |
|---|
Course 19
Microsoft Azure Solutions Architect Certification Training for AZ 300-301
| Sl. No. | Chapter |
|---|