Pluralsight CEU-Eligible Courses for CompTIA A+ updated March 2018

Similar documents
Pluralsight CEU-Eligible Courses for CompTIA Network+ updated March 2018

Skillsoft Pre-Approved for CompTIA CEUs

P a g e 1. Teknologisk Institut. Online kursus k SysAdmin & DevOps Collection

Skillsoft Pre-Approved for CompTIA CEUs

Product Catalog Platinum 529,00 (1 jaar toegang) CertKit includes: Quizzes, Tips & Tricks, 24/7 help, practise tests and e-learning CompTIA

NetCom Learning Training Courses Pre-Approved for CompTIA CEUs

Unlocking Potential Through Learning

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Skillsoft Pre-Approved for CompTIA CEUs

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Business Skills Learning Sessions* SINGLE COURSE TITLES

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Aston Martin Institute

Ethical Hacking and Prevention

TECHNICAL. Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months

TECHNICAL. Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months

Windows Server 2016 MCSA Bootcamp

TECHNICAL. Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

Ingram Micro Cyber Security Portfolio

CompTIA Cybersecurity Analyst+

MCSA: Windows Server MCSA 2016 Windows 2016 Server 2016 MCSA 2016 MCSA : Installation, Storage, and Compute with Windows Server 2016

IT Foundations Networking Specialist Certification with Exam

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

Diploma in Network (LAN/WAN) Administration

Security+ SY0-501 Study Guide Table of Contents

CHCSS. Certified Hands-on Cyber Security Specialist (510)

DIABLO VALLEY COLLEGE CATALOG

Academic Services Group. Master Course List (Revised November 6, 2015)

PUBLIC COURSE SCHEDULE. January - June 2017

IT Technician Pathways Course Guide

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

Microsoft Certified System Engineer

CompTIA Network+ Study Guide Table of Contents

Idaho's Premiere Learning Center. Voted Best of Idaho Length. 5 Days Days 16. 2hrs. 1 day. Length. Length. 2 Days. 1 Day.

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Certified Ethical Hacker (CEH)

TERIBITE TECHNOLOGIES ACADEMY

Technical Classes. Cisco. Cisco Authorized Courses CISSP. Coding & Programming. CCNA Certification Bootcamp ( exam) 2/6/2015 9am-4:30pm

Type Vendor Exam # Name Size. Technical Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1) 180

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

PUBLIC COURSE SCHEDULE. July - December 2017

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are

Managing Microsoft 365 Identity and Access

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

Network Engineering/Cyber Security I & II

ifuture ifuture have delivered Technical and Management trainings across PAN India, APAC and Middle East region

Course 831 Certified Ethical Hacker v9

Installation, Storage, and Compute with Windows Server

Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs

Advanced Diploma on Information Security

CompTIA Security+ Study Guide (SY0-501)

About Us. We re now the world s largest independent IT training company, and we continue to lead

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

Designing Windows Server 2008 Network and Applications Infrastructure

Experience working with Windows Server 2008 or Windows Server Experience working in a Windows Server infrastructure enterprise environment

MCSA Windows Server 2012

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)

EZY Intellect Pte. Ltd.,

Upgrading Your Skills to MCSA: Windows Server 2016

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

COURSE 20741B: NETWORKING WITH WINDOWS SERVER 2016

Application Training Application Courses

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

Microsoft Office Courses

MCSA Windows Server 2012

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

New Horizons Computer Learning Center Training

Certified Ethical Hacker

GLOBAL INFOSKILLS SDN BHD

GLOBAL INFOSKILLS SDN BHD

Microsoft Certified Solution Associate Windows Server 2016 Training

Exam : Implementing Microsoft Azure Infrastructure Solutions

20741 Networking with Windows Server 2016

Networking with Windows Server 2016

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

CPTE: Certified Penetration Testing Engineer

Windows 8 Boot Camp 6439; 5 Days, Instructor-led

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

[MS20347]: Enabling and Managing Office 365

CEH: CERTIFIED ETHICAL HACKER v9

Upgrading your Skills to MCSA Windows Server 2012

Launching a Highly-regulated Startup in the Cloud

Course No. MCSA Days Instructor-led, Hands-on

Designing and Deploying Microsoft Exchange Server 2016

Cloud Essentials for Architects using OpenStack

Networking with Windows Server 2016

Architecting Microsoft Azure Solutions (proposed exam 535)

