Skip Navigation or Skip to Content
Sign In  |  View Cart  |    |  Help  |  
Return to Course Catalog

Course Catalog > Online Courses > Information Technology

Information Technology   

  • Cybersecurity & Fraud Awareness Workshop  6/26/25 (10am-12:30pm)
  • Fee: $5.00
    Dates: 6/26/2025 - 6/26/2025
    Times: 10:00 AM - 12:30 PM
    Days: Th
    Sessions: 1
    Building:
    Room:
    Instructor: Hance Patrick
    This online workshop will show you the techniques that scammers use in today's web environment and help you identify and prevent loss from an online scam. 
     
     

     

    The workshop will take place online via Zoom. You will receive a link to the workshop presentation via the email address in which you use to register at least one day prior to the workshop. If you have any additional questions, please contact our Registration Office Monday-Friday from 8:00am-5:00pm.

     

 

  • Intermediate Networking
  • Fee: $139.00
    Dates: 2/12/2025 - 12/22/2030

    Learn More

    Gain a full understanding of almost every aspect of networking technology as you prepare for CCNA certification. This course will build your knowledge of networks and networking, with detailed treatments of TCP/IP, how switches and routers operate, DNS, and more with real-world applications for the concepts you learn.

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Intermediate Networking
  • Fee: $139.00
    Dates: 4/16/2025 - 6/30/2025

    Learn More

    Gain a full understanding of almost every aspect of networking technology as you prepare for CCNA certification. This course will build your knowledge of networks and networking, with detailed treatments of TCP/IP, how switches and routers operate, DNS, and more with real-world applications for the concepts you learn.

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Intermediate Networking
  • Fee: $139.00
    Dates: 7/16/2025 - 12/22/2030

    Learn More

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Intermediate Networking
  • Fee: $139.00
    Dates: 8/13/2025 - 12/22/2030

    Learn More

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Intermediate Networking
  • Fee: $139.00
    Dates: 9/17/2025 - 12/22/2030

    Learn More

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Introduction to Networking
  • Fee: $139.00
    Dates: 2/12/2025 - 12/22/2030

    Learn More

    Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network. This course explains computer networking basics in easy-to-understand terms, using concepts common to everyday, non-computing experience.

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Introduction to Networking
  • Fee: $139.00
    Dates: 4/16/2025 - 6/30/2025

    Learn More

    Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network. This course explains computer networking basics in easy-to-understand terms, using concepts common to everyday, non-computing experience.

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Introduction to Networking
  • Fee: $139.00
    Dates: 7/16/2025 - 12/22/2030

    Learn More

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Introduction to Networking
  • Fee: $139.00
    Dates: 8/13/2025 - 12/22/2030

    Learn More

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Introduction to Networking
  • Fee: $139.00
    Dates: 9/17/2025 - 12/22/2030

    Learn More

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Introduction to PC Security
  • Fee: $139.00
    Dates: 2/12/2025 - 12/22/2030

    Learn More

    Learn why you're at risk and what you can do to protect your precious personal and business data from the outside world. In this course, a security expert will teach you the fundamentals of PC and network security as you learn to install and configure a firewall to build an impenetrable moat around your computer or network.

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Introduction to PC Security
  • Fee: $139.00
    Dates: 4/16/2025 - 6/30/2025

    Learn More

    Learn why you're at risk and what you can do to protect your precious personal and business data from the outside world. In this course, a security expert will teach you the fundamentals of PC and network security as you learn to install and configure a firewall to build an impenetrable moat around your computer or network.

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Introduction to PC Security
  • Fee: $139.00
    Dates: 7/16/2025 - 12/22/2030

    Learn More

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Introduction to PC Security
  • Fee: $139.00
    Dates: 8/13/2025 - 12/22/2030

    Learn More

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Introduction to PC Security
  • Fee: $139.00
    Dates: 9/17/2025 - 12/22/2030

    Learn More

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Introduction to PC Troubleshooting
  • Fee: $139.00
    Dates: 2/12/2025 - 12/22/2030

    Learn More

    Don't spend your hard-earned cash on PC repairs that you can fix yourself with a little troubleshooting knowledge. This course takes you step-by-step through typical hardware and operating system problems and gives you the skills you need to solve them as you learn to maintain and optimize a Windows PC.

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Introduction to PC Troubleshooting
  • Fee: $139.00
    Dates: 4/16/2025 - 6/30/2025

    Learn More

    Don't spend your hard-earned cash on PC repairs that you can fix yourself with a little troubleshooting knowledge. This course takes you step-by-step through typical hardware and operating system problems and gives you the skills you need to solve them as you learn to maintain and optimize a Windows PC.

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Introduction to PC Troubleshooting
  • Fee: $139.00
    Dates: 7/16/2025 - 12/22/2030

    Learn More

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Introduction to PC Troubleshooting
  • Fee: $139.00
    Dates: 8/13/2025 - 12/22/2030

    Learn More

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Introduction to PC Troubleshooting
  • Fee: $139.00
    Dates: 9/17/2025 - 12/22/2030

    Learn More

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Understanding the Cloud
  • Fee: $139.00
    Dates: 2/12/2025 - 12/22/2030

    Learn More

    Learn everything you need to understand cloud computing. This course explores how the cloud works, what drives it, why it is so popular, and what it can do for you.

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Understanding the Cloud
  • Fee: $139.00
    Dates: 4/16/2025 - 6/30/2025

    Learn More

    Learn everything you need to understand cloud computing. This course explores how the cloud works, what drives it, why it is so popular, and what it can do for you.

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Understanding the Cloud
  • Fee: $139.00
    Dates: 7/16/2025 - 12/22/2030

    Learn More

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Understanding the Cloud
  • Fee: $139.00
    Dates: 8/13/2025 - 12/22/2030

    Learn More

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Understanding the Cloud
  • Fee: $139.00
    Dates: 9/17/2025 - 12/22/2030

    Learn More

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Wireless Networking
  • Fee: $139.00
    Dates: 2/12/2025 - 12/22/2030

    Learn More

    Learn how to plan, deploy, and connect wireless networks from an industry expert. This course removes the mystery behind wireless connections and provide a thorough overview of this fascinating and lucrative technology.

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Wireless Networking
  • Fee: $139.00
    Dates: 4/16/2025 - 6/30/2025

    Learn More

    Learn how to plan, deploy, and connect wireless networks from an industry expert. This course removes the mystery behind wireless connections and provide a thorough overview of this fascinating and lucrative technology.

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Wireless Networking
  • Fee: $139.00
    Dates: 7/16/2025 - 12/22/2030

    Learn More

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Wireless Networking
  • Fee: $139.00
    Dates: 8/13/2025 - 12/22/2030

    Learn More

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • Wireless Networking
  • Fee: $139.00
    Dates: 9/17/2025 - 12/22/2030

    Learn More

    This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.

 

  • AZ-104: Microsoft Azure Administrator (Voucher Included) 
  • Fee: $1,995.00
    Item Number: TesOILC207721
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    You will learn to manage Azure subscriptions and resources, implement and manage storage, deploy and manage virtual machines (VMs), configure and manage virtual networks, and manage identities.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The Microsoft Azure Administrator course is intended for those who are either looking to gain more knowledge about administering Azure cloud services, security, networking, and compute cloud abilities or who are looking to pass the AZ-104 exam and complete their Microsoft Certified: Azure Administrator certification.

    You will learn to Implement access management with Azure users, groups, and role-based access control. This is in addition to creating Windows virtual machines in the Azure Portal, with Azure PowerShell, or using ARM Templates. You will also implement Azure Active Directory, Self-Service Password Reset, Azure AD Identity Protection, and integrated SaaS applications, understand virtual networking components, IP addressing, network routing options, and much more.

    Furthermore, you will learn to use Azure Monitor to configure Azure alerts and review the Azure Activity Log, explain virtual machine usage cases, storage options, pricing, operating systems, networking capabilities, and general planning considerations. You will also discover how to optimize your use of Azure tools like the Azure portal, Azure PowerShell, Cloud Shell, and the Azure CLI.

    By course completion, you will have the AZ-104 training needed to sit for the AZ-104: Microsoft Azure Administrator Exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Azure Subscriptions, Resources & Billing
    2. Azure Policies
    3. Azure Users & Groups
    4. Azure Logging & Monitoring
    5. Azure Resource Management
    6. Azure User & Groups
    7. Azure Logging & Monitoring
    8. Azure Resource Management
    9. Azure Storage Accounts & Types
    10. Azure Virtual Machines
    11. Shared Access Signature, backup & File
    12. Deploy & Manage Virtual Machines
    13. Azure Containers
    14. Configure & Manage Victual Networks
    15. Manage Identities

    What you will learn

    • Query and analyze Log Analytics data
    • Deploy resources with ARM templates and organize Azure resources
    • Create Azure storage accounts for different data replication, pricing, and content scenarios
    • Implement virtual machine storage, blob storage, Azure files, and structured storage
    • Secure and manage storage with shared access keys, Azure backup, and Azure File Sync
    • Store and access data using Azure Content Delivery Network, and the Import and Export service
    • Deploy custom server images and Linux virtual machines
    • Configure virtual machine networking and storage options
    • Implement virtual machine high availability, scalability, and custom scripts extensions
    • Backup, restore, and monitor virtual machines
    • Implement Azure DNS domains, zones, record types, and resolution methods
    • Configure network security groups, service endpoints, logging, and network troubleshooting
    • Implement site connectivity schemas, including VNet-to-VNet connections and virtual network peering
    • Configure domains and tenants, users and groups, roles, and devices
    • Implement and manage Azure Active Directory integration options and Azure AD Application Proxy
    • Implement and configure Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway
    • Use Azure RBAC to grant a granular level of access based on an administrator's assigned tasks
    • Use Azure Multi-Factor Authentication to configure a strong authentication for users at sign-in

    How you will benefit

    • You will be prepared for the AZ-104: Microsoft Azure Administrator Exam
    • Grow your IT career and open new job opportunities

    Doug Bassett

    Doug Bassett is an IT instructor specializing in Microsoft Azure, Server 2016/19, and Exchange messaging. He holds many highly sought-after IT certifications, including Microsoft MCSE, Microsoft MCSA, CompTIA Network+, Cisco CCNA, and Microsoft MCT. In addition to his certifications, Doug has expert knowledge of Microsoft Server 2000, 2003, 2008/2012/2016/2019, Exchange Server and Exchange Online, and Networking structure and applications. As an instructor, Doug is deeply involved in helping his students understand complex concepts and loves to approach teaching a subject from multiple angles.


    The Microsoft Azure Administrator course is intended for those who are either looking to gain more knowledge about administering Azure cloud services, security, networking, and compute cloud abilities or who are looking to pass the AZ-104 exam and complete their Microsoft Certified: Azure Administrator certification.

    You will learn to Implement access management with Azure users, groups, and role-based access control. This is in addition to creating Windows virtual machines in the Azure Portal, with Azure PowerShell, or using ARM Templates. You will also implement Azure Active Directory, Self-Service Password Reset, Azure AD Identity Protection, and integrated SaaS applications, understand virtual networking components, IP addressing, network routing options, and much more.

    Furthermore, you will learn to use Azure Monitor to configure Azure alerts and review the Azure Activity Log, explain virtual machine usage cases, storage options, pricing, operating systems, networking capabilities, and general planning considerations. You will also discover how to optimize your use of Azure tools like the Azure portal, Azure PowerShell, Cloud Shell, and the Azure CLI.

    By course completion, you will have the AZ-104 training needed to sit for the AZ-104: Microsoft Azure Administrator Exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • AZ-104: Microsoft Azure Administrator (Voucher Included) 
  • Fee: $1,995.00
    Item Number: 252OILC207721
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    You will learn to manage Azure subscriptions and resources, implement and manage storage, deploy and manage virtual machines (VMs), configure and manage virtual networks, and manage identities.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The Microsoft Azure Administrator course is intended for those who are either looking to gain more knowledge about administering Azure cloud services, security, networking, and compute cloud abilities or who are looking to pass the AZ-104 exam and complete their Microsoft Certified: Azure Administrator certification.

    You will learn to Implement access management with Azure users, groups, and role-based access control. This is in addition to creating Windows virtual machines in the Azure Portal, with Azure PowerShell, or using ARM Templates. You will also implement Azure Active Directory, Self-Service Password Reset, Azure AD Identity Protection, and integrated SaaS applications, understand virtual networking components, IP addressing, network routing options, and much more.

    Furthermore, you will learn to use Azure Monitor to configure Azure alerts and review the Azure Activity Log, explain virtual machine usage cases, storage options, pricing, operating systems, networking capabilities, and general planning considerations. You will also discover how to optimize your use of Azure tools like the Azure portal, Azure PowerShell, Cloud Shell, and the Azure CLI.

    By course completion, you will have the AZ-104 training needed to sit for the AZ-104: Microsoft Azure Administrator Exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Azure Subscriptions, Resources & Billing
    2. Azure Policies
    3. Azure Users & Groups
    4. Azure Logging & Monitoring
    5. Azure Resource Management
    6. Azure User & Groups
    7. Azure Logging & Monitoring
    8. Azure Resource Management
    9. Azure Storage Accounts & Types
    10. Azure Virtual Machines
    11. Shared Access Signature, backup & File
    12. Deploy & Manage Virtual Machines
    13. Azure Containers
    14. Configure & Manage Victual Networks
    15. Manage Identities

    What you will learn

    • Query and analyze Log Analytics data
    • Deploy resources with ARM templates and organize Azure resources
    • Create Azure storage accounts for different data replication, pricing, and content scenarios
    • Implement virtual machine storage, blob storage, Azure files, and structured storage
    • Secure and manage storage with shared access keys, Azure backup, and Azure File Sync
    • Store and access data using Azure Content Delivery Network, and the Import and Export service
    • Deploy custom server images and Linux virtual machines
    • Configure virtual machine networking and storage options
    • Implement virtual machine high availability, scalability, and custom scripts extensions
    • Backup, restore, and monitor virtual machines
    • Implement Azure DNS domains, zones, record types, and resolution methods
    • Configure network security groups, service endpoints, logging, and network troubleshooting
    • Implement site connectivity schemas, including VNet-to-VNet connections and virtual network peering
    • Configure domains and tenants, users and groups, roles, and devices
    • Implement and manage Azure Active Directory integration options and Azure AD Application Proxy
    • Implement and configure Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway
    • Use Azure RBAC to grant a granular level of access based on an administrator's assigned tasks
    • Use Azure Multi-Factor Authentication to configure a strong authentication for users at sign-in

    How you will benefit

    • You will be prepared for the AZ-104: Microsoft Azure Administrator Exam
    • Grow your IT career and open new job opportunities

    Doug Bassett

    Doug Bassett is an IT instructor specializing in Microsoft Azure, Server 2016/19, and Exchange messaging. He holds many highly sought-after IT certifications, including Microsoft MCSE, Microsoft MCSA, CompTIA Network+, Cisco CCNA, and Microsoft MCT. In addition to his certifications, Doug has expert knowledge of Microsoft Server 2000, 2003, 2008/2012/2016/2019, Exchange Server and Exchange Online, and Networking structure and applications. As an instructor, Doug is deeply involved in helping his students understand complex concepts and loves to approach teaching a subject from multiple angles.


    The Microsoft Azure Administrator course is intended for those who are either looking to gain more knowledge about administering Azure cloud services, security, networking, and compute cloud abilities or who are looking to pass the AZ-104 exam and complete their Microsoft Certified: Azure Administrator certification.

    You will learn to Implement access management with Azure users, groups, and role-based access control. This is in addition to creating Windows virtual machines in the Azure Portal, with Azure PowerShell, or using ARM Templates. You will also implement Azure Active Directory, Self-Service Password Reset, Azure AD Identity Protection, and integrated SaaS applications, understand virtual networking components, IP addressing, network routing options, and much more.

    Furthermore, you will learn to use Azure Monitor to configure Azure alerts and review the Azure Activity Log, explain virtual machine usage cases, storage options, pricing, operating systems, networking capabilities, and general planning considerations. You will also discover how to optimize your use of Azure tools like the Azure portal, Azure PowerShell, Cloud Shell, and the Azure CLI.

    By course completion, you will have the AZ-104 training needed to sit for the AZ-104: Microsoft Azure Administrator Exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • AZ-900: Microsoft Azure Fundamentals (Voucher Included) 
  • Fee: $1,995.00
    Item Number: TesOILC207741
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    You will learn foundational level knowledge on cloud concepts; core Microsoft Azure services; security, privacy, compliance, and trust; and Azure pricing and support.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The Microsoft Azure Fundamentals course is intended for entry-level Azure professionals and builds the groundwork needed to properly administer and subscribe to Microsoft Azure. From networking and cloud concepts to Azure workloads, security, privacy, and more, you will master the training needed to take your career to the next level. By course completion, you will be prepared to achieve your Microsoft Azure certification.

    The course will also prepare you to sit for the AZ-900: Microsoft Azure Fundamentals Exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Onsite Networking
    2. Benefits and Considerations of Using Cloud Services
    3. Differences between IaaS, PaaS, and SaaS
    4. Differences Between Public, Private, and Hybrid Clouds
    5. Core Azure Architecture Components
    6. Core Products Available and Subscriptions in Azure
    7. Azure Management and Monitoring Tools
    8. Securing Network Connectivity in Azure
    9. Core Azure Identity Services
    10. Security Tools and Features of Azure
    11. Azure Governance Methodologies
    12. Conditional Access
    13. Using Profiles
    14. Privacy Standards
    15. Azure Service Level Agreements (SLAs)
    16. Mobile Application Management (MDM)
    17. Windows Defender Tools

    What you will learn

    • Concepts of onsite networking
    • Cloud concepts
    • Concepts of cloud-based networking
    • Azure workloads
    • Security and privacy in Azure
    • Azure subscriptions
    • Concepts of hybrid networking
    • Azure application support
    • How to manage and monitor Azure Services

    How you will benefit

    • You will be prepared for the AZ-900: Microsoft Azure Fundamentals Exam
    • Increase your career opportunities as an IT professional

    Will Panek

    Will Panek is a worldwide recognized Microsoft instructor and author. Will Panek is a 5-time Microsoft MVP and has published over 30 titles on Microsoft technologies. Will is a passionate and authoritative instructor and makes sure that his students can implement Microsoft technologies and get themselves certified along the way. Outside the class and authorship, you'd be likely to find Will at the forge smithing his latest creation.


    The Microsoft Azure Fundamentals course is intended for entry-level Azure professionals and builds the groundwork needed to properly administer and subscribe to Microsoft Azure. From networking and cloud concepts to Azure workloads, security, privacy, and more, you will master the training needed to take your career to the next level. By course completion, you will be prepared to achieve your Microsoft Azure certification.

    The course will also prepare you to sit for the AZ-900: Microsoft Azure Fundamentals Exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • AZ-900: Microsoft Azure Fundamentals (Voucher Included) 
  • Fee: $1,995.00
    Item Number: 252OILC207741
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    You will learn foundational level knowledge on cloud concepts; core Microsoft Azure services; security, privacy, compliance, and trust; and Azure pricing and support.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The Microsoft Azure Fundamentals course is intended for entry-level Azure professionals and builds the groundwork needed to properly administer and subscribe to Microsoft Azure. From networking and cloud concepts to Azure workloads, security, privacy, and more, you will master the training needed to take your career to the next level. By course completion, you will be prepared to achieve your Microsoft Azure certification.

    The course will also prepare you to sit for the AZ-900: Microsoft Azure Fundamentals Exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Onsite Networking
    2. Benefits and Considerations of Using Cloud Services
    3. Differences between IaaS, PaaS, and SaaS
    4. Differences Between Public, Private, and Hybrid Clouds
    5. Core Azure Architecture Components
    6. Core Products Available and Subscriptions in Azure
    7. Azure Management and Monitoring Tools
    8. Securing Network Connectivity in Azure
    9. Core Azure Identity Services
    10. Security Tools and Features of Azure
    11. Azure Governance Methodologies
    12. Conditional Access
    13. Using Profiles
    14. Privacy Standards
    15. Azure Service Level Agreements (SLAs)
    16. Mobile Application Management (MDM)
    17. Windows Defender Tools

    What you will learn

    • Concepts of onsite networking
    • Cloud concepts
    • Concepts of cloud-based networking
    • Azure workloads
    • Security and privacy in Azure
    • Azure subscriptions
    • Concepts of hybrid networking
    • Azure application support
    • How to manage and monitor Azure Services

    How you will benefit

    • You will be prepared for the AZ-900: Microsoft Azure Fundamentals Exam
    • Increase your career opportunities as an IT professional

    Will Panek

    Will Panek is a worldwide recognized Microsoft instructor and author. Will Panek is a 5-time Microsoft MVP and has published over 30 titles on Microsoft technologies. Will is a passionate and authoritative instructor and makes sure that his students can implement Microsoft technologies and get themselves certified along the way. Outside the class and authorship, you'd be likely to find Will at the forge smithing his latest creation.


    The Microsoft Azure Fundamentals course is intended for entry-level Azure professionals and builds the groundwork needed to properly administer and subscribe to Microsoft Azure. From networking and cloud concepts to Azure workloads, security, privacy, and more, you will master the training needed to take your career to the next level. By course completion, you will be prepared to achieve your Microsoft Azure certification.

    The course will also prepare you to sit for the AZ-900: Microsoft Azure Fundamentals Exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Certified AWS Cloud Practitioner (Voucher Included) 
  • Fee: $1,995.00
    Item Number: TesOILC207501
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for IT professionals who would like to better understand AWS Cloud concepts and core AWS services.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 10 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Virtual Labs included with the course
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and available online.

    • Study guide
    • Virtual labs
    • Practice exams

    This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    Anyone looking for exposure to AWS or the AWS Certified Cloud Practitioner should take this course. This course can be used to prepare for the AWS Certified Cloud Practitioner exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview and AWS Introduction
      1. Introduction to AWS Certified Cloud Practitioner Course and Exam Objectives
      2. Introducing AWS and the Cloud
      3. AWS Well-Architected Framework
      4. The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
      5. AWS Pricing, Billing, Support Plans and Dashboards
      6. Accessing AWS Resources
    2. AWS Compute
      1. Amazon EC2
      2. EC2 Scaling and Load Balancing
      3. Amazon ECS, EKS, and Fargate
      4. AWS Lambda
      5. Elastic BeanStalk
    3. AWS Databases
      1. Database Overview and RDS
      2. Amazon Elasticache
      3. DynamoDB
      4. DocumentDB
      5. Amazon Redshift
      6. Amazon Neptune
    4. AWS Storage
      1. Instance and EBS Storage
      2. EFS, FSx for Windows and FSx for Lustre
      3. Simple Storage Service (S3)
      4. AWS Storage Gateway
    5. AWS Networking
      1. VPC Overview and Subnets
      2. VPC Internet Connectivity, Routing, and NAT
      3. VPC Security Groups and ACLs
      4. VPNs and Direct Connect
      5. CloudFront, Global Accelerator and Route53
      6. API Gateway
    6. AWS Messaging, Migration, and Translation
      1. SQS
      2. SNS and SES
      3. Snowcone, Snowball, Snowmobile
      4. AWS DataSync, AWS Transfer, AWS Database Migration Service
      5. AWS Translate and Transcribe
    7. Security
      1. Security Overview, IAM Users and Groups
      2. Permissions and Policies
      3. IAM Roles, Identity Federation and Cognito
      4. KMS, Secrets Manager, AWS Organizations and Compliance
      5. AWS WAF, Shield, Inspector, Macie, and GuardDuty
    8. Monitoring and Maintenance
      1. CloudWatch, CloudWatch Logs, and CloudWatch Events
      2. CloudTrail and Trusted Advisor

    What you will learn

    • Define what the AWS Cloud is and the basic global infrastructure
    • Describe basic AWS Cloud architectural principles
    • Describe the AWS Cloud value proposition
    • Describe key services on the AWS platform and their common use cases (for example, compute and analytics)
    • Describe basic security and compliance aspects of the AWS platform and the shared security model
    • Define the billing, account management, and pricing models
    • Identify sources of documentation or technical assistance (for example, whitepapers or support tickets)
    • Describe basic/core characteristics of deploying and operating in the AWS Cloud

    How you will benefit

    • You will be prepared to sit for the AWS Certified Cloud Practitioner exam
    • Complete the course in 3 months or less
    • Improve your job opportunities and earning potential by increasing your AWS Cloud skills and knowledge

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.

    Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.

    In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.


    This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    Anyone looking for exposure to AWS or the AWS Certified Cloud Practitioner should take this course. This course can be used to prepare for the AWS Certified Cloud Practitioner exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Certified AWS Cloud Practitioner (Voucher Included) 
  • Fee: $1,995.00
    Item Number: 252OILC207501
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for IT professionals who would like to better understand AWS Cloud concepts and core AWS services.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 10 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Virtual Labs included with the course
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and available online.

    • Study guide
    • Virtual labs
    • Practice exams

    This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    Anyone looking for exposure to AWS or the AWS Certified Cloud Practitioner should take this course. This course can be used to prepare for the AWS Certified Cloud Practitioner exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview and AWS Introduction
      1. Introduction to AWS Certified Cloud Practitioner Course and Exam Objectives
      2. Introducing AWS and the Cloud
      3. AWS Well-Architected Framework
      4. The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
      5. AWS Pricing, Billing, Support Plans and Dashboards
      6. Accessing AWS Resources
    2. AWS Compute
      1. Amazon EC2
      2. EC2 Scaling and Load Balancing
      3. Amazon ECS, EKS, and Fargate
      4. AWS Lambda
      5. Elastic BeanStalk
    3. AWS Databases
      1. Database Overview and RDS
      2. Amazon Elasticache
      3. DynamoDB
      4. DocumentDB
      5. Amazon Redshift
      6. Amazon Neptune
    4. AWS Storage
      1. Instance and EBS Storage
      2. EFS, FSx for Windows and FSx for Lustre
      3. Simple Storage Service (S3)
      4. AWS Storage Gateway
    5. AWS Networking
      1. VPC Overview and Subnets
      2. VPC Internet Connectivity, Routing, and NAT
      3. VPC Security Groups and ACLs
      4. VPNs and Direct Connect
      5. CloudFront, Global Accelerator and Route53
      6. API Gateway
    6. AWS Messaging, Migration, and Translation
      1. SQS
      2. SNS and SES
      3. Snowcone, Snowball, Snowmobile
      4. AWS DataSync, AWS Transfer, AWS Database Migration Service
      5. AWS Translate and Transcribe
    7. Security
      1. Security Overview, IAM Users and Groups
      2. Permissions and Policies
      3. IAM Roles, Identity Federation and Cognito
      4. KMS, Secrets Manager, AWS Organizations and Compliance
      5. AWS WAF, Shield, Inspector, Macie, and GuardDuty
    8. Monitoring and Maintenance
      1. CloudWatch, CloudWatch Logs, and CloudWatch Events
      2. CloudTrail and Trusted Advisor

    What you will learn

    • Define what the AWS Cloud is and the basic global infrastructure
    • Describe basic AWS Cloud architectural principles
    • Describe the AWS Cloud value proposition
    • Describe key services on the AWS platform and their common use cases (for example, compute and analytics)
    • Describe basic security and compliance aspects of the AWS platform and the shared security model
    • Define the billing, account management, and pricing models
    • Identify sources of documentation or technical assistance (for example, whitepapers or support tickets)
    • Describe basic/core characteristics of deploying and operating in the AWS Cloud

    How you will benefit

    • You will be prepared to sit for the AWS Certified Cloud Practitioner exam
    • Complete the course in 3 months or less
    • Improve your job opportunities and earning potential by increasing your AWS Cloud skills and knowledge

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.

    Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.

    In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.


    This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    Anyone looking for exposure to AWS or the AWS Certified Cloud Practitioner should take this course. This course can be used to prepare for the AWS Certified Cloud Practitioner exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Certified AWS Cloud Practitioner Developer Associate (Vouchers Included) 
  • Fee: $3,995.00
    Item Number: TesOILC207551
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for IT professionals who would like to better understand AWS Cloud concepts, core AWS services, and those looking to gain more knowledge into AWS's developing capabilities.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Virtual Labs included with the course
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and available online.

    • Study guide
    • Virtual labs
    • Practice exams

    This comprehensive course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    You will learn how to use the AWS SDK to develop secure and scalable cloud applications. You will also explore how to interact with AWS using code and discuss key concepts, best practices, and troubleshooting tips.

    This course can be used to prepare for the AWS Certified Cloud Practitioner - Foundational and AWS Certified Developer – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview and AWS Introduction
      1. Introduction to AWS Certified Cloud Practitioner Course and Exam Objectives
      2. Introducing AWS and the Cloud
      3. AWS Well-Architected Framework
      4. The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
      5. AWS Pricing, Billing, Support Plans, and Dashboards
      6. Accessing AWS Resources
    2. AWS Compute
      1. Amazon EC2
      2. EC2 Scaling and Load Balancing
      3. Amazon ECS, EKS, and Fargate
      4. AWS Lambda
      5. Elastic BeanStalk
    3. AWS Databases
      1. Database Overview and RDS
      2. Amazon Elasticache
      3. DynamoDB
      4. DocumentDB
      5. Amazon Redshift
      6. Amazon Neptune
    4. AWS Storage
      1. Instance and EBS Storage
      2. EFS, FSx for Windows and FSx for Lustre
      3. Simple Storage Service (S3)
      4. AWS Storage Gateway
    5. AWS Networking
      1. VPC Overview and Subnets
      2. VPC Internet Connectivity, Routing, and NAT
      3. VPC Security Groups and ACLs
      4. VPNs and Direct Connect
      5. CloudFront, Global Accelerator and Route53
      6. API Gateway
    6. AWS Messaging, Migration, and Translation
      1. SQS
      2. SNS and SES
      3. Snowcone, Snowball, Snowmobile
      4. AWS DataSync, AWS Transfer, AWS Database Migration Service
      5. AWS Translate and Transcribe
    7. Security
      1. Security Overview, IAM Users and Groups
      2. Permissions and Policies
      3. IAM Roles, Identity Federation, and Cognito
      4. KMS, Secrets Manager, AWS Organizations and Compliance
      5. AWS WAF, Shield, Inspector, Macie, and GuardDuty
    8. Monitoring and Maintenance
      1. CloudWatch, CloudWatch Logs, and CloudWatch Events
      2. CloudTrail and Trusted Advisor
    9. Course Overview and the AWS Global Infrastructure
      1. Introduction to AWS Developer Associate Course and Exam Objectives
      2. Regions, Availability Zones, and Edge Locations
    10. AWS Security
      1. IAM Users, Groups, Permissions
      2. Access Keys and IAM Roles
      3. Identity Federation and Cognito
      4. KMS, HSM, and Secrets Manager
    11. Networking and Compute
      1. VPC Overview and VPC Subnets
      2. VPC Internet Connectivity, Routing, and NAT
      3. VPC Security Groups and ACLs
      4. CloudFront and Global Accelerator
      5. EC2 Overview and Launching a Server
      6. EC2 Storage
      7. EC2 Auto Scaling
      8. EC2 Elastic Loadbalancing
      9. Elastic Container Service Overview
    12. Databases
      1. Database Overview and RDS
      2. RDS Multi-AZ and Read Replicas
      3. Amazon Aurora
      4. Elasticache
      5. DynamoDB Overview, Table Creation, Modes, and Encryption
      6. DynamoDB Access Controls, Scans, Queries, Indexes
      7. DynamoDB DAX, Global Tables, Streams, and Additional Considerations
      8. DocumentDB
    13. Simple Storage Service (S3)
      1. S3 Overview, Bucket Creation, Object Upload, Storage Classes, and Lifecycle Policies
      2. S3 Object Paths, Data Consistency, and Limits
      3. S3 Encryption, Permissions, and Pre-signed URLs
      4. S3 Versioning, MFA Delete, and Object Lock
      5. S3 CORs, Server Access Logging, Event Notifications, Replication
      6. S3 Static Website Hosting
    14. Lambda, API Gateway, Step Functions
      1. Lambda Overview and Examples
      2. Lambda Features, Limits, and Permissions
      3. Step Functions
      4. API Gateway
    15. Messaging
      1. SQS
      2. SNS
      3. SES
    16. Elastic Beanstalk and Kinesis
      1. Elastic Beanstalk Overview
      2. Elastic Beanstalk Versions and Deployment Options
      3. Kinesis
    17. Developer Tools
      1. Continuous Integration and Continuous Deployment Overview
      2. Code Commit, Artifact, Build, Deploy, and Pipeline
      3. CloudFormation and Sam
      4. SDKs, CLIs, and Simple Workflow Service
    18. Monitoring
      1. CloudWatch, CloudWatch Logs, and CloudWatch Events
      2. CloudTrail and X-Ray

    What you will learn

    • Define what the AWS Cloud is and the basic global infrastructure and basic AWS Cloud architectural principles
    • Describe the AWS Cloud value proposition
    • Describe key services on the AWS platform and their common use cases Describe basic security and compliance aspects of the AWS platform and the shared security model
    • Define the billing, account management, and pricing models
    • Identify sources of documentation or technical assistance (for example, whitepapers or support tickets)
    • Describe basic/core characteristics of deploying and operating in the AWS Cloud
    • Set up the AWS SDK and developer credentials for Java, C#/.NET, Python, and JavaScript
    • Interact with AWS services and develop solutions by using the AWS SDK
    • Use AWS Identity and Access Management (IAM) for service authentication
    • Use Amazon Simple Storage Service (Amazon S3) and Amazon DynamoDB as datastores
    • Integrate applications and data by using AWS Lambda, Amazon API Gateway, Amazon Simple Queue Service (Amazon SQS), Amazon Simple Notification Service (Amazon SNS), and AWS Step Functions
    • Use Web Identity Framework and Amazon Cognito for user authentication
    • Use Amazon ElastiCache to improve application scalability
    • Use containers in the development process
    • Leverage the CI/CD pipeline to deploy applications on AWS

    How you will benefit

    • You will be prepared to sit for the AWS Certified Cloud Practitioner exam
    • You will be prepared to sit for the AWS Certified AWS Developer Associate: Associate Exam
    • Gain valuable career skills that you can apply immediately
    • Increase your earning potential
    • Complete your program in 6 months or less
    • Certificate of completion from the school or organization that you registered through (upon successfully passing the final exam)

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.

    Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing, and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.

    In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.


    This comprehensive course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    You will learn how to use the AWS SDK to develop secure and scalable cloud applications. You will also explore how to interact with AWS using code and discuss key concepts, best practices, and troubleshooting tips.

    This course can be used to prepare for the AWS Certified Cloud Practitioner - Foundational and AWS Certified Developer – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Certified AWS Cloud Practitioner Developer Associate (Vouchers Included) 
  • Fee: $3,995.00
    Item Number: 252OILC207551
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for IT professionals who would like to better understand AWS Cloud concepts, core AWS services, and those looking to gain more knowledge into AWS's developing capabilities.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Virtual Labs included with the course
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and available online.

    • Study guide
    • Virtual labs
    • Practice exams

    This comprehensive course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    You will learn how to use the AWS SDK to develop secure and scalable cloud applications. You will also explore how to interact with AWS using code and discuss key concepts, best practices, and troubleshooting tips.

    This course can be used to prepare for the AWS Certified Cloud Practitioner - Foundational and AWS Certified Developer – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview and AWS Introduction
      1. Introduction to AWS Certified Cloud Practitioner Course and Exam Objectives
      2. Introducing AWS and the Cloud
      3. AWS Well-Architected Framework
      4. The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
      5. AWS Pricing, Billing, Support Plans, and Dashboards
      6. Accessing AWS Resources
    2. AWS Compute
      1. Amazon EC2
      2. EC2 Scaling and Load Balancing
      3. Amazon ECS, EKS, and Fargate
      4. AWS Lambda
      5. Elastic BeanStalk
    3. AWS Databases
      1. Database Overview and RDS
      2. Amazon Elasticache
      3. DynamoDB
      4. DocumentDB
      5. Amazon Redshift
      6. Amazon Neptune
    4. AWS Storage
      1. Instance and EBS Storage
      2. EFS, FSx for Windows and FSx for Lustre
      3. Simple Storage Service (S3)
      4. AWS Storage Gateway
    5. AWS Networking
      1. VPC Overview and Subnets
      2. VPC Internet Connectivity, Routing, and NAT
      3. VPC Security Groups and ACLs
      4. VPNs and Direct Connect
      5. CloudFront, Global Accelerator and Route53
      6. API Gateway
    6. AWS Messaging, Migration, and Translation
      1. SQS
      2. SNS and SES
      3. Snowcone, Snowball, Snowmobile
      4. AWS DataSync, AWS Transfer, AWS Database Migration Service
      5. AWS Translate and Transcribe
    7. Security
      1. Security Overview, IAM Users and Groups
      2. Permissions and Policies
      3. IAM Roles, Identity Federation, and Cognito
      4. KMS, Secrets Manager, AWS Organizations and Compliance
      5. AWS WAF, Shield, Inspector, Macie, and GuardDuty
    8. Monitoring and Maintenance
      1. CloudWatch, CloudWatch Logs, and CloudWatch Events
      2. CloudTrail and Trusted Advisor
    9. Course Overview and the AWS Global Infrastructure
      1. Introduction to AWS Developer Associate Course and Exam Objectives
      2. Regions, Availability Zones, and Edge Locations
    10. AWS Security
      1. IAM Users, Groups, Permissions
      2. Access Keys and IAM Roles
      3. Identity Federation and Cognito
      4. KMS, HSM, and Secrets Manager
    11. Networking and Compute
      1. VPC Overview and VPC Subnets
      2. VPC Internet Connectivity, Routing, and NAT
      3. VPC Security Groups and ACLs
      4. CloudFront and Global Accelerator
      5. EC2 Overview and Launching a Server
      6. EC2 Storage
      7. EC2 Auto Scaling
      8. EC2 Elastic Loadbalancing
      9. Elastic Container Service Overview
    12. Databases
      1. Database Overview and RDS
      2. RDS Multi-AZ and Read Replicas
      3. Amazon Aurora
      4. Elasticache
      5. DynamoDB Overview, Table Creation, Modes, and Encryption
      6. DynamoDB Access Controls, Scans, Queries, Indexes
      7. DynamoDB DAX, Global Tables, Streams, and Additional Considerations
      8. DocumentDB
    13. Simple Storage Service (S3)
      1. S3 Overview, Bucket Creation, Object Upload, Storage Classes, and Lifecycle Policies
      2. S3 Object Paths, Data Consistency, and Limits
      3. S3 Encryption, Permissions, and Pre-signed URLs
      4. S3 Versioning, MFA Delete, and Object Lock
      5. S3 CORs, Server Access Logging, Event Notifications, Replication
      6. S3 Static Website Hosting
    14. Lambda, API Gateway, Step Functions
      1. Lambda Overview and Examples
      2. Lambda Features, Limits, and Permissions
      3. Step Functions
      4. API Gateway
    15. Messaging
      1. SQS
      2. SNS
      3. SES
    16. Elastic Beanstalk and Kinesis
      1. Elastic Beanstalk Overview
      2. Elastic Beanstalk Versions and Deployment Options
      3. Kinesis
    17. Developer Tools
      1. Continuous Integration and Continuous Deployment Overview
      2. Code Commit, Artifact, Build, Deploy, and Pipeline
      3. CloudFormation and Sam
      4. SDKs, CLIs, and Simple Workflow Service
    18. Monitoring
      1. CloudWatch, CloudWatch Logs, and CloudWatch Events
      2. CloudTrail and X-Ray

    What you will learn

    • Define what the AWS Cloud is and the basic global infrastructure and basic AWS Cloud architectural principles
    • Describe the AWS Cloud value proposition
    • Describe key services on the AWS platform and their common use cases Describe basic security and compliance aspects of the AWS platform and the shared security model
    • Define the billing, account management, and pricing models
    • Identify sources of documentation or technical assistance (for example, whitepapers or support tickets)
    • Describe basic/core characteristics of deploying and operating in the AWS Cloud
    • Set up the AWS SDK and developer credentials for Java, C#/.NET, Python, and JavaScript
    • Interact with AWS services and develop solutions by using the AWS SDK
    • Use AWS Identity and Access Management (IAM) for service authentication
    • Use Amazon Simple Storage Service (Amazon S3) and Amazon DynamoDB as datastores
    • Integrate applications and data by using AWS Lambda, Amazon API Gateway, Amazon Simple Queue Service (Amazon SQS), Amazon Simple Notification Service (Amazon SNS), and AWS Step Functions
    • Use Web Identity Framework and Amazon Cognito for user authentication
    • Use Amazon ElastiCache to improve application scalability
    • Use containers in the development process
    • Leverage the CI/CD pipeline to deploy applications on AWS

    How you will benefit

    • You will be prepared to sit for the AWS Certified Cloud Practitioner exam
    • You will be prepared to sit for the AWS Certified AWS Developer Associate: Associate Exam
    • Gain valuable career skills that you can apply immediately
    • Increase your earning potential
    • Complete your program in 6 months or less
    • Certificate of completion from the school or organization that you registered through (upon successfully passing the final exam)

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.

    Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing, and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.

    In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.


    This comprehensive course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    You will learn how to use the AWS SDK to develop secure and scalable cloud applications. You will also explore how to interact with AWS using code and discuss key concepts, best practices, and troubleshooting tips.

    This course can be used to prepare for the AWS Certified Cloud Practitioner - Foundational and AWS Certified Developer – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Certified AWS Cloud Practitioner Solutions Architect (Vouchers Included) 
  • Fee: $3,995.00
    Item Number: TesOILC207561
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for IT professionals who would like to better understand AWS Cloud concepts, core AWS services, Solutions Architects and Solution Design Engineers.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Virtual Labs included with the course
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and available online.

    • Study guide
    • Virtual labs
    • Practice exams

    This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    You will be taught the fundamental skills to architect your IT solutions on AWS. AWS Architect Associate is a course for system engineers and system developers. It will cover optimizing the AWS Cloud by understanding AWS services and how they fit into cloud-based solutions.