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

Upgrading Your Skills to MCSA Windows 8.1

MCSA Office 365 Bootcamp

20347: Enabling and Managing Office hours

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

[MS20743]: Upgrading Your Skills to MCSA: Windows Server 2016

Certified LAN and WAN Specialist (CLWS)

CIT 480: Securing Computer Systems. Putting It All Together

MCSE Mobility Earned: MCSE Cloud Platform & Infrastructure Earned: 2017 MCSE MCSE. MCSD App Builder. MCSE Business Applications Earned 2017

MCSE Cloud Platform & Infrastructure CLOUD PLATFORM & INFRASTRUCTURE.

Microsoft Certified Solutions Associate (MCSA)

Transcription:

Pluralsight CEU-Eligible Courses for CompTIA A+ updated March 2018 Access Control Lists (ACLs) for Cisco CCNA 200-125/100-105 Administering Office 365 Quick Start Advanced Access Control with Cisco ISE for CCNP Security (300-208) SISAS Advanced Malware Analysis: Combating Exploit Kits Advanced Persistent Threats: The Big Picture Advanced Security for CCNA Security (210-260) IINS Advanced Web Application Penetration Testing with Burp Suite Applying SQL Server 2016 Features to Real-world Data Problems Architecting and Implementing Azure Networking Architecting Azure Solutions (70-534): Application Storage and Data Access Strategy Architecting Azure Solutions (70-534): Design an Advanced Application Architecting Azure Solutions (70-534): Management, Monitoring, and Business Continuity Architecting Azure Solutions (70-534): Secure Resources Architecting Microsoft Azure Solutions (70-534): Design Web Apps Assessing and Mitigating Security Risks Automating AWS and vsphere with Terraform Automating Deployment and Scale of Azure IaaS Solutions AWS Certified Solutions Architect - Associate AWS Certified Solutions Architect - Professional AWS Security Fundamentals AWS Security Operations: Designing for Acceptable Risk and Compliance AWS Security Operations: Securing Access to Object Storage AWS Security Operations: Securing Core AWS Infrastructure Services AWS Security Operations: Securing Managed Services Azure Resource Manager Deep Dive Azure Site Recovery: IaaS Migration and Disaster Recovery Azure SQL Data Warehouse: First Look Azure SQL Database for the SQL Server DBA Cisco ACI Programmability Cisco Data Center Network Design for CCDA DESGN (200-310) Cisco Edge Network Design for CCDA DESGN (200-310) Cisco ISE Guest Access for CCNP Security (300-208) SISAS Cisco Network Design Blocks for CCDA DESGN (200-310) CISSP - Communications and Network Security CISSP - Identity and Access Management CISSP - Security and Risk Management CISSP - Security Engineering CISSP - Security Operations CISSP : Security Assessment and Testing Citrix Networking Deep Dive Citrix XenDesktop/XenApp 7.6 LTSR CCA-V: Introduction Citrix XenDesktop/XenApp 7.6 LTSR CCA-V: Maintaining Citrix XenDesktop/XenApp 7.6 LTSR CCA-V: Managing Citrix XenDesktop/XenApp 7.6 LTSR CCA-V: Monitoring Citrix XenDesktop/XenApp 7.6 LTSR CCA-V: Troubleshooting Citrix XenDesktop/XenApp 7.6 LTSR CCP-V: Configuring Citrix XenDesktop/XenApp 7.6 LTSR CCP-V: Installing 1