    This course can be used to prepare for the AWS Certified Cloud Practitioner - Foundational and the AWS Certified Solutions Architect – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview and AWS Introduction
      1. Introduction to AWS Certified Cloud Practitioner Course and Exam Objectives
      2. Introducing AWS and the Cloud
      3. AWS Well-Architected Framework
      4. The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
      5. AWS Pricing, Billing, Support Plans and Dashboards
      6. Accessing AWS Resources
    2. AWS Compute
      1. Amazon EC2
      2. EC2 Scaling and Load Balancing
      3. Amazon ECS, EKS, and Fargate
      4. AWS Lambda
      5. Elastic BeanStalk
    3. AWS Databases
      1. Database Overview and RDS
      2. Amazon Elasticache
      3. DynamoDB
      4. DocumentDB
      5. Amazon Redshift
      6. Amazon Neptune
    4. AWS Storage
      1. Instance and EBS Storage
      2. EFS, FSx for Windows and FSx for Lustre
      3. Simple Storage Service (S3)
      4. AWS Storage Gateway
    5. AWS Networking
      1. VPC Overview and Subnets
      2. VPC Internet Connectivity, Routing, and NAT
      3. VPC Security Groups and ACLs
      4. VPNs and Direct Connect
      5. CloudFront, Global Accelerator and Route53
      6. API Gateway
    6. AWS Messaging, Migration, and Translation
      1. SQS
      2. SNS and SES
      3. Snowcone, Snowball, Snowmobile
      4. AWS DataSync, AWS Transfer, AWS Database Migration Service
      5. AWS Translate and Transcribe
    7. Security
      1. Security Overview, IAM Users and Groups
      2. Permissions and Policies
      3. IAM Roles, Identity Federation and Cognito
      4. KMS, Secrets Manager, AWS Organizations and Compliance
      5. AWS WAF, Shield, Inspector, Macie, and GuardDuty
    8. Monitoring and Maintenance
      1. CloudWatch, CloudWatch Logs, and CloudWatch Events
      2. CloudTrail and Trusted Advisor
    9. Course Overview and the AWS Global Infrastructure
      1. Introduction to AWS Architect Associate Course and Exam Objectives
      2. Regions, Availability Zones, and Edge Locations
    10. Compute
      1. EC2: Overview, Architecture, and Pricing
      2. EC2: Launching and Accessing a Linux and Windows Server
      3. EC2: AMIs and Instance Types
      4. EC2: Instance Store, EBS, EFS, FSx
      5. EC2: IP addressing, Network Interfaces, Security Groups and Placement Groups
      6. EC2: Auto Scaling
      7. EC2: Load Balancers
      8. ECS: Overview
      9. Serverless: Lambda
      10. Serverless: API Gateway
    11. Databases
      1. Databases: Overview
      2. RDS: Overview, Instances, Storage, Encryption and Backups
      3. RDS: Multi-AZ, and Read Replicas
      4. RDS: Amazon Aurora
      5. Elasticache: Overview
      6. DynamoDB: Overview
      7. Redshift: Overview
    12. Networking
      1. VPC: Overview, and VPC Subnets
      2. VPC: Internet Connectivity, Routing, and NAT
      3. VPC: Security Groups and ACLs
      4. VPC: VPNs, Direct Connect, Peering, Transit Gateways, and Endpoints
      5. CloudFront and Global Accelerator
      6. Route53
    13. Storage and Migration
      1. Storage: Overview and Review
      2. Storage: S3 Introduction, Storage Classes, Lifecyle Policies, and Static Websites
      3. Storage: S3 Security, Integrity, and Replication
      4. Storage: Storage Gateway and AWS Backup
      5. Migration: Snowcone, Snowball and Snowmobile
      6. Migration: AWS DataSync, AWS Transfer, AWS Database Migration Service
    14. Application Integration and Customer Engagement
      1. SQS, SNS, SES, Amazon MQ
    15. Security
      1. IAM: Users, Groups, Policies
      2. IAM: Temporary Credentials, Roles, Password Policies
      3. KMS and HSM
      4. Amazon Inspector, Macie, GuardDuty
      5. AWS Certificate Manager. Secrets Manager, WAF, Shield
    16. Monitoring and Management
      1. Amazon CloudWatch
      2. AWS CloudTrail, AWS Config
      3. AWS Organizations and AWS Resource Groups
      4. AWS Billing and Cost Management

    What you will learn

    • Define what the AWS Cloud is and the basic global infrastructure
    • Describe basic AWS Cloud architectural principles
    • Describe the AWS Cloud value proposition
    • Describe key services on the AWS platform and their common use cases (for example, compute and analytics)
    • Describe basic security and compliance aspects of the AWS platform and the shared security model
    • Define the billing, account management, and pricing models
    • Identify sources of documentation or technical assistance (for example, whitepapers or support tickets)
    • Describe basic/core characteristics of deploying and operating in the AWS CloudMake architectural decisions based on AWS architectural principles and best practices
    • Leverage AWS services to make your infrastructure scalable, reliable, and highly available
    • Leverage AWS Managed Services to enable greater flexibility and resiliency in an infrastructure
    • Make an AWS-based infrastructure more efficient to increase performance and reduce costs
    • Use the Well-Architected Framework to improve architectures with AWS solutions

    How you will benefit

    • You will be prepared to sit for the AWS Certified Cloud Practitioner exam
    • You will be prepared to sit for the AWS Solutions Architect: Associate Exam
    • Gain valuable career skills that you can apply immediately
    • Increase your earning potential
    • Complete your program in 6 months or less

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.

    Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing, and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.

    In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.


    This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    You will be taught the fundamental skills to architect your IT solutions on AWS. AWS Architect Associate is a course for system engineers and system developers. It will cover optimizing the AWS Cloud by understanding AWS services and how they fit into cloud-based solutions.

    This course can be used to prepare for the AWS Certified Cloud Practitioner - Foundational and the AWS Certified Solutions Architect – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Certified AWS Cloud Practitioner Solutions Architect (Vouchers Included) 
  • Fee: $3,995.00
    Item Number: 252OILC207561
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for IT professionals who would like to better understand AWS Cloud concepts, core AWS services, Solutions Architects and Solution Design Engineers.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Virtual Labs included with the course
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and available online.

    • Study guide
    • Virtual labs
    • Practice exams

    This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    You will be taught the fundamental skills to architect your IT solutions on AWS. AWS Architect Associate is a course for system engineers and system developers. It will cover optimizing the AWS Cloud by understanding AWS services and how they fit into cloud-based solutions.

    This course can be used to prepare for the AWS Certified Cloud Practitioner - Foundational and the AWS Certified Solutions Architect – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview and AWS Introduction
      1. Introduction to AWS Certified Cloud Practitioner Course and Exam Objectives
      2. Introducing AWS and the Cloud
      3. AWS Well-Architected Framework
      4. The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
      5. AWS Pricing, Billing, Support Plans and Dashboards
      6. Accessing AWS Resources
    2. AWS Compute
      1. Amazon EC2
      2. EC2 Scaling and Load Balancing
      3. Amazon ECS, EKS, and Fargate
      4. AWS Lambda
      5. Elastic BeanStalk
    3. AWS Databases
      1. Database Overview and RDS
      2. Amazon Elasticache
      3. DynamoDB
      4. DocumentDB
      5. Amazon Redshift
      6. Amazon Neptune
    4. AWS Storage
      1. Instance and EBS Storage
      2. EFS, FSx for Windows and FSx for Lustre
      3. Simple Storage Service (S3)
      4. AWS Storage Gateway
    5. AWS Networking
      1. VPC Overview and Subnets
      2. VPC Internet Connectivity, Routing, and NAT
      3. VPC Security Groups and ACLs
      4. VPNs and Direct Connect
      5. CloudFront, Global Accelerator and Route53
      6. API Gateway
    6. AWS Messaging, Migration, and Translation
      1. SQS
      2. SNS and SES
      3. Snowcone, Snowball, Snowmobile
      4. AWS DataSync, AWS Transfer, AWS Database Migration Service
      5. AWS Translate and Transcribe
    7. Security
      1. Security Overview, IAM Users and Groups
      2. Permissions and Policies
      3. IAM Roles, Identity Federation and Cognito
      4. KMS, Secrets Manager, AWS Organizations and Compliance
      5. AWS WAF, Shield, Inspector, Macie, and GuardDuty
    8. Monitoring and Maintenance
      1. CloudWatch, CloudWatch Logs, and CloudWatch Events
      2. CloudTrail and Trusted Advisor
    9. Course Overview and the AWS Global Infrastructure
      1. Introduction to AWS Architect Associate Course and Exam Objectives
      2. Regions, Availability Zones, and Edge Locations
    10. Compute
      1. EC2: Overview, Architecture, and Pricing
      2. EC2: Launching and Accessing a Linux and Windows Server
      3. EC2: AMIs and Instance Types
      4. EC2: Instance Store, EBS, EFS, FSx
      5. EC2: IP addressing, Network Interfaces, Security Groups and Placement Groups
      6. EC2: Auto Scaling
      7. EC2: Load Balancers
      8. ECS: Overview
      9. Serverless: Lambda
      10. Serverless: API Gateway
    11. Databases
      1. Databases: Overview
      2. RDS: Overview, Instances, Storage, Encryption and Backups
      3. RDS: Multi-AZ, and Read Replicas
      4. RDS: Amazon Aurora
      5. Elasticache: Overview
      6. DynamoDB: Overview
      7. Redshift: Overview
    12. Networking
      1. VPC: Overview, and VPC Subnets
      2. VPC: Internet Connectivity, Routing, and NAT
      3. VPC: Security Groups and ACLs
      4. VPC: VPNs, Direct Connect, Peering, Transit Gateways, and Endpoints
      5. CloudFront and Global Accelerator
      6. Route53
    13. Storage and Migration
      1. Storage: Overview and Review
      2. Storage: S3 Introduction, Storage Classes, Lifecyle Policies, and Static Websites
      3. Storage: S3 Security, Integrity, and Replication
      4. Storage: Storage Gateway and AWS Backup
      5. Migration: Snowcone, Snowball and Snowmobile
      6. Migration: AWS DataSync, AWS Transfer, AWS Database Migration Service
    14. Application Integration and Customer Engagement
      1. SQS, SNS, SES, Amazon MQ
    15. Security
      1. IAM: Users, Groups, Policies
      2. IAM: Temporary Credentials, Roles, Password Policies
      3. KMS and HSM
      4. Amazon Inspector, Macie, GuardDuty
      5. AWS Certificate Manager. Secrets Manager, WAF, Shield
    16. Monitoring and Management
      1. Amazon CloudWatch
      2. AWS CloudTrail, AWS Config
      3. AWS Organizations and AWS Resource Groups
      4. AWS Billing and Cost Management

    What you will learn

    • Define what the AWS Cloud is and the basic global infrastructure
    • Describe basic AWS Cloud architectural principles
    • Describe the AWS Cloud value proposition
    • Describe key services on the AWS platform and their common use cases (for example, compute and analytics)
    • Describe basic security and compliance aspects of the AWS platform and the shared security model
    • Define the billing, account management, and pricing models
    • Identify sources of documentation or technical assistance (for example, whitepapers or support tickets)
    • Describe basic/core characteristics of deploying and operating in the AWS CloudMake architectural decisions based on AWS architectural principles and best practices
    • Leverage AWS services to make your infrastructure scalable, reliable, and highly available
    • Leverage AWS Managed Services to enable greater flexibility and resiliency in an infrastructure
    • Make an AWS-based infrastructure more efficient to increase performance and reduce costs
    • Use the Well-Architected Framework to improve architectures with AWS solutions

    How you will benefit

    • You will be prepared to sit for the AWS Certified Cloud Practitioner exam
    • You will be prepared to sit for the AWS Solutions Architect: Associate Exam
    • Gain valuable career skills that you can apply immediately
    • Increase your earning potential
    • Complete your program in 6 months or less

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.

    Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing, and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.

    In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.


    This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    You will be taught the fundamental skills to architect your IT solutions on AWS. AWS Architect Associate is a course for system engineers and system developers. It will cover optimizing the AWS Cloud by understanding AWS services and how they fit into cloud-based solutions.

    This course can be used to prepare for the AWS Certified Cloud Practitioner - Foundational and the AWS Certified Solutions Architect – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Certified AWS Cloud Practitioner SysOps Administrator (Vouchers Included) 
  • Fee: $3,995.00
    Item Number: TesOILC207541
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for system administrators and software developers and other IT professionals who would like to better understand AWS Cloud concepts and core AWS services.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Virtual Labs included with the course
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and available online.

    • Study guide
    • Virtual labs
    • Practice exams

    This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    Students will then be taught how to create automatable and repeatable deployments of networks and systems on the AWS platform. AWS System Operations is a course for system administrators and developer operations personnel and will cover the specific AWS features and tools related to configuration and deployment, as well as common techniques used throughout the industry for configuring and deploying systems.

    This course can be used to prepare for the AWS Certified Cloud Practitioner – Foundational and AWS Certified SysOps Administrator – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview and AWS Introduction
      1. Introduction to AWS Certified Cloud Practitioner Course and Exam Objectives
      2. Introducing AWS and the Cloud
      3. AWS Well-Architected Framework
      4. The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
      5. AWS Pricing, Billing, Support Plans, and Dashboards
      6. Accessing AWS Resources
    2. AWS Compute
      1. Amazon EC2
      2. EC2 Scaling and Load Balancing
      3. Amazon ECS, EKS, and Fargate
      4. AWS Lambda
      5. Elastic BeanStalk
    3. AWS Databases
      1. Database Overview and RDS
      2. Amazon Elasticache
      3. DynamoDB
      4. DocumentDB
      5. Amazon Redshift
      6. Amazon Neptune
    4. AWS Storage
      1. Instance and EBS Storage
      2. EFS, FSx for Windows and FSx for Lustre
      3. Simple Storage Service (S3)
      4. AWS Storage Gateway
    5. AWS Networking
      1. VPC Overview and Subnets
      2. VPC Internet Connectivity, Routing, and NAT
      3. VPC Security Groups and ACLs
      4. VPNs and Direct Connect
      5. CloudFront, Global Accelerator and Route53
      6. API Gateway
    6. AWS Messaging, Migration, and Translation
      1. SQS
      2. SNS and SES
      3. Snowcone, Snowball, Snowmobile
      4. AWS DataSync, AWS Transfer, AWS Database Migration Service
      5. AWS Translate and Transcribe
    7. Security
      1. Security Overview, IAM Users and Groups
      2. Permissions and Policies
      3. IAM Roles, Identity Federation, and Cognito
      4. KMS, Secrets Manager, AWS Organizations and Compliance
      5. AWS WAF, Shield, Inspector, Macie, and GuardDuty
    8. Monitoring and Maintenance
      1. CloudWatch, CloudWatch Logs, and CloudWatch Events
      2. CloudTrail and Trusted Advisor
    9. Course Overview and AWS Introduction
      1. Introduction to AWS Certified SysOps Administrator Associate Course and Exam Objectives
      2. Introducing AWS and the Cloud
      3. The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
      4. AWS Pricing, Billing, Support Plans, and Dashboards
      5. Accessing AWS Resources
    10. AWS Networking
      1. VPC Overview and VPC Subnets
      2. VPC Internet Connectivity, Routing, and NAT
      3. VPC Security Groups, ACLs, and Flow Logs
      4. VPC VPNs, Direct Connect, Peering, Transit Gateways, and Endpoints
      5. CloudFront, Global Accelerator and Route53
    11. AWS Compute
      1. EC2 Overview, Architecture, and Pricing
      2. EC2 Launching and Accessing a Linux and Windows Server
      3. EC2 AMIs, Instance Types, Features
      4. EC2 Instance Store, EBS, EFS, FSx, and S3 Storage
      5. EC2 IP addressing, Network Interfaces, Security Groups, and Placement Groups
      6. EC2 Auto Scaling
      7. EC2 Load Balancers
      8. ECS Overview
      9. Lambda Overview and Examples
      10. API Gateway
    12. AWS Databases
      1. Database Overview
      2. RDS Overview, Instances, Storage, Encryption, and Backups
      3. RDS Multi-AZ, and Read Replicas
      4. RDS Amazon Aurora
      5. Elasticache Overview
      6. DynamoDB Overview
      7. Redshift Overview
    13. AWS Storage
      1. Storage Overview and Review
      2. S3 Introduction, Storage Classes, and Lifecycle Policies
      3. S3 Security and Integrity
      4. S3 Replication, Event Notifications, Inventory, and Limits
      5. S3 Static Website Hosting
      6. Storage Gateway and AWS Backup
    14. AWS Migration and Messaging
      1. Snowcone, Snowball, Snowmobile
      2. AWS DataSync, AWS Transfer, AWS Database Migration Service
      3. SQS, SNS, and SES
    15. AWS Security
      1. Security Overview, IAM Users and Groups
      2. Permissions and Policies
      3. IAM Roles, Identity Federation, and Cognito
      4. KMS, Secrets Manager, Certificates Manager, and Compliance
      5. AWS WAF, Shield, Inspector, Macie, and GuardDuty
    16. Monitoring, Maintenance, and Management
      1. CloudWatch, CloudWatch Logs, and CloudWatch Events
      2. AWS CloudTrail, AWS Config, and Trusted Advisor
      3. CloudFormation and Service Catalog
      4. AWS Organizations and Control Towe
      5. AWS Systems Manager, Resource Groups, and Service/Personal Health Dashboards
      6. AWS Pricing, Billing, and Cost Management

    What you will learn

    • Define what the AWS Cloud is and the basic global infrastructure
    • Describe basic AWS Cloud architectural principles, key services, and common use cases and the AWS Cloud value proposition
    • Describe basic security and compliance aspects of the AWS platform and the shared security model
    • Define the billing, account management, and pricing models
    • Identify sources of documentation or technical assistance
    • Describe basic/core characteristics of deploying and operating in the AWS Cloud
    • Use standard AWS infrastructure features such as Amazon Virtual Private Cloud (VPC), Amazon Elastic Compute Cloud (EC2), Elastic Load Balancing, and Auto Scaling from the command line
    • Use AWS CloudFormation and other automation technologies to produce stacks of AWS resources that can be deployed in an automated, repeatable fashion
    • Build functioning virtual private networks with Amazon VPC from the ground up using the AWS Management Console
    • Deploy Amazon EC2 instances using command line calls and troubleshoot the most common problems with instances
    • Monitor the health of Amazon EC2 instances and other AWS services
    • Manage user identity, AWS permissions, and security in the cloud
    • Manage resource consumption in an AWS account using tools such as Amazon CloudWatch, tagging, and Trusted Advisor
    • Select and implement the best strategy for creating reusable Amazon EC2 instances
    • Configure a set of Amazon EC2 instances that launch behind a load balancer, with the system scaling up and down in response to demand
    • Edit and troubleshoot a basic AWS CloudFormation stack definition

    How you will benefit

    • You will be prepared to sit for the AWS Certified Cloud Practitioner exam
    • You will be prepared to sit for the AWS SysOps Administrator: Associate Exam
    • Gain valuable career skills that you can apply immediately
    • Increase your earning potential
    • Complete your program in 6 months or less
    • Certificate of completion from the school or organization that you registered through (upon successfully passing the final exam)

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.

    Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing, and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.

    In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.


    This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    Students will then be taught how to create automatable and repeatable deployments of networks and systems on the AWS platform. AWS System Operations is a course for system administrators and developer operations personnel and will cover the specific AWS features and tools related to configuration and deployment, as well as common techniques used throughout the industry for configuring and deploying systems.

    This course can be used to prepare for the AWS Certified Cloud Practitioner – Foundational and AWS Certified SysOps Administrator – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Certified AWS Cloud Practitioner SysOps Administrator (Vouchers Included) 
  • Fee: $3,995.00
    Item Number: 252OILC207541
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for system administrators and software developers and other IT professionals who would like to better understand AWS Cloud concepts and core AWS services.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Virtual Labs included with the course
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and available online.

    • Study guide
    • Virtual labs
    • Practice exams

    This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    Students will then be taught how to create automatable and repeatable deployments of networks and systems on the AWS platform. AWS System Operations is a course for system administrators and developer operations personnel and will cover the specific AWS features and tools related to configuration and deployment, as well as common techniques used throughout the industry for configuring and deploying systems.

    This course can be used to prepare for the AWS Certified Cloud Practitioner – Foundational and AWS Certified SysOps Administrator – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview and AWS Introduction
      1. Introduction to AWS Certified Cloud Practitioner Course and Exam Objectives
      2. Introducing AWS and the Cloud
      3. AWS Well-Architected Framework
      4. The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
      5. AWS Pricing, Billing, Support Plans, and Dashboards
      6. Accessing AWS Resources
    2. AWS Compute
      1. Amazon EC2
      2. EC2 Scaling and Load Balancing
      3. Amazon ECS, EKS, and Fargate
      4. AWS Lambda
      5. Elastic BeanStalk
    3. AWS Databases
      1. Database Overview and RDS
      2. Amazon Elasticache
      3. DynamoDB
      4. DocumentDB
      5. Amazon Redshift
      6. Amazon Neptune
    4. AWS Storage
      1. Instance and EBS Storage
      2. EFS, FSx for Windows and FSx for Lustre
      3. Simple Storage Service (S3)
      4. AWS Storage Gateway
    5. AWS Networking
      1. VPC Overview and Subnets
      2. VPC Internet Connectivity, Routing, and NAT
      3. VPC Security Groups and ACLs
      4. VPNs and Direct Connect
      5. CloudFront, Global Accelerator and Route53
      6. API Gateway
    6. AWS Messaging, Migration, and Translation
      1. SQS
      2. SNS and SES
      3. Snowcone, Snowball, Snowmobile
      4. AWS DataSync, AWS Transfer, AWS Database Migration Service
      5. AWS Translate and Transcribe
    7. Security
      1. Security Overview, IAM Users and Groups
      2. Permissions and Policies
      3. IAM Roles, Identity Federation, and Cognito
      4. KMS, Secrets Manager, AWS Organizations and Compliance
      5. AWS WAF, Shield, Inspector, Macie, and GuardDuty
    8. Monitoring and Maintenance
      1. CloudWatch, CloudWatch Logs, and CloudWatch Events
      2. CloudTrail and Trusted Advisor
    9. Course Overview and AWS Introduction
      1. Introduction to AWS Certified SysOps Administrator Associate Course and Exam Objectives
      2. Introducing AWS and the Cloud
      3. The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
      4. AWS Pricing, Billing, Support Plans, and Dashboards
      5. Accessing AWS Resources
    10. AWS Networking
      1. VPC Overview and VPC Subnets
      2. VPC Internet Connectivity, Routing, and NAT
      3. VPC Security Groups, ACLs, and Flow Logs
      4. VPC VPNs, Direct Connect, Peering, Transit Gateways, and Endpoints
      5. CloudFront, Global Accelerator and Route53
    11. AWS Compute
      1. EC2 Overview, Architecture, and Pricing
      2. EC2 Launching and Accessing a Linux and Windows Server
      3. EC2 AMIs, Instance Types, Features
      4. EC2 Instance Store, EBS, EFS, FSx, and S3 Storage
      5. EC2 IP addressing, Network Interfaces, Security Groups, and Placement Groups
      6. EC2 Auto Scaling
      7. EC2 Load Balancers
      8. ECS Overview
      9. Lambda Overview and Examples
      10. API Gateway
    12. AWS Databases
      1. Database Overview
      2. RDS Overview, Instances, Storage, Encryption, and Backups
      3. RDS Multi-AZ, and Read Replicas
      4. RDS Amazon Aurora
      5. Elasticache Overview
      6. DynamoDB Overview
      7. Redshift Overview
    13. AWS Storage
      1. Storage Overview and Review
      2. S3 Introduction, Storage Classes, and Lifecycle Policies
      3. S3 Security and Integrity
      4. S3 Replication, Event Notifications, Inventory, and Limits
      5. S3 Static Website Hosting
      6. Storage Gateway and AWS Backup
    14. AWS Migration and Messaging
      1. Snowcone, Snowball, Snowmobile
      2. AWS DataSync, AWS Transfer, AWS Database Migration Service
      3. SQS, SNS, and SES
    15. AWS Security
      1. Security Overview, IAM Users and Groups
      2. Permissions and Policies
      3. IAM Roles, Identity Federation, and Cognito
      4. KMS, Secrets Manager, Certificates Manager, and Compliance
      5. AWS WAF, Shield, Inspector, Macie, and GuardDuty
    16. Monitoring, Maintenance, and Management
      1. CloudWatch, CloudWatch Logs, and CloudWatch Events
      2. AWS CloudTrail, AWS Config, and Trusted Advisor
      3. CloudFormation and Service Catalog
      4. AWS Organizations and Control Towe
      5. AWS Systems Manager, Resource Groups, and Service/Personal Health Dashboards
      6. AWS Pricing, Billing, and Cost Management

    What you will learn

    • Define what the AWS Cloud is and the basic global infrastructure
    • Describe basic AWS Cloud architectural principles, key services, and common use cases and the AWS Cloud value proposition
    • Describe basic security and compliance aspects of the AWS platform and the shared security model
    • Define the billing, account management, and pricing models
    • Identify sources of documentation or technical assistance
    • Describe basic/core characteristics of deploying and operating in the AWS Cloud
    • Use standard AWS infrastructure features such as Amazon Virtual Private Cloud (VPC), Amazon Elastic Compute Cloud (EC2), Elastic Load Balancing, and Auto Scaling from the command line
    • Use AWS CloudFormation and other automation technologies to produce stacks of AWS resources that can be deployed in an automated, repeatable fashion
    • Build functioning virtual private networks with Amazon VPC from the ground up using the AWS Management Console
    • Deploy Amazon EC2 instances using command line calls and troubleshoot the most common problems with instances
    • Monitor the health of Amazon EC2 instances and other AWS services
    • Manage user identity, AWS permissions, and security in the cloud
    • Manage resource consumption in an AWS account using tools such as Amazon CloudWatch, tagging, and Trusted Advisor
    • Select and implement the best strategy for creating reusable Amazon EC2 instances
    • Configure a set of Amazon EC2 instances that launch behind a load balancer, with the system scaling up and down in response to demand
    • Edit and troubleshoot a basic AWS CloudFormation stack definition

    How you will benefit

    • You will be prepared to sit for the AWS Certified Cloud Practitioner exam
    • You will be prepared to sit for the AWS SysOps Administrator: Associate Exam
    • Gain valuable career skills that you can apply immediately
    • Increase your earning potential
    • Complete your program in 6 months or less
    • Certificate of completion from the school or organization that you registered through (upon successfully passing the final exam)

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.

    Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing, and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.

    In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.


    This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    Students will then be taught how to create automatable and repeatable deployments of networks and systems on the AWS platform. AWS System Operations is a course for system administrators and developer operations personnel and will cover the specific AWS features and tools related to configuration and deployment, as well as common techniques used throughout the industry for configuring and deploying systems.

    This course can be used to prepare for the AWS Certified Cloud Practitioner – Foundational and AWS Certified SysOps Administrator – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Certified Ethical Hacker (Voucher Included) 
  • Fee: $2,895.00
    Item Number: TesOILC206111
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This online Certified Ethical Hacker (CEH) course will teach you the valuable details that every information security professional needs to know.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.10 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online. The materials are non-refundable upon registration.

    • Certified Ethical Hacker, Ethical Hacking and Countermeasures (eBook)

    To be successful in beating a hacker, you need to think like one. This ethical hacking certification course immerses you in the hacker mindset and puts you in control with hands-on activities. As a certified ethical hacker (CEH), you use the same techniques as malicious hackers to assess security and identify weaknesses, but for ethical purposes. You will scan, test, hack, and secure your own systems to help prevent potentially catastrophic damage to your organization.

    By completing this CEH training, you will learn the industry standards of ethical hacking developed by the EC-Council. This process involves five phases, namely Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Your Tracks. With these skills, you will be able to assess the security posture of an organization and identify and fix weaknesses before malicious hackers can exploit them.

    This unique credential sets you apart from other IT professionals and adds even more value to your organization. According to the EC-Council, one in every two professionals receive promotions after gaining their ethical hacking certification.

    Gain advanced hacking tools and techniques while preparing to sit for the Certified Ethical Hacker Exam 312-50 with this accredited CEH course offered by the EC-Council. The exam voucher is included in the cost of your enrollment.


    1. Introduction to Ethical Hacking
    2. Foot Printing and Reconnaissance
    3. Scanning Networks
    4. Enumeration
    5. Vulnerability Analysis
    6. System Hacking
    7. Malware Threats
    8. Sniffing
    9. Social Engineering
    10. Denial of Service
    11. Session Hijacking
    12. Evading IDS, Firewalls and Honeypots
    13. Hacking Web Servers
    14. Hacking Web Applications
    15. SQL Injection
    16. Hacking Wireless Networks
    17. Hacking Mobile Platforms
    18. IoT and OT Hacking
    19. Cloud Computing
    20. Cryptography

    What you will learn

    • Assess ethical and legal requirements for security assessment and penetration testing and develop a compliance strategy
    • Analyze the different phases of hacking and determine the most effective ethical hacking strategy for assessing the security of information system components
    • Identify vulnerabilities, threats, and attacks to information systems, and recommend countermeasures.
    • Evaluate cryptography algorithms and encryption techniques and develop implementation strategies for securing information
    • Evaluate network security techniques and tools, and implement appropriate information security controls based on evidence, information, and research

    How you will benefit

    • Prepare for Certified Ethical Hacker (CEH) Exam Number 312-50 with example CEH exam questions
    • Obtain the CEH credential to unlock a number of career opportunities in the information security and cybersecurity industry
    • Obtain a credential highly acknowledged and recognized by employers in the public and private sector
    • Complete the most advanced, hands on ethical hacking program in the industry

    Eric Reed

    Eric Reed has over 12 years of experience in IT consulting, specializing in security. Since 2005, he has consulted and delivered custom training to the U.S. military and numerous Fortune 100 and Fortune 500 companies. He has delivered CEH, CHFI, and ECSA/LPT training for the last seven years, with a 95 percent pass rating. Reed was awarded the EC Council Instructor of the Year in 2009 and 2012, as well as the Circle of Excellence in 2006, 2007, and 2010.


    To be successful in beating a hacker, you need to think like one. This ethical hacking certification course immerses you in the hacker mindset and puts you in control with hands-on activities. As a certified ethical hacker (CEH), you use the same techniques as malicious hackers to assess security and identify weaknesses, but for ethical purposes. You will scan, test, hack, and secure your own systems to help prevent potentially catastrophic damage to your organization.

    By completing this CEH training, you will learn the industry standards of ethical hacking developed by the EC-Council. This process involves five phases, namely Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Your Tracks. With these skills, you will be able to assess the security posture of an organization and identify and fix weaknesses before malicious hackers can exploit them.

    This unique credential sets you apart from other IT professionals and adds even more value to your organization. According to the EC-Council, one in every two professionals receive promotions after gaining their ethical hacking certification.

    Gain advanced hacking tools and techniques while preparing to sit for the Certified Ethical Hacker Exam 312-50 with this accredited CEH course offered by the EC-Council. The exam voucher is included in the cost of your enrollment.

 

  • Certified Ethical Hacker (Voucher Included) 
  • Fee: $2,895.00
    Item Number: 252OILC206111
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This online Certified Ethical Hacker (CEH) course will teach you the valuable details that every information security professional needs to know.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.10 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online. The materials are non-refundable upon registration.

    • Certified Ethical Hacker, Ethical Hacking and Countermeasures (eBook)

    To be successful in beating a hacker, you need to think like one. This ethical hacking certification course immerses you in the hacker mindset and puts you in control with hands-on activities. As a certified ethical hacker (CEH), you use the same techniques as malicious hackers to assess security and identify weaknesses, but for ethical purposes. You will scan, test, hack, and secure your own systems to help prevent potentially catastrophic damage to your organization.

    By completing this CEH training, you will learn the industry standards of ethical hacking developed by the EC-Council. This process involves five phases, namely Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Your Tracks. With these skills, you will be able to assess the security posture of an organization and identify and fix weaknesses before malicious hackers can exploit them.

    This unique credential sets you apart from other IT professionals and adds even more value to your organization. According to the EC-Council, one in every two professionals receive promotions after gaining their ethical hacking certification.

    Gain advanced hacking tools and techniques while preparing to sit for the Certified Ethical Hacker Exam 312-50 with this accredited CEH course offered by the EC-Council. The exam voucher is included in the cost of your enrollment.


    1. Introduction to Ethical Hacking
    2. Foot Printing and Reconnaissance
    3. Scanning Networks
    4. Enumeration
    5. Vulnerability Analysis
    6. System Hacking
    7. Malware Threats
    8. Sniffing
    9. Social Engineering
    10. Denial of Service
    11. Session Hijacking
    12. Evading IDS, Firewalls and Honeypots
    13. Hacking Web Servers
    14. Hacking Web Applications
    15. SQL Injection
    16. Hacking Wireless Networks
    17. Hacking Mobile Platforms
    18. IoT and OT Hacking
    19. Cloud Computing
    20. Cryptography

    What you will learn

    • Assess ethical and legal requirements for security assessment and penetration testing and develop a compliance strategy
    • Analyze the different phases of hacking and determine the most effective ethical hacking strategy for assessing the security of information system components
    • Identify vulnerabilities, threats, and attacks to information systems, and recommend countermeasures.
    • Evaluate cryptography algorithms and encryption techniques and develop implementation strategies for securing information
    • Evaluate network security techniques and tools, and implement appropriate information security controls based on evidence, information, and research

    How you will benefit

    • Prepare for Certified Ethical Hacker (CEH) Exam Number 312-50 with example CEH exam questions
    • Obtain the CEH credential to unlock a number of career opportunities in the information security and cybersecurity industry
    • Obtain a credential highly acknowledged and recognized by employers in the public and private sector
    • Complete the most advanced, hands on ethical hacking program in the industry

    Eric Reed

    Eric Reed has over 12 years of experience in IT consulting, specializing in security. Since 2005, he has consulted and delivered custom training to the U.S. military and numerous Fortune 100 and Fortune 500 companies. He has delivered CEH, CHFI, and ECSA/LPT training for the last seven years, with a 95 percent pass rating. Reed was awarded the EC Council Instructor of the Year in 2009 and 2012, as well as the Circle of Excellence in 2006, 2007, and 2010.


    To be successful in beating a hacker, you need to think like one. This ethical hacking certification course immerses you in the hacker mindset and puts you in control with hands-on activities. As a certified ethical hacker (CEH), you use the same techniques as malicious hackers to assess security and identify weaknesses, but for ethical purposes. You will scan, test, hack, and secure your own systems to help prevent potentially catastrophic damage to your organization.

    By completing this CEH training, you will learn the industry standards of ethical hacking developed by the EC-Council. This process involves five phases, namely Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Your Tracks. With these skills, you will be able to assess the security posture of an organization and identify and fix weaknesses before malicious hackers can exploit them.

    This unique credential sets you apart from other IT professionals and adds even more value to your organization. According to the EC-Council, one in every two professionals receive promotions after gaining their ethical hacking certification.

    Gain advanced hacking tools and techniques while preparing to sit for the Certified Ethical Hacker Exam 312-50 with this accredited CEH course offered by the EC-Council. The exam voucher is included in the cost of your enrollment.

 

  • Certified Kubernetes Administrator (CKA) (Voucher Included) 
  • Fee: $1,995.00
    Item Number: TesOILC207831
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course will teach you how to use the container management platform used by companies like Google to manage their application infrastructure.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac. Chromebooks are not compatible.

    Required Lab Exercises

    • For hands-on lab exercises, access to a Linux server or Linux desktop/laptop is required. Access to a public cloud provider or VirtualBox on your machine is also needed. Lab exercises in this course have been tested in a GCP environment.
    • If using a cloud provider like GCP or AWS, you should be able to complete the lab exercises using the free tier or credits provided to you. However, you may incur charges if you exceed the credits initially allocated by the cloud provider.

    Software Requirements:

    • PC: Windows 7 or later.
    • Mac: macOS 10.7 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Exam Requirements:

    • Exams are delivered online, and candidates must provide their own computer with:
      • Current version of Chrome or Chromium.
      • Reliable internet access.
      • A microphone.
      • A webcam.
    • All technical exam requirements should be tested and working prior to starting the exam.
    • Candidates are not allowed to have other applications or browser windows running except the one on which the Exam is being shown.
    • Candidates should run the compatibility check tool to verify that their hardware meets the minimum requirements.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    Learn how to use the container management platform used by top companies, like Google, with the Certified Kubernetes Administrator (CKA) course. This Kubernetes training course will teach you everything you need to know to install and configure a production-grade Kubernetes cluster, from network configuration to upgrades to making deployments available through services.

    You will gain a solid understanding of key principles like Pods, Deployments, ReplicaSets, and services. Your training equips you with the necessary skills to work with containers, which enables you to package applications with their dependencies and deploy them on various platforms such as Bare-Metal, VM, Cloud, and more!

    This Kubernetes course introduces Continuous Integration/Continuous Delivery (CI/CD) within an open container ecosystem, using a project-based approach to help you understand and implement best practices. You will learn about the crucial role played by Docker Swarm and Kubernetes, revision control using Git, and how to install and configure Jenkins as a Continuous Integration platform. You will also discover how to use code reviews to enforce development workflows, package and distribute applications with Docker and Docker Registry, and set up a deployment pipeline using Argo CD.

    Upon course completion, this Kubernetes training course will prepare you for the CKA exam. This exam is performance-based and involves completing various tasks from a Kubernetes command line. With your enrollment, you will also receive an exam voucher to take the CKA certification exam.

    Note: This certification is ideal for Kubernetes administrators, cloud administrators, and other IT professionals who manage Kubernetes instances.


    1. Getting Started
    2. Containers Fundamentals
      1. Course Introduction
      2. Virtualization Fundamentals
      3. Virtualization Mechanisms
      4. Container Standards And Runtimes
      5. Image Operations
      6. Container Operations
      7. Building Container Images
      8. Container Networking
      9. Container Storage
      10. Runtime And Containers Security
    3. DevOps and SRE Fundamentals
      1. Introduction
      2. What and Why of CI/CD
      3. Setup: Exploring and Creating Our Learning Environment
      4. Basics of Container Operations with Docker
      5. Version Control with Git
      6. Setting Up Continuous Integration with Jenkins
      7. GitHub Branch Policies & Pipeline as Code with Jenkinsfile
      8. Using Docker with Jenkins Pipelines
      9. Docker Images
      10. Launching a Multi-Service Application with Docker Compose
      11. Automated Code Analysis
      12. SRE and Deploying a Scalable Application to Kubernetes
      13. SRE. GitOps and CD with Argo CD
    4. Kubernetes Fundamentals
      1. Course Introduction
      2. Basics of Kubernetes
      3. Installation and Configuration
      4. Kubernetes Architecture
      5. APIs and Access
      6. API Objects
      7. Managing State with Deployments
      8. Volumes and Data
      9. Services
      10. Helm
      11. Ingress
      12. Scheduling
      13. Logging and Troubleshooting
      14. Custom Resource Definitions
      15. Security
      16. High Availability
      17. Exam Domain Review
      18. Course Completion
    5. CKA Prep and Exam

    What you will learn

    • How to use the container management platform used by companies like Google to manage their application infrastructure
    • How to install and configure a production-grade Kubernetes cluster
    • The key principles, such as Pods, Deployments, ReplicaSets, and services
    • Learn revision control using Git
    • Understand the role played by Docker and Kubernetes
    • Learn to install and configure Jenkins as a Continuous Integration platform
    • Understand the fundamentals of Continuous Integration/Continuous Delivery (CI/CD)

    How you will benefit

    • Demonstrate the ability to do basic installation and configuring and managing production-grade Kubernetes clusters
    • Understand key concepts such as Kubernetes networking, storage, security, maintenance, logging and monitoring, application lifecycle, troubleshooting, and API object primitives
    • Obtain the ability to establish basic use-cases for end users
    • Master enforcing development workflows as code reviews
    • Gather application packaging and distribution with Docker Swarm and Docker Registry using Argo CD to set up a deployment pipeline

    Linux Instructors

    This course does not have an assigned instructor, but you will have access to several Linux instructors and subject matter experts throughout the course.


    Learn how to use the container management platform used by top companies, like Google, with the Certified Kubernetes Administrator (CKA) course. This Kubernetes training course will teach you everything you need to know to install and configure a production-grade Kubernetes cluster, from network configuration to upgrades to making deployments available through services.

    You will gain a solid understanding of key principles like Pods, Deployments, ReplicaSets, and services. Your training equips you with the necessary skills to work with containers, which enables you to package applications with their dependencies and deploy them on various platforms such as Bare-Metal, VM, Cloud, and more!

    This Kubernetes course introduces Continuous Integration/Continuous Delivery (CI/CD) within an open container ecosystem, using a project-based approach to help you understand and implement best practices. You will learn about the crucial role played by Docker Swarm and Kubernetes, revision control using Git, and how to install and configure Jenkins as a Continuous Integration platform. You will also discover how to use code reviews to enforce development workflows, package and distribute applications with Docker and Docker Registry, and set up a deployment pipeline using Argo CD.

    Upon course completion, this Kubernetes training course will prepare you for the CKA exam. This exam is performance-based and involves completing various tasks from a Kubernetes command line. With your enrollment, you will also receive an exam voucher to take the CKA certification exam.

    Note: This certification is ideal for Kubernetes administrators, cloud administrators, and other IT professionals who manage Kubernetes instances.

 

  • Certified Kubernetes Administrator (CKA) (Voucher Included) 
  • Fee: $1,995.00
    Item Number: 252OILC207831
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course will teach you how to use the container management platform used by companies like Google to manage their application infrastructure.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac. Chromebooks are not compatible.

    Required Lab Exercises

    • For hands-on lab exercises, access to a Linux server or Linux desktop/laptop is required. Access to a public cloud provider or VirtualBox on your machine is also needed. Lab exercises in this course have been tested in a GCP environment.
    • If using a cloud provider like GCP or AWS, you should be able to complete the lab exercises using the free tier or credits provided to you. However, you may incur charges if you exceed the credits initially allocated by the cloud provider.

    Software Requirements:

    • PC: Windows 7 or later.
    • Mac: macOS 10.7 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Exam Requirements:

    • Exams are delivered online, and candidates must provide their own computer with:
      • Current version of Chrome or Chromium.
      • Reliable internet access.
      • A microphone.
      • A webcam.
    • All technical exam requirements should be tested and working prior to starting the exam.
    • Candidates are not allowed to have other applications or browser windows running except the one on which the Exam is being shown.
    • Candidates should run the compatibility check tool to verify that their hardware meets the minimum requirements.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    Learn how to use the container management platform used by top companies, like Google, with the Certified Kubernetes Administrator (CKA) course. This Kubernetes training course will teach you everything you need to know to install and configure a production-grade Kubernetes cluster, from network configuration to upgrades to making deployments available through services.

    You will gain a solid understanding of key principles like Pods, Deployments, ReplicaSets, and services. Your training equips you with the necessary skills to work with containers, which enables you to package applications with their dependencies and deploy them on various platforms such as Bare-Metal, VM, Cloud, and more!

    This Kubernetes course introduces Continuous Integration/Continuous Delivery (CI/CD) within an open container ecosystem, using a project-based approach to help you understand and implement best practices. You will learn about the crucial role played by Docker Swarm and Kubernetes, revision control using Git, and how to install and configure Jenkins as a Continuous Integration platform. You will also discover how to use code reviews to enforce development workflows, package and distribute applications with Docker and Docker Registry, and set up a deployment pipeline using Argo CD.

    Upon course completion, this Kubernetes training course will prepare you for the CKA exam. This exam is performance-based and involves completing various tasks from a Kubernetes command line. With your enrollment, you will also receive an exam voucher to take the CKA certification exam.

    Note: This certification is ideal for Kubernetes administrators, cloud administrators, and other IT professionals who manage Kubernetes instances.


    1. Getting Started
    2. Containers Fundamentals
      1. Course Introduction
      2. Virtualization Fundamentals
      3. Virtualization Mechanisms
      4. Container Standards And Runtimes
      5. Image Operations
      6. Container Operations
      7. Building Container Images
      8. Container Networking
      9. Container Storage
      10. Runtime And Containers Security
    3. DevOps and SRE Fundamentals
      1. Introduction
      2. What and Why of CI/CD
      3. Setup: Exploring and Creating Our Learning Environment
      4. Basics of Container Operations with Docker
      5. Version Control with Git
      6. Setting Up Continuous Integration with Jenkins
      7. GitHub Branch Policies & Pipeline as Code with Jenkinsfile
      8. Using Docker with Jenkins Pipelines
      9. Docker Images
      10. Launching a Multi-Service Application with Docker Compose
      11. Automated Code Analysis
      12. SRE and Deploying a Scalable Application to Kubernetes
      13. SRE. GitOps and CD with Argo CD
    4. Kubernetes Fundamentals
      1. Course Introduction
      2. Basics of Kubernetes
      3. Installation and Configuration
      4. Kubernetes Architecture
      5. APIs and Access
      6. API Objects
      7. Managing State with Deployments
      8. Volumes and Data
      9. Services
      10. Helm
      11. Ingress
      12. Scheduling
      13. Logging and Troubleshooting
      14. Custom Resource Definitions
      15. Security
      16. High Availability
      17. Exam Domain Review
      18. Course Completion
    5. CKA Prep and Exam

    What you will learn

    • How to use the container management platform used by companies like Google to manage their application infrastructure
    • How to install and configure a production-grade Kubernetes cluster
    • The key principles, such as Pods, Deployments, ReplicaSets, and services
    • Learn revision control using Git
    • Understand the role played by Docker and Kubernetes
    • Learn to install and configure Jenkins as a Continuous Integration platform
    • Understand the fundamentals of Continuous Integration/Continuous Delivery (CI/CD)

    How you will benefit

    • Demonstrate the ability to do basic installation and configuring and managing production-grade Kubernetes clusters
    • Understand key concepts such as Kubernetes networking, storage, security, maintenance, logging and monitoring, application lifecycle, troubleshooting, and API object primitives
    • Obtain the ability to establish basic use-cases for end users
    • Master enforcing development workflows as code reviews
    • Gather application packaging and distribution with Docker Swarm and Docker Registry using Argo CD to set up a deployment pipeline

    Linux Instructors

    This course does not have an assigned instructor, but you will have access to several Linux instructors and subject matter experts throughout the course.


    Learn how to use the container management platform used by top companies, like Google, with the Certified Kubernetes Administrator (CKA) course. This Kubernetes training course will teach you everything you need to know to install and configure a production-grade Kubernetes cluster, from network configuration to upgrades to making deployments available through services.

    You will gain a solid understanding of key principles like Pods, Deployments, ReplicaSets, and services. Your training equips you with the necessary skills to work with containers, which enables you to package applications with their dependencies and deploy them on various platforms such as Bare-Metal, VM, Cloud, and more!

    This Kubernetes course introduces Continuous Integration/Continuous Delivery (CI/CD) within an open container ecosystem, using a project-based approach to help you understand and implement best practices. You will learn about the crucial role played by Docker Swarm and Kubernetes, revision control using Git, and how to install and configure Jenkins as a Continuous Integration platform. You will also discover how to use code reviews to enforce development workflows, package and distribute applications with Docker and Docker Registry, and set up a deployment pipeline using Argo CD.

    Upon course completion, this Kubernetes training course will prepare you for the CKA exam. This exam is performance-based and involves completing various tasks from a Kubernetes command line. With your enrollment, you will also receive an exam voucher to take the CKA certification exam.

    Note: This certification is ideal for Kubernetes administrators, cloud administrators, and other IT professionals who manage Kubernetes instances.

 

  • Certified Network Defender (CND) (Voucher Included) 
  • Fee: $2,895.00
    Item Number: TesOILC207161
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course prepares for the EC-Council Certified Network Defender (CND) exam. You will gain key skills that network engineers need to protect, detect and respond to the threats on their networks.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.10 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online. The materials are non-refundable upon registration.


    This comprehensive online course is specifically designed to prepare network engineers for the Certified Network Defender (CND) certification exam offered by the EC-Council (ECC). The CND certification is globally recognized and validates your ability to protect networks and maintain operations during cyber-attacks effectively.

    Throughout this CND course, you will delve into various modules that cover essential topics such as network security controls, protocols, and devices. You will learn how to strengthen security infrastructures by effectively implementing intrusion detection and prevention systems and troubleshooting network problems. The course also provides in-depth training on implementing secure virtual private networks (VPNs) for organizations and identifying and mitigating threats to wireless networks.

    One of the key highlights of this CND training program is its alignment with global CND responsibilities and Department of Defense (DoD) job roles for system/network administrators. This ensures that the skills and knowledge you acquire are highly relevant and applicable in real-world scenarios. The course follows a vendor-neutral approach, allowing you to understand network security principles and practices comprehensively without being tied to any specific technology or platform.

    Upon completing this course, you will receive a voucher covering the certifying exam's cost. This allows you to schedule and take the exam remotely using a proctor function, providing flexibility and convenience in the certification process.

    By enrolling in this course and earning the CND certification, you will become proficient in network security, gain the necessary skills to protect networks from cyber breaches, and enhance your professional credibility in this high-demand field.


    1. Network Attacks and Defense Strategies
    2. Administrative Network Security
    3. Technical Network Security
    4. Network Perimeter Security
    5. Endpoint Security-Windows Systems
    6. Endpoint Security-Linux Systems
    7. Endpoint Security- Mobile Devices
    8. Endpoint Security-IoT Devices
    9. Administrative Application Security
    10. Data Security
    11. Enterprise Virtual Network Security
    12. Enterprise Cloud Network Security
    13. Enterprise Wireless Network Security
    14. Network Traffic Monitoring and Analysis
    15. Network Logs Monitoring and Analysis
    16. Incident Response and Forensic Investigation
    17. Business Continuity and Disaster Recovery
    18. Risk Anticipation with Risk Management
    19. Threat Assessment with Attack Surface Analysis
    20. Threat Prediction With Cyber Threat Intelligence

    What you will learn

    • Acquire knowledge of basic networking concepts, including network security controls, protocols, and devices, to design a robust networking infrastructure
    • Evaluate potential vulnerabilities and threats to the network infrastructure, assess the potential impact of network security breaches, and analyze available countermeasures
    • Explore various network security mechanisms, analyze available security controls, and develop plans for implementing and configuring these controls
    • Recognize the significance of network security policies and develop comprehensive policies to protect the network infrastructure
    • Gain an understanding of the functioning of different networking devices and devise secure configuration strategies for these devices
    • Troubleshooting key network problems
    • Learn how to implement a secure VPN for organizational use and engage in monitoring and signature analysis to detect attacks and policy violations

    How you will benefit

    • This course satisfies the exam eligibility requirements for the Certified Network Defender (CND)—exam number 312-38 and includes sample CND questions
    • Gain the necessary technical knowledge to design a secure network, understand network operations, and analyze related materials
    • Develop skills in designing effective network security policies and incident response plans, as well as building resiliency and ensuring continuity of operations during attacks
    • Upon successfully passing the certification exam, you will earn the title of Certified Network Defender (CND)

    Eric Reed

    Eric Reed has over 15 years' experience in IT consulting. He has consulted and delivered certification and customized training to the U.S. military, and for many Fortune 100 and Fortune 500 companies. Eric has delivered CEH, CHFI, and ECSA/LPT for the last ten years and was named "EC-Council Instructor of the Year" seven times, as well as being the recipient of the Circle of Excellence Award in 2006, 2007 and 2010. Eric holds many industry certifications, including EC-Council's CND, CNDA, CHFI, ECSA, CEH and LPT.


    This comprehensive online course is specifically designed to prepare network engineers for the Certified Network Defender (CND) certification exam offered by the EC-Council (ECC). The CND certification is globally recognized and validates your ability to protect networks and maintain operations during cyber-attacks effectively.

    Throughout this CND course, you will delve into various modules that cover essential topics such as network security controls, protocols, and devices. You will learn how to strengthen security infrastructures by effectively implementing intrusion detection and prevention systems and troubleshooting network problems. The course also provides in-depth training on implementing secure virtual private networks (VPNs) for organizations and identifying and mitigating threats to wireless networks.

    One of the key highlights of this CND training program is its alignment with global CND responsibilities and Department of Defense (DoD) job roles for system/network administrators. This ensures that the skills and knowledge you acquire are highly relevant and applicable in real-world scenarios. The course follows a vendor-neutral approach, allowing you to understand network security principles and practices comprehensively without being tied to any specific technology or platform.

    Upon completing this course, you will receive a voucher covering the certifying exam's cost. This allows you to schedule and take the exam remotely using a proctor function, providing flexibility and convenience in the certification process.

    By enrolling in this course and earning the CND certification, you will become proficient in network security, gain the necessary skills to protect networks from cyber breaches, and enhance your professional credibility in this high-demand field.

 

  • Certified Network Defender (CND) (Voucher Included) 
  • Fee: $2,895.00
    Item Number: 252OILC207161
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course prepares for the EC-Council Certified Network Defender (CND) exam. You will gain key skills that network engineers need to protect, detect and respond to the threats on their networks.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.10 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online. The materials are non-refundable upon registration.


    This comprehensive online course is specifically designed to prepare network engineers for the Certified Network Defender (CND) certification exam offered by the EC-Council (ECC). The CND certification is globally recognized and validates your ability to protect networks and maintain operations during cyber-attacks effectively.

    Throughout this CND course, you will delve into various modules that cover essential topics such as network security controls, protocols, and devices. You will learn how to strengthen security infrastructures by effectively implementing intrusion detection and prevention systems and troubleshooting network problems. The course also provides in-depth training on implementing secure virtual private networks (VPNs) for organizations and identifying and mitigating threats to wireless networks.

    One of the key highlights of this CND training program is its alignment with global CND responsibilities and Department of Defense (DoD) job roles for system/network administrators. This ensures that the skills and knowledge you acquire are highly relevant and applicable in real-world scenarios. The course follows a vendor-neutral approach, allowing you to understand network security principles and practices comprehensively without being tied to any specific technology or platform.

    Upon completing this course, you will receive a voucher covering the certifying exam's cost. This allows you to schedule and take the exam remotely using a proctor function, providing flexibility and convenience in the certification process.

    By enrolling in this course and earning the CND certification, you will become proficient in network security, gain the necessary skills to protect networks from cyber breaches, and enhance your professional credibility in this high-demand field.


    1. Network Attacks and Defense Strategies
    2. Administrative Network Security
    3. Technical Network Security
    4. Network Perimeter Security
    5. Endpoint Security-Windows Systems
    6. Endpoint Security-Linux Systems
    7. Endpoint Security- Mobile Devices
    8. Endpoint Security-IoT Devices
    9. Administrative Application Security
    10. Data Security
    11. Enterprise Virtual Network Security
    12. Enterprise Cloud Network Security
    13. Enterprise Wireless Network Security
    14. Network Traffic Monitoring and Analysis
    15. Network Logs Monitoring and Analysis
    16. Incident Response and Forensic Investigation
    17. Business Continuity and Disaster Recovery
    18. Risk Anticipation with Risk Management
    19. Threat Assessment with Attack Surface Analysis
    20. Threat Prediction With Cyber Threat Intelligence

    What you will learn

    • Acquire knowledge of basic networking concepts, including network security controls, protocols, and devices, to design a robust networking infrastructure
    • Evaluate potential vulnerabilities and threats to the network infrastructure, assess the potential impact of network security breaches, and analyze available countermeasures
    • Explore various network security mechanisms, analyze available security controls, and develop plans for implementing and configuring these controls
    • Recognize the significance of network security policies and develop comprehensive policies to protect the network infrastructure
    • Gain an understanding of the functioning of different networking devices and devise secure configuration strategies for these devices
    • Troubleshooting key network problems
    • Learn how to implement a secure VPN for organizational use and engage in monitoring and signature analysis to detect attacks and policy violations

    How you will benefit

    • This course satisfies the exam eligibility requirements for the Certified Network Defender (CND)—exam number 312-38 and includes sample CND questions
    • Gain the necessary technical knowledge to design a secure network, understand network operations, and analyze related materials
    • Develop skills in designing effective network security policies and incident response plans, as well as building resiliency and ensuring continuity of operations during attacks
    • Upon successfully passing the certification exam, you will earn the title of Certified Network Defender (CND)

    Eric Reed

    Eric Reed has over 15 years' experience in IT consulting. He has consulted and delivered certification and customized training to the U.S. military, and for many Fortune 100 and Fortune 500 companies. Eric has delivered CEH, CHFI, and ECSA/LPT for the last ten years and was named "EC-Council Instructor of the Year" seven times, as well as being the recipient of the Circle of Excellence Award in 2006, 2007 and 2010. Eric holds many industry certifications, including EC-Council's CND, CNDA, CHFI, ECSA, CEH and LPT.


    This comprehensive online course is specifically designed to prepare network engineers for the Certified Network Defender (CND) certification exam offered by the EC-Council (ECC). The CND certification is globally recognized and validates your ability to protect networks and maintain operations during cyber-attacks effectively.

    Throughout this CND course, you will delve into various modules that cover essential topics such as network security controls, protocols, and devices. You will learn how to strengthen security infrastructures by effectively implementing intrusion detection and prevention systems and troubleshooting network problems. The course also provides in-depth training on implementing secure virtual private networks (VPNs) for organizations and identifying and mitigating threats to wireless networks.

    One of the key highlights of this CND training program is its alignment with global CND responsibilities and Department of Defense (DoD) job roles for system/network administrators. This ensures that the skills and knowledge you acquire are highly relevant and applicable in real-world scenarios. The course follows a vendor-neutral approach, allowing you to understand network security principles and practices comprehensively without being tied to any specific technology or platform.

    Upon completing this course, you will receive a voucher covering the certifying exam's cost. This allows you to schedule and take the exam remotely using a proctor function, providing flexibility and convenience in the certification process.

    By enrolling in this course and earning the CND certification, you will become proficient in network security, gain the necessary skills to protect networks from cyber breaches, and enhance your professional credibility in this high-demand field.

 

  • Certified Penetration Testing Professional (CPENT) (Voucher Included) 
  • Fee: $2,995.00
    Item Number: TesOILC207331
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended using the EC-Council's Certified Penetration Tester (CPENT) program.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 7 or later.
    • Mac: macOS 10.12 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The EC-Council's Certified Penetration Tester (CPENT) program is an engaging, informative, and expertly designed course that aims to help you master your Penetration Testing (pen-testing) skills. Recognized by the American Council on Education (ACE), this penetrating testing course offers a comprehensive curriculum that encompasses innovative techniques and methodologies for tackling real-world threat scenarios.

    In this penetration testing certification course, you will gain an understanding of a wide range of topics, such as how to write your own exploits, build custom tools, conduct advanced binaries exploitation, double pivot to access hidden networks and customize scripts/exploits to penetrate the most secure segments of a network. Pen testing is a practice that goes beyond ethical hacking by incorporating elements of exploitation, risk measurement, reporting, and executive communication.

    Securing advanced domains such as the Internet of Things (IoT), Operational Technology (OT), and Cloud has become increasingly more difficult for cybersecurity professionals as there is a shortage of expertise in this area, and CPENT ranges are dynamic and constantly evolving to reflect live networks' changing targets and technology. Expert penetration testers must continually develop their skills in advanced tools, techniques, and methodologies to conduct effective penetration tests in enterprise network environments and protect against current and future cybersecurity threats.

    Enrollment in this Pen Testing course includes a voucher that covers the cost of your certification exam upon course completion.

    Note: We continually add new targets and defenses throughout the lifetime of this CPENT penetration testing course to ensure its relevance.


    1. Introduction to Penetration Testing
    2. Penetration Testing Scoping and Engagement
    3. Open-Source Intelligence (OSINT)
    4. Social Engineering Penetration Testing
    5. Network Penetration Testing – External
    6. Network Penetration Testing– Internal
    7. Network Penetration Testing – Perimeter Devices
    8. Web Application Penetration Testing
    9. Wireless Penetration Testing
    10. IoT Penetration Testing
    11. OT/SCADA Penetration Testing
    12. Cloud Penetration Testing
    13. Binary Analysis and Exploitation
    14. Active Directory Penetration Testing
    15. Report Writing and Post Testing Actions

    What you will learn

    • Advanced Windows Attacks
    • Attacking IOT Systems
    • Writing Exploits: Advanced Binary Exploitation
    • Bypassing a Filtered Network
    • Pen testing Operational Technology (OT)
    • Access Hidden Networks with Pivoting
    • Double Pivoting
    • Privilege Escalation
    • Evading Defense Mechanisms
    • Attack Automation with Scripts
    • Weaponize Your Exploits
    • Write Professional Reports

    How you will benefit

    • Mapped with the NICE framework.
    • 100% methodology-based penetration testing program
    • Blends both manual and automated penetration testing approaches
    • Designed with the best service providers' most common penetration testing practices
    • Maps to all major Job Portals. Role Title: Penetration Tester and Security Analyst
    • Provides strong reporting writing guidance
    • Gives a real-world experience through an Advanced Penetration Testing Range
    • Provides candidates with standard Pen test for use in the field

    Kevin Cardwell

    Kevin Cardwell is an experienced instructor, technical editor, and author for computer forensics and hacking courses. He has conducted over 500 security assessments across the globe with expertise in finding weaknesses and determining ways clients can mitigate or limit the impact of these weaknesses.

    Kevin currently works as a freelance consultant and provides consulting services for companies throughout the world, and as an advisor to numerous government entities within the U.S., Middle East, Africa, Asia, and the U.K. He previously spent 22 years in the U.S. Navy and worked as both a software and systems engineer on a variety of Department of Defense projects.

    Kevin is the author of the Center for Advanced Security and Training (CAST) Advanced Network Defense and Advanced Penetration Testing courses and Building Virtual Pentesting Labs for Advanced Penetration Testing, Advanced Penetration Testing for Highly Secured Environments 2nd Edition and Backtrack: Testing Wireless Network Security. He is technical editor of the Learning Tree Course Penetration Testing Techniques and Computer Forensics. He has also presented at the Blackhat USA, Hacker Halted, ISSA, and TakeDownCon conferences, and more.

    Kevin received his Bachelor of Science in computer science from the National University in California and a Master of Science in software engineering from Southern Methodist University (SMU) in Texas. He holds the CEH, ECSA, LPT, and several other certifications.


    The EC-Council's Certified Penetration Tester (CPENT) program is an engaging, informative, and expertly designed course that aims to help you master your Penetration Testing (pen-testing) skills. Recognized by the American Council on Education (ACE), this penetrating testing course offers a comprehensive curriculum that encompasses innovative techniques and methodologies for tackling real-world threat scenarios.

    In this penetration testing certification course, you will gain an understanding of a wide range of topics, such as how to write your own exploits, build custom tools, conduct advanced binaries exploitation, double pivot to access hidden networks and customize scripts/exploits to penetrate the most secure segments of a network. Pen testing is a practice that goes beyond ethical hacking by incorporating elements of exploitation, risk measurement, reporting, and executive communication.

    Securing advanced domains such as the Internet of Things (IoT), Operational Technology (OT), and Cloud has become increasingly more difficult for cybersecurity professionals as there is a shortage of expertise in this area, and CPENT ranges are dynamic and constantly evolving to reflect live networks' changing targets and technology. Expert penetration testers must continually develop their skills in advanced tools, techniques, and methodologies to conduct effective penetration tests in enterprise network environments and protect against current and future cybersecurity threats.

    Enrollment in this Pen Testing course includes a voucher that covers the cost of your certification exam upon course completion.

    Note: We continually add new targets and defenses throughout the lifetime of this CPENT penetration testing course to ensure its relevance.

 

  • Certified Penetration Testing Professional (CPENT) (Voucher Included) 
  • Fee: $2,995.00
    Item Number: 252OILC207331
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended using the EC-Council's Certified Penetration Tester (CPENT) program.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 7 or later.
    • Mac: macOS 10.12 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The EC-Council's Certified Penetration Tester (CPENT) program is an engaging, informative, and expertly designed course that aims to help you master your Penetration Testing (pen-testing) skills. Recognized by the American Council on Education (ACE), this penetrating testing course offers a comprehensive curriculum that encompasses innovative techniques and methodologies for tackling real-world threat scenarios.

    In this penetration testing certification course, you will gain an understanding of a wide range of topics, such as how to write your own exploits, build custom tools, conduct advanced binaries exploitation, double pivot to access hidden networks and customize scripts/exploits to penetrate the most secure segments of a network. Pen testing is a practice that goes beyond ethical hacking by incorporating elements of exploitation, risk measurement, reporting, and executive communication.

    Securing advanced domains such as the Internet of Things (IoT), Operational Technology (OT), and Cloud has become increasingly more difficult for cybersecurity professionals as there is a shortage of expertise in this area, and CPENT ranges are dynamic and constantly evolving to reflect live networks' changing targets and technology. Expert penetration testers must continually develop their skills in advanced tools, techniques, and methodologies to conduct effective penetration tests in enterprise network environments and protect against current and future cybersecurity threats.

    Enrollment in this Pen Testing course includes a voucher that covers the cost of your certification exam upon course completion.

    Note: We continually add new targets and defenses throughout the lifetime of this CPENT penetration testing course to ensure its relevance.


    1. Introduction to Penetration Testing
    2. Penetration Testing Scoping and Engagement
    3. Open-Source Intelligence (OSINT)
    4. Social Engineering Penetration Testing
    5. Network Penetration Testing – External
    6. Network Penetration Testing– Internal
    7. Network Penetration Testing – Perimeter Devices
    8. Web Application Penetration Testing
    9. Wireless Penetration Testing
    10. IoT Penetration Testing
    11. OT/SCADA Penetration Testing
    12. Cloud Penetration Testing
    13. Binary Analysis and Exploitation
    14. Active Directory Penetration Testing
    15. Report Writing and Post Testing Actions

    What you will learn

    • Advanced Windows Attacks
    • Attacking IOT Systems
    • Writing Exploits: Advanced Binary Exploitation
    • Bypassing a Filtered Network
    • Pen testing Operational Technology (OT)
    • Access Hidden Networks with Pivoting
    • Double Pivoting
    • Privilege Escalation
    • Evading Defense Mechanisms
    • Attack Automation with Scripts
    • Weaponize Your Exploits
    • Write Professional Reports

    How you will benefit

    • Mapped with the NICE framework.
    • 100% methodology-based penetration testing program
    • Blends both manual and automated penetration testing approaches
    • Designed with the best service providers' most common penetration testing practices
    • Maps to all major Job Portals. Role Title: Penetration Tester and Security Analyst
    • Provides strong reporting writing guidance
    • Gives a real-world experience through an Advanced Penetration Testing Range
    • Provides candidates with standard Pen test for use in the field

    Kevin Cardwell

    Kevin Cardwell is an experienced instructor, technical editor, and author for computer forensics and hacking courses. He has conducted over 500 security assessments across the globe with expertise in finding weaknesses and determining ways clients can mitigate or limit the impact of these weaknesses.

    Kevin currently works as a freelance consultant and provides consulting services for companies throughout the world, and as an advisor to numerous government entities within the U.S., Middle East, Africa, Asia, and the U.K. He previously spent 22 years in the U.S. Navy and worked as both a software and systems engineer on a variety of Department of Defense projects.

    Kevin is the author of the Center for Advanced Security and Training (CAST) Advanced Network Defense and Advanced Penetration Testing courses and Building Virtual Pentesting Labs for Advanced Penetration Testing, Advanced Penetration Testing for Highly Secured Environments 2nd Edition and Backtrack: Testing Wireless Network Security. He is technical editor of the Learning Tree Course Penetration Testing Techniques and Computer Forensics. He has also presented at the Blackhat USA, Hacker Halted, ISSA, and TakeDownCon conferences, and more.

    Kevin received his Bachelor of Science in computer science from the National University in California and a Master of Science in software engineering from Southern Methodist University (SMU) in Texas. He holds the CEH, ECSA, LPT, and several other certifications.


    The EC-Council's Certified Penetration Tester (CPENT) program is an engaging, informative, and expertly designed course that aims to help you master your Penetration Testing (pen-testing) skills. Recognized by the American Council on Education (ACE), this penetrating testing course offers a comprehensive curriculum that encompasses innovative techniques and methodologies for tackling real-world threat scenarios.

    In this penetration testing certification course, you will gain an understanding of a wide range of topics, such as how to write your own exploits, build custom tools, conduct advanced binaries exploitation, double pivot to access hidden networks and customize scripts/exploits to penetrate the most secure segments of a network. Pen testing is a practice that goes beyond ethical hacking by incorporating elements of exploitation, risk measurement, reporting, and executive communication.

    Securing advanced domains such as the Internet of Things (IoT), Operational Technology (OT), and Cloud has become increasingly more difficult for cybersecurity professionals as there is a shortage of expertise in this area, and CPENT ranges are dynamic and constantly evolving to reflect live networks' changing targets and technology. Expert penetration testers must continually develop their skills in advanced tools, techniques, and methodologies to conduct effective penetration tests in enterprise network environments and protect against current and future cybersecurity threats.

    Enrollment in this Pen Testing course includes a voucher that covers the cost of your certification exam upon course completion.

    Note: We continually add new targets and defenses throughout the lifetime of this CPENT penetration testing course to ensure its relevance.

 

  • Cisco CCNP Collaboration: CLCOR & CLICA 
  • Fee: $3,295.00
    Item Number: TesOILC207671
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network security engineers and those looking to attain their CCNP Security certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The Implementing Cisco Collaboration Core Technologies (CLCOR) course provides you with skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications.

    In the Implementing Cisco Collaboration Applications (CLICA) course, you will learn collaboration applications, including single sign-on, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients.

    The course will also prepare you to sit for the Cisco CCNP Collaboration Core exam CLCOR and the Cisco CCNP Collaboration Concentration exam CLICA. These exams in tandem will earn you the CCNP Collaboration certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Overview of Infrastructure and Design
      1. Traditional Voice Versus Unified Voice
    2. Overview of Cisco Collaborations
      1. Overview of Cisco Collaborations Architecture
      2. Understanding Cisco IP Phones
      3. Voice Port Codec and DSP
      4. Introduction to Cisco Unified CM Deployment Model
      5. Overview of Installation & Hardware Platform
      6. Getting Started with GUI and Initial Configuration
      7. Overview and Configuration of SSL Certificate for Collaboration
      8. Deployment of SIP and SCCP Endpoint
      9. Deployment of Cisco Collaboration Features
    3. Voice Gateways & Trunks
      1. Deployment & Configurations of H323 Gateways and Trunks
      2. Deployment & Configurations of MGCP Gateway
      3. Deployment & Configurations of Call Routing
    4. Understanding & Configuring Call Routing
      1. Understanding Call Routing Digit Analysis and Calling Privileges
      2. Configure Globalized Call Routing in Cisco Unified CM
      3. Describe Mobile and Remote Access
    5. Cisco Unity Connection
      1. Overview and Configure these in Cisco Unity Connection
      2. Understanding Features in Cisco Unity Connection
    6. Describe Cisco Unified IM & P Protocols and Deployment
      1. Deploy Cisco Jabber on Premises
    7. Describe Problems That Can Lead to Poor Voice and Video Quality
    8. Troubleshooting Cisco Collaboration
      1. Troubleshooting Cisco Unity Connection Integration
    9. Single Sign-On (SSO) for Collaboration Applications
      1. Introduction to Single Sign-On
      2. Types of SSO
      3. Configuring SSO
      4. Introduction to SAML SSO
    10. Configuring Cisco Unified IM and Presence
      1. Introduction to Cisco Unity Connection
      2. Introduction to CUC multicluster operation
      3. Configuring on-prem Cisco Unified Instant Message and Presence
      4. Troubleshooting on prem Cisco Unified Instant Message and Presence
    11. Configuring Cisco Unity Connection and Cisco Unity Express
      1. Configuring call operation and rules in Cisco Unity Connection
      2. Troubleshoot Cisco Unity Connection
      3. Implementing toll fraud prevention
      4. Configuring Cisco Unity Express integration to Cisco Unified Communications Manager Express
    12. Application Clients
      1. Introduction to Cisco Unified Attendant Console
      2. Configuring service discovery
      3. Configuring Jabber client installation switches
      4. Troubleshooting Cisco Jabber

    What you will learn

    CLCOR

    • Describe the Cisco Collaboration solutions architecture
    • Compare the IP Phone signaling protocols of Session Initiation Protocol (SIP), H323, Media Gateway Control Protocol (MGCP), and Skinny Client Control Protocol (SCCP)
    • Integrate and troubleshoot Cisco Unified Communications Manager with LDAP for user synchronization and user authentication
    • Implement Cisco Unified Communications Manager provisioning features
    • Describe the different codecs and how they are used to transform analog voice into digital streams
    • Describe a dial plan, and explain call routing in Cisco Unified Communications Manager
    • Implement Public Switched Telephone Network (PSTN) access using MGCP gateways
    • Implement a Cisco gateway for PSTN access
    • Configure calling privileges in Cisco Unified Communications Manager
    • Implement toll fraud prevention
    • Implement globalized call routing within a Cisco Unified Communications Manager cluster
    • Implement and troubleshoot media resources in Cisco Unified Communications Manager
    • Describe Cisco Instant Messaging and Presence, including call flows and protocols
    • Describe and configure endpoints and commonly required features
    • Configure and troubleshoot Cisco Unity Connection integration
    • Configure and troubleshoot Cisco Unity Connection call handlers
    • Describe how Mobile Remote Access (MRA) is used to allow endpoints to work from outside the company
    • Analyze traffic patterns and quality issues in converged IP networks supporting voice, video, and data traffic
    • Define QoS and its models
    • Implement classification and marking
    • Configure classification and marking options on Cisco Catalyst® switches

    CLICA

    • Configure and utilize the Single Sign-On application
    • Describe Cisco Unity Connection
    • Describe the CUC multicluster operation
    • Configure on-prem Cisco Unified Instant Message and Presence
    • Configure call operation and rules in Unity Connection
    • Implement toll fraud prevention
    • Describe Cisco Unified Attendant Console
    • Configure and troubleshoot Cisco Jabber

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Collaboration core exam: 350-801 CLCOR: Implementing and Operating Cisco Collaboration Core Technologies
    • You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-810 CLICA: Implementing Cisco Collaboration Applications

    Faisal Khan

    Faisal Khan is an expert in Cisco telephony and collaboration and the world of AWS, holding many certifications with their cloud technologies. These credentials include Cisco CCIE Collaboration, Cisco CCNP, Cisco CCNA, and AWS Solutions Architect.

    In addition to his certifications, Faisal has expert knowledge in the following areas: Cisco Collaboration, Amazon AWS, Cisco UCCE/UCCX, and Cisco networking.

    Faisal is deeply interested in understanding technologies at the most granular level.


    The Implementing Cisco Collaboration Core Technologies (CLCOR) course provides you with skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications.

    In the Implementing Cisco Collaboration Applications (CLICA) course, you will learn collaboration applications, including single sign-on, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients.

    The course will also prepare you to sit for the Cisco CCNP Collaboration Core exam CLCOR and the Cisco CCNP Collaboration Concentration exam CLICA. These exams in tandem will earn you the CCNP Collaboration certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Collaboration: CLCOR & CLICA 
  • Fee: $3,295.00
    Item Number: 252OILC207671
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network security engineers and those looking to attain their CCNP Security certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The Implementing Cisco Collaboration Core Technologies (CLCOR) course provides you with skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications.

    In the Implementing Cisco Collaboration Applications (CLICA) course, you will learn collaboration applications, including single sign-on, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients.

    The course will also prepare you to sit for the Cisco CCNP Collaboration Core exam CLCOR and the Cisco CCNP Collaboration Concentration exam CLICA. These exams in tandem will earn you the CCNP Collaboration certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Overview of Infrastructure and Design
      1. Traditional Voice Versus Unified Voice
    2. Overview of Cisco Collaborations
      1. Overview of Cisco Collaborations Architecture
      2. Understanding Cisco IP Phones
      3. Voice Port Codec and DSP
      4. Introduction to Cisco Unified CM Deployment Model
      5. Overview of Installation & Hardware Platform
      6. Getting Started with GUI and Initial Configuration
      7. Overview and Configuration of SSL Certificate for Collaboration
      8. Deployment of SIP and SCCP Endpoint
      9. Deployment of Cisco Collaboration Features
    3. Voice Gateways & Trunks
      1. Deployment & Configurations of H323 Gateways and Trunks
      2. Deployment & Configurations of MGCP Gateway
      3. Deployment & Configurations of Call Routing
    4. Understanding & Configuring Call Routing
      1. Understanding Call Routing Digit Analysis and Calling Privileges
      2. Configure Globalized Call Routing in Cisco Unified CM
      3. Describe Mobile and Remote Access
    5. Cisco Unity Connection
      1. Overview and Configure these in Cisco Unity Connection
      2. Understanding Features in Cisco Unity Connection
    6. Describe Cisco Unified IM & P Protocols and Deployment
      1. Deploy Cisco Jabber on Premises
    7. Describe Problems That Can Lead to Poor Voice and Video Quality
    8. Troubleshooting Cisco Collaboration
      1. Troubleshooting Cisco Unity Connection Integration
    9. Single Sign-On (SSO) for Collaboration Applications
      1. Introduction to Single Sign-On
      2. Types of SSO
      3. Configuring SSO
      4. Introduction to SAML SSO
    10. Configuring Cisco Unified IM and Presence
      1. Introduction to Cisco Unity Connection
      2. Introduction to CUC multicluster operation
      3. Configuring on-prem Cisco Unified Instant Message and Presence
      4. Troubleshooting on prem Cisco Unified Instant Message and Presence
    11. Configuring Cisco Unity Connection and Cisco Unity Express
      1. Configuring call operation and rules in Cisco Unity Connection
      2. Troubleshoot Cisco Unity Connection
      3. Implementing toll fraud prevention
      4. Configuring Cisco Unity Express integration to Cisco Unified Communications Manager Express
    12. Application Clients
      1. Introduction to Cisco Unified Attendant Console
      2. Configuring service discovery
      3. Configuring Jabber client installation switches
      4. Troubleshooting Cisco Jabber

    What you will learn

    CLCOR

    • Describe the Cisco Collaboration solutions architecture
    • Compare the IP Phone signaling protocols of Session Initiation Protocol (SIP), H323, Media Gateway Control Protocol (MGCP), and Skinny Client Control Protocol (SCCP)
    • Integrate and troubleshoot Cisco Unified Communications Manager with LDAP for user synchronization and user authentication
    • Implement Cisco Unified Communications Manager provisioning features
    • Describe the different codecs and how they are used to transform analog voice into digital streams
    • Describe a dial plan, and explain call routing in Cisco Unified Communications Manager
    • Implement Public Switched Telephone Network (PSTN) access using MGCP gateways
    • Implement a Cisco gateway for PSTN access
    • Configure calling privileges in Cisco Unified Communications Manager
    • Implement toll fraud prevention
    • Implement globalized call routing within a Cisco Unified Communications Manager cluster
    • Implement and troubleshoot media resources in Cisco Unified Communications Manager
    • Describe Cisco Instant Messaging and Presence, including call flows and protocols
    • Describe and configure endpoints and commonly required features
    • Configure and troubleshoot Cisco Unity Connection integration
    • Configure and troubleshoot Cisco Unity Connection call handlers
    • Describe how Mobile Remote Access (MRA) is used to allow endpoints to work from outside the company
    • Analyze traffic patterns and quality issues in converged IP networks supporting voice, video, and data traffic
    • Define QoS and its models
    • Implement classification and marking
    • Configure classification and marking options on Cisco Catalyst® switches

    CLICA

    • Configure and utilize the Single Sign-On application
    • Describe Cisco Unity Connection
    • Describe the CUC multicluster operation
    • Configure on-prem Cisco Unified Instant Message and Presence
    • Configure call operation and rules in Unity Connection
    • Implement toll fraud prevention
    • Describe Cisco Unified Attendant Console
    • Configure and troubleshoot Cisco Jabber

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Collaboration core exam: 350-801 CLCOR: Implementing and Operating Cisco Collaboration Core Technologies
    • You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-810 CLICA: Implementing Cisco Collaboration Applications

    Faisal Khan

    Faisal Khan is an expert in Cisco telephony and collaboration and the world of AWS, holding many certifications with their cloud technologies. These credentials include Cisco CCIE Collaboration, Cisco CCNP, Cisco CCNA, and AWS Solutions Architect.

    In addition to his certifications, Faisal has expert knowledge in the following areas: Cisco Collaboration, Amazon AWS, Cisco UCCE/UCCX, and Cisco networking.

    Faisal is deeply interested in understanding technologies at the most granular level.


    The Implementing Cisco Collaboration Core Technologies (CLCOR) course provides you with skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications.

    In the Implementing Cisco Collaboration Applications (CLICA) course, you will learn collaboration applications, including single sign-on, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients.

    The course will also prepare you to sit for the Cisco CCNP Collaboration Core exam CLCOR and the Cisco CCNP Collaboration Concentration exam CLICA. These exams in tandem will earn you the CCNP Collaboration certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Collaboration: CLCOR & CLICA (Vouchers Included) 
  • Fee: $3,995.00
    Item Number: TesOILC207681
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network security engineers and those looking to attain their CCNP Security certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The Implementing Cisco Collaboration Core Technologies (CLCOR) course provides you with skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications.

    In the Implementing Cisco Collaboration Applications (CLICA) course, you will learn collaboration applications, including single sign-on, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients.

    The course will also prepare you to sit for the Cisco CCNP Collaboration Core exam CLCOR and the Cisco CCNP Collaboration Concentration exam CLICA. These exams in tandem will earn you the CCNP Collaboration certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Overview of Infrastructure and Design
      1. Traditional Voice Versus Unified Voice
    2. Overview of Cisco Collaborations
      1. Overview of Cisco Collaborations Architecture
      2. Understanding Cisco IP Phones
      3. Voice Port Codec and DSP
      4. Introduction to Cisco Unified CM Deployment Model
      5. Overview of Installation & Hardware Platform
      6. Getting Started with GUI and Initial Configuration
      7. Overview and Configuration of SSL Certificate for Collaboration
      8. Deployment of SIP and SCCP Endpoint
      9. Deployment of Cisco Collaboration Features
    3. Voice Gateways & Trunks
      1. Deployment & Configurations of H323 Gateways and Trunks
      2. Deployment & Configurations of MGCP Gateway
      3. Deployment & Configurations of Call Routing
    4. Understanding & Configuring Call Routing
      1. Understanding Call Routing Digit Analysis and Calling Privileges
      2. Configure Globalized Call Routing in Cisco Unified CM
      3. Describe Mobile and Remote Access
    5. Cisco Unity Connection
      1. Overview and Configure these in Cisco Unity Connection
      2. Understanding Features in Cisco Unity Connection
    6. Describe Cisco Unified IM & P Protocols and Deployment
      1. Deploy Cisco Jabber on Premises
    7. Describe Problems That Can Lead to Poor Voice and Video Quality
    8. Troubleshooting Cisco Collaboration
      1. Troubleshooting Cisco Unity Connection Integration
    9. Single Sign-On (SSO) for Collaboration Applications
      1. Introduction to Single Sign-On
      2. Types of SSO
      3. Configuring SSO
      4. Introduction to SAML SSO
    10. Configuring Cisco Unified IM and Presence
      1. Introduction to Cisco Unity Connection
      2. Introduction to CUC multicluster operation
      3. Configuring on-prem Cisco Unified Instant Message and Presence
      4. Troubleshooting on prem Cisco Unified Instant Message and Presence
    11. Configuring Cisco Unity Connection and Cisco Unity Express
      1. Configuring call operation and rules in Cisco Unity Connection
      2. Troubleshoot Cisco Unity Connection
      3. Implementing toll fraud prevention
      4. Configuring Cisco Unity Express integration to Cisco Unified Communications Manager Express
    12. Application Clients
      1. Introduction to Cisco Unified Attendant Console
      2. Configuring service discovery
      3. Configuring Jabber client installation switches
      4. Troubleshooting Cisco Jabber

    What you will learn

    CLCOR

    • Describe the Cisco Collaboration solutions architecture
    • Compare the IP Phone signaling protocols of Session Initiation Protocol (SIP), H323, Media Gateway Control Protocol (MGCP), and Skinny Client Control Protocol (SCCP)
    • Integrate and troubleshoot Cisco Unified Communications Manager with LDAP for user synchronization and user authentication
    • Implement Cisco Unified Communications Manager provisioning features
    • Describe the different codecs and how they are used to transform analog voice into digital streams
    • Describe a dial plan, and explain call routing in Cisco Unified Communications Manager
    • Implement Public Switched Telephone Network (PSTN) access using MGCP gateways
    • Implement a Cisco gateway for PSTN access
    • Configure calling privileges in Cisco Unified Communications Manager
    • Implement toll fraud prevention
    • Implement globalized call routing within a Cisco Unified Communications Manager cluster
    • Implement and troubleshoot media resources in Cisco Unified Communications Manager
    • Describe Cisco Instant Messaging and Presence, including call flows and protocols
    • Describe and configure endpoints and commonly required features
    • Configure and troubleshoot Cisco Unity Connection integration
    • Configure and troubleshoot Cisco Unity Connection call handlers
    • Describe how Mobile Remote Access (MRA) is used to allow endpoints to work from outside the company
    • Analyze traffic patterns and quality issues in converged IP networks supporting voice, video, and data traffic
    • Define QoS and its models
    • Implement classification and marking
    • Configure classification and marking options on Cisco Catalyst® switches

    CLICA

    • Configure and utilize the Single Sign-On application
    • Describe Cisco Unity Connection
    • Describe the CUC multicluster operation
    • Configure on-prem Cisco Unified Instant Message and Presence
    • Configure call operation and rules in Unity Connection
    • Implement toll fraud prevention
    • Describe Cisco Unified Attendant Console
    • Configure and troubleshoot Cisco Jabber

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Collaboration core exam: 350-801 CLCOR: Implementing and Operating Cisco Collaboration Core Technologies
    • You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-810 CLICA: Implementing Cisco Collaboration Applications

    Faisal Khan

    Faisal Khan is an expert in Cisco telephony and collaboration and the world of AWS, holding many certifications with their cloud technologies. These credentials include Cisco CCIE Collaboration, Cisco CCNP, Cisco CCNA, and AWS Solutions Architect.

    In addition to his certifications, Faisal has expert knowledge in the following areas: Cisco Collaboration, Amazon AWS, Cisco UCCE/UCCX, and Cisco networking.

    Faisal is deeply interested in understanding technologies at the most granular level.


    The Implementing Cisco Collaboration Core Technologies (CLCOR) course provides you with skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications.

    In the Implementing Cisco Collaboration Applications (CLICA) course, you will learn collaboration applications, including single sign-on, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients.

    The course will also prepare you to sit for the Cisco CCNP Collaboration Core exam CLCOR and the Cisco CCNP Collaboration Concentration exam CLICA. These exams in tandem will earn you the CCNP Collaboration certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Collaboration: CLCOR & CLICA (Vouchers Included) 
  • Fee: $3,995.00
    Item Number: 252OILC207681
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network security engineers and those looking to attain their CCNP Security certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The Implementing Cisco Collaboration Core Technologies (CLCOR) course provides you with skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications.

    In the Implementing Cisco Collaboration Applications (CLICA) course, you will learn collaboration applications, including single sign-on, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients.