Citrix XenDesktop/XenApp 7.6 LTSR CCP-V: Introduction Citrix XenDesktop/XenApp 7.6 LTSR CCP-V: Pre-installation Citrix XenDesktop/XenApp 7.6 LTSR CCP-V: Testing Computing, Communication, and Business Integration for CASP (CAS-002) Conducting Network Vulnerability Analysis Configuring a Cisco Router for Cisco CCNA 200-125/100-105 Configuring Windows 10 (70-697): Lab Setup Configuring Windows 10 Core Services Create and Manage Virtual Machines on Microsoft Azure Creating a DMZ in Azure Cryptography: The Big Picture CSSLP : Secure Software Concepts CSSLP : Secure Software Requirements Cyber Security Awareness: Backing up Your Data Cyber Security Awareness: Digital Data Protection Cyber Security Awareness: Electronic Commerce Security Cyber Security Awareness: Identifying Personally Identifiable Information (PII) Cyber Security Awareness: Malware Explained Cyber Security Awareness: Mobile Device Security Cyber Security Awareness: Pairing Physical and Digital Security Cyber Security Awareness: Phishing and Whaling Cyber Security Awareness: Safer Digital Communications Cyber Security Awareness: Security by Geolocation Cyber Security Awareness: Security for Cloud Services Cyber Security Awareness: Security Overview Cyber Security Awareness: Social Engineering Cyber Security Awareness: Social Networking at Work Cyber Security Awareness: The Importance of Identity Protection Cyber Security Awareness: The Internet of Things (IoT) Cyber Security Awareness: The Protection and Destruction of Portable Data Cybersecurity Threats: Ransomware Data Center Infrastructure for CCNA Data Center (200-150/200-155) Deploy Azure Virtual Networks, VPNs, and Gateways Deploy Windows 10 Images Deploying and Integrating Azure AD Deploying and Managing Azure IaaS Virtual Machines Deploying Windows 10 Anniversary Edition (v1607) with MDT Design a Database Environment with SQL Server 2014 (70-465) Design a Database Structure with SQL Server 2014 (70-465) Designing a Hybrid Cloud in Azure Designing and Implementing Security Policies Designing/Deploying Exchange 2016 (70-345): Client Access Designing/Deploying Exchange 2016 (70-345): Compliance & Archiving Designing/Deploying Exchange 2016 (70-345): Hybrid & Migrations Designing/Deploying Exchange 2016 (70-345): Mailbox Databases Designing/Deploying Exchange 2016 (70-345): Recipients & Security Designing/Deploying Exchange 2016 (70-345): Transport Digital Forensics: Getting Started with File Systems 2

Disaster Recovery for CompTIA Server+ (SK0-004) Enabling Office 365 (70-347) Exchange Online (End User and Planning) Enabling Office 365 (70-347) MCSA and the 70-347 Exam Enabling Office 365 (70-347) Plan/Configure Skype for Business Online Enterprise Campus Design for CCDA DESGN (200-310) Enterprise IP Routing Design for CCDA DESGN (200-310) Enterprise IPv4/IPv6 Design for CCDA DESGN (200-310) Enterprise LAN Switching for Cisco CCNA 200-125/200-105 Enterprise Security for CASP (CAS-002) Enterprise Security for CASP (CAS-002) Enterprise Security: Policies, Practices, and Procedures Enterprise Security: Policies, Practices, and Procedures Enterprise WAN Network Design for Cisco CCDP ARCH (300-320) Ethical Hacking: Buffer Overflow Ethical Hacking: Cloud Computing Ethical Hacking: Cryptography Ethical Hacking: Denial of Service Ethical Hacking: Evading IDS, Firewalls, and Honeypots Ethical Hacking: Hacking Mobile Platforms Ethical Hacking: Hacking Wireless Networks Ethical Hacking: Penetration Testing Ethical Hacking: Sniffing Ethical Hacking: Social Engineering Exam Review for CCNP R&S 300-135 TSHOOT Exchange Server 2016 Recipient Administration Exploit Development and Execution with the Metasploit Framework Exploitation: Evading Detection and Bypassing Countermeasures External Footprinting: Reconnaissance and Mapping Firewalls for CCNA Security (210-260) IINS Fundamentals of Cloud Computing Fundamentals of Using Cisco ACI Getting Started Analyzing Malware Infections Getting Started with AWS Athena Getting Started with Azure Automation Getting Started with Azure Machine Learning Getting Started with Azure Operational Insights Getting Started with Citrix NetScaler Gateway 11 for XenDesktop Administrators Getting Started with OWASP Zed Attack Proxy (ZAP) for Web Application Penetration Testing Getting Started with the Microsoft Enterprise Mobility Suite Getting Started: Hybrid Identity with Microsoft Azure Google Cloud Platform Fundamentals Hands-On Incident Response Fundamentals How to Stop Man-in-the-Middle and Downgrade Attacks in Your Apps Implement Active Directory Domain Services in Windows Server 2016 Implement Windows Server 2016 IP Address Management (IPAM) Implementing a Security Assessment and Authorization Process Implementing Active Directory Certificate Services in Windows Server 2016 Implementing and Managing Azure Multi-factor Authentication 3