    The course will also prepare you to sit for the Cisco CCNP Collaboration Core exam CLCOR and the Cisco CCNP Collaboration Concentration exam CLICA. These exams in tandem will earn you the CCNP Collaboration certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Overview of Infrastructure and Design
      1. Traditional Voice Versus Unified Voice
    2. Overview of Cisco Collaborations
      1. Overview of Cisco Collaborations Architecture
      2. Understanding Cisco IP Phones
      3. Voice Port Codec and DSP
      4. Introduction to Cisco Unified CM Deployment Model
      5. Overview of Installation & Hardware Platform
      6. Getting Started with GUI and Initial Configuration
      7. Overview and Configuration of SSL Certificate for Collaboration
      8. Deployment of SIP and SCCP Endpoint
      9. Deployment of Cisco Collaboration Features
    3. Voice Gateways & Trunks
      1. Deployment & Configurations of H323 Gateways and Trunks
      2. Deployment & Configurations of MGCP Gateway
      3. Deployment & Configurations of Call Routing
    4. Understanding & Configuring Call Routing
      1. Understanding Call Routing Digit Analysis and Calling Privileges
      2. Configure Globalized Call Routing in Cisco Unified CM
      3. Describe Mobile and Remote Access
    5. Cisco Unity Connection
      1. Overview and Configure these in Cisco Unity Connection
      2. Understanding Features in Cisco Unity Connection
    6. Describe Cisco Unified IM & P Protocols and Deployment
      1. Deploy Cisco Jabber on Premises
    7. Describe Problems That Can Lead to Poor Voice and Video Quality
    8. Troubleshooting Cisco Collaboration
      1. Troubleshooting Cisco Unity Connection Integration
    9. Single Sign-On (SSO) for Collaboration Applications
      1. Introduction to Single Sign-On
      2. Types of SSO
      3. Configuring SSO
      4. Introduction to SAML SSO
    10. Configuring Cisco Unified IM and Presence
      1. Introduction to Cisco Unity Connection
      2. Introduction to CUC multicluster operation
      3. Configuring on-prem Cisco Unified Instant Message and Presence
      4. Troubleshooting on prem Cisco Unified Instant Message and Presence
    11. Configuring Cisco Unity Connection and Cisco Unity Express
      1. Configuring call operation and rules in Cisco Unity Connection
      2. Troubleshoot Cisco Unity Connection
      3. Implementing toll fraud prevention
      4. Configuring Cisco Unity Express integration to Cisco Unified Communications Manager Express
    12. Application Clients
      1. Introduction to Cisco Unified Attendant Console
      2. Configuring service discovery
      3. Configuring Jabber client installation switches
      4. Troubleshooting Cisco Jabber

    What you will learn

    CLCOR

    • Describe the Cisco Collaboration solutions architecture
    • Compare the IP Phone signaling protocols of Session Initiation Protocol (SIP), H323, Media Gateway Control Protocol (MGCP), and Skinny Client Control Protocol (SCCP)
    • Integrate and troubleshoot Cisco Unified Communications Manager with LDAP for user synchronization and user authentication
    • Implement Cisco Unified Communications Manager provisioning features
    • Describe the different codecs and how they are used to transform analog voice into digital streams
    • Describe a dial plan, and explain call routing in Cisco Unified Communications Manager
    • Implement Public Switched Telephone Network (PSTN) access using MGCP gateways
    • Implement a Cisco gateway for PSTN access
    • Configure calling privileges in Cisco Unified Communications Manager
    • Implement toll fraud prevention
    • Implement globalized call routing within a Cisco Unified Communications Manager cluster
    • Implement and troubleshoot media resources in Cisco Unified Communications Manager
    • Describe Cisco Instant Messaging and Presence, including call flows and protocols
    • Describe and configure endpoints and commonly required features
    • Configure and troubleshoot Cisco Unity Connection integration
    • Configure and troubleshoot Cisco Unity Connection call handlers
    • Describe how Mobile Remote Access (MRA) is used to allow endpoints to work from outside the company
    • Analyze traffic patterns and quality issues in converged IP networks supporting voice, video, and data traffic
    • Define QoS and its models
    • Implement classification and marking
    • Configure classification and marking options on Cisco Catalyst® switches

    CLICA

    • Configure and utilize the Single Sign-On application
    • Describe Cisco Unity Connection
    • Describe the CUC multicluster operation
    • Configure on-prem Cisco Unified Instant Message and Presence
    • Configure call operation and rules in Unity Connection
    • Implement toll fraud prevention
    • Describe Cisco Unified Attendant Console
    • Configure and troubleshoot Cisco Jabber

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Collaboration core exam: 350-801 CLCOR: Implementing and Operating Cisco Collaboration Core Technologies
    • You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-810 CLICA: Implementing Cisco Collaboration Applications

    Faisal Khan

    Faisal Khan is an expert in Cisco telephony and collaboration and the world of AWS, holding many certifications with their cloud technologies. These credentials include Cisco CCIE Collaboration, Cisco CCNP, Cisco CCNA, and AWS Solutions Architect.

    In addition to his certifications, Faisal has expert knowledge in the following areas: Cisco Collaboration, Amazon AWS, Cisco UCCE/UCCX, and Cisco networking.

    Faisal is deeply interested in understanding technologies at the most granular level.


    The Implementing Cisco Collaboration Core Technologies (CLCOR) course provides you with skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications.

    In the Implementing Cisco Collaboration Applications (CLICA) course, you will learn collaboration applications, including single sign-on, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients.

    The course will also prepare you to sit for the Cisco CCNP Collaboration Core exam CLCOR and the Cisco CCNP Collaboration Concentration exam CLICA. These exams in tandem will earn you the CCNP Collaboration certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Enterprise: ENCOR & ENARSI 
  • Fee: $3,295.00
    Item Number: TesOILC207571
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    The CCNP Enterprise: ENARSI provides you with the knowledge of implementation and troubleshooting for advanced routing technologies and services. In this course, you will learn about Layer 3, VPN services, infrastructure security, infrastructure services, and infrastructure automation.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENARSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview
      1. Introduction to ENCOR Course and Exam Objectives
    2. Campus Architecture and Device Fundamentals
      1. Campus Architecture
      2. Device Architecture
    3. Access and Distribution Layer Features and Services
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Routing
      1. Routing Introduction
      2. Dynamic Routing Overview
      3. OSPFv2 Overview, Packets, States, and Design
      4. OSPFv2 Configuration and Verification
      5. Text BoxOSPFv2 Network Types and DR/BDR Election
      6. OSPFv2 LSAs and Metric
      7. OSPFv2 Summarization
      8. OSPFv2 Filtering
      9. EBGP Overview, Configuration and Verification
      10. Text BoxShapeBGP Best Path Selection Process
      11. Network Address Translation (NAT)
      12. Multicast Protocol Overview
    5. VPN's
      1. GRE Tunnel Configuration and Verification
      2. IPSec Introduction
      3. IPSec Site-to-Site VPN Tunnel Configuration and Verification
      4. GRE over IPSec Tunnel Configuration and Verification
      5. Virtual Routing and Forwarding (VRF)
    6. Management Protocols and Services
      1. NTP Configuration and Verification
      2. Syslog Configuration and Verification
      3. Debugs, Conditional Debugs, Ping, and Traceroute
      4. SNMP Configuration and Verification
      5. NetFlow / Flexible NetFlow Configuration and Verification
      6. SPAN, RSPAN, ERSPAN Configuration and Verification
      7. IPSLA Configuration and Verification
      8. Quality of Service (QoS) Overview
      9. Embedded Event Manager (EEM) Configuration
    7. Security
      1. Device Access, Authentication Configuration and Verification
      2. AAA Configuration and Verification
      3. Access Control Lists (ACLs)
      4. Control Plane Policing (CoPP)
      5. Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
    8. Next Generation Campus Networks
      1. SD-Access
      2. LISP and VXLAN
      3. SD-WAN
      4. DNA Center Overview
      5. Data Formats
      6. Data Modeling
      7. NetConf / RestConf
      8. Python Exam Prep
      9. ShapeChef, Puppet, Ansible, SaltStack
    9. LAN Essentials
    10. Course Overview
      1. Introduction to ENARSI Course and Exam Objectives
    11. EIGRPv4, EIGRPv6 and Named EIGRP
      1. EIGRPv4 Configuration and Verification
      2. EIGRPv4 Security Features
      3. EIGRPv4 Metric and Path Selection
      4. EIGRPv4 Convergence
      5. EIGRPv4 Summarization
      6. EIGRP Route Manipulation
      7. EIGRPv4 Troubleshooting
      8. EIGRPv6
      9. Named EIGRP
    12. OSPFv2, OSPFv3, OSPF Address-Families
      1. OSPFv2 Design, Configuration and Verification
      2. OSPFv2 Security Features
      3. OSPFv2 Packets and States
      4. OSPFv2 LSAs
      5. OSPFv2 Metric
      6. OSPFv2 Network Types and DR/BDR Elections
      7. OSPFv2 Summarization and Area Types
      8. OSPFv2 Filtering, Virtual-Links, and Convergence
      9. OSPFv2 Troubleshooting
      10. OSPFv3
      11. OSPF Address-Families
    13. Multi-Protocol BGPv4
      1. BGP Core Operations
      2. BGP Configuration and Verification
      3. BGP Summarization
      4. BGP Filtering
      5. BGP Peer Groups and Route Reflectors
      6. BGP Path Selection Process and Attribute Manipulation
      7. Troubleshooting BGP
      8. BGP for IPv6
    14. Redistribution and Advanced Routing Control
      1. Redistribution Configuration and Verification
      2. Redistribution Filtering
      3. Redistribution Challenges
      4. Redistribution for IPv6
      5. Policy Based Routing Configuration and Verification
      6. IPSLA Configuration and Verification
    15. VPNs
      1. VRF-Lite Configuration and Verification
      2. MPLS Overview
      3. MPLS L3 VPNS
      4. GRE Review
      5. DMVPN Configuration and Verification
      6. DMPVN IPSec Configuration and Verification
    16. Management Protocol and Services
      1. Device Access and Authentication Configuration and Verification
      2. IOS Management Tools
      3. Syslog Configuration and Verification
      4. SNMP Configuration and Verification
      5. NetFlow and Flexible NetFlow Configuration and Verification
      6. DHCPv4 and DHCPv6 for Cisco IOS
    17. Device Security
      1. uRPF Configuration and Verification
      2. CoPP Configuration and Verification
      3. IPv4 ACL Review
      4. IPv6 ACL Review
      5. IPv6 First Hop Security Features

    What you will learn

    • ENCOR
      • Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more
      • Advanced Routing
      • Configure and verify device management
      • Cisco DNA Center
      • Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall
    • ENARSI
      • Route Maps
      • Redistribution
      • Policy-Based Routing
      • VRF-Lite
      • eBGP and iBGP
      • DMVPNs
      • IOS AAA
      • DCHP for IPv4 and IPv6
      • IPv4 and IPv6 ACL's

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
    • You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-410 ENARSI: Implementing Cisco Enterprise Advanced Routing and Services

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.

    Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.

    In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    The CCNP Enterprise: ENARSI provides you with the knowledge of implementation and troubleshooting for advanced routing technologies and services. In this course, you will learn about Layer 3, VPN services, infrastructure security, infrastructure services, and infrastructure automation.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENARSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Enterprise: ENCOR & ENARSI 
  • Fee: $3,295.00
    Item Number: 252OILC207571
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    The CCNP Enterprise: ENARSI provides you with the knowledge of implementation and troubleshooting for advanced routing technologies and services. In this course, you will learn about Layer 3, VPN services, infrastructure security, infrastructure services, and infrastructure automation.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENARSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview
      1. Introduction to ENCOR Course and Exam Objectives
    2. Campus Architecture and Device Fundamentals
      1. Campus Architecture
      2. Device Architecture
    3. Access and Distribution Layer Features and Services
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Routing
      1. Routing Introduction
      2. Dynamic Routing Overview
      3. OSPFv2 Overview, Packets, States, and Design
      4. OSPFv2 Configuration and Verification
      5. Text BoxOSPFv2 Network Types and DR/BDR Election
      6. OSPFv2 LSAs and Metric
      7. OSPFv2 Summarization
      8. OSPFv2 Filtering
      9. EBGP Overview, Configuration and Verification
      10. Text BoxShapeBGP Best Path Selection Process
      11. Network Address Translation (NAT)
      12. Multicast Protocol Overview
    5. VPN's
      1. GRE Tunnel Configuration and Verification
      2. IPSec Introduction
      3. IPSec Site-to-Site VPN Tunnel Configuration and Verification
      4. GRE over IPSec Tunnel Configuration and Verification
      5. Virtual Routing and Forwarding (VRF)
    6. Management Protocols and Services
      1. NTP Configuration and Verification
      2. Syslog Configuration and Verification
      3. Debugs, Conditional Debugs, Ping, and Traceroute
      4. SNMP Configuration and Verification
      5. NetFlow / Flexible NetFlow Configuration and Verification
      6. SPAN, RSPAN, ERSPAN Configuration and Verification
      7. IPSLA Configuration and Verification
      8. Quality of Service (QoS) Overview
      9. Embedded Event Manager (EEM) Configuration
    7. Security
      1. Device Access, Authentication Configuration and Verification
      2. AAA Configuration and Verification
      3. Access Control Lists (ACLs)
      4. Control Plane Policing (CoPP)
      5. Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
    8. Next Generation Campus Networks
      1. SD-Access
      2. LISP and VXLAN
      3. SD-WAN
      4. DNA Center Overview
      5. Data Formats
      6. Data Modeling
      7. NetConf / RestConf
      8. Python Exam Prep
      9. ShapeChef, Puppet, Ansible, SaltStack
    9. LAN Essentials
    10. Course Overview
      1. Introduction to ENARSI Course and Exam Objectives
    11. EIGRPv4, EIGRPv6 and Named EIGRP
      1. EIGRPv4 Configuration and Verification
      2. EIGRPv4 Security Features
      3. EIGRPv4 Metric and Path Selection
      4. EIGRPv4 Convergence
      5. EIGRPv4 Summarization
      6. EIGRP Route Manipulation
      7. EIGRPv4 Troubleshooting
      8. EIGRPv6
      9. Named EIGRP
    12. OSPFv2, OSPFv3, OSPF Address-Families
      1. OSPFv2 Design, Configuration and Verification
      2. OSPFv2 Security Features
      3. OSPFv2 Packets and States
      4. OSPFv2 LSAs
      5. OSPFv2 Metric
      6. OSPFv2 Network Types and DR/BDR Elections
      7. OSPFv2 Summarization and Area Types
      8. OSPFv2 Filtering, Virtual-Links, and Convergence
      9. OSPFv2 Troubleshooting
      10. OSPFv3
      11. OSPF Address-Families
    13. Multi-Protocol BGPv4
      1. BGP Core Operations
      2. BGP Configuration and Verification
      3. BGP Summarization
      4. BGP Filtering
      5. BGP Peer Groups and Route Reflectors
      6. BGP Path Selection Process and Attribute Manipulation
      7. Troubleshooting BGP
      8. BGP for IPv6
    14. Redistribution and Advanced Routing Control
      1. Redistribution Configuration and Verification
      2. Redistribution Filtering
      3. Redistribution Challenges
      4. Redistribution for IPv6
      5. Policy Based Routing Configuration and Verification
      6. IPSLA Configuration and Verification
    15. VPNs
      1. VRF-Lite Configuration and Verification
      2. MPLS Overview
      3. MPLS L3 VPNS
      4. GRE Review
      5. DMVPN Configuration and Verification
      6. DMPVN IPSec Configuration and Verification
    16. Management Protocol and Services
      1. Device Access and Authentication Configuration and Verification
      2. IOS Management Tools
      3. Syslog Configuration and Verification
      4. SNMP Configuration and Verification
      5. NetFlow and Flexible NetFlow Configuration and Verification
      6. DHCPv4 and DHCPv6 for Cisco IOS
    17. Device Security
      1. uRPF Configuration and Verification
      2. CoPP Configuration and Verification
      3. IPv4 ACL Review
      4. IPv6 ACL Review
      5. IPv6 First Hop Security Features

    What you will learn

    • ENCOR
      • Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more
      • Advanced Routing
      • Configure and verify device management
      • Cisco DNA Center
      • Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall
    • ENARSI
      • Route Maps
      • Redistribution
      • Policy-Based Routing
      • VRF-Lite
      • eBGP and iBGP
      • DMVPNs
      • IOS AAA
      • DCHP for IPv4 and IPv6
      • IPv4 and IPv6 ACL's

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
    • You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-410 ENARSI: Implementing Cisco Enterprise Advanced Routing and Services

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.

    Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.

    In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    The CCNP Enterprise: ENARSI provides you with the knowledge of implementation and troubleshooting for advanced routing technologies and services. In this course, you will learn about Layer 3, VPN services, infrastructure security, infrastructure services, and infrastructure automation.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENARSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Enterprise: ENCOR & ENARSI (Vouchers Included) 
  • Fee: $3,995.00
    Item Number: TesOILC207581
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    The CCNP Enterprise: ENARSI provides you with the knowledge of implementation and troubleshooting for advanced routing technologies and services. In this course, you will learn about Layer 3, VPN services, infrastructure security, infrastructure services, and infrastructure automation.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENARSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview
      1. Introduction to ENCOR Course and Exam Objectives
    2. Campus Architecture and Device Fundamentals
      1. Campus Architecture
      2. Device Architecture
    3. Access and Distribution Layer Features and Services
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Routing
      1. Routing Introduction
      2. Dynamic Routing Overview
      3. OSPFv2 Overview, Packets, States, and Design
      4. OSPFv2 Configuration and Verification
      5. Text BoxOSPFv2 Network Types and DR/BDR Election
      6. OSPFv2 LSAs and Metric
      7. OSPFv2 Summarization
      8. OSPFv2 Filtering
      9. EBGP Overview, Configuration and Verification
      10. Text BoxShapeBGP Best Path Selection Process
      11. Network Address Translation (NAT)
      12. Multicast Protocol Overview
    5. VPN's
      1. GRE Tunnel Configuration and Verification
      2. IPSec Introduction
      3. IPSec Site-to-Site VPN Tunnel Configuration and Verification
      4. GRE over IPSec Tunnel Configuration and Verification
      5. Virtual Routing and Forwarding (VRF)
    6. Management Protocols and Services
      1. NTP Configuration and Verification
      2. Syslog Configuration and Verification
      3. Debugs, Conditional Debugs, Ping, and Traceroute
      4. SNMP Configuration and Verification
      5. NetFlow / Flexible NetFlow Configuration and Verification
      6. SPAN, RSPAN, ERSPAN Configuration and Verification
      7. IPSLA Configuration and Verification
      8. Quality of Service (QoS) Overview
      9. Embedded Event Manager (EEM) Configuration
    7. Security
      1. Device Access, Authentication Configuration and Verification
      2. AAA Configuration and Verification
      3. Access Control Lists (ACLs)
      4. Control Plane Policing (CoPP)
      5. Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
    8. Next Generation Campus Networks
      1. SD-Access
      2. LISP and VXLAN
      3. SD-WAN
      4. DNA Center Overview
      5. Data Formats
      6. Data Modeling
      7. NetConf / RestConf
      8. Python Exam Prep
      9. ShapeChef, Puppet, Ansible, SaltStack
    9. LAN Essentials
    10. Course Overview
      1. Introduction to ENARSI Course and Exam Objectives
    11. EIGRPv4, EIGRPv6 and Named EIGRP
      1. EIGRPv4 Configuration and Verification
      2. EIGRPv4 Security Features
      3. EIGRPv4 Metric and Path Selection
      4. EIGRPv4 Convergence
      5. EIGRPv4 Summarization
      6. EIGRP Route Manipulation
      7. EIGRPv4 Troubleshooting
      8. EIGRPv6
      9. Named EIGRP
    12. OSPFv2, OSPFv3, OSPF Address-Families
      1. OSPFv2 Design, Configuration and Verification
      2. OSPFv2 Security Features
      3. OSPFv2 Packets and States
      4. OSPFv2 LSAs
      5. OSPFv2 Metric
      6. OSPFv2 Network Types and DR/BDR Elections
      7. OSPFv2 Summarization and Area Types
      8. OSPFv2 Filtering, Virtual-Links, and Convergence
      9. OSPFv2 Troubleshooting
      10. OSPFv3
      11. OSPF Address-Families
    13. Multi-Protocol BGPv4
      1. BGP Core Operations
      2. BGP Configuration and Verification
      3. BGP Summarization
      4. BGP Filtering
      5. BGP Peer Groups and Route Reflectors
      6. BGP Path Selection Process and Attribute Manipulation
      7. Troubleshooting BGP
      8. BGP for IPv6
    14. Redistribution and Advanced Routing Control
      1. Redistribution Configuration and Verification
      2. Redistribution Filtering
      3. Redistribution Challenges
      4. Redistribution for IPv6
      5. Policy Based Routing Configuration and Verification
      6. IPSLA Configuration and Verification
    15. VPNs
      1. VRF-Lite Configuration and Verification
      2. MPLS Overview
      3. MPLS L3 VPNS
      4. GRE Review
      5. DMVPN Configuration and Verification
      6. DMPVN IPSec Configuration and Verification
    16. Management Protocol and Services
      1. Device Access and Authentication Configuration and Verification
      2. IOS Management Tools
      3. Syslog Configuration and Verification
      4. SNMP Configuration and Verification
      5. NetFlow and Flexible NetFlow Configuration and Verification
      6. DHCPv4 and DHCPv6 for Cisco IOS
    17. Device Security
      1. uRPF Configuration and Verification
      2. CoPP Configuration and Verification
      3. IPv4 ACL Review
      4. IPv6 ACL Review
      5. IPv6 First Hop Security Features

    What you will learn

    ENCOR

    • Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more
    • Advanced Routing
    • Configure and verify device management
    • Cisco DNA Center
    • Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall

    ENARSI

    • Route Maps
    • Redistribution
    • Policy-Based Routing
    • VRF-Lite
    • eBGP and iBGP
    • DMVPNs
    • IOS AAA
    • DCHP for IPv4 and IPv6
    • IPv4 and IPv6 ACL's

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
    • You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-410 ENARSI: Implementing Cisco Enterprise Advanced Routing and Services

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.

    Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.

    In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    The CCNP Enterprise: ENARSI provides you with the knowledge of implementation and troubleshooting for advanced routing technologies and services. In this course, you will learn about Layer 3, VPN services, infrastructure security, infrastructure services, and infrastructure automation.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENARSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Enterprise: ENCOR & ENARSI (Vouchers Included) 
  • Fee: $3,995.00
    Item Number: 252OILC207581
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    The CCNP Enterprise: ENARSI provides you with the knowledge of implementation and troubleshooting for advanced routing technologies and services. In this course, you will learn about Layer 3, VPN services, infrastructure security, infrastructure services, and infrastructure automation.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENARSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview
      1. Introduction to ENCOR Course and Exam Objectives
    2. Campus Architecture and Device Fundamentals
      1. Campus Architecture
      2. Device Architecture
    3. Access and Distribution Layer Features and Services
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Routing
      1. Routing Introduction
      2. Dynamic Routing Overview
      3. OSPFv2 Overview, Packets, States, and Design
      4. OSPFv2 Configuration and Verification
      5. Text BoxOSPFv2 Network Types and DR/BDR Election
      6. OSPFv2 LSAs and Metric
      7. OSPFv2 Summarization
      8. OSPFv2 Filtering
      9. EBGP Overview, Configuration and Verification
      10. Text BoxShapeBGP Best Path Selection Process
      11. Network Address Translation (NAT)
      12. Multicast Protocol Overview
    5. VPN's
      1. GRE Tunnel Configuration and Verification
      2. IPSec Introduction
      3. IPSec Site-to-Site VPN Tunnel Configuration and Verification
      4. GRE over IPSec Tunnel Configuration and Verification
      5. Virtual Routing and Forwarding (VRF)
    6. Management Protocols and Services
      1. NTP Configuration and Verification
      2. Syslog Configuration and Verification
      3. Debugs, Conditional Debugs, Ping, and Traceroute
      4. SNMP Configuration and Verification
      5. NetFlow / Flexible NetFlow Configuration and Verification
      6. SPAN, RSPAN, ERSPAN Configuration and Verification
      7. IPSLA Configuration and Verification
      8. Quality of Service (QoS) Overview
      9. Embedded Event Manager (EEM) Configuration
    7. Security
      1. Device Access, Authentication Configuration and Verification
      2. AAA Configuration and Verification
      3. Access Control Lists (ACLs)
      4. Control Plane Policing (CoPP)
      5. Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
    8. Next Generation Campus Networks
      1. SD-Access
      2. LISP and VXLAN
      3. SD-WAN
      4. DNA Center Overview
      5. Data Formats
      6. Data Modeling
      7. NetConf / RestConf
      8. Python Exam Prep
      9. ShapeChef, Puppet, Ansible, SaltStack
    9. LAN Essentials
    10. Course Overview
      1. Introduction to ENARSI Course and Exam Objectives
    11. EIGRPv4, EIGRPv6 and Named EIGRP
      1. EIGRPv4 Configuration and Verification
      2. EIGRPv4 Security Features
      3. EIGRPv4 Metric and Path Selection
      4. EIGRPv4 Convergence
      5. EIGRPv4 Summarization
      6. EIGRP Route Manipulation
      7. EIGRPv4 Troubleshooting
      8. EIGRPv6
      9. Named EIGRP
    12. OSPFv2, OSPFv3, OSPF Address-Families
      1. OSPFv2 Design, Configuration and Verification
      2. OSPFv2 Security Features
      3. OSPFv2 Packets and States
      4. OSPFv2 LSAs
      5. OSPFv2 Metric
      6. OSPFv2 Network Types and DR/BDR Elections
      7. OSPFv2 Summarization and Area Types
      8. OSPFv2 Filtering, Virtual-Links, and Convergence
      9. OSPFv2 Troubleshooting
      10. OSPFv3
      11. OSPF Address-Families
    13. Multi-Protocol BGPv4
      1. BGP Core Operations
      2. BGP Configuration and Verification
      3. BGP Summarization
      4. BGP Filtering
      5. BGP Peer Groups and Route Reflectors
      6. BGP Path Selection Process and Attribute Manipulation
      7. Troubleshooting BGP
      8. BGP for IPv6
    14. Redistribution and Advanced Routing Control
      1. Redistribution Configuration and Verification
      2. Redistribution Filtering
      3. Redistribution Challenges
      4. Redistribution for IPv6
      5. Policy Based Routing Configuration and Verification
      6. IPSLA Configuration and Verification
    15. VPNs
      1. VRF-Lite Configuration and Verification
      2. MPLS Overview
      3. MPLS L3 VPNS
      4. GRE Review
      5. DMVPN Configuration and Verification
      6. DMPVN IPSec Configuration and Verification
    16. Management Protocol and Services
      1. Device Access and Authentication Configuration and Verification
      2. IOS Management Tools
      3. Syslog Configuration and Verification
      4. SNMP Configuration and Verification
      5. NetFlow and Flexible NetFlow Configuration and Verification
      6. DHCPv4 and DHCPv6 for Cisco IOS
    17. Device Security
      1. uRPF Configuration and Verification
      2. CoPP Configuration and Verification
      3. IPv4 ACL Review
      4. IPv6 ACL Review
      5. IPv6 First Hop Security Features

    What you will learn

    ENCOR

    • Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more
    • Advanced Routing
    • Configure and verify device management
    • Cisco DNA Center
    • Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall

    ENARSI

    • Route Maps
    • Redistribution
    • Policy-Based Routing
    • VRF-Lite
    • eBGP and iBGP
    • DMVPNs
    • IOS AAA
    • DCHP for IPv4 and IPv6
    • IPv4 and IPv6 ACL's

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
    • You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-410 ENARSI: Implementing Cisco Enterprise Advanced Routing and Services

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.

    Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.

    In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    The CCNP Enterprise: ENARSI provides you with the knowledge of implementation and troubleshooting for advanced routing technologies and services. In this course, you will learn about Layer 3, VPN services, infrastructure security, infrastructure services, and infrastructure automation.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENARSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Enterprise: ENCOR & ENSLD 
  • Fee: $3,295.00
    Item Number: TesOILC207591
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    CCNP Enterprise: ENARSI provides you with knowledge of Cisco solutions in advanced addressing and routing solutions, advanced enterprise campus networks, WAN, security and network services, and Software-Defined Access.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENSLD. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview
      1. Introduction to ENCOR Course and Exam Objectives
    2. Campus Architecture and Device Fundamentals
      1. Campus Architecture
      2. Device Architecture
    3. Access and Distribution Layer Features and Services
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Routing
      1. Routing Introduction
      2. Dynamic Routing Overview
      3. OSPFv2 Overview, Packets, States, and Design
      4. OSPFv2 Configuration and Verification
      5. Text BoxOSPFv2 Network Types and DR/BDR Election
      6. OSPFv2 LSAs and Metric
      7. OSPFv2 Summarization
      8. OSPFv2 Filtering
      9. EBGP Overview, Configuration and Verification
      10. Text BoxShapeBGP Best Path Selection Process
      11. Network Address Translation (NAT)
      12. Multicast Protocol Overview
    5. VPN's
      1. GRE Tunnel Configuration and Verification
      2. IPSec Introduction
      3. IPSec Site-to-Site VPN Tunnel Configuration and Verification
      4. GRE over IPSec Tunnel Configuration and Verification
      5. Virtual Routing and Forwarding (VRF)
    6. Management Protocols and Services
      1. NTP Configuration and Verification
      2. Syslog Configuration and Verification
      3. Debugs, Conditional Debugs, Ping, and Traceroute
      4. SNMP Configuration and Verification
      5. NetFlow / Flexible NetFlow Configuration and Verification
      6. SPAN, RSPAN, ERSPAN Configuration and Verification
      7. IPSLA Configuration and Verification
      8. Quality of Service (QoS) Overview
      9. Embedded Event Manager (EEM) Configuration
    7. Security
      1. Device Access, Authentication Configuration and Verification
      2. AAA Configuration and Verification
      3. Access Control Lists (ACLs)
      4. Control Plane Policing (CoPP)
      5. Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
    8. Next Generation Campus Networks
      1. SD-Access
      2. LISP and VXLAN
      3. SD-WAN
      4. DNA Center Overview
      5. Data Formats
      6. Data Modeling
      7. NetConf / RestConf
      8. Python Exam Prep
      9. ShapeChef, Puppet, Ansible, SaltStack
    9. LAN Essentials
    10. Routed Protocols - Addressing
      1. IPv4 addressing (create plan)
      2. IPv6 addressing (create plan)
      3. IPv6 migration methods (determine)
    11. Routing Protocols – Secure and scale (create design)
      1. IS-IS
      2. EIGRP
      3. OSPF
      4. BGP – address families, attributes, filtering, RR's, load sharing, balancing, symmetry
    12. Enterprise Campus Networks (design)
      1. HA – GR, FHRP's
      2. L2 – xSTP, loop prevention, convergence
      3. L3 – convergence, vrf, redistribution, filtering, summarization
      4. SD-Access architecture and design (describe) – underlay, overlay, control and data planes
    13. Wide Area Networks (WAN)
      1. Options (compare) – L2/3 VPN's, metro ethernet, DWDM, SD-Wan ce
      2. Site to site VPN (design) – L2/L3, GRE, DMVPN, GET VPN
      3. HA (design) – single, multi, backup, failover
      4. SD-WAN architecture and design (describe) – various planes, QoS, multicast
    14. End-to-End Quality of Service (QoS)
      1. QoS strategies – IntServ/Diffserv (design)
      2. End-to-End QoS – Classify, mark, shape, police, queue (design)
      3. Network management techniques, out-of-band, in-band (design)
    15. Multicast
      1. Concepts – source/shared trees, RPF, RP (describe)
      2. Services – PIM bi-dir, SSM, MSDP (design)
    16. Automation
      1. YANG data models (IETF, Openconfig, Cisco native) – recognize differences
      2. Netconf and Restconf – recognize differences
      3. Telemetry model-driven (periodic/on-change publication and dial-in/dial-out) – recognize differences and impact

    What you will learn

    ENCOR

    • Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more!
    • Advanced Routing
    • Configure and verify device management
    • Cisco DNA Center
    • Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall

    ENSLD

    • Describe and apply advanced addressing and routing solutions
    • Describe and apply advanced enterprise campus networks
    • Describe and apply WAN
    • Describe and apply security and network services
    • Describe and apply Software-Defined Access

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
    • You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-420 ENSLD: Designing Cisco Enterprise Networks

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams. Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP. In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.

    Aaron Gould

    Aaron Gould is a highly knowledgeable network engineer with heavy experience in the Internet Service Provider space. Aaron holds multiple professional-level certifications with Juniper and Cisco equipment as well as Juniper - JNCIP-SP, Juniper - JNCIS-SP, Juniper - JNCDS-DC, Juniper - AAA (JNCIA X 3), Juniper – JNCDA, Juniper - JNCIA-Cloud, Juniper - JNCIA-Junos, Cisco - CCNP SP, Cisco – CCIP, Cisco – CCDP, Cisco - CCNP R/S, MEF CECP, and IPv6 Forum - Silver certifications. Aaron's extensive expertise includes Cisco IOS Routing and Switching, Cisco Network Design, Cisco Service Provider Routing, and Juniper Service Provider Routing.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    CCNP Enterprise: ENARSI provides you with knowledge of Cisco solutions in advanced addressing and routing solutions, advanced enterprise campus networks, WAN, security and network services, and Software-Defined Access.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENSLD. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Enterprise: ENCOR & ENSLD 
  • Fee: $3,295.00
    Item Number: 252OILC207591
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    CCNP Enterprise: ENARSI provides you with knowledge of Cisco solutions in advanced addressing and routing solutions, advanced enterprise campus networks, WAN, security and network services, and Software-Defined Access.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENSLD. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview
      1. Introduction to ENCOR Course and Exam Objectives
    2. Campus Architecture and Device Fundamentals
      1. Campus Architecture
      2. Device Architecture
    3. Access and Distribution Layer Features and Services
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Routing
      1. Routing Introduction
      2. Dynamic Routing Overview
      3. OSPFv2 Overview, Packets, States, and Design
      4. OSPFv2 Configuration and Verification
      5. Text BoxOSPFv2 Network Types and DR/BDR Election
      6. OSPFv2 LSAs and Metric
      7. OSPFv2 Summarization
      8. OSPFv2 Filtering
      9. EBGP Overview, Configuration and Verification
      10. Text BoxShapeBGP Best Path Selection Process
      11. Network Address Translation (NAT)
      12. Multicast Protocol Overview
    5. VPN's
      1. GRE Tunnel Configuration and Verification
      2. IPSec Introduction
      3. IPSec Site-to-Site VPN Tunnel Configuration and Verification
      4. GRE over IPSec Tunnel Configuration and Verification
      5. Virtual Routing and Forwarding (VRF)
    6. Management Protocols and Services
      1. NTP Configuration and Verification
      2. Syslog Configuration and Verification
      3. Debugs, Conditional Debugs, Ping, and Traceroute
      4. SNMP Configuration and Verification
      5. NetFlow / Flexible NetFlow Configuration and Verification
      6. SPAN, RSPAN, ERSPAN Configuration and Verification
      7. IPSLA Configuration and Verification
      8. Quality of Service (QoS) Overview
      9. Embedded Event Manager (EEM) Configuration
    7. Security
      1. Device Access, Authentication Configuration and Verification
      2. AAA Configuration and Verification
      3. Access Control Lists (ACLs)
      4. Control Plane Policing (CoPP)
      5. Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
    8. Next Generation Campus Networks
      1. SD-Access
      2. LISP and VXLAN
      3. SD-WAN
      4. DNA Center Overview
      5. Data Formats
      6. Data Modeling
      7. NetConf / RestConf
      8. Python Exam Prep
      9. ShapeChef, Puppet, Ansible, SaltStack
    9. LAN Essentials
    10. Routed Protocols - Addressing
      1. IPv4 addressing (create plan)
      2. IPv6 addressing (create plan)
      3. IPv6 migration methods (determine)
    11. Routing Protocols – Secure and scale (create design)
      1. IS-IS
      2. EIGRP
      3. OSPF
      4. BGP – address families, attributes, filtering, RR's, load sharing, balancing, symmetry
    12. Enterprise Campus Networks (design)
      1. HA – GR, FHRP's
      2. L2 – xSTP, loop prevention, convergence
      3. L3 – convergence, vrf, redistribution, filtering, summarization
      4. SD-Access architecture and design (describe) – underlay, overlay, control and data planes
    13. Wide Area Networks (WAN)
      1. Options (compare) – L2/3 VPN's, metro ethernet, DWDM, SD-Wan ce
      2. Site to site VPN (design) – L2/L3, GRE, DMVPN, GET VPN
      3. HA (design) – single, multi, backup, failover
      4. SD-WAN architecture and design (describe) – various planes, QoS, multicast
    14. End-to-End Quality of Service (QoS)
      1. QoS strategies – IntServ/Diffserv (design)
      2. End-to-End QoS – Classify, mark, shape, police, queue (design)
      3. Network management techniques, out-of-band, in-band (design)
    15. Multicast
      1. Concepts – source/shared trees, RPF, RP (describe)
      2. Services – PIM bi-dir, SSM, MSDP (design)
    16. Automation
      1. YANG data models (IETF, Openconfig, Cisco native) – recognize differences
      2. Netconf and Restconf – recognize differences
      3. Telemetry model-driven (periodic/on-change publication and dial-in/dial-out) – recognize differences and impact

    What you will learn

    ENCOR

    • Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more!
    • Advanced Routing
    • Configure and verify device management
    • Cisco DNA Center
    • Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall

    ENSLD

    • Describe and apply advanced addressing and routing solutions
    • Describe and apply advanced enterprise campus networks
    • Describe and apply WAN
    • Describe and apply security and network services
    • Describe and apply Software-Defined Access

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
    • You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-420 ENSLD: Designing Cisco Enterprise Networks

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams. Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP. In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.

    Aaron Gould

    Aaron Gould is a highly knowledgeable network engineer with heavy experience in the Internet Service Provider space. Aaron holds multiple professional-level certifications with Juniper and Cisco equipment as well as Juniper - JNCIP-SP, Juniper - JNCIS-SP, Juniper - JNCDS-DC, Juniper - AAA (JNCIA X 3), Juniper – JNCDA, Juniper - JNCIA-Cloud, Juniper - JNCIA-Junos, Cisco - CCNP SP, Cisco – CCIP, Cisco – CCDP, Cisco - CCNP R/S, MEF CECP, and IPv6 Forum - Silver certifications. Aaron's extensive expertise includes Cisco IOS Routing and Switching, Cisco Network Design, Cisco Service Provider Routing, and Juniper Service Provider Routing.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    CCNP Enterprise: ENARSI provides you with knowledge of Cisco solutions in advanced addressing and routing solutions, advanced enterprise campus networks, WAN, security and network services, and Software-Defined Access.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENSLD. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Enterprise: ENCOR & ENSLD (Vouchers Included) 
  • Fee: $3,995.00
    Item Number: TesOILC207601
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    CCNP Enterprise: ENARSI provides you with knowledge of Cisco solutions in advanced addressing and routing solutions, advanced enterprise campus networks, WAN, security and network services, and Software-Defined Access.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENSLD. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview
      1. Introduction to ENCOR Course and Exam Objectives
    2. Campus Architecture and Device Fundamentals
      1. Campus Architecture
      2. Device Architecture
    3. Access and Distribution Layer Features and Services
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Routing
      1. Routing Introduction
      2. Dynamic Routing Overview
      3. OSPFv2 Overview, Packets, States, and Design
      4. OSPFv2 Configuration and Verification
      5. Text BoxOSPFv2 Network Types and DR/BDR Election
      6. OSPFv2 LSAs and Metric
      7. OSPFv2 Summarization
      8. OSPFv2 Filtering
      9. EBGP Overview, Configuration and Verification
      10. Text BoxShapeBGP Best Path Selection Process
      11. Network Address Translation (NAT)
      12. Multicast Protocol Overview
    5. VPN's
      1. GRE Tunnel Configuration and Verification
      2. IPSec Introduction
      3. IPSec Site-to-Site VPN Tunnel Configuration and Verification
      4. GRE over IPSec Tunnel Configuration and Verification
      5. Virtual Routing and Forwarding (VRF)
    6. Management Protocols and Services
      1. NTP Configuration and Verification
      2. Syslog Configuration and Verification
      3. Debugs, Conditional Debugs, Ping, and Traceroute
      4. SNMP Configuration and Verification
      5. NetFlow / Flexible NetFlow Configuration and Verification
      6. SPAN, RSPAN, ERSPAN Configuration and Verification
      7. IPSLA Configuration and Verification
      8. Quality of Service (QoS) Overview
      9. Embedded Event Manager (EEM) Configuration
    7. Security
      1. Device Access, Authentication Configuration and Verification
      2. AAA Configuration and Verification
      3. Access Control Lists (ACLs)
      4. Control Plane Policing (CoPP)
      5. Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
    8. Next Generation Campus Networks
      1. SD-Access
      2. LISP and VXLAN
      3. SD-WAN
      4. DNA Center Overview
      5. Data Formats
      6. Data Modeling
      7. NetConf / RestConf
      8. Python Exam Prep
      9. ShapeChef, Puppet, Ansible, SaltStack
    9. LAN Essentials
    10. Routed Protocols - Addressing
      1. IPv4 addressing (create plan)
      2. IPv6 addressing (create plan)
      3. IPv6 migration methods (determine)
    11. Routing Protocols – Secure and scale (create design)
      1. IS-IS
      2. EIGRP
      3. OSPF
      4. BGP – address families, attributes, filtering, RR's, load sharing, balancing, symmetry
    12. Enterprise Campus Networks (design)
      1. HA – GR, FHRP's
      2. L2 – xSTP, loop prevention, convergence
      3. L3 – convergence, vrf, redistribution, filtering, summarization
      4. SD-Access architecture and design (describe) – underlay, overlay, control and data planes
    13. Wide Area Networks (WAN)
      1. Options (compare) – L2/3 VPN's, metro ethernet, DWDM, SD-Wan ce
      2. Site to site VPN (design) – L2/L3, GRE, DMVPN, GET VPN
      3. HA (design) – single, multi, backup, failover
      4. SD-WAN architecture and design (describe) – various planes, QoS, multicast
    14. End-to-End Quality of Service (QoS)
      1. QoS strategies – IntServ/Diffserv (design)
      2. End-to-End QoS – Classify, mark, shape, police, queue (design)
      3. Network management techniques, out-of-band, in-band (design)
    15. Multicast
      1. Concepts – source/shared trees, RPF, RP (describe)
      2. Services – PIM bi-dir, SSM, MSDP (design)
    16. Automation
      1. YANG data models (IETF, Openconfig, Cisco native) – recognize differences
      2. Netconf and Restconf – recognize differences
      3. Telemetry model-driven (periodic/on-change publication and dial-in/dial-out) – recognize differences and impact

    What you will learn

    ENCOR

    • Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more!
    • Advanced Routing
    • Configure and verify device management
    • Cisco DNA Center
    • Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall

    ENSLD

    • Describe and apply advanced addressing and routing solutions
    • Describe and apply advanced enterprise campus networks
    • Describe and apply WAN
    • Describe and apply security and network services
    • Describe and apply Software-Defined Access

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
    • You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-420 ENSLD: Designing Cisco Enterprise Networks

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams. Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP. In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.

    Aaron Gould

    Aaron Gould is a highly knowledgeable network engineer with heavy experience in the Internet Service Provider space. Aaron holds multiple professional-level certifications with Juniper and Cisco equipment as well as Juniper - JNCIP-SP, Juniper - JNCIS-SP, Juniper - JNCDS-DC, Juniper - AAA (JNCIA X 3), Juniper – JNCDA, Juniper - JNCIA-Cloud, Juniper - JNCIA-Junos, Cisco - CCNP SP, Cisco – CCIP, Cisco – CCDP, Cisco - CCNP R/S, MEF CECP, and IPv6 Forum - Silver certifications. Aaron's extensive expertise includes Cisco IOS Routing and Switching, Cisco Network Design, Cisco Service Provider Routing, and Juniper Service Provider Routing.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    CCNP Enterprise: ENARSI provides you with knowledge of Cisco solutions in advanced addressing and routing solutions, advanced enterprise campus networks, WAN, security and network services, and Software-Defined Access.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENSLD. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Enterprise: ENCOR & ENSLD (Vouchers Included) 
  • Fee: $3,995.00
    Item Number: 252OILC207601
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    CCNP Enterprise: ENARSI provides you with knowledge of Cisco solutions in advanced addressing and routing solutions, advanced enterprise campus networks, WAN, security and network services, and Software-Defined Access.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENSLD. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview
      1. Introduction to ENCOR Course and Exam Objectives
    2. Campus Architecture and Device Fundamentals
      1. Campus Architecture
      2. Device Architecture
    3. Access and Distribution Layer Features and Services
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Routing
      1. Routing Introduction
      2. Dynamic Routing Overview
      3. OSPFv2 Overview, Packets, States, and Design
      4. OSPFv2 Configuration and Verification
      5. Text BoxOSPFv2 Network Types and DR/BDR Election
      6. OSPFv2 LSAs and Metric
      7. OSPFv2 Summarization
      8. OSPFv2 Filtering
      9. EBGP Overview, Configuration and Verification
      10. Text BoxShapeBGP Best Path Selection Process
      11. Network Address Translation (NAT)
      12. Multicast Protocol Overview
    5. VPN's
      1. GRE Tunnel Configuration and Verification
      2. IPSec Introduction
      3. IPSec Site-to-Site VPN Tunnel Configuration and Verification
      4. GRE over IPSec Tunnel Configuration and Verification
      5. Virtual Routing and Forwarding (VRF)
    6. Management Protocols and Services
      1. NTP Configuration and Verification
      2. Syslog Configuration and Verification
      3. Debugs, Conditional Debugs, Ping, and Traceroute
      4. SNMP Configuration and Verification
      5. NetFlow / Flexible NetFlow Configuration and Verification
      6. SPAN, RSPAN, ERSPAN Configuration and Verification
      7. IPSLA Configuration and Verification
      8. Quality of Service (QoS) Overview
      9. Embedded Event Manager (EEM) Configuration
    7. Security
      1. Device Access, Authentication Configuration and Verification
      2. AAA Configuration and Verification
      3. Access Control Lists (ACLs)
      4. Control Plane Policing (CoPP)
      5. Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
    8. Next Generation Campus Networks
      1. SD-Access
      2. LISP and VXLAN
      3. SD-WAN
      4. DNA Center Overview
      5. Data Formats
      6. Data Modeling
      7. NetConf / RestConf
      8. Python Exam Prep
      9. ShapeChef, Puppet, Ansible, SaltStack
    9. LAN Essentials
    10. Routed Protocols - Addressing
      1. IPv4 addressing (create plan)
      2. IPv6 addressing (create plan)
      3. IPv6 migration methods (determine)
    11. Routing Protocols – Secure and scale (create design)
      1. IS-IS
      2. EIGRP
      3. OSPF
      4. BGP – address families, attributes, filtering, RR's, load sharing, balancing, symmetry
    12. Enterprise Campus Networks (design)
      1. HA – GR, FHRP's
      2. L2 – xSTP, loop prevention, convergence
      3. L3 – convergence, vrf, redistribution, filtering, summarization
      4. SD-Access architecture and design (describe) – underlay, overlay, control and data planes
    13. Wide Area Networks (WAN)
      1. Options (compare) – L2/3 VPN's, metro ethernet, DWDM, SD-Wan ce
      2. Site to site VPN (design) – L2/L3, GRE, DMVPN, GET VPN
      3. HA (design) – single, multi, backup, failover
      4. SD-WAN architecture and design (describe) – various planes, QoS, multicast
    14. End-to-End Quality of Service (QoS)
      1. QoS strategies – IntServ/Diffserv (design)
      2. End-to-End QoS – Classify, mark, shape, police, queue (design)
      3. Network management techniques, out-of-band, in-band (design)
    15. Multicast
      1. Concepts – source/shared trees, RPF, RP (describe)
      2. Services – PIM bi-dir, SSM, MSDP (design)
    16. Automation
      1. YANG data models (IETF, Openconfig, Cisco native) – recognize differences
      2. Netconf and Restconf – recognize differences
      3. Telemetry model-driven (periodic/on-change publication and dial-in/dial-out) – recognize differences and impact

    What you will learn

    ENCOR

    • Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more!
    • Advanced Routing
    • Configure and verify device management
    • Cisco DNA Center
    • Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall

    ENSLD

    • Describe and apply advanced addressing and routing solutions
    • Describe and apply advanced enterprise campus networks
    • Describe and apply WAN
    • Describe and apply security and network services
    • Describe and apply Software-Defined Access

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
    • You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-420 ENSLD: Designing Cisco Enterprise Networks

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams. Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP. In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.

    Aaron Gould

    Aaron Gould is a highly knowledgeable network engineer with heavy experience in the Internet Service Provider space. Aaron holds multiple professional-level certifications with Juniper and Cisco equipment as well as Juniper - JNCIP-SP, Juniper - JNCIS-SP, Juniper - JNCDS-DC, Juniper - AAA (JNCIA X 3), Juniper – JNCDA, Juniper - JNCIA-Cloud, Juniper - JNCIA-Junos, Cisco - CCNP SP, Cisco – CCIP, Cisco – CCDP, Cisco - CCNP R/S, MEF CECP, and IPv6 Forum - Silver certifications. Aaron's extensive expertise includes Cisco IOS Routing and Switching, Cisco Network Design, Cisco Service Provider Routing, and Juniper Service Provider Routing.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    CCNP Enterprise: ENARSI provides you with knowledge of Cisco solutions in advanced addressing and routing solutions, advanced enterprise campus networks, WAN, security and network services, and Software-Defined Access.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENSLD. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Enterprise: ENCOR & ENWLSI 
  • Fee: $3,295.00
    Item Number: TesOILC207611
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    In CCNP Enterprise: ENWLSI, you will be given the skills and knowledge to implement wireless networks, including FlexConnect, QoS, Multicast, advanced location services, security for client connectivity, monitoring, and device hardening.

    The course will prepare you to sit for the Cisco CCNP Enterprise Core exam ENCOR and the Cisco CCNP Enterprise Concentration exam ENWLSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview
      1. Introduction to ENCOR Course and Exam Objectives
    2. Campus Architecture and Device Fundamentals
      1. Campus Architecture
      2. Device Architecture
    3. Access and Distribution Layer Features and Services
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Routing
      1. Routing Introduction
      2. Dynamic Routing Overview
      3. OSPFv2 Overview, Packets, States, and Design
      4. OSPFv2 Configuration and Verification
      5. Text BoxOSPFv2 Network Types and DR/BDR Election
      6. OSPFv2 LSAs and Metric
      7. OSPFv2 Summarization
      8. OSPFv2 Filtering
      9. EBGP Overview, Configuration and Verification
      10. Text BoxShapeBGP Best Path Selection Process
      11. Network Address Translation (NAT)
      12. Multicast Protocol Overview
    5. VPN's
      1. GRE Tunnel Configuration and Verification
      2. IPSec Introduction
      3. IPSec Site-to-Site VPN Tunnel Configuration and Verification
      4. GRE over IPSec Tunnel Configuration and Verification
      5. Virtual Routing and Forwarding (VRF)
    6. Management Protocols and Services
      1. NTP Configuration and Verification
      2. Syslog Configuration and Verification
      3. Debugs, Conditional Debugs, Ping, and Traceroute
      4. SNMP Configuration and Verification
      5. NetFlow / Flexible NetFlow Configuration and Verification
      6. SPAN, RSPAN, ERSPAN Configuration and Verification
      7. IPSLA Configuration and Verification
      8. Quality of Service (QoS) Overview
      9. Embedded Event Manager (EEM) Configuration
    7. Security
      1. Device Access, Authentication Configuration and Verification
      2. AAA Configuration and Verification
      3. Access Control Lists (ACLs)
      4. Control Plane Policing (CoPP)
      5. Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
    8. Next Generation Campus Networks
      1. SD-Access
      2. LISP and VXLAN
      3. SD-WAN
      4. DNA Center Overview
      5. Data Formats
      6. Data Modeling
      7. NetConf / RestConf
      8. Python Exam Prep
      9. ShapeChef, Puppet, Ansible, SaltStack
    9. LAN Essentials
    10. Securing and Troubleshooting the Wireless Network Infrastructure including
      1. Secure access to Wireless LAN Controllers (WLCs) and Access Points (APs)
      2. Configuration management via Cisco DNA Center, Cisco Prime Infrastructure (PI)
    11. Implementing and Troubleshooting Secure Client Connectivity including
      1. 802.1X Authentication, AAA services, and Cisco Connected Mobile Experiences (CMX)
    12. Implementing and Troubleshooting QoS in Wireless Networks including
      1. Cisco Application Visibility and Control (AVC), Multicast DNS (mDNS), and Cisco Media Stream
    13. Implementing and Troubleshooting Advanced Wireless Network Services including
      1. Location Services, Analytics, and wireless spectrum management

    What you will learn

    ENCOR

    • Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more
    • Advanced Routing
    • Configure and verify device management
    • Cisco DNA Center
    • Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall

    ENWLSI

    • Implement network settings to provide a secure wireless network infrastructure and troubleshoot security issues as it relates to the wireless network infrastructure
    • Implement a secure wireless client and troubleshoot wireless client connectivity issues
    • Implement and troubleshoot QoS in wireless networks
    • Implement and troubleshoot advanced capabilities in wireless network services

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
    • You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-430 ENWLSI: Implementing Cisco Enterprise Wireless Networks

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams. Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP. In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.

    Dan Goodman

    Dan Goodman is an IT professional specializing in Linux administration, Palo Alto firewalls, and wireless networking. He holds certifications in CompTIA Linux+, CWNP: CWNA, and Palo Alto PCNSA. In addition to his highly recognizable certifications, Dan is an expert in Linux administration, Palo Alto firewall administration, and wireless networking. Dan enjoys teaching the technologies focusing on real-world application of the theory. Outside of class-related efforts, he runs an animal shelter teaming with rescue animals.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    In CCNP Enterprise: ENWLSI, you will be given the skills and knowledge to implement wireless networks, including FlexConnect, QoS, Multicast, advanced location services, security for client connectivity, monitoring, and device hardening.

    The course will prepare you to sit for the Cisco CCNP Enterprise Core exam ENCOR and the Cisco CCNP Enterprise Concentration exam ENWLSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Enterprise: ENCOR & ENWLSI 
  • Fee: $3,295.00
    Item Number: 252OILC207611
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    In CCNP Enterprise: ENWLSI, you will be given the skills and knowledge to implement wireless networks, including FlexConnect, QoS, Multicast, advanced location services, security for client connectivity, monitoring, and device hardening.

    The course will prepare you to sit for the Cisco CCNP Enterprise Core exam ENCOR and the Cisco CCNP Enterprise Concentration exam ENWLSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview
      1. Introduction to ENCOR Course and Exam Objectives
    2. Campus Architecture and Device Fundamentals
      1. Campus Architecture
      2. Device Architecture
    3. Access and Distribution Layer Features and Services
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Routing
      1. Routing Introduction
      2. Dynamic Routing Overview
      3. OSPFv2 Overview, Packets, States, and Design
      4. OSPFv2 Configuration and Verification
      5. Text BoxOSPFv2 Network Types and DR/BDR Election
      6. OSPFv2 LSAs and Metric
      7. OSPFv2 Summarization
      8. OSPFv2 Filtering
      9. EBGP Overview, Configuration and Verification
      10. Text BoxShapeBGP Best Path Selection Process
      11. Network Address Translation (NAT)
      12. Multicast Protocol Overview
    5. VPN's
      1. GRE Tunnel Configuration and Verification
      2. IPSec Introduction
      3. IPSec Site-to-Site VPN Tunnel Configuration and Verification
      4. GRE over IPSec Tunnel Configuration and Verification
      5. Virtual Routing and Forwarding (VRF)
    6. Management Protocols and Services
      1. NTP Configuration and Verification
      2. Syslog Configuration and Verification
      3. Debugs, Conditional Debugs, Ping, and Traceroute
      4. SNMP Configuration and Verification
      5. NetFlow / Flexible NetFlow Configuration and Verification
      6. SPAN, RSPAN, ERSPAN Configuration and Verification
      7. IPSLA Configuration and Verification
      8. Quality of Service (QoS) Overview
      9. Embedded Event Manager (EEM) Configuration
    7. Security
      1. Device Access, Authentication Configuration and Verification
      2. AAA Configuration and Verification
      3. Access Control Lists (ACLs)
      4. Control Plane Policing (CoPP)
      5. Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
    8. Next Generation Campus Networks
      1. SD-Access
      2. LISP and VXLAN
      3. SD-WAN
      4. DNA Center Overview
      5. Data Formats
      6. Data Modeling
      7. NetConf / RestConf
      8. Python Exam Prep
      9. ShapeChef, Puppet, Ansible, SaltStack
    9. LAN Essentials
    10. Securing and Troubleshooting the Wireless Network Infrastructure including
      1. Secure access to Wireless LAN Controllers (WLCs) and Access Points (APs)
      2. Configuration management via Cisco DNA Center, Cisco Prime Infrastructure (PI)
    11. Implementing and Troubleshooting Secure Client Connectivity including
      1. 802.1X Authentication, AAA services, and Cisco Connected Mobile Experiences (CMX)
    12. Implementing and Troubleshooting QoS in Wireless Networks including
      1. Cisco Application Visibility and Control (AVC), Multicast DNS (mDNS), and Cisco Media Stream
    13. Implementing and Troubleshooting Advanced Wireless Network Services including
      1. Location Services, Analytics, and wireless spectrum management

    What you will learn

    ENCOR

    • Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more
    • Advanced Routing
    • Configure and verify device management
    • Cisco DNA Center
    • Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall

    ENWLSI

    • Implement network settings to provide a secure wireless network infrastructure and troubleshoot security issues as it relates to the wireless network infrastructure
    • Implement a secure wireless client and troubleshoot wireless client connectivity issues
    • Implement and troubleshoot QoS in wireless networks
    • Implement and troubleshoot advanced capabilities in wireless network services

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
    • You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-430 ENWLSI: Implementing Cisco Enterprise Wireless Networks

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams. Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP. In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.

    Dan Goodman

    Dan Goodman is an IT professional specializing in Linux administration, Palo Alto firewalls, and wireless networking. He holds certifications in CompTIA Linux+, CWNP: CWNA, and Palo Alto PCNSA. In addition to his highly recognizable certifications, Dan is an expert in Linux administration, Palo Alto firewall administration, and wireless networking. Dan enjoys teaching the technologies focusing on real-world application of the theory. Outside of class-related efforts, he runs an animal shelter teaming with rescue animals.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    In CCNP Enterprise: ENWLSI, you will be given the skills and knowledge to implement wireless networks, including FlexConnect, QoS, Multicast, advanced location services, security for client connectivity, monitoring, and device hardening.

    The course will prepare you to sit for the Cisco CCNP Enterprise Core exam ENCOR and the Cisco CCNP Enterprise Concentration exam ENWLSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Enterprise: ENCOR & ENWLSI (Vouchers Included) 
  • Fee: $3,995.00
    Item Number: TesOILC207621
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    In CCNP Enterprise: ENWLSI, you will be given the skills and knowledge to implement wireless networks, including FlexConnect, QoS, Multicast, advanced location services, security for client connectivity, monitoring, and device hardening.

    The course will prepare you to sit for the Cisco CCNP Enterprise Core exam ENCOR and the Cisco CCNP Enterprise Concentration exam ENWLSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview
      1. Introduction to ENCOR Course and Exam Objectives
    2. Campus Architecture and Device Fundamentals
      1. Campus Architecture
      2. Device Architecture
    3. Access and Distribution Layer Features and Services
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Routing
      1. Routing Introduction
      2. Dynamic Routing Overview
      3. OSPFv2 Overview, Packets, States, and Design
      4. OSPFv2 Configuration and Verification
      5. Text BoxOSPFv2 Network Types and DR/BDR Election
      6. OSPFv2 LSAs and Metric
      7. OSPFv2 Summarization
      8. OSPFv2 Filtering
      9. EBGP Overview, Configuration and Verification
      10. Text BoxShapeBGP Best Path Selection Process
      11. Network Address Translation (NAT)
      12. Multicast Protocol Overview
    5. VPN's
      1. GRE Tunnel Configuration and Verification
      2. IPSec Introduction
      3. IPSec Site-to-Site VPN Tunnel Configuration and Verification
      4. GRE over IPSec Tunnel Configuration and Verification
      5. Virtual Routing and Forwarding (VRF)
    6. Management Protocols and Services
      1. NTP Configuration and Verification
      2. Syslog Configuration and Verification
      3. Debugs, Conditional Debugs, Ping, and Traceroute
      4. SNMP Configuration and Verification
      5. NetFlow / Flexible NetFlow Configuration and Verification
      6. SPAN, RSPAN, ERSPAN Configuration and Verification
      7. IPSLA Configuration and Verification
      8. Quality of Service (QoS) Overview
      9. Embedded Event Manager (EEM) Configuration
    7. Security
      1. Device Access, Authentication Configuration and Verification
      2. AAA Configuration and Verification
      3. Access Control Lists (ACLs)
      4. Control Plane Policing (CoPP)
      5. Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
    8. Next Generation Campus Networks
      1. SD-Access
      2. LISP and VXLAN
      3. SD-WAN
      4. DNA Center Overview
      5. Data Formats
      6. Data Modeling
      7. NetConf / RestConf
      8. Python Exam Prep
      9. ShapeChef, Puppet, Ansible, SaltStack
    9. LAN Essentials
    10. Securing and Troubleshooting the Wireless Network Infrastructure including
      1. Secure access to Wireless LAN Controllers (WLCs) and Access Points (APs)
      2. Configuration management via Cisco DNA Center, Cisco Prime Infrastructure (PI)
    11. Implementing and Troubleshooting Secure Client Connectivity including
      1. 802.1X Authentication, AAA services, and Cisco Connected Mobile Experiences (CMX)
    12. Implementing and Troubleshooting QoS in Wireless Networks including
      1. Cisco Application Visibility and Control (AVC), Multicast DNS (mDNS), and Cisco Media Stream
    13. Implementing and Troubleshooting Advanced Wireless Network Services including
      1. Location Services, Analytics, and wireless spectrum management

    What you will learn

    ENCOR

    • Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more
    • Advanced Routing
    • Configure and verify device management
    • Cisco DNA Center
    • Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall

    ENWLSI

    • Implement network settings to provide a secure wireless network infrastructure and troubleshoot security issues as it relates to the wireless network infrastructure
    • Implement a secure wireless client and troubleshoot wireless client connectivity issues
    • Implement and troubleshoot QoS in wireless networks
    • Implement and troubleshoot advanced capabilities in wireless network services

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
    • You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-430 ENWLSI: Implementing Cisco Enterprise Wireless Networks

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams. Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP. In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.

    Dan Goodman

    Dan Goodman is an IT professional specializing in Linux administration, Palo Alto firewalls, and wireless networking. He holds certifications in CompTIA Linux+, CWNP: CWNA, and Palo Alto PCNSA. In addition to his highly recognizable certifications, Dan is an expert in Linux administration, Palo Alto firewall administration, and wireless networking. Dan enjoys teaching the technologies focusing on real-world application of the theory. Outside of class-related efforts, he runs an animal shelter teaming with rescue animals.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    In CCNP Enterprise: ENWLSI, you will be given the skills and knowledge to implement wireless networks, including FlexConnect, QoS, Multicast, advanced location services, security for client connectivity, monitoring, and device hardening.

    The course will prepare you to sit for the Cisco CCNP Enterprise Core exam ENCOR and the Cisco CCNP Enterprise Concentration exam ENWLSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Enterprise: ENCOR & ENWLSI (Vouchers Included) 
  • Fee: $3,995.00
    Item Number: 252OILC207621
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    In CCNP Enterprise: ENWLSI, you will be given the skills and knowledge to implement wireless networks, including FlexConnect, QoS, Multicast, advanced location services, security for client connectivity, monitoring, and device hardening.

    The course will prepare you to sit for the Cisco CCNP Enterprise Core exam ENCOR and the Cisco CCNP Enterprise Concentration exam ENWLSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview
      1. Introduction to ENCOR Course and Exam Objectives
    2. Campus Architecture and Device Fundamentals
      1. Campus Architecture
      2. Device Architecture
    3. Access and Distribution Layer Features and Services
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Routing
      1. Routing Introduction
      2. Dynamic Routing Overview
      3. OSPFv2 Overview, Packets, States, and Design
      4. OSPFv2 Configuration and Verification
      5. Text BoxOSPFv2 Network Types and DR/BDR Election
      6. OSPFv2 LSAs and Metric
      7. OSPFv2 Summarization
      8. OSPFv2 Filtering
      9. EBGP Overview, Configuration and Verification
      10. Text BoxShapeBGP Best Path Selection Process
      11. Network Address Translation (NAT)
      12. Multicast Protocol Overview
    5. VPN's
      1. GRE Tunnel Configuration and Verification
      2. IPSec Introduction
      3. IPSec Site-to-Site VPN Tunnel Configuration and Verification
      4. GRE over IPSec Tunnel Configuration and Verification
      5. Virtual Routing and Forwarding (VRF)
    6. Management Protocols and Services
      1. NTP Configuration and Verification
      2. Syslog Configuration and Verification
      3. Debugs, Conditional Debugs, Ping, and Traceroute
      4. SNMP Configuration and Verification
      5. NetFlow / Flexible NetFlow Configuration and Verification
      6. SPAN, RSPAN, ERSPAN Configuration and Verification
      7. IPSLA Configuration and Verification
      8. Quality of Service (QoS) Overview
      9. Embedded Event Manager (EEM) Configuration
    7. Security
      1. Device Access, Authentication Configuration and Verification
      2. AAA Configuration and Verification
      3. Access Control Lists (ACLs)
      4. Control Plane Policing (CoPP)
      5. Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
    8. Next Generation Campus Networks
      1. SD-Access
      2. LISP and VXLAN
      3. SD-WAN
      4. DNA Center Overview
      5. Data Formats
      6. Data Modeling
      7. NetConf / RestConf
      8. Python Exam Prep
      9. ShapeChef, Puppet, Ansible, SaltStack
    9. LAN Essentials
    10. Securing and Troubleshooting the Wireless Network Infrastructure including
      1. Secure access to Wireless LAN Controllers (WLCs) and Access Points (APs)
      2. Configuration management via Cisco DNA Center, Cisco Prime Infrastructure (PI)
    11. Implementing and Troubleshooting Secure Client Connectivity including
      1. 802.1X Authentication, AAA services, and Cisco Connected Mobile Experiences (CMX)
    12. Implementing and Troubleshooting QoS in Wireless Networks including
      1. Cisco Application Visibility and Control (AVC), Multicast DNS (mDNS), and Cisco Media Stream
    13. Implementing and Troubleshooting Advanced Wireless Network Services including
      1. Location Services, Analytics, and wireless spectrum management

    What you will learn

    ENCOR

    • Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more
    • Advanced Routing
    • Configure and verify device management
    • Cisco DNA Center
    • Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall

    ENWLSI

    • Implement network settings to provide a secure wireless network infrastructure and troubleshoot security issues as it relates to the wireless network infrastructure
    • Implement a secure wireless client and troubleshoot wireless client connectivity issues
    • Implement and troubleshoot QoS in wireless networks
    • Implement and troubleshoot advanced capabilities in wireless network services

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
    • You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-430 ENWLSI: Implementing Cisco Enterprise Wireless Networks

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams. Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP. In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.

    Dan Goodman

    Dan Goodman is an IT professional specializing in Linux administration, Palo Alto firewalls, and wireless networking. He holds certifications in CompTIA Linux+, CWNP: CWNA, and Palo Alto PCNSA. In addition to his highly recognizable certifications, Dan is an expert in Linux administration, Palo Alto firewall administration, and wireless networking. Dan enjoys teaching the technologies focusing on real-world application of the theory. Outside of class-related efforts, he runs an animal shelter teaming with rescue animals.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    In CCNP Enterprise: ENWLSI, you will be given the skills and knowledge to implement wireless networks, including FlexConnect, QoS, Multicast, advanced location services, security for client connectivity, monitoring, and device hardening.

    The course will prepare you to sit for the Cisco CCNP Enterprise Core exam ENCOR and the Cisco CCNP Enterprise Concentration exam ENWLSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Security: SCOR & SISE 
  • Fee: $3,295.00
    Item Number: TesOILC207631
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network security engineers and those looking to attain their CCNP Security certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.

    The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.

    The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Security Foundations
      1. Attacks against on-premises and cloud resources
      2. Common security vulnerabilities
      3. Cryptography concepts and applications
      4. Managing Cisco security devices via application programming interfaces (APIs)
    2. Implementing Security
      1. Security in common cloud environments
      2. Division of responsibility (shared responsibility model)
      3. DevSecOps, continuous integration, and orchestration
    3. Cloud Concepts and Security
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Application-Specific Security Tools
      1. Email Security Appliance (ESA)
      2. Web Security Appliance (WSA)
      3. Cloud Email Security (CES)
      4. Securing DNS with Cisco Umbrella
    5. Securing Endpoints
      1. Antimalware concepts
      2. Mobile device management (MDM)
      3. Multifactor authentication (MFA)
      4. Network access control
      5. Patch management
    6. Network Access Control and Visibility
      1. 802.1x, WebAuth, and MAB
      2. Network visibility and evasion techniques
      3. Cisco network analytics technologies
    7. Introducing Cisco ISE Architecture and Deployment
      1. Using Cisco ISE as a Network Access Policy Engine
      2. Cisco ISE Use Cases
      3. Describing Cisco ISE Functions
      4. Cisco ISE Deployment Models
      5. Context Visibility
    8. Cisco ISE Policy Enforcement
      1. Using 802.1X for Wired and Wireless Access
      2. Using MAC Authentication Bypass for Wired and Wireless Access
      3. Introducing Identity Management
      4. Configuring Certificate Services
      5. Introducing Cisco ISE Policy
      6. Implementing Third-Party Network Access Device Support
      7. Introducing Cisco TrustSec
      8. Cisco TrustSec Configuration
      9. Easy Connect
    9. Web Authentication and Guest Services
      1. Introducing Web Access with Cisco ISE
      2. Introducing Guest Access Components
      3. Configuring Guest Access Settings
      4. Configuring Sponsor and Guest Portals
    10. Cisco ISE Profiler
      1. Introducing Cisco ISE Profiler
      2. Profiling Deployment and Best Practices
    11. Cisco ISE BYOD
      1. Introducing the Cisco ISE BYOD Process
      2. Describing BYOD Flow
      3. Configuring the My Devices Portal
      4. Configuring Certificates in BYOD Scenarios
    12. Cisco ISE Endpoint Compliance Services
      1. Introducing Endpoint Compliance Services
      2. Configuring Client Posture Services and Provisioning in Cisco ISE
    13. Working with Network Access Devices
      1. Review TACACS+
      2. Cisco ISE TACACS+ Device Administration
      3. Configure TACACS+ Device Administration
      4. TACACS+ Device Administration Guidelines and Best Practices
      5. Migrating from Cisco ACS to Cisco ISE

    What you will learn

    SCOR

    • Cisco security devices via an API
    • Layer 2 and Layer 3+ security
    • VPNs
    • Cloud security concepts
    • Email Security Appliance (ESA)
    • Web Security Appliance (WSA)
    • Cloud Email Security (CES)
    • DNS with Cisco Umbrella
    • Mobile device management (MDM)
    • Multifactor authentication (MFA)

    SISE

    • Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture
    • Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages
    • Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services
    • Describe how Cisco ISE policy sets are used to implement authentication and authorization and how to leverage this capability to meet the needs of your organization
    • Describe third-party Network Access Devices (NADs), Cisco TrustSec®, and Easy Connect
    • Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios
    • Describe and configure Cisco ISE profiling services and understand how to monitor these services to enhance your situational awareness about network-connected endpoints
    • Describe best practices for deploying this profiler service in your specific environment
    • Describe BYOD challenges, solutions, processes, and portalsConfigure a BYOD solution and describe the relationship between BYOD processes and their related configuration components
    • Describe and configure various certificates related to a BYOD solution
    • Describe the value of the My Devices portal and how to configure this portal
    • Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE
    • Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets
    • Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols
    • Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Security core exam: 350-701 SCOR: Implementing and Operating Cisco Security Core Technologies
    • You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-715 SISE: Implementing and Configuring Cisco Identity Services Engine

    Shane Sexton

    Shane Sexton is a cybersecurity-focused instructor with a hunger for using technology to combat real-world challenges. He holds many professional IT certifications such as Citrix CCA, CompTIA A+, CompTIA Security+, CompTIA Linux+, CompTIA CySA+, ITIL Foundations, Cisco CCNA, AWS SysOps, and Cisco CCNP Security. Shane's extensive professional expertise includes Citrix Virtualization, Citrix Virtualization, Computer Hardware support, Cisco networking, Cybersecurity Blue Team, Cybersecurity Red Team, Cisco security, Amazon AWS, and ITIL. Inside the classroom, Shane makes the complicated seem approachable. Outside the classroom, Shane is a mad scientist with automation, coding, and scripting, tying them back to technologies he teaches in class. If he isn't watching the latest SpaceX launch, he can usually be found tinkering with something.

    Doug Bassett

    Doug Bassett is an IT instructor specializing in Microsoft Azure, Server 2016/19, and Exchange messaging. He holds many highly sought-after IT certifications, including Microsoft MCSE, Microsoft MCSA, CompTIA Network+, Cisco CCNA, and Microsoft MCT. In addition to his certifications, Doug has expert knowledge of Microsoft Server 2000, 2003, 2008/2012/2016/2019, Exchange Server and Exchange Online, and Networking structure and applications. As an instructor, Doug is deeply involved in helping his students understand complex concepts and loves to approach teaching a subject from multiple angles.


    The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.

    The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.

    The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Security: SCOR & SISE 
  • Fee: $3,295.00
    Item Number: 252OILC207631
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network security engineers and those looking to attain their CCNP Security certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.

    The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.

    The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Security Foundations
      1. Attacks against on-premises and cloud resources
      2. Common security vulnerabilities
      3. Cryptography concepts and applications
      4. Managing Cisco security devices via application programming interfaces (APIs)
    2. Implementing Security
      1. Security in common cloud environments
      2. Division of responsibility (shared responsibility model)
      3. DevSecOps, continuous integration, and orchestration
    3. Cloud Concepts and Security
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Application-Specific Security Tools
      1. Email Security Appliance (ESA)
      2. Web Security Appliance (WSA)
      3. Cloud Email Security (CES)
      4. Securing DNS with Cisco Umbrella
    5. Securing Endpoints
      1. Antimalware concepts
      2. Mobile device management (MDM)
      3. Multifactor authentication (MFA)
      4. Network access control
      5. Patch management
    6. Network Access Control and Visibility
      1. 802.1x, WebAuth, and MAB
      2. Network visibility and evasion techniques
      3. Cisco network analytics technologies
    7. Introducing Cisco ISE Architecture and Deployment
      1. Using Cisco ISE as a Network Access Policy Engine
      2. Cisco ISE Use Cases
      3. Describing Cisco ISE Functions
      4. Cisco ISE Deployment Models
      5. Context Visibility
    8. Cisco ISE Policy Enforcement
      1. Using 802.1X for Wired and Wireless Access
      2. Using MAC Authentication Bypass for Wired and Wireless Access
      3. Introducing Identity Management
      4. Configuring Certificate Services
      5. Introducing Cisco ISE Policy
      6. Implementing Third-Party Network Access Device Support
      7. Introducing Cisco TrustSec
      8. Cisco TrustSec Configuration
      9. Easy Connect
    9. Web Authentication and Guest Services
      1. Introducing Web Access with Cisco ISE
      2. Introducing Guest Access Components
      3. Configuring Guest Access Settings
      4. Configuring Sponsor and Guest Portals
    10. Cisco ISE Profiler
      1. Introducing Cisco ISE Profiler
      2. Profiling Deployment and Best Practices
    11. Cisco ISE BYOD
      1. Introducing the Cisco ISE BYOD Process
      2. Describing BYOD Flow
      3. Configuring the My Devices Portal
      4. Configuring Certificates in BYOD Scenarios
    12. Cisco ISE Endpoint Compliance Services
      1. Introducing Endpoint Compliance Services
      2. Configuring Client Posture Services and Provisioning in Cisco ISE
    13. Working with Network Access Devices
      1. Review TACACS+
      2. Cisco ISE TACACS+ Device Administration
      3. Configure TACACS+ Device Administration
      4. TACACS+ Device Administration Guidelines and Best Practices
      5. Migrating from Cisco ACS to Cisco ISE

    What you will learn

    SCOR

    • Cisco security devices via an API
    • Layer 2 and Layer 3+ security
    • VPNs
    • Cloud security concepts
    • Email Security Appliance (ESA)
    • Web Security Appliance (WSA)
    • Cloud Email Security (CES)
    • DNS with Cisco Umbrella
    • Mobile device management (MDM)
    • Multifactor authentication (MFA)

    SISE

    • Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture
    • Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages
    • Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services
    • Describe how Cisco ISE policy sets are used to implement authentication and authorization and how to leverage this capability to meet the needs of your organization
    • Describe third-party Network Access Devices (NADs), Cisco TrustSec®, and Easy Connect
    • Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios
    • Describe and configure Cisco ISE profiling services and understand how to monitor these services to enhance your situational awareness about network-connected endpoints
    • Describe best practices for deploying this profiler service in your specific environment
    • Describe BYOD challenges, solutions, processes, and portalsConfigure a BYOD solution and describe the relationship between BYOD processes and their related configuration components
    • Describe and configure various certificates related to a BYOD solution
    • Describe the value of the My Devices portal and how to configure this portal
    • Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE
    • Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets
    • Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols
    • Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Security core exam: 350-701 SCOR: Implementing and Operating Cisco Security Core Technologies
    • You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-715 SISE: Implementing and Configuring Cisco Identity Services Engine

    Shane Sexton

    Shane Sexton is a cybersecurity-focused instructor with a hunger for using technology to combat real-world challenges. He holds many professional IT certifications such as Citrix CCA, CompTIA A+, CompTIA Security+, CompTIA Linux+, CompTIA CySA+, ITIL Foundations, Cisco CCNA, AWS SysOps, and Cisco CCNP Security. Shane's extensive professional expertise includes Citrix Virtualization, Citrix Virtualization, Computer Hardware support, Cisco networking, Cybersecurity Blue Team, Cybersecurity Red Team, Cisco security, Amazon AWS, and ITIL. Inside the classroom, Shane makes the complicated seem approachable. Outside the classroom, Shane is a mad scientist with automation, coding, and scripting, tying them back to technologies he teaches in class. If he isn't watching the latest SpaceX launch, he can usually be found tinkering with something.

    Doug Bassett

    Doug Bassett is an IT instructor specializing in Microsoft Azure, Server 2016/19, and Exchange messaging. He holds many highly sought-after IT certifications, including Microsoft MCSE, Microsoft MCSA, CompTIA Network+, Cisco CCNA, and Microsoft MCT. In addition to his certifications, Doug has expert knowledge of Microsoft Server 2000, 2003, 2008/2012/2016/2019, Exchange Server and Exchange Online, and Networking structure and applications. As an instructor, Doug is deeply involved in helping his students understand complex concepts and loves to approach teaching a subject from multiple angles.


    The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.

    The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.

    The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Security: SCOR & SISE (Vouchers Included) 
  • Fee: $3,995.00
    Item Number: TesOILC207641
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network security engineers and those looking to attain their CCNP Security certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.

    The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.

    The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Security Foundations
      1. Attacks against on-premises and cloud resources
      2. Common security vulnerabilities
      3. Cryptography concepts and applications
      4. Managing Cisco security devices via application programming interfaces (APIs)
    2. Implementing Security
      1. Security in common cloud environments
      2. Division of responsibility (shared responsibility model)
      3. DevSecOps, continuous integration, and orchestration
    3. Cloud Concepts and Security
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Application-Specific Security Tools
      1. Email Security Appliance (ESA)
      2. Web Security Appliance (WSA)
      3. Cloud Email Security (CES)
      4. Securing DNS with Cisco Umbrella
    5. Securing Endpoints
      1. Antimalware concepts
      2. Mobile device management (MDM)
      3. Multifactor authentication (MFA)
      4. Network access control
      5. Patch management
    6. Network Access Control and Visibility
      1. 802.1x, WebAuth, and MAB
      2. Network visibility and evasion techniques
      3. Cisco network analytics technologies
    7. Introducing Cisco ISE Architecture and Deployment
      1. Using Cisco ISE as a Network Access Policy Engine
      2. Cisco ISE Use Cases
      3. Describing Cisco ISE Functions
      4. Cisco ISE Deployment Models
      5. Context Visibility
    8. Cisco ISE Policy Enforcement
      1. Using 802.1X for Wired and Wireless Access
      2. Using MAC Authentication Bypass for Wired and Wireless Access
      3. Introducing Identity Management
      4. Configuring Certificate Services
      5. Introducing Cisco ISE Policy
      6. Implementing Third-Party Network Access Device Support
      7. Introducing Cisco TrustSec
      8. Cisco TrustSec Configuration
      9. Easy Connect
    9. Web Authentication and Guest Services
      1. Introducing Web Access with Cisco ISE
      2. Introducing Guest Access Components
      3. Configuring Guest Access Settings
      4. Configuring Sponsor and Guest Portals
    10. Cisco ISE Profiler
      1. Introducing Cisco ISE Profiler
      2. Profiling Deployment and Best Practices
    11. Cisco ISE BYOD
      1. Introducing the Cisco ISE BYOD Process
      2. Describing BYOD Flow
      3. Configuring the My Devices Portal
      4. Configuring Certificates in BYOD Scenarios
    12. Cisco ISE Endpoint Compliance Services
      1. Introducing Endpoint Compliance Services
      2. Configuring Client Posture Services and Provisioning in Cisco ISE
    13. Working with Network Access Devices
      1. Review TACACS+
      2. Cisco ISE TACACS+ Device Administration
      3. Configure TACACS+ Device Administration
      4. TACACS+ Device Administration Guidelines and Best Practices
      5. Migrating from Cisco ACS to Cisco ISE

    What you will learn

    SCOR

    • Cisco security devices via an API
    • Layer 2 and Layer 3+ security
    • VPNs
    • Cloud security concepts
    • Email Security Appliance (ESA)
    • Web Security Appliance (WSA)
    • Cloud Email Security (CES)
    • DNS with Cisco Umbrella
    • Mobile device management (MDM)
    • Multifactor authentication (MFA)

    SISE

    • Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture
    • Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages
    • Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services
    • Describe how Cisco ISE policy sets are used to implement authentication and authorization and how to leverage this capability to meet the needs of your organization
    • Describe third-party Network Access Devices (NADs), Cisco TrustSec®, and Easy Connect
    • Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios
    • Describe and configure Cisco ISE profiling services and understand how to monitor these services to enhance your situational awareness about network-connected endpoints
    • Describe best practices for deploying this profiler service in your specific environment
    • Describe BYOD challenges, solutions, processes, and portalsConfigure a BYOD solution and describe the relationship between BYOD processes and their related configuration components
    • Describe and configure various certificates related to a BYOD solution
    • Describe the value of the My Devices portal and how to configure this portal
    • Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE
    • Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets
    • Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols
    • Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Security core exam: 350-701 SCOR: Implementing and Operating Cisco Security Core Technologies
    • You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-715 SISE: Implementing and Configuring Cisco Identity Services Engine

    Shane Sexton

    Shane Sexton is a cybersecurity-focused instructor with a hunger for using technology to combat real-world challenges. He holds many professional IT certifications such as Citrix CCA, CompTIA A+, CompTIA Security+, CompTIA Linux+, CompTIA CySA+, ITIL Foundations, Cisco CCNA, AWS SysOps, and Cisco CCNP Security. Shane's extensive professional expertise includes Citrix Virtualization, Citrix Virtualization, Computer Hardware support, Cisco networking, Cybersecurity Blue Team, Cybersecurity Red Team, Cisco security, Amazon AWS, and ITIL. Inside the classroom, Shane makes the complicated seem approachable. Outside the classroom, Shane is a mad scientist with automation, coding, and scripting, tying them back to technologies he teaches in class. If he isn't watching the latest SpaceX launch, he can usually be found tinkering with something.

    Doug Bassett

    Doug Bassett is an IT instructor specializing in Microsoft Azure, Server 2016/19, and Exchange messaging. He holds many highly sought-after IT certifications, including Microsoft MCSE, Microsoft MCSA, CompTIA Network+, Cisco CCNA, and Microsoft MCT. In addition to his certifications, Doug has expert knowledge of Microsoft Server 2000, 2003, 2008/2012/2016/2019, Exchange Server and Exchange Online, and Networking structure and applications. As an instructor, Doug is deeply involved in helping his students understand complex concepts and loves to approach teaching a subject from multiple angles.


    The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.

    The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.

    The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Security: SCOR & SISE (Vouchers Included) 
  • Fee: $3,995.00
    Item Number: 252OILC207641
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network security engineers and those looking to attain their CCNP Security certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.

    The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.

    The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Security Foundations
      1. Attacks against on-premises and cloud resources
      2. Common security vulnerabilities
      3. Cryptography concepts and applications
      4. Managing Cisco security devices via application programming interfaces (APIs)
    2. Implementing Security
      1. Security in common cloud environments
      2. Division of responsibility (shared responsibility model)
      3. DevSecOps, continuous integration, and orchestration
    3. Cloud Concepts and Security
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Application-Specific Security Tools
      1. Email Security Appliance (ESA)
      2. Web Security Appliance (WSA)
      3. Cloud Email Security (CES)
      4. Securing DNS with Cisco Umbrella
    5. Securing Endpoints
      1. Antimalware concepts
      2. Mobile device management (MDM)
      3. Multifactor authentication (MFA)
      4. Network access control
      5. Patch management
    6. Network Access Control and Visibility
      1. 802.1x, WebAuth, and MAB
      2. Network visibility and evasion techniques
      3. Cisco network analytics technologies
    7. Introducing Cisco ISE Architecture and Deployment
      1. Using Cisco ISE as a Network Access Policy Engine
      2. Cisco ISE Use Cases
      3. Describing Cisco ISE Functions
      4. Cisco ISE Deployment Models
      5. Context Visibility
    8. Cisco ISE Policy Enforcement
      1. Using 802.1X for Wired and Wireless Access
      2. Using MAC Authentication Bypass for Wired and Wireless Access
      3. Introducing Identity Management
      4. Configuring Certificate Services
      5. Introducing Cisco ISE Policy
      6. Implementing Third-Party Network Access Device Support
      7. Introducing Cisco TrustSec
      8. Cisco TrustSec Configuration
      9. Easy Connect
    9. Web Authentication and Guest Services
      1. Introducing Web Access with Cisco ISE
      2. Introducing Guest Access Components
      3. Configuring Guest Access Settings
      4. Configuring Sponsor and Guest Portals
    10. Cisco ISE Profiler
      1. Introducing Cisco ISE Profiler
      2. Profiling Deployment and Best Practices
    11. Cisco ISE BYOD
      1. Introducing the Cisco ISE BYOD Process
      2. Describing BYOD Flow
      3. Configuring the My Devices Portal
      4. Configuring Certificates in BYOD Scenarios
    12. Cisco ISE Endpoint Compliance Services
      1. Introducing Endpoint Compliance Services
      2. Configuring Client Posture Services and Provisioning in Cisco ISE
    13. Working with Network Access Devices
      1. Review TACACS+
      2. Cisco ISE TACACS+ Device Administration
      3. Configure TACACS+ Device Administration
      4. TACACS+ Device Administration Guidelines and Best Practices
      5. Migrating from Cisco ACS to Cisco ISE

    What you will learn

    SCOR

    • Cisco security devices via an API
    • Layer 2 and Layer 3+ security
    • VPNs
    • Cloud security concepts
    • Email Security Appliance (ESA)
    • Web Security Appliance (WSA)
    • Cloud Email Security (CES)
    • DNS with Cisco Umbrella
    • Mobile device management (MDM)
    • Multifactor authentication (MFA)

    SISE

    • Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture
    • Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages
    • Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services
    • Describe how Cisco ISE policy sets are used to implement authentication and authorization and how to leverage this capability to meet the needs of your organization
    • Describe third-party Network Access Devices (NADs), Cisco TrustSec®, and Easy Connect
    • Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios
    • Describe and configure Cisco ISE profiling services and understand how to monitor these services to enhance your situational awareness about network-connected endpoints
    • Describe best practices for deploying this profiler service in your specific environment
    • Describe BYOD challenges, solutions, processes, and portalsConfigure a BYOD solution and describe the relationship between BYOD processes and their related configuration components
    • Describe and configure various certificates related to a BYOD solution
    • Describe the value of the My Devices portal and how to configure this portal
    • Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE
    • Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets
    • Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols
    • Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Security core exam: 350-701 SCOR: Implementing and Operating Cisco Security Core Technologies
    • You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-715 SISE: Implementing and Configuring Cisco Identity Services Engine

    Shane Sexton

    Shane Sexton is a cybersecurity-focused instructor with a hunger for using technology to combat real-world challenges. He holds many professional IT certifications such as Citrix CCA, CompTIA A+, CompTIA Security+, CompTIA Linux+, CompTIA CySA+, ITIL Foundations, Cisco CCNA, AWS SysOps, and Cisco CCNP Security. Shane's extensive professional expertise includes Citrix Virtualization, Citrix Virtualization, Computer Hardware support, Cisco networking, Cybersecurity Blue Team, Cybersecurity Red Team, Cisco security, Amazon AWS, and ITIL. Inside the classroom, Shane makes the complicated seem approachable. Outside the classroom, Shane is a mad scientist with automation, coding, and scripting, tying them back to technologies he teaches in class. If he isn't watching the latest SpaceX launch, he can usually be found tinkering with something.