Implementing and Securing Windows Server 2016 Core Networking Implementing Azure Application Services Implementing Containers on Windows Server 2016 Implementing High Availability in Windows Server 2016 Implementing Microsoft Azure Networking Implementing Physical Security Implementing Windows 10 Implementing Windows Server 2016 Connectivity and Remote Access Implementing Windows Server 2016 DHCP Implementing Windows Server 2016 Distributed Networking Services Implementing Windows Server 2016 DNS Implementing Windows Server 2016 Hyper-V Implementing Windows Server 2016 Identity Federation and Access Implementing Windows Server 2016 Software Defined Networking Implementing Windows Server 2016 Storage Solutions Importing and Exporting Oracle Data for DBAs Information Security Manager: Information Security Governance Information Systems Auditing: The Big Picture Information Systems Auditor: Acquisition and Development Information Systems Auditor: Governance and Management Information Systems Auditor: Operations, Maintenance, and Service Information Systems Auditor: Protection of Information Assets Information Systems Auditor: The Process of Auditing Infrastructure Security for CCNP Routing & Switching 300-115 SWITCH Installing and Configuring Windows 10 Installing Windows Server 2016 Introduction to Installing and Configuring Windows 10 and Configuring Windows Devices Introduction to Penetration Testing Using Metasploit IPv6 and Microsoft Windows ISE Posture Services for CCNP Security (300-208) SISAS ISE Profiling Services for CCNP Security (300-208) SISAS ISO/IEC 27001 Information Security: The Big Picture Juniper Networks JNCIS-ENT (JN0-343): Layer 2 Security Juniper Networks JNCIS-ENT (JN0-343): Layer 2 Switching and VLANs Juniper Networks JNCIS-ENT (JN0-343): Open Shortest Path First Juniper Networks JNCIS-ENT (JN0-343): Protocol-independent Routing Juniper Networks JNCIS-ENT (JN0-343): Spanning Tree Juniper Networks JNCIS-ENT: Intermediate System to Intermediate System Layer 2 Security for CCNA Security (210-260) IINS LFCE: Advanced Linux Networking LFCE: Advanced Network and System Administration LFCE: Linux Service Management - HTTP Services LFCE: Network and Host Security LFCS: Linux Essentials LFCS: Linux Networking LFCS: Linux Operation Essentials LFCS: Linux Service Management LFCS: Linux Storage Management 4

LFCS: Linux User and Group Management LFCS: Linux Virtualization Management Linux Encryption Security (LPIC-3 303) Linux High Availability Cluster Management (LPIC-3 304 Part 2/2) Linux Network Programming Linux Network Security (LPIC-3 303) Linux Server Skills for Windows Administrators Linux Server Virtualization (LPIC-3 304 Part 1/2) Linux: Managing Web Services (LPIC-2) LPI: Linux Essentials (010-150) Mac OS X Support: Applications and Processes Mac OS X Support: Data Management Mac OS X Support: File Systems Mac OS X Support: Installation and Configuration Mac OS X Support: User Accounts Maintain Windows 10 Images Maintaining and Monitoring Windows Server 2016 Malware Analysis Fundamentals Malware Analysis: The Big Picture Manage and Maintain Active Directory Domain Services in Windows Server 2016 Managing and Maintaining Windows 10 Managing and Supporting DirectAccess with Windows Server 2016 Managing AWS Security and Identity Managing Azure AD Managing Azure IaaS with PowerShell Managing Certificates with AWS Certificate Manager Managing Configurations with Azure Automation DSC Managing Configurations with Azure Automation DSC Managing Information Security Incidents (ISO/IEC 27002) Managing Information Security Threats & Risks (ISO/IEC 27002) Managing Infrastructure with Microsoft Azure - Getting Started Managing Inventory, Change, and Compliance with AWS Config Managing PCs and Devices with Microsoft Intune Mastering AWS Command-line Interface Operations Mastering Microsoft Azure Resource Manager Microsoft Azure Administration for AWS Administrators Microsoft Azure Architecture - Getting Started Microsoft Azure Architecture for AWS Architects Microsoft Azure IaaS Monitoring and Management - Getting Started Microsoft Azure Security - Getting Started Microsoft Azure Virtual Machines - Getting Started Migrating to Exchange Server 2016 Monitoring Servers and Services with AWS CloudWatch Monitoring with AWS CloudTrail Network Fundamentals and Protocols Network Interface Layer and Ethernet Operation for Cisco CCNA 200-125/100-105 Network Penetration Testing Using Python and Kali Linux Network Services for Cisco CCNA 200-125/200-105 5