    Doug Bassett

    Doug Bassett is an IT instructor specializing in Microsoft Azure, Server 2016/19, and Exchange messaging. He holds many highly sought-after IT certifications, including Microsoft MCSE, Microsoft MCSA, CompTIA Network+, Cisco CCNA, and Microsoft MCT. In addition to his certifications, Doug has expert knowledge of Microsoft Server 2000, 2003, 2008/2012/2016/2019, Exchange Server and Exchange Online, and Networking structure and applications. As an instructor, Doug is deeply involved in helping his students understand complex concepts and loves to approach teaching a subject from multiple angles.


    The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.

    The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.

    The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Security: SCOR & SVPN 
  • Fee: $3,295.00
    Item Number: TesOILC207651
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network security engineers and those looking to attain their CCNP Security certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.

    The Implementing Secure Solutions with Virtual Private Networks (SVPN) course focuses on implementing secure remote communications with Virtual Private Network (VPN) solutions, including secure communications, architectures, and troubleshooting on Cisco ASAs and Cisco IOS Routers.

    The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SVPN. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Security Foundations
      1. Attacks against on-premises and cloud resources
      2. Common security vulnerabilities
      3. Cryptography concepts and applications
      4. Managing Cisco security devices via application programming interfaces (APIs)
    2. Implementing Security
      1. Security in common cloud environments
      2. Division of responsibility (shared responsibility model)
      3. DevSecOps, continuous integration, and orchestration
    3. Cloud Concepts and Security
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Application-Specific Security Tools
      1. Email Security Appliance (ESA)
      2. Web Security Appliance (WSA)
      3. Cloud Email Security (CES)
      4. Securing DNS with Cisco Umbrella
    5. Securing Endpoints
      1. Antimalware concepts
      2. Mobile device management (MDM)
      3. Multifactor authentication (MFA)
      4. Network access control
      5. Patch management
    6. Network Access Control and Visibility
      1. 802.1x, WebAuth, and MAB
      2. Network visibility and evasion techniques
      3. Cisco network analytics technologies
    7. Introduction to VPN Technologies
      1. Site-to-site and remote access VPNs
      2. Cryptography concepts
      3. Public Key Infrastructure (PKI)
      4. IPsec Concepts
      5. IKEv1 and IKEv2
      6. AH and ESP
    8. VPN Configuration
      1. Traditional crypto map IPsec configuration
      2. VTI configuration
      3. Configuring and troubleshooting DMVPN
      4. Deploying and troubleshooting FlexVPN
    9. Remote Access VPN Configuration
      1. SSL concepts
      2. Clientless AnyConnect deployments
      3. Client-based AnyConnect deployments
      4. Extended functionality with plugins
      5. Local, remote, and two-factor authentication
      6. Host scan and posture assessment
      7. AnyConnect troubleshooting

    What you will learn

    SCOR

    • Cisco security devices via an API
    • Layer 2 and Layer 3+ security
    • VPNs
    • Cloud security concepts
    • Email Security Appliance (ESA)
    • Web Security Appliance (WSA)
    • Cloud Email Security (CES)
    • DNS with Cisco Umbrella
    • Mobile device management (MDM)
    • Multifactor authentication (MFA)

    SVPN

    • Implement secure remote communications with Virtual Private Network (VPN) solutions including secure communications, architectures, and troubleshooting
    • Implementing Site to Site IPsec VPN on Routers & ASA
    • Implementing FlexVPN with IKEv2 on Cisco Routers
    • Implementing DMVPN on Cisco Routers
    • Implementing Cisco AnyConnect

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Security core exam: 350-701 SCOR: Implementing and Operating Cisco Security Core Technologies
    • You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-730 SVPN: Implementing Secure Solutions with Virtual Private Networks

    Shane Sexton

    Shane Sexton is a cybersecurity-focused instructor with a hunger for using technology to combat real-world challenges. He holds many professional IT certifications such as Citrix CCA, CompTIA A+, CompTIA Security+, CompTIA Linux+, CompTIA CySA+, ITIL Foundations, Cisco CCNA, AWS SysOps, and Cisco CCNP Security. Shane's extensive professional expertise includes Citrix Virtualization, Citrix Virtualization, Computer Hardware support, Cisco networking, Cybersecurity Blue Team, Cybersecurity Red Team, Cisco security, Amazon AWS, and ITIL. Inside the classroom, Shane makes the complicated seem approachable. Outside the classroom, Shane is a mad scientist with automation, coding, and scripting, tying them back to technologies he teaches in class. If he isn't watching the latest SpaceX launch, he can usually be found tinkering with something.


    The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.

    The Implementing Secure Solutions with Virtual Private Networks (SVPN) course focuses on implementing secure remote communications with Virtual Private Network (VPN) solutions, including secure communications, architectures, and troubleshooting on Cisco ASAs and Cisco IOS Routers.

    The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SVPN. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Security: SCOR & SVPN 
  • Fee: $3,295.00
    Item Number: 252OILC207651
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network security engineers and those looking to attain their CCNP Security certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.

    The Implementing Secure Solutions with Virtual Private Networks (SVPN) course focuses on implementing secure remote communications with Virtual Private Network (VPN) solutions, including secure communications, architectures, and troubleshooting on Cisco ASAs and Cisco IOS Routers.

    The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SVPN. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Security Foundations
      1. Attacks against on-premises and cloud resources
      2. Common security vulnerabilities
      3. Cryptography concepts and applications
      4. Managing Cisco security devices via application programming interfaces (APIs)
    2. Implementing Security
      1. Security in common cloud environments
      2. Division of responsibility (shared responsibility model)
      3. DevSecOps, continuous integration, and orchestration
    3. Cloud Concepts and Security
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Application-Specific Security Tools
      1. Email Security Appliance (ESA)
      2. Web Security Appliance (WSA)
      3. Cloud Email Security (CES)
      4. Securing DNS with Cisco Umbrella
    5. Securing Endpoints
      1. Antimalware concepts
      2. Mobile device management (MDM)
      3. Multifactor authentication (MFA)
      4. Network access control
      5. Patch management
    6. Network Access Control and Visibility
      1. 802.1x, WebAuth, and MAB
      2. Network visibility and evasion techniques
      3. Cisco network analytics technologies
    7. Introduction to VPN Technologies
      1. Site-to-site and remote access VPNs
      2. Cryptography concepts
      3. Public Key Infrastructure (PKI)
      4. IPsec Concepts
      5. IKEv1 and IKEv2
      6. AH and ESP
    8. VPN Configuration
      1. Traditional crypto map IPsec configuration
      2. VTI configuration
      3. Configuring and troubleshooting DMVPN
      4. Deploying and troubleshooting FlexVPN
    9. Remote Access VPN Configuration
      1. SSL concepts
      2. Clientless AnyConnect deployments
      3. Client-based AnyConnect deployments
      4. Extended functionality with plugins
      5. Local, remote, and two-factor authentication
      6. Host scan and posture assessment
      7. AnyConnect troubleshooting

    What you will learn

    SCOR

    • Cisco security devices via an API
    • Layer 2 and Layer 3+ security
    • VPNs
    • Cloud security concepts
    • Email Security Appliance (ESA)
    • Web Security Appliance (WSA)
    • Cloud Email Security (CES)
    • DNS with Cisco Umbrella
    • Mobile device management (MDM)
    • Multifactor authentication (MFA)

    SVPN

    • Implement secure remote communications with Virtual Private Network (VPN) solutions including secure communications, architectures, and troubleshooting
    • Implementing Site to Site IPsec VPN on Routers & ASA
    • Implementing FlexVPN with IKEv2 on Cisco Routers
    • Implementing DMVPN on Cisco Routers
    • Implementing Cisco AnyConnect

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Security core exam: 350-701 SCOR: Implementing and Operating Cisco Security Core Technologies
    • You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-730 SVPN: Implementing Secure Solutions with Virtual Private Networks

    Shane Sexton

    Shane Sexton is a cybersecurity-focused instructor with a hunger for using technology to combat real-world challenges. He holds many professional IT certifications such as Citrix CCA, CompTIA A+, CompTIA Security+, CompTIA Linux+, CompTIA CySA+, ITIL Foundations, Cisco CCNA, AWS SysOps, and Cisco CCNP Security. Shane's extensive professional expertise includes Citrix Virtualization, Citrix Virtualization, Computer Hardware support, Cisco networking, Cybersecurity Blue Team, Cybersecurity Red Team, Cisco security, Amazon AWS, and ITIL. Inside the classroom, Shane makes the complicated seem approachable. Outside the classroom, Shane is a mad scientist with automation, coding, and scripting, tying them back to technologies he teaches in class. If he isn't watching the latest SpaceX launch, he can usually be found tinkering with something.


    The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.

    The Implementing Secure Solutions with Virtual Private Networks (SVPN) course focuses on implementing secure remote communications with Virtual Private Network (VPN) solutions, including secure communications, architectures, and troubleshooting on Cisco ASAs and Cisco IOS Routers.

    The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SVPN. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Security: SCOR & SVPN (Vouchers Included) 
  • Fee: $3,995.00
    Item Number: TesOILC207661
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network security engineers and those looking to attain their CCNP Security certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.

    The Implementing Secure Solutions with Virtual Private Networks (SVPN) course focuses on implementing secure remote communications with Virtual Private Network (VPN) solutions, including secure communications, architectures, and troubleshooting on Cisco ASAs and Cisco IOS Routers.

    The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SVPN. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Security Foundations
      1. Attacks against on-premises and cloud resources
      2. Common security vulnerabilities
      3. Cryptography concepts and applications
      4. Managing Cisco security devices via application programming interfaces (APIs)
    2. Implementing Security
      1. Security in common cloud environments
      2. Division of responsibility (shared responsibility model)
      3. DevSecOps, continuous integration, and orchestration
    3. Cloud Concepts and Security
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Application-Specific Security Tools
      1. Email Security Appliance (ESA)
      2. Web Security Appliance (WSA)
      3. Cloud Email Security (CES)
      4. Securing DNS with Cisco Umbrella
    5. Securing Endpoints
      1. Antimalware concepts
      2. Mobile device management (MDM)
      3. Multifactor authentication (MFA)
      4. Network access control
      5. Patch management
    6. Network Access Control and Visibility
      1. 802.1x, WebAuth, and MAB
      2. Network visibility and evasion techniques
      3. Cisco network analytics technologies
    7. Introduction to VPN Technologies
      1. Site-to-site and remote access VPNs
      2. Cryptography concepts
      3. Public Key Infrastructure (PKI)
      4. IPsec Concepts
      5. IKEv1 and IKEv2
      6. AH and ESP
    8. VPN Configuration
      1. Traditional crypto map IPsec configuration
      2. VTI configuration
      3. Configuring and troubleshooting DMVPN
      4. Deploying and troubleshooting FlexVPN
    9. Remote Access VPN Configuration
      1. SSL concepts
      2. Clientless AnyConnect deployments
      3. Client-based AnyConnect deployments
      4. Extended functionality with plugins
      5. Local, remote, and two-factor authentication
      6. Host scan and posture assessment
      7. AnyConnect troubleshooting

    What you will learn

    SCOR

    • Cisco security devices via an API
    • Layer 2 and Layer 3+ security
    • VPNs
    • Cloud security concepts
    • Email Security Appliance (ESA)
    • Web Security Appliance (WSA)
    • Cloud Email Security (CES)
    • DNS with Cisco Umbrella
    • Mobile device management (MDM)
    • Multifactor authentication (MFA)

    SVPN

    • Implement secure remote communications with Virtual Private Network (VPN) solutions including secure communications, architectures, and troubleshooting
    • Implementing Site to Site IPsec VPN on Routers & ASA
    • Implementing FlexVPN with IKEv2 on Cisco Routers
    • Implementing DMVPN on Cisco Routers
    • Implementing Cisco AnyConnect

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Security core exam: 350-701 SCOR: Implementing and Operating Cisco Security Core Technologies
    • You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-730 SVPN: Implementing Secure Solutions with Virtual Private Networks

    Shane Sexton

    Shane Sexton is a cybersecurity-focused instructor with a hunger for using technology to combat real-world challenges. He holds many professional IT certifications such as Citrix CCA, CompTIA A+, CompTIA Security+, CompTIA Linux+, CompTIA CySA+, ITIL Foundations, Cisco CCNA, AWS SysOps, and Cisco CCNP Security. Shane's extensive professional expertise includes Citrix Virtualization, Citrix Virtualization, Computer Hardware support, Cisco networking, Cybersecurity Blue Team, Cybersecurity Red Team, Cisco security, Amazon AWS, and ITIL. Inside the classroom, Shane makes the complicated seem approachable. Outside the classroom, Shane is a mad scientist with automation, coding, and scripting, tying them back to technologies he teaches in class. If he isn't watching the latest SpaceX launch, he can usually be found tinkering with something.


    The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.

    The Implementing Secure Solutions with Virtual Private Networks (SVPN) course focuses on implementing secure remote communications with Virtual Private Network (VPN) solutions, including secure communications, architectures, and troubleshooting on Cisco ASAs and Cisco IOS Routers.

    The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SVPN. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Security: SCOR & SVPN (Vouchers Included) 
  • Fee: $3,995.00
    Item Number: 252OILC207661
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network security engineers and those looking to attain their CCNP Security certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.

    The Implementing Secure Solutions with Virtual Private Networks (SVPN) course focuses on implementing secure remote communications with Virtual Private Network (VPN) solutions, including secure communications, architectures, and troubleshooting on Cisco ASAs and Cisco IOS Routers.

    The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SVPN. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Security Foundations
      1. Attacks against on-premises and cloud resources
      2. Common security vulnerabilities
      3. Cryptography concepts and applications
      4. Managing Cisco security devices via application programming interfaces (APIs)
    2. Implementing Security
      1. Security in common cloud environments
      2. Division of responsibility (shared responsibility model)
      3. DevSecOps, continuous integration, and orchestration
    3. Cloud Concepts and Security
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Application-Specific Security Tools
      1. Email Security Appliance (ESA)
      2. Web Security Appliance (WSA)
      3. Cloud Email Security (CES)
      4. Securing DNS with Cisco Umbrella
    5. Securing Endpoints
      1. Antimalware concepts
      2. Mobile device management (MDM)
      3. Multifactor authentication (MFA)
      4. Network access control
      5. Patch management
    6. Network Access Control and Visibility
      1. 802.1x, WebAuth, and MAB
      2. Network visibility and evasion techniques
      3. Cisco network analytics technologies
    7. Introduction to VPN Technologies
      1. Site-to-site and remote access VPNs
      2. Cryptography concepts
      3. Public Key Infrastructure (PKI)
      4. IPsec Concepts
      5. IKEv1 and IKEv2
      6. AH and ESP
    8. VPN Configuration
      1. Traditional crypto map IPsec configuration
      2. VTI configuration
      3. Configuring and troubleshooting DMVPN
      4. Deploying and troubleshooting FlexVPN
    9. Remote Access VPN Configuration
      1. SSL concepts
      2. Clientless AnyConnect deployments
      3. Client-based AnyConnect deployments
      4. Extended functionality with plugins
      5. Local, remote, and two-factor authentication
      6. Host scan and posture assessment
      7. AnyConnect troubleshooting

    What you will learn

    SCOR

    • Cisco security devices via an API
    • Layer 2 and Layer 3+ security
    • VPNs
    • Cloud security concepts
    • Email Security Appliance (ESA)
    • Web Security Appliance (WSA)
    • Cloud Email Security (CES)
    • DNS with Cisco Umbrella
    • Mobile device management (MDM)
    • Multifactor authentication (MFA)

    SVPN

    • Implement secure remote communications with Virtual Private Network (VPN) solutions including secure communications, architectures, and troubleshooting
    • Implementing Site to Site IPsec VPN on Routers & ASA
    • Implementing FlexVPN with IKEv2 on Cisco Routers
    • Implementing DMVPN on Cisco Routers
    • Implementing Cisco AnyConnect

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Security core exam: 350-701 SCOR: Implementing and Operating Cisco Security Core Technologies
    • You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-730 SVPN: Implementing Secure Solutions with Virtual Private Networks

    Shane Sexton

    Shane Sexton is a cybersecurity-focused instructor with a hunger for using technology to combat real-world challenges. He holds many professional IT certifications such as Citrix CCA, CompTIA A+, CompTIA Security+, CompTIA Linux+, CompTIA CySA+, ITIL Foundations, Cisco CCNA, AWS SysOps, and Cisco CCNP Security. Shane's extensive professional expertise includes Citrix Virtualization, Citrix Virtualization, Computer Hardware support, Cisco networking, Cybersecurity Blue Team, Cybersecurity Red Team, Cisco security, Amazon AWS, and ITIL. Inside the classroom, Shane makes the complicated seem approachable. Outside the classroom, Shane is a mad scientist with automation, coding, and scripting, tying them back to technologies he teaches in class. If he isn't watching the latest SpaceX launch, he can usually be found tinkering with something.


    The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.

    The Implementing Secure Solutions with Virtual Private Networks (SVPN) course focuses on implementing secure remote communications with Virtual Private Network (VPN) solutions, including secure communications, architectures, and troubleshooting on Cisco ASAs and Cisco IOS Routers.

    The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SVPN. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • CompTIA A+ Certification Training (Vouchers Included) 
  • Fee: $2,095.00
    Item Number: TesOILC206001
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is designed to help you prepare to earn your CompTIA A+ credential by passing both required certification exams. Essential exam topics covered include various computer hardware and software aspects, including mobile devices, networking technology, virtualization, cloud computing, security, and operational procedures.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.
    • Labs included in this program are not supported on mobile devices (i.e., phones and tablets).

    Software Requirements:

    • PC: Windows 10 or later.
      • Note: Access to Windows 11 is needed for the optional textbook module "Installing Windows".
      • Note: A Windows environment is required to complete some course assignments.
    • Mac: macOS 10.6 or later.
    • Chromebook 113 or later
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word. To complete your assignments, you may need Microsoft Word 2003 or higher, or an equivalent word-processing program, such as LibreOffice, which is available to download for free.
    • Adobe Acrobat Reader. (Software must be installed and fully operational before the course begins.)

    Other:

    • Email capabilities and access to a personal email account.
    • A reliable high-speed Internet connection.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online. The textbook for the A+ course is accessed via links in the course lessons.

    • CompTIA A+ Guide to IT Technical Support

    Prepare to pass the CompTIA A+ certification exams to boost your resume and demonstrate your IT competence with a globally recognized credential! Obtaining your CompTIA A+ certification will open doors to entry-level IT jobs such as technical support specialists, help desk technicians, or field service technicians.

    Our comprehensive CompTIA A+ course offers a thorough overview of the basic concepts around multiple operating systems, enabling you to efficiently maintain and troubleshoot various operating systems. The CompTIA A+ certification is vendor-neutral and adaptable to different technology platforms, providing a solid foundation to pursue specialized certifications.

    You will become equipped with the skills to effectively diagnose and troubleshoot common software, hardware, and connectivity issues. With this employer-desired expertise, you will be an indispensable asset in any organization as you ensure smooth system operations and handle any technical challenges that arise.

    This CompTIA A+ certification training also covers network fundamentals, providing you with a solid foundation in networking concepts, protocols, and troubleshooting techniques. This knowledge will enable you to effectively manage network infrastructure, enhance connectivity, and contribute to efficient communication within organizations.

    Furthermore, you will gain practical experience in assembling and disassembling multiple computer parts, honing your skills in computer hardware. The in-depth CompTIA A+ training enables you to become proficient in building and maintaining computer systems, giving you a competitive edge in the job market.

    Upon successful completion of the lessons and exercises in this bundled CompTIA A+ certification program, you will be well-prepared to take CompTIA's A+ certification exams. You will receive an exam voucher for each certification exam, which covers the cost to sit for the certifying exams upon eligibility.


    1. CompTIA A+ Certification Training
      1. Taking a Computer Apart and Putting It Back Together
      2. All About Cases and Motherboards
      3. Supporting Processors and Upgrading Memory
      4. Power Supplies and Troubleshooting Computer Problems
      5. Supporting Hard Drives and Other Storage Devices
      6. Supporting Input/Output Devices
      7. Networking Fundamentals
      8. Network Infrastructure and Cloud Computing
      9. Supporting Mobile Devices
      10. Supporting Printers
      11. The Complex World of IT Professionals
      12. Installing Windows
      13. Maintaining Windows
      14. Troubleshooting Windows After Startup
      15. Troubleshooting Windows Startup
      16. Security Strategies
      17. Securing and Sharing Windows Resources
      18. Mobile Device Security
      19. Network Security and Troubleshooting
      20. Supporting macOS
      21. Linux and Scripting
      22. Preparing for a Certification Exam

    What you will learn

    • Explore a comprehensive video overview of the CompTIA A+ course
    • Master fundamental concepts of multiple operating systems to maintain and support them effectively
    • Develop troubleshooting skills for software, hardware, and connectivity issues
    • Acquire knowledge of network fundamentals, protocols, and troubleshooting techniques
    • Gain in-depth experience in assembling and disassembling computer parts to expand your IT expertise

    How you will benefit

    • Enhance and ensure your preparation for the CompTIA A+ certification exams
    • Engage with a variety of interactive learning materials, assignments, and assessments that will deepen your understanding and help with exam preparation
    • Boost your employability by jump-starting your IT career with a highly respected and recognized certification that demonstrates your proficiency in essential IT skills

    Linda Matthews

    Linda Matthews has years of experience both in the classroom teaching technical material and in the field solving a myriad of technical issues.

    Linda possesses the background to engage deeply with cybersecurity through teaching and intellectual focus. For the past eight years, she has lived with this vast and fascinating body of knowledge. Now, she regularly trains individuals in several of the most popular security courses from CompTIA and Microsoft. CompTIA's Security+ is the foundational course students need to begin an incredible journey into cybersecurity.

    Linda has a strong love for teaching and igniting the spark that can set students on a most worthwhile and fulfilling path.

    Sara Perrott

    Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author and a former college professor, and she is passionate about teaching the next generation of cybersecurity professionals. Sara has a Master of Science in Cybersecurity and Information Assurance from Western Governors University Washington and a Bachelor of Science in Information Systems Security from the University of Phoenix.

    Paula Woodall

    Paula Woodall began her technical career as a network and computer consultant 30 years ago. She first taught at a local university before taking the CompTIA and Microsoft exams to teach certified courses. Paula has been fortunate to teach these classes worldwide for companies such as HP and Microsoft. Paula enjoys teaching classes regarding computers and networking and talking to students about how their companies put these technologies to work for them.

    Justin Burandt

    Justin Burandt has built a strong career in information technology (IT) education, holding various leadership and support roles across several universities. As an assistant director at Miami Dade College's Cybersecurity Center of the Americas, he played a key role in developing the IT training infrastructure and expanding certification programs. Additionally, Justin has mentored over 120 students in Western Governors University's IT bachelor's programs. His teaching experience spans both online and in-person, including CompTIA Tech+, A+, and Network+ courses across high school, college, and adult education settings. He has also led IT seminars for various organizations, including governments, financial institutions, and businesses.


    Prepare to pass the CompTIA A+ certification exams to boost your resume and demonstrate your IT competence with a globally recognized credential! Obtaining your CompTIA A+ certification will open doors to entry-level IT jobs such as technical support specialists, help desk technicians, or field service technicians.

    Our comprehensive CompTIA A+ course offers a thorough overview of the basic concepts around multiple operating systems, enabling you to efficiently maintain and troubleshoot various operating systems. The CompTIA A+ certification is vendor-neutral and adaptable to different technology platforms, providing a solid foundation to pursue specialized certifications.

    You will become equipped with the skills to effectively diagnose and troubleshoot common software, hardware, and connectivity issues. With this employer-desired expertise, you will be an indispensable asset in any organization as you ensure smooth system operations and handle any technical challenges that arise.

    This CompTIA A+ certification training also covers network fundamentals, providing you with a solid foundation in networking concepts, protocols, and troubleshooting techniques. This knowledge will enable you to effectively manage network infrastructure, enhance connectivity, and contribute to efficient communication within organizations.

    Furthermore, you will gain practical experience in assembling and disassembling multiple computer parts, honing your skills in computer hardware. The in-depth CompTIA A+ training enables you to become proficient in building and maintaining computer systems, giving you a competitive edge in the job market.

    Upon successful completion of the lessons and exercises in this bundled CompTIA A+ certification program, you will be well-prepared to take CompTIA's A+ certification exams. You will receive an exam voucher for each certification exam, which covers the cost to sit for the certifying exams upon eligibility.

 

  • CompTIA A+ Certification Training (Vouchers Included) 
  • Fee: $2,095.00
    Item Number: 252OILC206001
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is designed to help you prepare to earn your CompTIA A+ credential by passing both required certification exams. Essential exam topics covered include various computer hardware and software aspects, including mobile devices, networking technology, virtualization, cloud computing, security, and operational procedures.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.
    • Labs included in this program are not supported on mobile devices (i.e., phones and tablets).

    Software Requirements:

    • PC: Windows 10 or later.
      • Note: Access to Windows 11 is needed for the optional textbook module "Installing Windows".
      • Note: A Windows environment is required to complete some course assignments.
    • Mac: macOS 10.6 or later.
    • Chromebook 113 or later
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word. To complete your assignments, you may need Microsoft Word 2003 or higher, or an equivalent word-processing program, such as LibreOffice, which is available to download for free.
    • Adobe Acrobat Reader. (Software must be installed and fully operational before the course begins.)

    Other:

    • Email capabilities and access to a personal email account.
    • A reliable high-speed Internet connection.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online. The textbook for the A+ course is accessed via links in the course lessons.

    • CompTIA A+ Guide to IT Technical Support

    Prepare to pass the CompTIA A+ certification exams to boost your resume and demonstrate your IT competence with a globally recognized credential! Obtaining your CompTIA A+ certification will open doors to entry-level IT jobs such as technical support specialists, help desk technicians, or field service technicians.

    Our comprehensive CompTIA A+ course offers a thorough overview of the basic concepts around multiple operating systems, enabling you to efficiently maintain and troubleshoot various operating systems. The CompTIA A+ certification is vendor-neutral and adaptable to different technology platforms, providing a solid foundation to pursue specialized certifications.

    You will become equipped with the skills to effectively diagnose and troubleshoot common software, hardware, and connectivity issues. With this employer-desired expertise, you will be an indispensable asset in any organization as you ensure smooth system operations and handle any technical challenges that arise.

    This CompTIA A+ certification training also covers network fundamentals, providing you with a solid foundation in networking concepts, protocols, and troubleshooting techniques. This knowledge will enable you to effectively manage network infrastructure, enhance connectivity, and contribute to efficient communication within organizations.

    Furthermore, you will gain practical experience in assembling and disassembling multiple computer parts, honing your skills in computer hardware. The in-depth CompTIA A+ training enables you to become proficient in building and maintaining computer systems, giving you a competitive edge in the job market.

    Upon successful completion of the lessons and exercises in this bundled CompTIA A+ certification program, you will be well-prepared to take CompTIA's A+ certification exams. You will receive an exam voucher for each certification exam, which covers the cost to sit for the certifying exams upon eligibility.


    1. CompTIA A+ Certification Training
      1. Taking a Computer Apart and Putting It Back Together
      2. All About Cases and Motherboards
      3. Supporting Processors and Upgrading Memory
      4. Power Supplies and Troubleshooting Computer Problems
      5. Supporting Hard Drives and Other Storage Devices
      6. Supporting Input/Output Devices
      7. Networking Fundamentals
      8. Network Infrastructure and Cloud Computing
      9. Supporting Mobile Devices
      10. Supporting Printers
      11. The Complex World of IT Professionals
      12. Installing Windows
      13. Maintaining Windows
      14. Troubleshooting Windows After Startup
      15. Troubleshooting Windows Startup
      16. Security Strategies
      17. Securing and Sharing Windows Resources
      18. Mobile Device Security
      19. Network Security and Troubleshooting
      20. Supporting macOS
      21. Linux and Scripting
      22. Preparing for a Certification Exam

    What you will learn

    • Explore a comprehensive video overview of the CompTIA A+ course
    • Master fundamental concepts of multiple operating systems to maintain and support them effectively
    • Develop troubleshooting skills for software, hardware, and connectivity issues
    • Acquire knowledge of network fundamentals, protocols, and troubleshooting techniques
    • Gain in-depth experience in assembling and disassembling computer parts to expand your IT expertise

    How you will benefit

    • Enhance and ensure your preparation for the CompTIA A+ certification exams
    • Engage with a variety of interactive learning materials, assignments, and assessments that will deepen your understanding and help with exam preparation
    • Boost your employability by jump-starting your IT career with a highly respected and recognized certification that demonstrates your proficiency in essential IT skills

    Linda Matthews

    Linda Matthews has years of experience both in the classroom teaching technical material and in the field solving a myriad of technical issues.

    Linda possesses the background to engage deeply with cybersecurity through teaching and intellectual focus. For the past eight years, she has lived with this vast and fascinating body of knowledge. Now, she regularly trains individuals in several of the most popular security courses from CompTIA and Microsoft. CompTIA's Security+ is the foundational course students need to begin an incredible journey into cybersecurity.

    Linda has a strong love for teaching and igniting the spark that can set students on a most worthwhile and fulfilling path.

    Sara Perrott

    Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author and a former college professor, and she is passionate about teaching the next generation of cybersecurity professionals. Sara has a Master of Science in Cybersecurity and Information Assurance from Western Governors University Washington and a Bachelor of Science in Information Systems Security from the University of Phoenix.

    Paula Woodall

    Paula Woodall began her technical career as a network and computer consultant 30 years ago. She first taught at a local university before taking the CompTIA and Microsoft exams to teach certified courses. Paula has been fortunate to teach these classes worldwide for companies such as HP and Microsoft. Paula enjoys teaching classes regarding computers and networking and talking to students about how their companies put these technologies to work for them.

    Justin Burandt

    Justin Burandt has built a strong career in information technology (IT) education, holding various leadership and support roles across several universities. As an assistant director at Miami Dade College's Cybersecurity Center of the Americas, he played a key role in developing the IT training infrastructure and expanding certification programs. Additionally, Justin has mentored over 120 students in Western Governors University's IT bachelor's programs. His teaching experience spans both online and in-person, including CompTIA Tech+, A+, and Network+ courses across high school, college, and adult education settings. He has also led IT seminars for various organizations, including governments, financial institutions, and businesses.


    Prepare to pass the CompTIA A+ certification exams to boost your resume and demonstrate your IT competence with a globally recognized credential! Obtaining your CompTIA A+ certification will open doors to entry-level IT jobs such as technical support specialists, help desk technicians, or field service technicians.

    Our comprehensive CompTIA A+ course offers a thorough overview of the basic concepts around multiple operating systems, enabling you to efficiently maintain and troubleshoot various operating systems. The CompTIA A+ certification is vendor-neutral and adaptable to different technology platforms, providing a solid foundation to pursue specialized certifications.

    You will become equipped with the skills to effectively diagnose and troubleshoot common software, hardware, and connectivity issues. With this employer-desired expertise, you will be an indispensable asset in any organization as you ensure smooth system operations and handle any technical challenges that arise.

    This CompTIA A+ certification training also covers network fundamentals, providing you with a solid foundation in networking concepts, protocols, and troubleshooting techniques. This knowledge will enable you to effectively manage network infrastructure, enhance connectivity, and contribute to efficient communication within organizations.

    Furthermore, you will gain practical experience in assembling and disassembling multiple computer parts, honing your skills in computer hardware. The in-depth CompTIA A+ training enables you to become proficient in building and maintaining computer systems, giving you a competitive edge in the job market.

    Upon successful completion of the lessons and exercises in this bundled CompTIA A+ certification program, you will be well-prepared to take CompTIA's A+ certification exams. You will receive an exam voucher for each certification exam, which covers the cost to sit for the certifying exams upon eligibility.

 

  • CompTIA Network+ Certification Training (Voucher Included) 
  • Fee: $1,895.00
    Item Number: TesOILC205981
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course will prepare you for a career as a network technician and qualify you to take the CompTIA Network+ certification exam (N10-009). You will master a variety of networking concepts and gain a fundamental knowledge of network design, security, cloud computing, and routing and switching.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.
    • Labs included in this program are not supported on mobile devices (i.e., phones and tablets).
    • Please note that a Windows environment is required to complete some course assignments.
    • A motherboard capable of client-side virtualization:
      • A 64-bit CPU
      • UEFI firmware
      • Hardware virtualization support in UEFI

    Software Requirements:

    • PC: Windows 10 or later.
    • Mac: macOS 10.6 or later.
    • Chromebook 113 or later
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word. To complete your assignments, you may need Microsoft Word 2003 or higher, or an equivalent word-processing program, such as LibreOffice, which is available to download for free.
    • Adobe Acrobat Reader. (Software must be installed and fully operational before the course begins.)

    Tools:

    • Access to copper Ethernet cable-making tools and equipment:
    • RJ-45 connectors
    • A crimping tool
    • Cat5, Cat5e, or Cat6 cable to practice on

    Other:

    • Email capabilities and access to a personal email account.
    • A reliable high-speed Internet connection.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment. The following digital textbook for this course is accessed via links in the course lessons:

    • CompTIA Network+ Guide to Networks, by Jill West (eBook)

    Knowing how to install, configure, and troubleshoot a computer network is a highly marketable and in-demand skill—and it's an ideal time to explore online CompTIA Network+ courses to expand your career opportunities and earning potential!

    This CompTIA Network+ certification course introduces the fundamental building blocks that form a modern network, such as hardware, topologies, and protocols, along with an introduction to the OSI model. The course provides in-depth coverage of the most important concepts in contemporary networking, including TCP/IP, Ethernet, wireless transmission, virtual networks, cloud computing, segmentation, security, performance optimization, and troubleshooting.

    After reading the lessons and completing the exercises in this CompTIA Net+ certification course, you will gain the confidence to select the network design, hardware, and software that best fits your environment. You will have the skills to build a network from scratch and maintain, upgrade, troubleshoot, and manage an existing network. Finally, you will be well-prepared to take CompTIA's Network+ certification exam.

    You will receive an exam voucher with your enrollment, which covers the fee to sit for the CompTIA Network+ (N10-009) certifying exam upon eligibility.


    1. Introduction to CompTIA
    2. Introduction to Networking
    3. Infrastructure and Documentation
    4. Addressing
    5. Protocols
    6. Cabling
    7. Wireless Networking
    8. Network Architecture
    9. Segmentation
    10. Wide Area Networking
    11. Risk Management
    12. Security in Network Design
    13. Performance and Recovery
    14. Final Exam

    What you will learn

    • Compare common network types, topologies, and architectures
    • Characteristics and uses of networking hardware and tools
    • How to install and configure wired and wireless networks
    • TCP/IP functionality and protocols
    • IP addressing concepts, including subnetting and VLANs
    • Cloud computing, virtualization, and remote access systems and methods
    • Tools and practices for monitoring network performance and health
    • Network safety and security threats and how to mitigate them
    • Explain how to troubleshoot and recover from network problems
    • Identify the purposes of network policies and documentation

    How you will benefit

    • Expand your career opportunities and earning potential
    • Course content is aligned with the CompTIA Network+ certification
    • Optional hands-on learning activities with simulations and live virtual machine labs
    • Opportunity to practice on multiple-choice questions to prepare you for your Network+ certification exam (N10-009)

    Linda Matthews

    Linda Matthews has years of experience both in the classroom teaching technical material and, in the field, solving a myriad of technical issues.

    Linda possesses the background to engage deeply with cybersecurity through teaching and intellectual focus. For the past eight years, she has lived with this vast and fascinating body of knowledge. Now, she regularly trains individuals in several of the most popular security courses from CompTIA and Microsoft.

    Linda has a strong love for teaching and igniting the spark that can set students on a most worthwhile and fulfilling path.

    Sara Perrott

    Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author and a former college professor, and she is passionate about teaching the next generation of cybersecurity professionals. Sara has a Master of Science in Cybersecurity and Information Assurance from Western Governors University Washington and a Bachelor of Science in Information Systems Security from the University of Phoenix.

    Brett Glines

    Brett Glines holds a Bachelor of Science in Finance from BYU and an MBA from Emory University. Since 1995, he has excelled as a consultant and educator in the field of technical education, primarily specializing in information technology and certification. He has helped thousands transition into IT careers and holds certifications in CompTIA A+, Network+, and Security+.

    Brett is a master at leveraging online environments for learning and has been training online exclusively since 2015. His focus is on engaging students and ensuring they understand and remember what they learn. He uses practical examples, everyday analogies and recall techniques to make learning easier and more effective.

    Justin Burandt

    Justin Burandt has built a strong career in information technology (IT) education, holding various leadership and support roles across several universities. As an assistant director at Miami Dade College's Cybersecurity Center of the Americas, he played a key role in developing the IT training infrastructure and expanding certification programs. Additionally, Justin has mentored over 120 students in Western Governors University's IT bachelor's programs. His teaching experience spans both online and in-person, including CompTIA Tech+, A+, and Network+ courses across high school, college, and adult education settings. He has also led IT seminars for various organizations, including governments, financial institutions, and businesses.


    Knowing how to install, configure, and troubleshoot a computer network is a highly marketable and in-demand skill—and it's an ideal time to explore online CompTIA Network+ courses to expand your career opportunities and earning potential!

    This CompTIA Network+ certification course introduces the fundamental building blocks that form a modern network, such as hardware, topologies, and protocols, along with an introduction to the OSI model. The course provides in-depth coverage of the most important concepts in contemporary networking, including TCP/IP, Ethernet, wireless transmission, virtual networks, cloud computing, segmentation, security, performance optimization, and troubleshooting.

    After reading the lessons and completing the exercises in this CompTIA Net+ certification course, you will gain the confidence to select the network design, hardware, and software that best fits your environment. You will have the skills to build a network from scratch and maintain, upgrade, troubleshoot, and manage an existing network. Finally, you will be well-prepared to take CompTIA's Network+ certification exam.

    You will receive an exam voucher with your enrollment, which covers the fee to sit for the CompTIA Network+ (N10-009) certifying exam upon eligibility.

 

  • CompTIA Network+ Certification Training (Voucher Included) 
  • Fee: $1,895.00
    Item Number: 252OILC205981
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course will prepare you for a career as a network technician and qualify you to take the CompTIA Network+ certification exam (N10-009). You will master a variety of networking concepts and gain a fundamental knowledge of network design, security, cloud computing, and routing and switching.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.
    • Labs included in this program are not supported on mobile devices (i.e., phones and tablets).
    • Please note that a Windows environment is required to complete some course assignments.
    • A motherboard capable of client-side virtualization:
      • A 64-bit CPU
      • UEFI firmware
      • Hardware virtualization support in UEFI

    Software Requirements:

    • PC: Windows 10 or later.
    • Mac: macOS 10.6 or later.
    • Chromebook 113 or later
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word. To complete your assignments, you may need Microsoft Word 2003 or higher, or an equivalent word-processing program, such as LibreOffice, which is available to download for free.
    • Adobe Acrobat Reader. (Software must be installed and fully operational before the course begins.)

    Tools:

    • Access to copper Ethernet cable-making tools and equipment:
    • RJ-45 connectors
    • A crimping tool
    • Cat5, Cat5e, or Cat6 cable to practice on

    Other:

    • Email capabilities and access to a personal email account.
    • A reliable high-speed Internet connection.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment. The following digital textbook for this course is accessed via links in the course lessons:

    • CompTIA Network+ Guide to Networks, by Jill West (eBook)

    Knowing how to install, configure, and troubleshoot a computer network is a highly marketable and in-demand skill—and it's an ideal time to explore online CompTIA Network+ courses to expand your career opportunities and earning potential!

    This CompTIA Network+ certification course introduces the fundamental building blocks that form a modern network, such as hardware, topologies, and protocols, along with an introduction to the OSI model. The course provides in-depth coverage of the most important concepts in contemporary networking, including TCP/IP, Ethernet, wireless transmission, virtual networks, cloud computing, segmentation, security, performance optimization, and troubleshooting.

    After reading the lessons and completing the exercises in this CompTIA Net+ certification course, you will gain the confidence to select the network design, hardware, and software that best fits your environment. You will have the skills to build a network from scratch and maintain, upgrade, troubleshoot, and manage an existing network. Finally, you will be well-prepared to take CompTIA's Network+ certification exam.

    You will receive an exam voucher with your enrollment, which covers the fee to sit for the CompTIA Network+ (N10-009) certifying exam upon eligibility.


    1. Introduction to CompTIA
    2. Introduction to Networking
    3. Infrastructure and Documentation
    4. Addressing
    5. Protocols
    6. Cabling
    7. Wireless Networking
    8. Network Architecture
    9. Segmentation
    10. Wide Area Networking
    11. Risk Management
    12. Security in Network Design
    13. Performance and Recovery
    14. Final Exam

    What you will learn

    • Compare common network types, topologies, and architectures
    • Characteristics and uses of networking hardware and tools
    • How to install and configure wired and wireless networks
    • TCP/IP functionality and protocols
    • IP addressing concepts, including subnetting and VLANs
    • Cloud computing, virtualization, and remote access systems and methods
    • Tools and practices for monitoring network performance and health
    • Network safety and security threats and how to mitigate them
    • Explain how to troubleshoot and recover from network problems
    • Identify the purposes of network policies and documentation

    How you will benefit

    • Expand your career opportunities and earning potential
    • Course content is aligned with the CompTIA Network+ certification
    • Optional hands-on learning activities with simulations and live virtual machine labs
    • Opportunity to practice on multiple-choice questions to prepare you for your Network+ certification exam (N10-009)

    Linda Matthews

    Linda Matthews has years of experience both in the classroom teaching technical material and, in the field, solving a myriad of technical issues.

    Linda possesses the background to engage deeply with cybersecurity through teaching and intellectual focus. For the past eight years, she has lived with this vast and fascinating body of knowledge. Now, she regularly trains individuals in several of the most popular security courses from CompTIA and Microsoft.

    Linda has a strong love for teaching and igniting the spark that can set students on a most worthwhile and fulfilling path.

    Sara Perrott

    Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author and a former college professor, and she is passionate about teaching the next generation of cybersecurity professionals. Sara has a Master of Science in Cybersecurity and Information Assurance from Western Governors University Washington and a Bachelor of Science in Information Systems Security from the University of Phoenix.

    Brett Glines

    Brett Glines holds a Bachelor of Science in Finance from BYU and an MBA from Emory University. Since 1995, he has excelled as a consultant and educator in the field of technical education, primarily specializing in information technology and certification. He has helped thousands transition into IT careers and holds certifications in CompTIA A+, Network+, and Security+.