Network Vulnerability Scanning with OpenVAS Networking for CompTIA Server+ (SK0-004) Office 365: Deploying & Updating Microsoft Office 365 ProPlus OpenStack: Getting to Know OpenStack and the COA OpenStack: Installing the Lab Environment OpenStack: Managing Identities and Objects OpenStack: Nova and Neutron OPSEC for Penetration Testers Payment Card Security, Processing, and the PCI Standards PCI DSS: The Big Picture Penetration Testing Automation Using Python and Kali Linux Penetration Testing Life Cycle Explained Penetration Testing OSINT Gathering with Recon-ng Penetration Testing SharePoint Penetration Testing: Setting the Scope and Rules of Engagement Penetration Testing: The Big Picture Performing and Analyzing Network Reconnaissance Performing OSINT Gathering on Corporate Targets Planning and Designing Microsoft Azure Compute Solutions Planning and Designing Microsoft Azure Networking Solutions Planning and Designing Microsoft Azure Security Solutions Play by Play: Elastic Scale and Consistency with Azure Automation DSC Play by Play: Enterprise Data Encryption with Azure Revealed Play by Play: Ethical Hacking - Deconstructing the Hack Play by Play: Exploring the Internet of Vulnerabilities Play by Play: Social Engineering with Troy Hunt and Lars Klint Post Exploitation: Performing Infrastructure Analysis Practical SQL Server In-Memory OLTP Tables and Objects Practical SQL Server Security, Compliance, and Auditing Pre 2017 - Create and Manage Virtual Machines for Azure Solutions (70-532) Pre 2017 - Design and Implement Web Apps for Azure Solutions (70-532) Pre 2017 - Implementing Active Directory for Azure Infrastructure (70-533) Pre 2017 - Implementing Storage for Azure Infrastructure (70-533) Pre 2017 - Implementing Virtual Machines for Azure Infrastructure (70-533) Pre 2017 - Implementing Virtual Networks for Azure Infrastructure (70-533) Pre 2017 - Implementing Web Apps for Azure Infrastructure (70-533) Pre 2017 - Prepare to Pass the Azure Solutions (70-532) Exam Pre 2017 - Preparing to Pass the Microsoft Azure (70-533) Exam Providing Disaster Recovery with Azure Services Puppet 4: Hiera, the Single Source of Truth Puppet 4: Language Essentials Puppet 4: Server and Puppet Enterprise Puppet 4: Working with Files and Templates Puppet 4: Working with Modules and Classes Research and Analysis for CASP (CAS-002) Risk Management and Incident Response for CASP (CAS-002) Risk Management and Information Systems Control: Introduction to Risk Risk Management and Information Systems Control: IT Risk Assessment 6