    Brett is a master at leveraging online environments for learning and has been training online exclusively since 2015. His focus is on engaging students and ensuring they understand and remember what they learn. He uses practical examples, everyday analogies and recall techniques to make learning easier and more effective.

    Justin Burandt

    Justin Burandt has built a strong career in information technology (IT) education, holding various leadership and support roles across several universities. As an assistant director at Miami Dade College's Cybersecurity Center of the Americas, he played a key role in developing the IT training infrastructure and expanding certification programs. Additionally, Justin has mentored over 120 students in Western Governors University's IT bachelor's programs. His teaching experience spans both online and in-person, including CompTIA Tech+, A+, and Network+ courses across high school, college, and adult education settings. He has also led IT seminars for various organizations, including governments, financial institutions, and businesses.


    Knowing how to install, configure, and troubleshoot a computer network is a highly marketable and in-demand skill—and it's an ideal time to explore online CompTIA Network+ courses to expand your career opportunities and earning potential!

    This CompTIA Network+ certification course introduces the fundamental building blocks that form a modern network, such as hardware, topologies, and protocols, along with an introduction to the OSI model. The course provides in-depth coverage of the most important concepts in contemporary networking, including TCP/IP, Ethernet, wireless transmission, virtual networks, cloud computing, segmentation, security, performance optimization, and troubleshooting.

    After reading the lessons and completing the exercises in this CompTIA Net+ certification course, you will gain the confidence to select the network design, hardware, and software that best fits your environment. You will have the skills to build a network from scratch and maintain, upgrade, troubleshoot, and manage an existing network. Finally, you will be well-prepared to take CompTIA's Network+ certification exam.

    You will receive an exam voucher with your enrollment, which covers the fee to sit for the CompTIA Network+ (N10-009) certifying exam upon eligibility.

 

  • CompTIA Security+ Certification Training (Voucher Included) 
  • Fee: $1,995.00
    Item Number: TesOILC205991
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn a broad range of security topics, including threat management, identity management, access control, cryptography, and network security. This course will teach you everything you need to take and successfully pass the CompTIA Security+ certification exam.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.
    • Labs included in this program are not supported on mobile devices (i.e., phones and tablets).

    Software Requirements:

    • PC: Windows 10 or later.
    • Mac: macOS 10.6 or later.
    • Chromebook 113 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word. To complete your assignments, you may need Microsoft Word 2003 or higher, or an equivalent word-processing program, such as LibreOffice, which is available to download for free.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.
    • A reliable high-speed Internet connection

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment. The textbook for the Security+ course is accessed via links in the course lessons.

    • CompTIA Security+ Guide to Network Security Fundamentals

    Boost your cybersecurity career and yearly income by obtaining your CompTIA Security+ certification! According to CompTIA, five of the top six security jobs have annual salaries of $90,000 or higher, with some exceeding $127,000. The Security+ certification is widely recognized and well-respected in the IT industry and it will validate your skills and help you gain top-paying employment.

    The vendor-neutral CompTIA Security+ certification covers a broad range of security topics, including threat management, identity management, access control, cryptography, and network security. By completing this CompTIA Security+ course, learning key cybersecurity concepts and mastering accompanying quizzes and tests, you will be well-prepared to take the Security+ certification exam.

    This online CompTIA Security+ training covers the essential knowledge and skills required to identify, assess, and mitigate security risks in modern IT environments. This course provides a comprehensive overview of the key concepts and best practices in cybersecurity, including the latest trends and emerging threats. It also teaches the fundamental principles of cybersecurity and enables students to implement security controls that protect against a wide range of attacks and vulnerabilities.

    This Security+ certification course offers an exam voucher with enrollment. The voucher covers the cost to sit for the certifying exam upon eligibility. After completing the CompTIA Security+ course, you can set up your own exam dates and times at a nearby testing center.


    1. Introduction to CompTIA
    2. Security Fundamentals
    3. Threat Management and Cybersecurity Resources
    4. Threats and Attacks on Endpoints
    5. Endpoint and Application Development Security
    6. Cryptography
    7. Public Key Infrastructure and Cryptographic Protocols
    8. Mobile, Embedded, and Specialized Device Security
    9. Networking Threats, Assessments, and Defenses
    10. Network Security Appliances and Technologies
    11. Cloud and Virtualization Security
    12. Network Threats, Assessments, and Defenses
    13. Authentication
    14. Incident Preparation, Response, and Investigation
    15. Cybersecurity Resilience
    16. Risk Management and Data Privacy
    17. Preparing for the Certificate Exam
    18. Exploring a Career in Cybersecurity

    What you will learn

    • Gain fundamental concepts of computer security
    • Understand cybersecurity threats, vulnerabilities, and assessments
    • Review incident preparations, response, and risk management
    • Learn to monitor and secure hybrid environments, including cloud, mobile, Internet of Things (IoT), and operational technology

    How you will benefit

    • Prepare for the CompTIA Security+ certificate exam
    • Utilize a variety of interactives, assignments, and assessments
    • Review topics covering the most updated objectives found in the CompTIA Security+ exam

    Linda Matthews

    Linda Matthews has years of experience both in the classroom teaching technical material and in the field solving a myriad of technical issues.

    Linda possesses the background to engage deeply with cybersecurity through teaching and intellectual focus. For the past eight years, she has lived with this vast and fascinating body of knowledge. Now, she regularly trains individuals in several of the most popular security courses from CompTIA and Microsoft. CompTIA's Security+ is the foundational course students need to begin an incredible journey into cybersecurity.

    Linda has a strong love for teaching and igniting the spark that can set students on a most worthwhile and fulfilling path.

    Sara Perrott

    Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author and a former college professor, and she is passionate about teaching the next generation of cybersecurity professionals. Sara has a Master of Science in Cybersecurity and Information Assurance from Western Governors University Washington and a Bachelor of Science in Information Systems Security from the University of Phoenix.


    Boost your cybersecurity career and yearly income by obtaining your CompTIA Security+ certification! According to CompTIA, five of the top six security jobs have annual salaries of $90,000 or higher, with some exceeding $127,000. The Security+ certification is widely recognized and well-respected in the IT industry and it will validate your skills and help you gain top-paying employment.

    The vendor-neutral CompTIA Security+ certification covers a broad range of security topics, including threat management, identity management, access control, cryptography, and network security. By completing this CompTIA Security+ course, learning key cybersecurity concepts and mastering accompanying quizzes and tests, you will be well-prepared to take the Security+ certification exam.

    This online CompTIA Security+ training covers the essential knowledge and skills required to identify, assess, and mitigate security risks in modern IT environments. This course provides a comprehensive overview of the key concepts and best practices in cybersecurity, including the latest trends and emerging threats. It also teaches the fundamental principles of cybersecurity and enables students to implement security controls that protect against a wide range of attacks and vulnerabilities.

    This Security+ certification course offers an exam voucher with enrollment. The voucher covers the cost to sit for the certifying exam upon eligibility. After completing the CompTIA Security+ course, you can set up your own exam dates and times at a nearby testing center.

 

  • CompTIA Security+ Certification Training (Voucher Included) 
  • Fee: $1,995.00
    Item Number: 252OILC205991
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn a broad range of security topics, including threat management, identity management, access control, cryptography, and network security. This course will teach you everything you need to take and successfully pass the CompTIA Security+ certification exam.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.
    • Labs included in this program are not supported on mobile devices (i.e., phones and tablets).

    Software Requirements:

    • PC: Windows 10 or later.
    • Mac: macOS 10.6 or later.
    • Chromebook 113 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word. To complete your assignments, you may need Microsoft Word 2003 or higher, or an equivalent word-processing program, such as LibreOffice, which is available to download for free.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.
    • A reliable high-speed Internet connection

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment. The textbook for the Security+ course is accessed via links in the course lessons.

    • CompTIA Security+ Guide to Network Security Fundamentals

    Boost your cybersecurity career and yearly income by obtaining your CompTIA Security+ certification! According to CompTIA, five of the top six security jobs have annual salaries of $90,000 or higher, with some exceeding $127,000. The Security+ certification is widely recognized and well-respected in the IT industry and it will validate your skills and help you gain top-paying employment.

    The vendor-neutral CompTIA Security+ certification covers a broad range of security topics, including threat management, identity management, access control, cryptography, and network security. By completing this CompTIA Security+ course, learning key cybersecurity concepts and mastering accompanying quizzes and tests, you will be well-prepared to take the Security+ certification exam.

    This online CompTIA Security+ training covers the essential knowledge and skills required to identify, assess, and mitigate security risks in modern IT environments. This course provides a comprehensive overview of the key concepts and best practices in cybersecurity, including the latest trends and emerging threats. It also teaches the fundamental principles of cybersecurity and enables students to implement security controls that protect against a wide range of attacks and vulnerabilities.

    This Security+ certification course offers an exam voucher with enrollment. The voucher covers the cost to sit for the certifying exam upon eligibility. After completing the CompTIA Security+ course, you can set up your own exam dates and times at a nearby testing center.


    1. Introduction to CompTIA
    2. Security Fundamentals
    3. Threat Management and Cybersecurity Resources
    4. Threats and Attacks on Endpoints
    5. Endpoint and Application Development Security
    6. Cryptography
    7. Public Key Infrastructure and Cryptographic Protocols
    8. Mobile, Embedded, and Specialized Device Security
    9. Networking Threats, Assessments, and Defenses
    10. Network Security Appliances and Technologies
    11. Cloud and Virtualization Security
    12. Network Threats, Assessments, and Defenses
    13. Authentication
    14. Incident Preparation, Response, and Investigation
    15. Cybersecurity Resilience
    16. Risk Management and Data Privacy
    17. Preparing for the Certificate Exam
    18. Exploring a Career in Cybersecurity

    What you will learn

    • Gain fundamental concepts of computer security
    • Understand cybersecurity threats, vulnerabilities, and assessments
    • Review incident preparations, response, and risk management
    • Learn to monitor and secure hybrid environments, including cloud, mobile, Internet of Things (IoT), and operational technology

    How you will benefit

    • Prepare for the CompTIA Security+ certificate exam
    • Utilize a variety of interactives, assignments, and assessments
    • Review topics covering the most updated objectives found in the CompTIA Security+ exam

    Linda Matthews

    Linda Matthews has years of experience both in the classroom teaching technical material and in the field solving a myriad of technical issues.

    Linda possesses the background to engage deeply with cybersecurity through teaching and intellectual focus. For the past eight years, she has lived with this vast and fascinating body of knowledge. Now, she regularly trains individuals in several of the most popular security courses from CompTIA and Microsoft. CompTIA's Security+ is the foundational course students need to begin an incredible journey into cybersecurity.

    Linda has a strong love for teaching and igniting the spark that can set students on a most worthwhile and fulfilling path.

    Sara Perrott

    Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author and a former college professor, and she is passionate about teaching the next generation of cybersecurity professionals. Sara has a Master of Science in Cybersecurity and Information Assurance from Western Governors University Washington and a Bachelor of Science in Information Systems Security from the University of Phoenix.


    Boost your cybersecurity career and yearly income by obtaining your CompTIA Security+ certification! According to CompTIA, five of the top six security jobs have annual salaries of $90,000 or higher, with some exceeding $127,000. The Security+ certification is widely recognized and well-respected in the IT industry and it will validate your skills and help you gain top-paying employment.

    The vendor-neutral CompTIA Security+ certification covers a broad range of security topics, including threat management, identity management, access control, cryptography, and network security. By completing this CompTIA Security+ course, learning key cybersecurity concepts and mastering accompanying quizzes and tests, you will be well-prepared to take the Security+ certification exam.

    This online CompTIA Security+ training covers the essential knowledge and skills required to identify, assess, and mitigate security risks in modern IT environments. This course provides a comprehensive overview of the key concepts and best practices in cybersecurity, including the latest trends and emerging threats. It also teaches the fundamental principles of cybersecurity and enables students to implement security controls that protect against a wide range of attacks and vulnerabilities.

    This Security+ certification course offers an exam voucher with enrollment. The voucher covers the cost to sit for the certifying exam upon eligibility. After completing the CompTIA Security+ course, you can set up your own exam dates and times at a nearby testing center.

 

  • Computer Hacking Forensics Investigator (CHFI) (Voucher Included) 
  • Fee: $2,895.00
    Item Number: TesOILC207171
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course prepares for Computer Hacking Forensics Investigator (CHFI) certification exam. You will master the security discipline of digital forensics from a vendor-neutral perspective.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.10 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online. The materials are non-refundable upon registration.


    This computer forensics certification course is designed to equip you with the necessary skills to pass the EC-Council's Computer Hacking Forensic Investigator (CHFI) Certification exam. By achieving this credential, you will be able to demonstrate your proficiency in digital forensic tools and techniques that are crucial in today's cybersecurity industry.

    Our digital forensics certification course takes a comprehensive and meticulous approach to computer forensics and evidence analysis. You will learn how to identify an intruder's traces, collect the appropriate evidence for prosecution, and prevent future attacks.

    Taught by a skilled digital forensics professional, in this CHFI certification program, you will learn a reliable method for conducting forensic investigations, which includes templates for collecting evidence, maintaining the chain of custody, and creating final investigation reports. Additionally, you will have access to cloud-based virtual labs on advanced Cyber Ranges, allowing you to practice different investigation techniques in realistically simulated environments.

    Note: This computer forensics certification is an ANSI 17024 accredited program, mapped to the NICE 2.0 framework and recognized and approved by the DoD under Directive 8570. Course enrollment includes a voucher that covers the certification exam fee upon eligibility. You can take the exam remotely through a proctor function—ensuring scheduling and testing are convenient.


    1. Computer Forensics in Today's World
    2. Computer Forensics Investigation Process
    3. Understanding Hard Disks and File Systems
    4. Data Acquisition and Duplication
    5. Defeating Anti-Forensics Techniques
    6. Windows Forensics
    7. Linux and Mac Forensics
    8. Network Forensics
    9. Malware Forensics
    10. Investigating Web Attacks
    11. Dark Web Forensics
    12. Cloud Forensics
    13. Email and Social Media Forensics
    14. Mobile Forensics
    15. IoT Forensics

    What you will learn

    • Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
    • Perform anti-forensic methods detection
    • Conduct post-intrusion analysis of electronic and digital media to determine who, where, what, when, and how the intrusion occurred
    • Extract and analyze logs from various devices such as proxy, firewall, IPS, IDS, desktop, laptop, servers, SIM tool, router, firewall, switches AD server, DHCP logs, and access control logs as part of the investigation process
    • Identify & check the possible source/incident origin
    • Recover deleted files and partitions in Windows, macOS, and Linux

    How you will benefit

    • Become a Certified Hacking Forensics Investigator (CHFI)
    • Exam eligibility for the EC-Council Certified Hacking Forensics Investigator (CHFI) Exam Number 312-49 with example CHFI questions
    • The CHFI certification can fortify the applied knowledge level of law enforcement, system administrators, security, defense and military personnel, legal, banking, and computer and network security. It helps to enhance knowledge and skills in digital investigations and network integrity

    Eric Reed

    Eric Reed has over 12 years of experience in IT consulting, specializing in security. Since 2005, he has consulted and delivered custom training to the U.S. military and numerous Fortune 100 and Fortune 500 companies. He has delivered CEH, CHFI, and ECSA/LPT training for the last seven years, with a 95 percent pass rating. Reed was awarded the EC Council Instructor of the Year in 2009 and 2012, as well as the Circle of Excellence in 2006, 2007, and 2010.


    This computer forensics certification course is designed to equip you with the necessary skills to pass the EC-Council's Computer Hacking Forensic Investigator (CHFI) Certification exam. By achieving this credential, you will be able to demonstrate your proficiency in digital forensic tools and techniques that are crucial in today's cybersecurity industry.

    Our digital forensics certification course takes a comprehensive and meticulous approach to computer forensics and evidence analysis. You will learn how to identify an intruder's traces, collect the appropriate evidence for prosecution, and prevent future attacks.

    Taught by a skilled digital forensics professional, in this CHFI certification program, you will learn a reliable method for conducting forensic investigations, which includes templates for collecting evidence, maintaining the chain of custody, and creating final investigation reports. Additionally, you will have access to cloud-based virtual labs on advanced Cyber Ranges, allowing you to practice different investigation techniques in realistically simulated environments.

    Note: This computer forensics certification is an ANSI 17024 accredited program, mapped to the NICE 2.0 framework and recognized and approved by the DoD under Directive 8570. Course enrollment includes a voucher that covers the certification exam fee upon eligibility. You can take the exam remotely through a proctor function—ensuring scheduling and testing are convenient.

 

  • Computer Hacking Forensics Investigator (CHFI) (Voucher Included) 
  • Fee: $2,895.00
    Item Number: 252OILC207171
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course prepares for Computer Hacking Forensics Investigator (CHFI) certification exam. You will master the security discipline of digital forensics from a vendor-neutral perspective.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.10 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online. The materials are non-refundable upon registration.


    This computer forensics certification course is designed to equip you with the necessary skills to pass the EC-Council's Computer Hacking Forensic Investigator (CHFI) Certification exam. By achieving this credential, you will be able to demonstrate your proficiency in digital forensic tools and techniques that are crucial in today's cybersecurity industry.

    Our digital forensics certification course takes a comprehensive and meticulous approach to computer forensics and evidence analysis. You will learn how to identify an intruder's traces, collect the appropriate evidence for prosecution, and prevent future attacks.

    Taught by a skilled digital forensics professional, in this CHFI certification program, you will learn a reliable method for conducting forensic investigations, which includes templates for collecting evidence, maintaining the chain of custody, and creating final investigation reports. Additionally, you will have access to cloud-based virtual labs on advanced Cyber Ranges, allowing you to practice different investigation techniques in realistically simulated environments.

    Note: This computer forensics certification is an ANSI 17024 accredited program, mapped to the NICE 2.0 framework and recognized and approved by the DoD under Directive 8570. Course enrollment includes a voucher that covers the certification exam fee upon eligibility. You can take the exam remotely through a proctor function—ensuring scheduling and testing are convenient.


    1. Computer Forensics in Today's World
    2. Computer Forensics Investigation Process
    3. Understanding Hard Disks and File Systems
    4. Data Acquisition and Duplication
    5. Defeating Anti-Forensics Techniques
    6. Windows Forensics
    7. Linux and Mac Forensics
    8. Network Forensics
    9. Malware Forensics
    10. Investigating Web Attacks
    11. Dark Web Forensics
    12. Cloud Forensics
    13. Email and Social Media Forensics
    14. Mobile Forensics
    15. IoT Forensics

    What you will learn

    • Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
    • Perform anti-forensic methods detection
    • Conduct post-intrusion analysis of electronic and digital media to determine who, where, what, when, and how the intrusion occurred
    • Extract and analyze logs from various devices such as proxy, firewall, IPS, IDS, desktop, laptop, servers, SIM tool, router, firewall, switches AD server, DHCP logs, and access control logs as part of the investigation process
    • Identify & check the possible source/incident origin
    • Recover deleted files and partitions in Windows, macOS, and Linux

    How you will benefit

    • Become a Certified Hacking Forensics Investigator (CHFI)
    • Exam eligibility for the EC-Council Certified Hacking Forensics Investigator (CHFI) Exam Number 312-49 with example CHFI questions
    • The CHFI certification can fortify the applied knowledge level of law enforcement, system administrators, security, defense and military personnel, legal, banking, and computer and network security. It helps to enhance knowledge and skills in digital investigations and network integrity

    Eric Reed

    Eric Reed has over 12 years of experience in IT consulting, specializing in security. Since 2005, he has consulted and delivered custom training to the U.S. military and numerous Fortune 100 and Fortune 500 companies. He has delivered CEH, CHFI, and ECSA/LPT training for the last seven years, with a 95 percent pass rating. Reed was awarded the EC Council Instructor of the Year in 2009 and 2012, as well as the Circle of Excellence in 2006, 2007, and 2010.


    This computer forensics certification course is designed to equip you with the necessary skills to pass the EC-Council's Computer Hacking Forensic Investigator (CHFI) Certification exam. By achieving this credential, you will be able to demonstrate your proficiency in digital forensic tools and techniques that are crucial in today's cybersecurity industry.

    Our digital forensics certification course takes a comprehensive and meticulous approach to computer forensics and evidence analysis. You will learn how to identify an intruder's traces, collect the appropriate evidence for prosecution, and prevent future attacks.

    Taught by a skilled digital forensics professional, in this CHFI certification program, you will learn a reliable method for conducting forensic investigations, which includes templates for collecting evidence, maintaining the chain of custody, and creating final investigation reports. Additionally, you will have access to cloud-based virtual labs on advanced Cyber Ranges, allowing you to practice different investigation techniques in realistically simulated environments.

    Note: This computer forensics certification is an ANSI 17024 accredited program, mapped to the NICE 2.0 framework and recognized and approved by the DoD under Directive 8570. Course enrollment includes a voucher that covers the certification exam fee upon eligibility. You can take the exam remotely through a proctor function—ensuring scheduling and testing are convenient.

 

  • Cybersecurity & Fraud Awareness Workshop  6/4/25 (2:00-4:30pm)
  • Fee: $5.00
    Dates: 6/4/2025 - 6/4/2025
    Times: 2:00 PM - 4:30 PM
    Days: Th
    Sessions: 1
    Building:
    Room:
    Instructor: Hance Patrick
    This online workshop will show you the techniques that scammers use in today's web environment and help you identify and prevent loss from an online scam. 
     
     

     

    The workshop will take place online via Zoom. You will receive a link to the workshop presentation via the email address in which you use to register at least one day prior to the workshop. If you have any additional questions, please contact our Registration Office Monday-Friday from 8:00am-5:00pm.

     

 

  • Cybersecurity & Fraud Awareness Workshop  6/9/25 (10am-12:30pm)
  • Fee: $5.00
    Dates: 6/9/2025 - 6/9/2025
    Times: 10:00 AM - 12:30 PM
    Days: Th
    Sessions: 1
    Building:
    Room:
    Instructor: Hance Patrick
    This online workshop will show you the techniques that scammers use in today's web environment and help you identify and prevent loss from an online scam. 
     
     

     

    The workshop will take place online via Zoom. You will receive a link to the workshop presentation via the email address in which you use to register at least one day prior to the workshop. If you have any additional questions, please contact our Registration Office Monday-Friday from 8:00am-5:00pm.

     

 

  • Cybersecurity & Fraud Awareness Workshop  6/11/25 (2:00-4:30pm)
  • Fee: $5.00
    Dates: 6/11/2025 - 6/11/2025
    Times: 2:00 PM - 4:30 PM
    Days: Th
    Sessions: 1
    Building:
    Room:
    Instructor: Hance Patrick
    This online workshop will show you the techniques that scammers use in today's web environment and help you identify and prevent loss from an online scam. 
     
     

     

    The workshop will take place online via Zoom. You will receive a link to the workshop presentation via the email address in which you use to register at least one day prior to the workshop. If you have any additional questions, please contact our Registration Office Monday-Friday from 8:00am-5:00pm.

     

 

  • Digital Game Artist Certificate 
  • Fee: $2,595.00
    Item Number: TesOILC206541
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This online Digital Game Artist Certificate course will train you to become a professional video game artist by developing core skills for jobs related to Digital Art, 3D Art, Modeling, Character Design, and Environmental Art Design.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.
    • 3 Button Mouse (with wheel)
    • These supplementary materials are recommended but not required:
      • Pressure sensitive tablet (e.g., Wacom)
      • Quixel Mixer
      • Various thickness black markers
      • Sketching pencils
      • 12 color pack of pens

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Blender 2015 or later
    • Adobe Photoshop CS6+ (not included in enrollment) or GIMP/Paint.NET (free)
    • Unreal Engine 4
    • Unity 5+
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    Become a professional video game artist with this online game artist training course, designed to equip you with the necessary skills and knowledge to succeed in this creative and lucrative industry. Focus on developing core competencies in areas such as digital art, 3D art, modeling, character design, and environmental art design. You will learn essential techniques for jobs related to game art, including modeling game props and characters, importing elements into game-specific software, and animating game assets.

    Apply the concepts learned in the course by working with popular game development platforms such as Unreal Engine 4 and Unity 5+. These platforms are widely used in the video game industry and will provide you with hands-on experience in translating your artistic skills into practical game design.

    In addition to software and game-related techniques, this game art course also covers broader topics that can help boost your career such as general design principles and concept art. You will learn the fundamental principles that distinguish good art from great art and the key social aspects necessary for ongoing growth and professional development in the field. By the end of the game artist course, you will have acquired a diverse set of employable skills and a solid understanding of the key components of 3D art and environmental art.


    1. 3D Modeling I
      1. Getting Started
      2. Basic Blender Interface
      3. Viewport Configuration and Layout
      4. Display Settings and Menu Rollouts
      5. Select, Undo/Redo, and Space Search
      6. Rendering an Image
      7. Viewport Controls and Settings
      8. Transforms and User Preferences
      9. Select and Deselect
      10. Primitives
      11. Append
      12. Primitive Properties
      13. 3D Cursor and Object Position
      14. Edit and Object Mode
      15. Grease Pencil
      16. Pivots and Object Origin
      17. 3D Cursor
      18. Transform Orientation and Duplicate
      19. Polygon, Vertex, and Edge
      20. Object Mode Keys
      21. Edit Mode Keys
      22. Limit Selection to Visible
      23. Viewport Shading and Smoothing
      24. Insert, Delete, Dissolve Edge
      25. Edge Split and Create Edge
      26. Merge
      27. User Preferences and Key Commands
      28. Outliner
      29. Modifiers
      30. Piling Modifiers
      31. Snaps (Edit and Object Mode)
      32. Snap to Grid
      33. Splines
      34. Rendering Splines
      35. Splines in Edit Mode
      36. Curve Modifier
      37. Path Deform Process
      38. Bevel with Contour Controls
      39. Lathe
      40. Mirror and Symmetrize
      41. Insert
      42. Intersect Tool
      43. Fill, Bridge, and Grid Fill
      44. Bend
      45. Pivot Positioning
      46. Fill
      47. Grease Pencil Revisited
      48. Duplicate and Linked Duplicate
      49. Appending and Saving Selected
      50. Layers
      51. Boolean
      52. Smooth Shading
      53. Arrays
      54. Solidify
      55. Subdivide
      56. Proportional Editing
      57. Mesh Deform
      58. Basic Light Settings
      59. Basic Edge Placement for Sub D Surfaces
      60. Final Practical
    2. Elements of Visual Design
      1. Getting Started
      2. Balance
      3. Unity
      4. Gradation
      5. Harmony
      6. Dominance
      7. Repetition
      8. Contrast
      9. Gestalt
      10. Space
      11. Symmetry and Asymmetry
      12. Gathering and Filtering
      13. Style Guides
      14. Form and Structure
      15. Silhouette and Visual Reference
      16. Tonal Studies
      17. Light
      18. Ball Study
      19. Visual Depth
      20. Tactile Texture / Visual Texture / Pattern
      21. Volume
      22. Visual Narrative I
      23. Visual Narrative II
      24. Final Practical
    3. Texture Maps and Digital Painting
      1. Getting Started
      2. Photoshop Texture Maps
      3. Custom Brushes
      4. Style Sheets and Ortho Concepts
      5. Creature Design
      6. DDO, NDO, and 3DO in Photoshop
      7. Quixel
      8. Map Types
      9. What is Physically Based Rendering?
      10. Ambient Occlusion (AO) Maps
      11. ID Maps
      12. Using the Quixel Suite
      13. Using NDO I
      14. Using 3DO I
      15. NDO Practical
      16. Accessing Material ID Links
      17. Using DDO I
      18. Saving DDO Smart Materials
      19. Using DDO II
      20. Using DDO III
      21. Create Base (Albedo / Specular / Reflection / AO / Normal)
      22. Lowering Preview Resolution and Viewing IDs in Real-Time
      23. Combining Normal Information
      24. Layers and Blending Modes in DDO
      25. The Mask Editor and Mask Paint
      26. Brush Combining in Photoshop and Blender
      27. Grouping Layers
      28. Final Practical
    4. 3D Modeling II
      1. Getting Started
      2. Basic Photoshop
      3. Tile Texture
      4. Wacom Tablet Properties
      5. Layers
      6. Lights
      7. Sizing and Saving Texture Maps
      8. Texel Density
      9. Basic UV Unwrap
      10. The UV Editor
      11. Adding Maps to Objects
      12. Auto and Smart Unwrap
      13. To Sphere
      14. Unwrap Follow Active Quads
      15. Setting Seams for UVW Unwrap
      16. Smoothing and UV Elements
      17. Element Selection
      18. Positioning of Unwrap Elements
      19. Weld, Stitch, and Breaking UV Elements
      20. Relaxing UV Vertices and Elements
      21. Packing UV Elements
      22. Mesh Smooth and Edge Crease
      23. Cycles in Blender
      24. Texture Paint
      25. Basic Sculpt
      26. Baking ID Maps
      27. Baked Textures
      28. Creating Normal Maps
      29. Sub-D Modeling Intro
      30. Final Practical
    5. Elements of Digital Design
      1. Getting Started
      2. Stylized 3d Character
      3. Man Made Prop
      4. 3d Tree
      5. Underwater Vehicle
    6. 3D Modeling III
      1. Getting Started
      2. Anatomy (Hands)
      3. Anatomy (Feet)
      4. Anatomy (Head)
      5. Anatomy (Arm, Leg)
      6. Anatomy (Chest, Back)
      7. Anatomy (Creature - Cat)
      8. Anatomy (Creature - Horse)
      9. Anatomy (Bird)
      10. Anatomy (Creature - Dinosaur)
      11. Anatomy (Structural Design - Wings)
      12. Edge Flow, Relaxed Edge Flow
      13. Anatomy and Edge Flow
      14. Supporting Edges (Structural)
      15. Supporting Edges (Curved Mesh)
      16. Mirror and Edge Flow
      17. Weighted Vertices
      18. Armature in 3d (Skin Modifier)
      19. Edge Flow for Animated Meshes
      20. Fixing Texture Seams
      21. Digital Sculpting
      22. Solidify to Set Up Clothing
      23. Script UV Squares Master
      24. Script Mesh Align to G Pencil
      25. Final Practical
    7. 3D Sculpture
      1. Getting Started
      2. Orthographic Planes
      3. Alpha Settings and Transparency
      4. X-Ray
      5. Blocking Out the Leg
      6. Adding the Mirror Modifier
      7. Defining the Back of the Neck
      8. Creating the Feet
      9. Creating the Head I
      10. Creating the Head II
      11. Creating the Hands I
      12. Creating the Hands II
      13. Creating the Arms
      14. Creating the Toes
      15. Eyes and Teeth
      16. Final Base Mesh (Ready for Sculpt)
      17. The Multiresolution Modifier
      18. Setting Up the Sculpt Menu
      19. Laying Down Clay Strips
      20. Refining the Sculpt
      21. Sculpting Details
      22. Duplicate Mesh, Create Low and High Variation
      23. Spaced (Relax) Vertices and Tight Mesh Areas
      24. Texture Projections
      25. Projection Snaps and Retopo
      26. Final Practical
    8. Sub-D Modeling
      1. Getting Started
      2. Add/Delete Edge Loops to Define Volumes
      3. Unwrapping Separate Objects (Sub-Objects)
      4. Baking Normal Maps (Blender)
      5. Baking Normal Maps (XNormal)
      6. Apply Normal Maps to Mesh
      7. Texture Paint Mode and Brushes
      8. Mirror in Paint Mode
      9. Stencils
      10. UV Unwrap Guidelines
      11. Normal Map Errors and Extreme Stretching
      12. Normal Map Elements (XYZ, Color, Designation)
      13. Additional Projects
      14. Final Practical
    9. Digital Lighting and Game Engines
      1. Getting Started
      2. New Project and UI Overview
      3. Viewport Navigation
      4. View Modes and Show Flags
      5. Placing Objects in a Level
      6. Content Browser
      7. Material Creation I
      8. Material Creation II
      9. Basic Lighting
      10. Basic Blueprints
      11. Lights and Settings
      12. Shadows
      13. Light Behavior I
      14. Light Behavior II
      15. Three Point Lighting
      16. Time of Day Lighting
      17. Translucency and Projections
      18. Game Engine Lighting I
      19. Game Engine Lighting II
      20. Final Practical
    10. Character Design and Animation
      1. Getting Started
      2. Modeling the Base Mesh
      3. Sculpting the Character
      4. Retopology
      5. UV Mapping and Texture Baking
      6. Texture Painting
      7. Rigging the Character
      8. Creating Animation Cycles
      9. Setting Up in Unity
      10. Final Practical
    11. (CAPSTONE) Final Practical and Portfolio
      1. Final Practical and Essay
      2. Portfolio Development
      3. Career/Next Steps Consultation

    What you will learn

    • How to improve your game art abilities
    • Prop, environment, and character art/animation
    • Proficiency in popular 2D and 3D modeling software
    • Modeling and texturing techniques to effectively bring your designs to life
    • The fundamental principles of creating exceptional art

    How you will benefit

    • Identify the specific skills needed for your professional game art projects
    • Engage in hands-on development to practice and improve your new animation skills
    • Assess your artistic ability and identify areas for improvement
    • Evaluate the effectiveness of your new skills in real-world projects

    Christian Bradley

    Christian Bradley is the Director of Curriculum Development for Digital Media at the Art Institute of California, Orange County campus. He was as an instructor and Academic Director of Game Art and Design at the Art Institute of California, San Diego from 2003 to 2015. For more than twenty years, Bradley was an environment artist and texture artist with more than 35 commercial video game titles for PC, and Sony, Microsoft, and Nintendo consoles in his portfolio. He has worked at Interplay, the Dreamers Guild Studios, and the Collective Studios. Some previous clients include Activision, Digital Extremes, and Legend Entertainment.


    Become a professional video game artist with this online game artist training course, designed to equip you with the necessary skills and knowledge to succeed in this creative and lucrative industry. Focus on developing core competencies in areas such as digital art, 3D art, modeling, character design, and environmental art design. You will learn essential techniques for jobs related to game art, including modeling game props and characters, importing elements into game-specific software, and animating game assets.

    Apply the concepts learned in the course by working with popular game development platforms such as Unreal Engine 4 and Unity 5+. These platforms are widely used in the video game industry and will provide you with hands-on experience in translating your artistic skills into practical game design.

    In addition to software and game-related techniques, this game art course also covers broader topics that can help boost your career such as general design principles and concept art. You will learn the fundamental principles that distinguish good art from great art and the key social aspects necessary for ongoing growth and professional development in the field. By the end of the game artist course, you will have acquired a diverse set of employable skills and a solid understanding of the key components of 3D art and environmental art.

 

  • Digital Game Artist Certificate 
  • Fee: $2,595.00
    Item Number: 252OILC206541
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This online Digital Game Artist Certificate course will train you to become a professional video game artist by developing core skills for jobs related to Digital Art, 3D Art, Modeling, Character Design, and Environmental Art Design.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.
    • 3 Button Mouse (with wheel)
    • These supplementary materials are recommended but not required:
      • Pressure sensitive tablet (e.g., Wacom)
      • Quixel Mixer
      • Various thickness black markers
      • Sketching pencils
      • 12 color pack of pens

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Blender 2015 or later
    • Adobe Photoshop CS6+ (not included in enrollment) or GIMP/Paint.NET (free)
    • Unreal Engine 4
    • Unity 5+
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    Become a professional video game artist with this online game artist training course, designed to equip you with the necessary skills and knowledge to succeed in this creative and lucrative industry. Focus on developing core competencies in areas such as digital art, 3D art, modeling, character design, and environmental art design. You will learn essential techniques for jobs related to game art, including modeling game props and characters, importing elements into game-specific software, and animating game assets.

    Apply the concepts learned in the course by working with popular game development platforms such as Unreal Engine 4 and Unity 5+. These platforms are widely used in the video game industry and will provide you with hands-on experience in translating your artistic skills into practical game design.

    In addition to software and game-related techniques, this game art course also covers broader topics that can help boost your career such as general design principles and concept art. You will learn the fundamental principles that distinguish good art from great art and the key social aspects necessary for ongoing growth and professional development in the field. By the end of the game artist course, you will have acquired a diverse set of employable skills and a solid understanding of the key components of 3D art and environmental art.


    1. 3D Modeling I
      1. Getting Started
      2. Basic Blender Interface
      3. Viewport Configuration and Layout
      4. Display Settings and Menu Rollouts
      5. Select, Undo/Redo, and Space Search
      6. Rendering an Image
      7. Viewport Controls and Settings
      8. Transforms and User Preferences
      9. Select and Deselect
      10. Primitives
      11. Append
      12. Primitive Properties
      13. 3D Cursor and Object Position
      14. Edit and Object Mode
      15. Grease Pencil
      16. Pivots and Object Origin
      17. 3D Cursor
      18. Transform Orientation and Duplicate
      19. Polygon, Vertex, and Edge
      20. Object Mode Keys
      21. Edit Mode Keys
      22. Limit Selection to Visible
      23. Viewport Shading and Smoothing
      24. Insert, Delete, Dissolve Edge
      25. Edge Split and Create Edge
      26. Merge
      27. User Preferences and Key Commands
      28. Outliner
      29. Modifiers
      30. Piling Modifiers
      31. Snaps (Edit and Object Mode)
      32. Snap to Grid
      33. Splines
      34. Rendering Splines
      35. Splines in Edit Mode
      36. Curve Modifier
      37. Path Deform Process
      38. Bevel with Contour Controls
      39. Lathe
      40. Mirror and Symmetrize
      41. Insert
      42. Intersect Tool
      43. Fill, Bridge, and Grid Fill
      44. Bend
      45. Pivot Positioning
      46. Fill
      47. Grease Pencil Revisited
      48. Duplicate and Linked Duplicate
      49. Appending and Saving Selected
      50. Layers
      51. Boolean
      52. Smooth Shading
      53. Arrays
      54. Solidify
      55. Subdivide
      56. Proportional Editing
      57. Mesh Deform
      58. Basic Light Settings
      59. Basic Edge Placement for Sub D Surfaces
      60. Final Practical
    2. Elements of Visual Design
      1. Getting Started
      2. Balance
      3. Unity
      4. Gradation
      5. Harmony
      6. Dominance
      7. Repetition
      8. Contrast
      9. Gestalt
      10. Space
      11. Symmetry and Asymmetry
      12. Gathering and Filtering
      13. Style Guides
      14. Form and Structure
      15. Silhouette and Visual Reference
      16. Tonal Studies
      17. Light
      18. Ball Study
      19. Visual Depth
      20. Tactile Texture / Visual Texture / Pattern
      21. Volume
      22. Visual Narrative I
      23. Visual Narrative II
      24. Final Practical
    3. Texture Maps and Digital Painting
      1. Getting Started
      2. Photoshop Texture Maps
      3. Custom Brushes
      4. Style Sheets and Ortho Concepts
      5. Creature Design
      6. DDO, NDO, and 3DO in Photoshop
      7. Quixel
      8. Map Types
      9. What is Physically Based Rendering?
      10. Ambient Occlusion (AO) Maps
      11. ID Maps
      12. Using the Quixel Suite
      13. Using NDO I
      14. Using 3DO I
      15. NDO Practical
      16. Accessing Material ID Links
      17. Using DDO I
      18. Saving DDO Smart Materials
      19. Using DDO II
      20. Using DDO III
      21. Create Base (Albedo / Specular / Reflection / AO / Normal)
      22. Lowering Preview Resolution and Viewing IDs in Real-Time
      23. Combining Normal Information
      24. Layers and Blending Modes in DDO
      25. The Mask Editor and Mask Paint
      26. Brush Combining in Photoshop and Blender
      27. Grouping Layers
      28. Final Practical
    4. 3D Modeling II
      1. Getting Started
      2. Basic Photoshop
      3. Tile Texture
      4. Wacom Tablet Properties
      5. Layers
      6. Lights
      7. Sizing and Saving Texture Maps
      8. Texel Density
      9. Basic UV Unwrap
      10. The UV Editor
      11. Adding Maps to Objects
      12. Auto and Smart Unwrap
      13. To Sphere
      14. Unwrap Follow Active Quads
      15. Setting Seams for UVW Unwrap
      16. Smoothing and UV Elements
      17. Element Selection
      18. Positioning of Unwrap Elements
      19. Weld, Stitch, and Breaking UV Elements
      20. Relaxing UV Vertices and Elements
      21. Packing UV Elements
      22. Mesh Smooth and Edge Crease
      23. Cycles in Blender
      24. Texture Paint
      25. Basic Sculpt
      26. Baking ID Maps
      27. Baked Textures
      28. Creating Normal Maps
      29. Sub-D Modeling Intro
      30. Final Practical
    5. Elements of Digital Design
      1. Getting Started
      2. Stylized 3d Character
      3. Man Made Prop
      4. 3d Tree
      5. Underwater Vehicle
    6. 3D Modeling III
      1. Getting Started
      2. Anatomy (Hands)
      3. Anatomy (Feet)
      4. Anatomy (Head)
      5. Anatomy (Arm, Leg)
      6. Anatomy (Chest, Back)
      7. Anatomy (Creature - Cat)
      8. Anatomy (Creature - Horse)
      9. Anatomy (Bird)
      10. Anatomy (Creature - Dinosaur)
      11. Anatomy (Structural Design - Wings)
      12. Edge Flow, Relaxed Edge Flow
      13. Anatomy and Edge Flow
      14. Supporting Edges (Structural)
      15. Supporting Edges (Curved Mesh)
      16. Mirror and Edge Flow
      17. Weighted Vertices
      18. Armature in 3d (Skin Modifier)
      19. Edge Flow for Animated Meshes
      20. Fixing Texture Seams
      21. Digital Sculpting
      22. Solidify to Set Up Clothing
      23. Script UV Squares Master
      24. Script Mesh Align to G Pencil
      25. Final Practical
    7. 3D Sculpture
      1. Getting Started
      2. Orthographic Planes
      3. Alpha Settings and Transparency
      4. X-Ray
      5. Blocking Out the Leg
      6. Adding the Mirror Modifier
      7. Defining the Back of the Neck
      8. Creating the Feet
      9. Creating the Head I
      10. Creating the Head II
      11. Creating the Hands I
      12. Creating the Hands II
      13. Creating the Arms
      14. Creating the Toes
      15. Eyes and Teeth
      16. Final Base Mesh (Ready for Sculpt)
      17. The Multiresolution Modifier
      18. Setting Up the Sculpt Menu
      19. Laying Down Clay Strips
      20. Refining the Sculpt
      21. Sculpting Details
      22. Duplicate Mesh, Create Low and High Variation
      23. Spaced (Relax) Vertices and Tight Mesh Areas
      24. Texture Projections
      25. Projection Snaps and Retopo
      26. Final Practical
    8. Sub-D Modeling
      1. Getting Started
      2. Add/Delete Edge Loops to Define Volumes
      3. Unwrapping Separate Objects (Sub-Objects)
      4. Baking Normal Maps (Blender)
      5. Baking Normal Maps (XNormal)
      6. Apply Normal Maps to Mesh
      7. Texture Paint Mode and Brushes
      8. Mirror in Paint Mode
      9. Stencils
      10. UV Unwrap Guidelines
      11. Normal Map Errors and Extreme Stretching
      12. Normal Map Elements (XYZ, Color, Designation)
      13. Additional Projects
      14. Final Practical
    9. Digital Lighting and Game Engines
      1. Getting Started
      2. New Project and UI Overview
      3. Viewport Navigation
      4. View Modes and Show Flags
      5. Placing Objects in a Level
      6. Content Browser
      7. Material Creation I
      8. Material Creation II
      9. Basic Lighting
      10. Basic Blueprints
      11. Lights and Settings
      12. Shadows
      13. Light Behavior I
      14. Light Behavior II
      15. Three Point Lighting
      16. Time of Day Lighting
      17. Translucency and Projections
      18. Game Engine Lighting I
      19. Game Engine Lighting II
      20. Final Practical
    10. Character Design and Animation
      1. Getting Started
      2. Modeling the Base Mesh
      3. Sculpting the Character
      4. Retopology
      5. UV Mapping and Texture Baking
      6. Texture Painting
      7. Rigging the Character
      8. Creating Animation Cycles
      9. Setting Up in Unity
      10. Final Practical
    11. (CAPSTONE) Final Practical and Portfolio
      1. Final Practical and Essay
      2. Portfolio Development
      3. Career/Next Steps Consultation

    What you will learn

    • How to improve your game art abilities
    • Prop, environment, and character art/animation
    • Proficiency in popular 2D and 3D modeling software
    • Modeling and texturing techniques to effectively bring your designs to life
    • The fundamental principles of creating exceptional art

    How you will benefit

    • Identify the specific skills needed for your professional game art projects
    • Engage in hands-on development to practice and improve your new animation skills
    • Assess your artistic ability and identify areas for improvement
    • Evaluate the effectiveness of your new skills in real-world projects

    Christian Bradley

    Christian Bradley is the Director of Curriculum Development for Digital Media at the Art Institute of California, Orange County campus. He was as an instructor and Academic Director of Game Art and Design at the Art Institute of California, San Diego from 2003 to 2015. For more than twenty years, Bradley was an environment artist and texture artist with more than 35 commercial video game titles for PC, and Sony, Microsoft, and Nintendo consoles in his portfolio. He has worked at Interplay, the Dreamers Guild Studios, and the Collective Studios. Some previous clients include Activision, Digital Extremes, and Legend Entertainment.