Risk Management and Information Systems Control: Risk and Control Monitoring and Reporting Risk Management and Information Systems Control: Risk Identification Risk Management and Information Systems Control: Risk Response and Mitigation Risks, Vulnerabilities, and Threats Routing IPv4 and IPv6 for Cisco CCNA 200-125/100-105 Secure Software Development Securing AWS Using CIS Foundations Benchmark Security Standard Securing Linux Servers Securing Multi-tenant ASP.NET Web Apps Securing Network Devices for CCNA Security (210-260) IINS Securing Virtual Machines with Azure Key Vault Securing Windows 10: Data at Rest, in Use, and in Transit Securing Your Node.js Web App Security Concepts for CCNA Security (210-260) IINS Security for CompTIA Server+ (SK0-004) Security for Hackers and Developers: Code Auditing Security for Hackers and Developers: Exploit Development Security for Hackers and Developers: Fuzzing Security for Hackers and Developers: Overview Security for Hackers and Developers: Reverse Engineering Security Management: The Big Picture Server Administration for CompTIA Server+ (SK0-004) Server Architecture for CompTIA Server+ (SK0-004) Setting up an Office 365 Hybrid Environment Solving Real World Problems with SQL Server 2016 Query Store SQL Server 2016 New Features for Developers SQL Server Reporting Services Playbook SQL Server Standard Edition Survival Guide SQL Server: Analyzing Query Performance for Developers SQL Server: Building Simple Asynchronous Applications SQL Server: Consolidation Tactics and Best Practices SQL Server: Improving Storage Subsystem Performance SQL Server: Indexing for Performance SQL Server: Installing and Configuring SQL Server 2016 SQL Server: Introduction to Query Store SQL Server: Replacing Profiler with Extended Events SQL Server: Scaling SQL Server 2012 and 2014: Part 2 SQL Server: Understanding and Using Azure SQL Database SQL Server: Understanding and Using DBCC Commands SQL Server: Upgrading and Migrating to SQL Server 2016 Storage for CompTIA Server+ (SK0-004) Technical Integration of Enterprise Components for CASP (CAS-002) The Information Security Big Picture The Issues of Identity and Access Management (IAM) Threat Intelligence: The Big Picture Threat Modeling Fundamentals Threat Modeling: The Big Picture Troubleshooting and Exam Prep for Cisco CCNA 200-125/200-105 7

Troubleshooting Cisco Networks: Infrastructure Services for CCNP R&S 300-135 TSHOOT Troubleshooting Cisco Networks: Internet Security for CCNP R&S 300-135 TSHOOT Troubleshooting Cisco Networks: IPv4 Routing Protocols for CCNP R&S 300-135 TSHOOT Troubleshooting Cisco Networks: IPv6 Routing Protocols for CCNP R&S 300-135 TSHOOT Troubleshooting Cisco Networks: Layer 2 Protocols for CCNP R&S 300-135 TSHOOT Troubleshooting Difficult Problems in Windows Troubleshooting Essentials for Cisco CCNA 200-125/100-105 Troubleshooting for CompTIA Server+ (SK0-004) Understanding and Using Azure Storage Understanding the Difference Between Microsoft Azure and Amazon AWS USB Forensics: Duplication USB Forensics: Writeblocking and Impersonation Using Cisco ACI with VMware vsphere Integration Using Docker with AWS Elastic Beanstalk Using Failover Clusters in Windows Server 2016 VMware Horizon 7: Configure and Administer VMware Mirage VMware Horizon 7: Configure and Manage App Volumes VMware Horizon 7: Configure and Manage User Environment Manager VMware Horizon 7: Configure and Manage VMware Identity Manager VMware Horizon 7: Configure vrealize Operations Manager VMware Horizon 7: Create and Configure Pools VMware Horizon 7: Install and Configure Horizon Server Components VMware Horizon 7: Introduction VPNs for CCNA Security (210-260) IINS vsphere 6 Foundations: Availability and Resource Management vsphere 6 Foundations: Perform Basic Monitoring vsphere 6 Foundations: Perform Basic Troubleshooting Web App Hacking: Caching Problems Web App Hacking: Cookie Attacks Web App Hacking: Hacking Authentication Web App Hacking: Hacking Password Reset Functionality Web App Hacking: Sensitive Data Exposure Web Application Penetration Testing Fundamentals Web Application Penetration Testing with Burp Suite What's New in SQL Server 2016 Reporting Services Windows 10 Configuring (70-697): Configure Networking Windows 10 Configuring (70-697): Configure Storage Windows 10 Configuring (70-697): Manage Apps Windows 10 Configuring (70-697): Manage Data Access and Protection Windows 10 Configuring (70-697): Manage Identity Windows 10 Configuring (70-697): Manage Remote Access Windows 10 Configuring (70-697): Manage Updates and Recovery Windows 10 Configuring (70-697): Plan and Implement Microsoft Intune Windows Registry Troubleshooting Windows Server 2016 Security Hardening Windows Server Administration Fundamentals Using PowerShell Windows: How It's Hacked, How to Protect It Wireless Network Penetration Testing 8

Wireless Network Penetration Testing Advanced Techniques Writing Penetration Testing Reports 9