    Become a professional video game artist with this online game artist training course, designed to equip you with the necessary skills and knowledge to succeed in this creative and lucrative industry. Focus on developing core competencies in areas such as digital art, 3D art, modeling, character design, and environmental art design. You will learn essential techniques for jobs related to game art, including modeling game props and characters, importing elements into game-specific software, and animating game assets.

    Apply the concepts learned in the course by working with popular game development platforms such as Unreal Engine 4 and Unity 5+. These platforms are widely used in the video game industry and will provide you with hands-on experience in translating your artistic skills into practical game design.

    In addition to software and game-related techniques, this game art course also covers broader topics that can help boost your career such as general design principles and concept art. You will learn the fundamental principles that distinguish good art from great art and the key social aspects necessary for ongoing growth and professional development in the field. By the end of the game artist course, you will have acquired a diverse set of employable skills and a solid understanding of the key components of 3D art and environmental art.

 

 

  • Intermediate Networking 
  • Fee: $139.00
    Item Number: TesOCTP27384202
    Dates: 5/14/2025 - 12/22/2030
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Gain practical experience in a hot new career field. Topics include VPNs, security, and Internet connectivity.


    Learn real-world applications for the concepts you learned in Introduction to Networking. Continue to build your knowledge of networks and networking, with detailed treatments of TCP/IP, how switches and routers operate, DNS, and more.

    You will gain a full understanding of almost every aspect of networking technology, including hot topics such as virtual private networks, security, Internet connectivity, and cloud computing. Completion of this course and its prerequisite should serve as a springboard for a career in computer networking or training for CCNA Certification.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    Getting up to Speed

    In the first lesson, you'll learn about the concept of a network stack. After a succinct review of essential network and networking terms, you'll compare the theoretical structure of a network stack—commonly called the OSI model—to real-world networking. You'll then trace how data travels through the computer for transmission on the network.

    Path of a Packet

    You'll pick up right where the last lesson left with a discussion on how a unit of computer data—called a packet—gets from one computer to another. You'll learn all about how packets are formed, how packets are sometimes chopped then reassembled to go across WAN links, and how the receiving computer handles packets upon arrival. You'll also learn why the network's most important device is the router.

    Routing

    This lesson is dedicated to helping you understand how routers operate. You'll learn all about how routers create a virtual map of the entire Internet. You'll also see how routers connect to different network types—an Ethernet segment and an ATM link, for example—and transmit data across those different mediums. The lesson will then discuss why routers have their own special languages, called routing protocols.

    Routing Protocols Explained

    In this lesson, you'll learn the language of routers: routing protocols. You'll learn why some routing protocols are appropriate for smaller networks, and why very large networks require specialized routing protocols. You'll also learn about the two most revealing measurements of a router's capability: latency and packets per second (pps).

    TCP/IP in Detail

    You've heard of TCP/IP, but its details may seem mysterious. After you complete this lesson, those mysteries will be banished forever! You'll learn about IP addressing, the four primary IP address classes, and all about the various protocols that come packaged within TCP/IP. Prepare to demystify TCP/IP!

    Fundamentals of Networking Security

    Security is on everyone's mind these days, so in this lesson, you'll learn the fundamentals of how computers enforce security. You'll learn what a security descriptor is and how it can allow some people to only read a document, while others can delete or modify the document as much as they like. You'll also learn the difference between a security implementation and security protocols. Finally, you'll find out how security operates in a Windows environment, including exactly what happens during log on, authentication, and authorization.

    Encryption

    In this lesson, you'll explore encryption, a method used to secure data for transmission over the Internet. You'll learn about various encryption schemes and get firsthand knowledge of how a chunk of data gets encrypted, how it gets decrypted on the receiving end, and how this process can be made secure. You'll also learn how Secure Sockets Layer (SSL) makes it safe for you to order merchandise online, and how SSL ensures that your connection to the seller's website is secure.

    Virtual Private Networks

    The Internet is a great public network, but what if you need it for private communication? For example, what if a salesman needs to make a private connection to their company's network to check on special bulk pricing? In this lesson, you'll learn how you can create a virtual private network out of your Internet connection. You'll get a hands-on view of how these private connections are made, and why they're so useful.

    DNS Names, Concepts, and Components

    The Internet, and almost every other network today, uses Domain Name System (DNS) to translate human-readable names (like www addresses) into IP addresses that computers can use. It's important to understand how this system works, so in this chapter you'll learn details about how DNS operates. You'll learn how resource records are the building blocks of DNS, and how DNS scales to the entire Internet by being broken into zones.

    DNS Resource Records and Resolution

    This lesson will expand on the discussion of DNS. Here you'll learn about the most important types of resource records, including A records, SOA records, and others. You'll also learn about the two types of DNS queries: recursive and iterative. There are many other resource record types, and you'll learn about those as well. By the end of the lesson, it'll be clear just how important DNS is to people's daily lives!

    Internet Servers and Services

    In this lesson, you'll learn how Internet servers operate, including how a web page is requested and transmitted to your computer, then displayed on your screen. You'll also learn about the two primary web protocols—HTTP and HTML. There are other Internet-based services, such as email servers, news servers, and instant messaging, and you'll investigate those in this lesson, too.

    Understanding Servers

    Have you ever wondered about the difference between a desktop computer and a server? Have you heard of cloud computing, but don't know exactly what it means? The final lesson will go over the differences between server-class operating systems and server-class computers and go in-depth about the various hardware components that comprise a true server-class computer. Understanding why a desktop computer shouldn't be used as a departmental server is important! You'll also learn what cloud computing is, why it's such a compelling platform, and how data centers provide all that computing power.


    What you will learn

    • Learn crucial real-world applications for the computing and networking knowledge you attain
    • Examine all of today's important issues and concerns - privacy, security, data transfer speeds, and cloud computing
    • Learn about IP addressing, the four primary IP address classes, and all about the various protocols that come packaged within TCP/IP
    • Learn various encryption schemes and acquire firsthand knowledge of how data is encrypted, processed, and secured

    How you will benefit

    • Gain the insight you will need for a career in computer networking or training for CCNA certification
    • Discover the ins and outs of the most pressing issues affecting computer networking today
    • Acquire knowledge with applications for both your work and personal life

    David Iseminger

    David Iseminger is an author and technology veteran, with expertise in computing, networking, wireless and cloud technologies, data and analytics, artificial intelligence, and blockchain. While with Microsoft, David worked on early versions of Windows and its core networking infrastructure, and on transmission protocols, security, data visualizations, and multiple emerging cloud technologies. David is passionate about education, serving as a School Board director for over 10 years, advocating at state and federal levels for increased learning standards, and has taught over 40,000 students through multiple technology courses. He has an awarded patent in Artificial Intelligence (AI) object detection and social posting methodologies, and is the founder and CEO of the blockchain company that created IronWeave, the unlimited scale blockchain platform, based on his patent-pending blockchain innovations and inventions.


    Gain a full understanding of almost every aspect of networking technology as you prepare for CCNA certification. This course will build your knowledge of networks and networking, with detailed treatments of TCP/IP, how switches and routers operate, DNS, and more with real-world applications for the concepts you learn.

 

  • Intermediate Networking 
  • Fee: $139.00
    Item Number: 252OCTP273842
    Dates: 5/14/2025 - 6/30/2025
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Gain practical experience in a hot new career field. Topics include VPNs, security, and Internet connectivity.


    Learn real-world applications for the concepts you learned in Introduction to Networking. Continue to build your knowledge of networks and networking, with detailed treatments of TCP/IP, how switches and routers operate, DNS, and more.

    You will gain a full understanding of almost every aspect of networking technology, including hot topics such as virtual private networks, security, Internet connectivity, and cloud computing. Completion of this course and its prerequisite should serve as a springboard for a career in computer networking or training for CCNA Certification.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    Getting up to Speed

    In the first lesson, you'll learn about the concept of a network stack. After a succinct review of essential network and networking terms, you'll compare the theoretical structure of a network stack—commonly called the OSI model—to real-world networking. You'll then trace how data travels through the computer for transmission on the network.

    Path of a Packet

    You'll pick up right where the last lesson left with a discussion on how a unit of computer data—called a packet—gets from one computer to another. You'll learn all about how packets are formed, how packets are sometimes chopped then reassembled to go across WAN links, and how the receiving computer handles packets upon arrival. You'll also learn why the network's most important device is the router.

    Routing

    This lesson is dedicated to helping you understand how routers operate. You'll learn all about how routers create a virtual map of the entire Internet. You'll also see how routers connect to different network types—an Ethernet segment and an ATM link, for example—and transmit data across those different mediums. The lesson will then discuss why routers have their own special languages, called routing protocols.

    Routing Protocols Explained

    In this lesson, you'll learn the language of routers: routing protocols. You'll learn why some routing protocols are appropriate for smaller networks, and why very large networks require specialized routing protocols. You'll also learn about the two most revealing measurements of a router's capability: latency and packets per second (pps).

    TCP/IP in Detail

    You've heard of TCP/IP, but its details may seem mysterious. After you complete this lesson, those mysteries will be banished forever! You'll learn about IP addressing, the four primary IP address classes, and all about the various protocols that come packaged within TCP/IP. Prepare to demystify TCP/IP!

    Fundamentals of Networking Security

    Security is on everyone's mind these days, so in this lesson, you'll learn the fundamentals of how computers enforce security. You'll learn what a security descriptor is and how it can allow some people to only read a document, while others can delete or modify the document as much as they like. You'll also learn the difference between a security implementation and security protocols. Finally, you'll find out how security operates in a Windows environment, including exactly what happens during log on, authentication, and authorization.

    Encryption

    In this lesson, you'll explore encryption, a method used to secure data for transmission over the Internet. You'll learn about various encryption schemes and get firsthand knowledge of how a chunk of data gets encrypted, how it gets decrypted on the receiving end, and how this process can be made secure. You'll also learn how Secure Sockets Layer (SSL) makes it safe for you to order merchandise online, and how SSL ensures that your connection to the seller's website is secure.

    Virtual Private Networks

    The Internet is a great public network, but what if you need it for private communication? For example, what if a salesman needs to make a private connection to their company's network to check on special bulk pricing? In this lesson, you'll learn how you can create a virtual private network out of your Internet connection. You'll get a hands-on view of how these private connections are made, and why they're so useful.

    DNS Names, Concepts, and Components

    The Internet, and almost every other network today, uses Domain Name System (DNS) to translate human-readable names (like www addresses) into IP addresses that computers can use. It's important to understand how this system works, so in this chapter you'll learn details about how DNS operates. You'll learn how resource records are the building blocks of DNS, and how DNS scales to the entire Internet by being broken into zones.

    DNS Resource Records and Resolution

    This lesson will expand on the discussion of DNS. Here you'll learn about the most important types of resource records, including A records, SOA records, and others. You'll also learn about the two types of DNS queries: recursive and iterative. There are many other resource record types, and you'll learn about those as well. By the end of the lesson, it'll be clear just how important DNS is to people's daily lives!

    Internet Servers and Services

    In this lesson, you'll learn how Internet servers operate, including how a web page is requested and transmitted to your computer, then displayed on your screen. You'll also learn about the two primary web protocols—HTTP and HTML. There are other Internet-based services, such as email servers, news servers, and instant messaging, and you'll investigate those in this lesson, too.

    Understanding Servers

    Have you ever wondered about the difference between a desktop computer and a server? Have you heard of cloud computing, but don't know exactly what it means? The final lesson will go over the differences between server-class operating systems and server-class computers and go in-depth about the various hardware components that comprise a true server-class computer. Understanding why a desktop computer shouldn't be used as a departmental server is important! You'll also learn what cloud computing is, why it's such a compelling platform, and how data centers provide all that computing power.


    What you will learn

    • Learn crucial real-world applications for the computing and networking knowledge you attain
    • Examine all of today's important issues and concerns - privacy, security, data transfer speeds, and cloud computing
    • Learn about IP addressing, the four primary IP address classes, and all about the various protocols that come packaged within TCP/IP
    • Learn various encryption schemes and acquire firsthand knowledge of how data is encrypted, processed, and secured

    How you will benefit

    • Gain the insight you will need for a career in computer networking or training for CCNA certification
    • Discover the ins and outs of the most pressing issues affecting computer networking today
    • Acquire knowledge with applications for both your work and personal life

    David Iseminger

    David Iseminger is an author and technology veteran, with expertise in computing, networking, wireless and cloud technologies, data and analytics, artificial intelligence, and blockchain. While with Microsoft, David worked on early versions of Windows and its core networking infrastructure, and on transmission protocols, security, data visualizations, and multiple emerging cloud technologies. David is passionate about education, serving as a School Board director for over 10 years, advocating at state and federal levels for increased learning standards, and has taught over 40,000 students through multiple technology courses. He has an awarded patent in Artificial Intelligence (AI) object detection and social posting methodologies, and is the founder and CEO of the blockchain company that created IronWeave, the unlimited scale blockchain platform, based on his patent-pending blockchain innovations and inventions.


    Gain a full understanding of almost every aspect of networking technology as you prepare for CCNA certification. This course will build your knowledge of networks and networking, with detailed treatments of TCP/IP, how switches and routers operate, DNS, and more with real-world applications for the concepts you learn.

 

  • Intermediate Networking 
  • Fee: $139.00
    Item Number: TesOCTP27384203
    Dates: 6/11/2025 - 12/22/2030
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Gain practical experience in a hot new career field. Topics include VPNs, security, and Internet connectivity.


    Learn real-world applications for the concepts you learned in Introduction to Networking. Continue to build your knowledge of networks and networking, with detailed treatments of TCP/IP, how switches and routers operate, DNS, and more.

    You will gain a full understanding of almost every aspect of networking technology, including hot topics such as virtual private networks, security, Internet connectivity, and cloud computing. Completion of this course and its prerequisite should serve as a springboard for a career in computer networking or training for CCNA Certification.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    Getting up to Speed

    In the first lesson, you'll learn about the concept of a network stack. After a succinct review of essential network and networking terms, you'll compare the theoretical structure of a network stack—commonly called the OSI model—to real-world networking. You'll then trace how data travels through the computer for transmission on the network.

    Path of a Packet

    You'll pick up right where the last lesson left with a discussion on how a unit of computer data—called a packet—gets from one computer to another. You'll learn all about how packets are formed, how packets are sometimes chopped then reassembled to go across WAN links, and how the receiving computer handles packets upon arrival. You'll also learn why the network's most important device is the router.

    Routing

    This lesson is dedicated to helping you understand how routers operate. You'll learn all about how routers create a virtual map of the entire Internet. You'll also see how routers connect to different network types—an Ethernet segment and an ATM link, for example—and transmit data across those different mediums. The lesson will then discuss why routers have their own special languages, called routing protocols.

    Routing Protocols Explained

    In this lesson, you'll learn the language of routers: routing protocols. You'll learn why some routing protocols are appropriate for smaller networks, and why very large networks require specialized routing protocols. You'll also learn about the two most revealing measurements of a router's capability: latency and packets per second (pps).

    TCP/IP in Detail

    You've heard of TCP/IP, but its details may seem mysterious. After you complete this lesson, those mysteries will be banished forever! You'll learn about IP addressing, the four primary IP address classes, and all about the various protocols that come packaged within TCP/IP. Prepare to demystify TCP/IP!

    Fundamentals of Networking Security

    Security is on everyone's mind these days, so in this lesson, you'll learn the fundamentals of how computers enforce security. You'll learn what a security descriptor is and how it can allow some people to only read a document, while others can delete or modify the document as much as they like. You'll also learn the difference between a security implementation and security protocols. Finally, you'll find out how security operates in a Windows environment, including exactly what happens during log on, authentication, and authorization.

    Encryption

    In this lesson, you'll explore encryption, a method used to secure data for transmission over the Internet. You'll learn about various encryption schemes and get firsthand knowledge of how a chunk of data gets encrypted, how it gets decrypted on the receiving end, and how this process can be made secure. You'll also learn how Secure Sockets Layer (SSL) makes it safe for you to order merchandise online, and how SSL ensures that your connection to the seller's website is secure.

    Virtual Private Networks

    The Internet is a great public network, but what if you need it for private communication? For example, what if a salesman needs to make a private connection to their company's network to check on special bulk pricing? In this lesson, you'll learn how you can create a virtual private network out of your Internet connection. You'll get a hands-on view of how these private connections are made, and why they're so useful.

    DNS Names, Concepts, and Components

    The Internet, and almost every other network today, uses Domain Name System (DNS) to translate human-readable names (like www addresses) into IP addresses that computers can use. It's important to understand how this system works, so in this chapter you'll learn details about how DNS operates. You'll learn how resource records are the building blocks of DNS, and how DNS scales to the entire Internet by being broken into zones.

    DNS Resource Records and Resolution

    This lesson will expand on the discussion of DNS. Here you'll learn about the most important types of resource records, including A records, SOA records, and others. You'll also learn about the two types of DNS queries: recursive and iterative. There are many other resource record types, and you'll learn about those as well. By the end of the lesson, it'll be clear just how important DNS is to people's daily lives!

    Internet Servers and Services

    In this lesson, you'll learn how Internet servers operate, including how a web page is requested and transmitted to your computer, then displayed on your screen. You'll also learn about the two primary web protocols—HTTP and HTML. There are other Internet-based services, such as email servers, news servers, and instant messaging, and you'll investigate those in this lesson, too.

    Understanding Servers

    Have you ever wondered about the difference between a desktop computer and a server? Have you heard of cloud computing, but don't know exactly what it means? The final lesson will go over the differences between server-class operating systems and server-class computers and go in-depth about the various hardware components that comprise a true server-class computer. Understanding why a desktop computer shouldn't be used as a departmental server is important! You'll also learn what cloud computing is, why it's such a compelling platform, and how data centers provide all that computing power.


    What you will learn

    • Learn crucial real-world applications for the computing and networking knowledge you attain
    • Examine all of today's important issues and concerns - privacy, security, data transfer speeds, and cloud computing
    • Learn about IP addressing, the four primary IP address classes, and all about the various protocols that come packaged within TCP/IP
    • Learn various encryption schemes and acquire firsthand knowledge of how data is encrypted, processed, and secured

    How you will benefit

    • Gain the insight you will need for a career in computer networking or training for CCNA certification
    • Discover the ins and outs of the most pressing issues affecting computer networking today
    • Acquire knowledge with applications for both your work and personal life

    David Iseminger

    David Iseminger is an author and technology veteran, with expertise in computing, networking, wireless and cloud technologies, data and analytics, artificial intelligence, and blockchain. While with Microsoft, David worked on early versions of Windows and its core networking infrastructure, and on transmission protocols, security, data visualizations, and multiple emerging cloud technologies. David is passionate about education, serving as a School Board director for over 10 years, advocating at state and federal levels for increased learning standards, and has taught over 40,000 students through multiple technology courses. He has an awarded patent in Artificial Intelligence (AI) object detection and social posting methodologies, and is the founder and CEO of the blockchain company that created IronWeave, the unlimited scale blockchain platform, based on his patent-pending blockchain innovations and inventions.


 

  • Intermediate Networking 
  • Fee: $139.00
    Item Number: 252OCTP273843
    Dates: 6/11/2025 - 6/30/2025
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Gain practical experience in a hot new career field. Topics include VPNs, security, and Internet connectivity.


    Learn real-world applications for the concepts you learned in Introduction to Networking. Continue to build your knowledge of networks and networking, with detailed treatments of TCP/IP, how switches and routers operate, DNS, and more.

    You will gain a full understanding of almost every aspect of networking technology, including hot topics such as virtual private networks, security, Internet connectivity, and cloud computing. Completion of this course and its prerequisite should serve as a springboard for a career in computer networking or training for CCNA Certification.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    Getting up to Speed

    In the first lesson, you'll learn about the concept of a network stack. After a succinct review of essential network and networking terms, you'll compare the theoretical structure of a network stack—commonly called the OSI model—to real-world networking. You'll then trace how data travels through the computer for transmission on the network.

    Path of a Packet

    You'll pick up right where the last lesson left with a discussion on how a unit of computer data—called a packet—gets from one computer to another. You'll learn all about how packets are formed, how packets are sometimes chopped then reassembled to go across WAN links, and how the receiving computer handles packets upon arrival. You'll also learn why the network's most important device is the router.

    Routing

    This lesson is dedicated to helping you understand how routers operate. You'll learn all about how routers create a virtual map of the entire Internet. You'll also see how routers connect to different network types—an Ethernet segment and an ATM link, for example—and transmit data across those different mediums. The lesson will then discuss why routers have their own special languages, called routing protocols.

    Routing Protocols Explained

    In this lesson, you'll learn the language of routers: routing protocols. You'll learn why some routing protocols are appropriate for smaller networks, and why very large networks require specialized routing protocols. You'll also learn about the two most revealing measurements of a router's capability: latency and packets per second (pps).

    TCP/IP in Detail

    You've heard of TCP/IP, but its details may seem mysterious. After you complete this lesson, those mysteries will be banished forever! You'll learn about IP addressing, the four primary IP address classes, and all about the various protocols that come packaged within TCP/IP. Prepare to demystify TCP/IP!

    Fundamentals of Networking Security

    Security is on everyone's mind these days, so in this lesson, you'll learn the fundamentals of how computers enforce security. You'll learn what a security descriptor is and how it can allow some people to only read a document, while others can delete or modify the document as much as they like. You'll also learn the difference between a security implementation and security protocols. Finally, you'll find out how security operates in a Windows environment, including exactly what happens during log on, authentication, and authorization.

    Encryption

    In this lesson, you'll explore encryption, a method used to secure data for transmission over the Internet. You'll learn about various encryption schemes and get firsthand knowledge of how a chunk of data gets encrypted, how it gets decrypted on the receiving end, and how this process can be made secure. You'll also learn how Secure Sockets Layer (SSL) makes it safe for you to order merchandise online, and how SSL ensures that your connection to the seller's website is secure.

    Virtual Private Networks

    The Internet is a great public network, but what if you need it for private communication? For example, what if a salesman needs to make a private connection to their company's network to check on special bulk pricing? In this lesson, you'll learn how you can create a virtual private network out of your Internet connection. You'll get a hands-on view of how these private connections are made, and why they're so useful.

    DNS Names, Concepts, and Components

    The Internet, and almost every other network today, uses Domain Name System (DNS) to translate human-readable names (like www addresses) into IP addresses that computers can use. It's important to understand how this system works, so in this chapter you'll learn details about how DNS operates. You'll learn how resource records are the building blocks of DNS, and how DNS scales to the entire Internet by being broken into zones.

    DNS Resource Records and Resolution

    This lesson will expand on the discussion of DNS. Here you'll learn about the most important types of resource records, including A records, SOA records, and others. You'll also learn about the two types of DNS queries: recursive and iterative. There are many other resource record types, and you'll learn about those as well. By the end of the lesson, it'll be clear just how important DNS is to people's daily lives!

    Internet Servers and Services

    In this lesson, you'll learn how Internet servers operate, including how a web page is requested and transmitted to your computer, then displayed on your screen. You'll also learn about the two primary web protocols—HTTP and HTML. There are other Internet-based services, such as email servers, news servers, and instant messaging, and you'll investigate those in this lesson, too.

    Understanding Servers

    Have you ever wondered about the difference between a desktop computer and a server? Have you heard of cloud computing, but don't know exactly what it means? The final lesson will go over the differences between server-class operating systems and server-class computers and go in-depth about the various hardware components that comprise a true server-class computer. Understanding why a desktop computer shouldn't be used as a departmental server is important! You'll also learn what cloud computing is, why it's such a compelling platform, and how data centers provide all that computing power.


    What you will learn

    • Learn crucial real-world applications for the computing and networking knowledge you attain
    • Examine all of today's important issues and concerns - privacy, security, data transfer speeds, and cloud computing
    • Learn about IP addressing, the four primary IP address classes, and all about the various protocols that come packaged within TCP/IP
    • Learn various encryption schemes and acquire firsthand knowledge of how data is encrypted, processed, and secured

    How you will benefit

    • Gain the insight you will need for a career in computer networking or training for CCNA certification
    • Discover the ins and outs of the most pressing issues affecting computer networking today
    • Acquire knowledge with applications for both your work and personal life

    David Iseminger

    David Iseminger is an author and technology veteran, with expertise in computing, networking, wireless and cloud technologies, data and analytics, artificial intelligence, and blockchain. While with Microsoft, David worked on early versions of Windows and its core networking infrastructure, and on transmission protocols, security, data visualizations, and multiple emerging cloud technologies. David is passionate about education, serving as a School Board director for over 10 years, advocating at state and federal levels for increased learning standards, and has taught over 40,000 students through multiple technology courses. He has an awarded patent in Artificial Intelligence (AI) object detection and social posting methodologies, and is the founder and CEO of the blockchain company that created IronWeave, the unlimited scale blockchain platform, based on his patent-pending blockchain innovations and inventions.


 

  • Intermediate Networking (Self-Guided) 
  • Fee: $139.00
    Item Number: TesOCTP277731
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Gain practical experience in a hot new career field. Topics include VPNs, security, and Internet connectivity.


    Learn real-world applications for the concepts you learned in Introduction to Networking. Continue to build your knowledge of networks and networking, with detailed treatments of TCP/IP, how switches and routers operate, DNS, and more.

    You will gain a full understanding of almost every aspect of networking technology, including hot topics such as virtual private networks, security, Internet connectivity, and cloud computing. Completion of this course and its prerequisite should serve as a springboard for a career in computer networking or training for CCNA Certification.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    Gain practical experience in a hot new career field. Topics include VPNs, security, and Internet connectivity.


    1. Getting up to Speed
    2. Path of a Packet
    3. Routing
    4. Routing Protocols Explained
    5. TCP/IP in Detail
    6. Fundamentals of Networking Security
    7. Encryption
    8. Virtual Private Networks
    9. DNS Names, Concepts, and Components
    10. DNS Resource Records and Resolution
    11. Internet Servers and Services
    12. Understanding Servers


    Self-Study

    Gain practical experience in a hot new career field. Topics include VPNs, security, and Internet connectivity.

 

  • Intermediate Networking (Self-Guided) 
  • Fee: $139.00
    Item Number: 252OCTP277731
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Gain practical experience in a hot new career field. Topics include VPNs, security, and Internet connectivity.


    Learn real-world applications for the concepts you learned in Introduction to Networking. Continue to build your knowledge of networks and networking, with detailed treatments of TCP/IP, how switches and routers operate, DNS, and more.

    You will gain a full understanding of almost every aspect of networking technology, including hot topics such as virtual private networks, security, Internet connectivity, and cloud computing. Completion of this course and its prerequisite should serve as a springboard for a career in computer networking or training for CCNA Certification.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    Gain practical experience in a hot new career field. Topics include VPNs, security, and Internet connectivity.


    1. Getting up to Speed
    2. Path of a Packet
    3. Routing
    4. Routing Protocols Explained
    5. TCP/IP in Detail
    6. Fundamentals of Networking Security
    7. Encryption
    8. Virtual Private Networks
    9. DNS Names, Concepts, and Components
    10. DNS Resource Records and Resolution
    11. Internet Servers and Services
    12. Understanding Servers


    Self-Study

    Gain practical experience in a hot new career field. Topics include VPNs, security, and Internet connectivity.

 

  • Introduction to Cybersecurity 
  • Fee: $139.00
    Item Number: TesOCTP279241
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This introductory course is for those with little to no cybersecurity experience that want to learn more about this growing industry.


    This self-paced course is designed to help you increase your knowledge of cybersecurity and technology fundamentals to fill knowledge gaps in your current role or pursue an entry-level career in this in-demand field. We answer questions around what cybersecurity is, what an operating system does and the most common types, cloud computing, and many other topics related to cybersecurity foundations.

    You will have the opportunity to develop your foundational cybersecurity skills through hands-on demonstrations as you follow along with the instructor videos, learn time-saving tips to increase your efficiency, and establish best practices.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    This course gives you the option of following along with the instructor on a few video-based exercises, allowing you to pause and replay until you are confident in your skillset. Should you wish to follow along, it is recommended that you have the following: Windows 10 environment, Wireshark, an AWS account (free tier), and a Windows 2016 VM (available in the AWS free tier).

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The need for skilled cybersecurity professionals continues to grow year over year, making it a great time to enter this in-demand industry.

    In this video-based learning course, you will learn fundamentals of cybersecurity such as concepts, commands, and tools from an experienced professional through lectures and follow-along demonstrations. You will also learn about cloud computing, networking, cybersecurity policy, and frameworks, as well as risk management and security auditing in a 100% online, self-paced training format.

    By the completion of your course, you will have a firm understanding of cybersecurity foundations, including key concepts and best practices.


    1. Cybersecurity Foundations
    2. Operating Systems
    3. Windows Command Line Foundations
    4. Network Fundamentals
    5. Cloud Computing Fundamentals
    6. Cybersecurity Policy, Framework, and Guidelines
    7. Cybersecurity Audit Foundations
    8. Risk Management
    9. Penetration Testing - Demonstration

    What you will learn

    • Understand what cybersecurity entails
    • Identify the three most common operating systems
    • Execute simple commands
    • Learn about cloud computing and networking
    • Learn about cybersecurity policies, frameworks, audits, and risk management

    How you will benefit

    • Learn if a career in cybersecurity could be right for you
    • Increase your baseline knowledge of foundational cybersecurity concepts
    • Learn tips and tricks from a working cybersecurity professional
    • Follow along with hands-on demonstrations to develop and practice your foundational skills
    • Finish in three months or less

    Self-Study

    The need for skilled cybersecurity professionals continues to grow year over year, making it a great time to enter this in-demand industry.

    In this video-based learning course, you will learn fundamentals of cybersecurity such as concepts, commands, and tools from an experienced professional through lectures and follow-along demonstrations. You will also learn about cloud computing, networking, cybersecurity policy, and frameworks, as well as risk management and security auditing in a 100% online, self-paced training format.

    By the completion of your course, you will have a firm understanding of cybersecurity foundations, including key concepts and best practices.

 

  • Introduction to Cybersecurity 
  • Fee: $139.00
    Item Number: 252OCTP279241
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This introductory course is for those with little to no cybersecurity experience that want to learn more about this growing industry.


    This self-paced course is designed to help you increase your knowledge of cybersecurity and technology fundamentals to fill knowledge gaps in your current role or pursue an entry-level career in this in-demand field. We answer questions around what cybersecurity is, what an operating system does and the most common types, cloud computing, and many other topics related to cybersecurity foundations.

    You will have the opportunity to develop your foundational cybersecurity skills through hands-on demonstrations as you follow along with the instructor videos, learn time-saving tips to increase your efficiency, and establish best practices.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    This course gives you the option of following along with the instructor on a few video-based exercises, allowing you to pause and replay until you are confident in your skillset. Should you wish to follow along, it is recommended that you have the following: Windows 10 environment, Wireshark, an AWS account (free tier), and a Windows 2016 VM (available in the AWS free tier).

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The need for skilled cybersecurity professionals continues to grow year over year, making it a great time to enter this in-demand industry.

    In this video-based learning course, you will learn fundamentals of cybersecurity such as concepts, commands, and tools from an experienced professional through lectures and follow-along demonstrations. You will also learn about cloud computing, networking, cybersecurity policy, and frameworks, as well as risk management and security auditing in a 100% online, self-paced training format.

    By the completion of your course, you will have a firm understanding of cybersecurity foundations, including key concepts and best practices.


    1. Cybersecurity Foundations
    2. Operating Systems
    3. Windows Command Line Foundations
    4. Network Fundamentals
    5. Cloud Computing Fundamentals
    6. Cybersecurity Policy, Framework, and Guidelines
    7. Cybersecurity Audit Foundations
    8. Risk Management
    9. Penetration Testing - Demonstration

    What you will learn

    • Understand what cybersecurity entails
    • Identify the three most common operating systems
    • Execute simple commands
    • Learn about cloud computing and networking
    • Learn about cybersecurity policies, frameworks, audits, and risk management

    How you will benefit

    • Learn if a career in cybersecurity could be right for you
    • Increase your baseline knowledge of foundational cybersecurity concepts
    • Learn tips and tricks from a working cybersecurity professional
    • Follow along with hands-on demonstrations to develop and practice your foundational skills
    • Finish in three months or less

    Self-Study

    The need for skilled cybersecurity professionals continues to grow year over year, making it a great time to enter this in-demand industry.

    In this video-based learning course, you will learn fundamentals of cybersecurity such as concepts, commands, and tools from an experienced professional through lectures and follow-along demonstrations. You will also learn about cloud computing, networking, cybersecurity policy, and frameworks, as well as risk management and security auditing in a 100% online, self-paced training format.

    By the completion of your course, you will have a firm understanding of cybersecurity foundations, including key concepts and best practices.

 

  • Introduction to Networking 
  • Fee: $139.00
    Item Number: TesOCTP27365202
    Dates: 5/14/2025 - 12/22/2030
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network.


    Businesses, schools, and other organizations rely on computer networks, which explains why employees and contributors with networking skills are in high demand.

    Are you ready to learn the fundamentals of computer networking in terms you can easily understand? If so, the online Introduction to Networking course will help you understand why networks have become so important, how software and hardware make networking possible, and how networks function. This course will also give you the foundation to understand and get ahead in any career involving the world of computers, networks, the Internet, and the cloud.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 10 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    History of Networking

    Have you ever wondered how networks started? We're surrounded by networks, whether they're computer networks, networks of roads, or the network of telephones that allow us to communicate every day. In our first lesson, you'll learn how networks have evolved over the last hundred years. You'll also find out why every additional device that connects to a network greatly increases the value of the network. By the time you've completed this lesson, you'll have a framework of knowledge that will take you through the rest of the course.

    How Networks Operate

    In this lesson, you'll jump right into networks and networking, and learn how they work. We'll use examples from our everyday experience. You'll learn how to tell the difference between a network and networking, and realize that computer networks are a lot like freeway networks. You'll never look at an interstate the same way again! You'll also find out why shipping your data from one computer to the next is a lot like sending your distant uncle a new cookie jar for his birthday. Believe it or not, freeways and shipped gifts have a direct correlation to how networks and networking operate!

    Peer-To-Peer Versus Client/Server

    Have you ever heard someone refer to a computer as a server? Maybe you've heard someone talk about connecting computers in a peer-to-peer environment. Understanding the difference between client/server and peer-to-peer networks really helps you learn about computers and networking. So in this lesson, you'll learn how to tell the difference between client/server and peer-to-peer networks, and when to use one instead of the other.

    Network Types and Topologies

    Many people have heard of Ethernet, but what does that mean exactly? In this lesson, you'll learn all about Ethernet and a whole lot more. Here you'll learn the difference between a star topology and a bus topology, and the advantages of each. Is Ethernet or Token Ring the best modern network technology, and why? In this lesson you'll get those answers and many more!

    Segmentation and Routing

    In this lesson we'll explore how routers operate, and you'll see why routers operate a lot like how a receptionist in a growing company handles telephone calls. We'll build on information you learned in previous lessons, and then you'll find out how a single interconnected network (the Internet) can actually span the entire globe. A global network is an amazing feat, accomplished by interconnecting network segments and routing data! When you've completed this lesson, you'll understand how routing helps our data to cross the city, state, or an entire ocean.

    Protocols

    When people communicate they speak a language, such as English or French, to exchange information. Computers communicate similarly over a network, but instead of speaking a language they use something called a protocol. Protocols are similar to languages and in this lesson, you'll learn about the protocols used in networking. You'll also learn which protocol has emerged as the dominant computer protocol, and why!

    TCP/IP

    In this lesson you'll learn how the networking protocol TCP/IP operates. TCP/IP is a collection of protocols, and we'll discuss how TCP/IP divides its tasks. We'll go over how TCP/IP uses addresses to direct data to its rightful owner - it's similar to how we use street addresses.

    Name Resolution and Services

    Have you ever wondered how your computer converts a Web address into a website that appears on your screen? In this lesson you'll learn how the Domain Name System (DNS) translates names into numeric addresses, and how all that allows your favorite website, email, or file to appear on your computer screen. You'll also learn how the entire computer industry comes to a consensus about how the Internet should work.

    Wide Area Networks (WANs)

    We'll take a look at Wide Area Networks (WANs) and how they compare to Local Area Networks (LANs), and we'll discuss different types of modern WANs. You'll learn all about how data gets sent over long distances and how the Internet changed expensive, long-distance network connections. You'll also learn how VPNs secure those Internet connections from prying eyes.

    Remote Access

    If you connect to the Internet, you use remote access. In this lesson, we'll explore the traditional means of connecting to remote LANs and talk about exactly how DSL and cable Internet access works. Then we'll discuss other means by which many people connect to the Internet, including wireless and cellular networks.

    Making Internet Connections

    In this lesson you'll apply many of the concepts you've learned so far in this course. We'll walk through the process of building a network with many different wired and wireless devices. Each step of the way, you'll come to understand what's going on behind the scenes. From there we'll jump to connecting to the Internet using broadband connections, configuring a home router, and testing what you've done.

    Review and Conclusion

    In our final lesson we'll tie all the previous lessons together, clarifying how new information about networks and networking can be quickly understood. You'll learn three categories into which networking knowledge can be placed, and see examples to apply your newfound network categories. By the end of this lesson, your understanding of networking will be solid as a rock, and you'll be well-prepared for a lifetime of continued learning about networks and networking!


    What you will learn

    • Learn how and why networks work rather than focusing on memorization of terms and numbers
    • Be capable of performing basic computer networking tasks
    • Understand the difference between client/server and peer-to peer networks
    • Learn how routers operate
    • Learn to connect to the Internet using broadband connections, configuring a home router, and testing what you've done
    • Be well prepared to apply your newfound knowledge to future changes in networks and networking

    How you will benefit

    • Easily understand how and why computer networking works
    • Have access to an instructor who completely understands networking and can convey that understanding to others
    • Prove helpful in your day to day dealings with computer networks and the Internet
    • Be well prepared for a lifetime of continued learning about networks and networking

    David Iseminger

    David Iseminger is an author and technology veteran, with expertise in computing, networking, wireless and cloud technologies, data and analytics, artificial intelligence, and blockchain. While with Microsoft, David worked on early versions of Windows and its core networking infrastructure, and on transmission protocols, security, data visualizations, and multiple emerging cloud technologies. David is passionate about education, serving as a School Board director for over 10 years, advocating at state and federal levels for increased learning standards, and has taught over 40,000 students through multiple technology courses. He has an awarded patent in Artificial Intelligence (AI) object detection and social posting methodologies, and is the founder and CEO of the blockchain company that created IronWeave, the unlimited scale blockchain platform, based on his patent-pending blockchain innovations and inventions.


    Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network. This course explains computer networking basics in easy-to-understand terms, using concepts common to everyday, non-computing experience.

 

  • Introduction to Networking 
  • Fee: $139.00
    Item Number: 252OCTP273652
    Dates: 5/14/2025 - 6/30/2025
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network.


    Businesses, schools, and other organizations rely on computer networks, which explains why employees and contributors with networking skills are in high demand.

    Are you ready to learn the fundamentals of computer networking in terms you can easily understand? If so, the online Introduction to Networking course will help you understand why networks have become so important, how software and hardware make networking possible, and how networks function. This course will also give you the foundation to understand and get ahead in any career involving the world of computers, networks, the Internet, and the cloud.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 10 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    History of Networking

    Have you ever wondered how networks started? We're surrounded by networks, whether they're computer networks, networks of roads, or the network of telephones that allow us to communicate every day. In our first lesson, you'll learn how networks have evolved over the last hundred years. You'll also find out why every additional device that connects to a network greatly increases the value of the network. By the time you've completed this lesson, you'll have a framework of knowledge that will take you through the rest of the course.

    How Networks Operate

    In this lesson, you'll jump right into networks and networking, and learn how they work. We'll use examples from our everyday experience. You'll learn how to tell the difference between a network and networking, and realize that computer networks are a lot like freeway networks. You'll never look at an interstate the same way again! You'll also find out why shipping your data from one computer to the next is a lot like sending your distant uncle a new cookie jar for his birthday. Believe it or not, freeways and shipped gifts have a direct correlation to how networks and networking operate!

    Peer-To-Peer Versus Client/Server

    Have you ever heard someone refer to a computer as a server? Maybe you've heard someone talk about connecting computers in a peer-to-peer environment. Understanding the difference between client/server and peer-to-peer networks really helps you learn about computers and networking. So in this lesson, you'll learn how to tell the difference between client/server and peer-to-peer networks, and when to use one instead of the other.

    Network Types and Topologies

    Many people have heard of Ethernet, but what does that mean exactly? In this lesson, you'll learn all about Ethernet and a whole lot more. Here you'll learn the difference between a star topology and a bus topology, and the advantages of each. Is Ethernet or Token Ring the best modern network technology, and why? In this lesson you'll get those answers and many more!

    Segmentation and Routing

    In this lesson we'll explore how routers operate, and you'll see why routers operate a lot like how a receptionist in a growing company handles telephone calls. We'll build on information you learned in previous lessons, and then you'll find out how a single interconnected network (the Internet) can actually span the entire globe. A global network is an amazing feat, accomplished by interconnecting network segments and routing data! When you've completed this lesson, you'll understand how routing helps our data to cross the city, state, or an entire ocean.

    Protocols

    When people communicate they speak a language, such as English or French, to exchange information. Computers communicate similarly over a network, but instead of speaking a language they use something called a protocol. Protocols are similar to languages and in this lesson, you'll learn about the protocols used in networking. You'll also learn which protocol has emerged as the dominant computer protocol, and why!

    TCP/IP

    In this lesson you'll learn how the networking protocol TCP/IP operates. TCP/IP is a collection of protocols, and we'll discuss how TCP/IP divides its tasks. We'll go over how TCP/IP uses addresses to direct data to its rightful owner - it's similar to how we use street addresses.

    Name Resolution and Services

    Have you ever wondered how your computer converts a Web address into a website that appears on your screen? In this lesson you'll learn how the Domain Name System (DNS) translates names into numeric addresses, and how all that allows your favorite website, email, or file to appear on your computer screen. You'll also learn how the entire computer industry comes to a consensus about how the Internet should work.

    Wide Area Networks (WANs)

    We'll take a look at Wide Area Networks (WANs) and how they compare to Local Area Networks (LANs), and we'll discuss different types of modern WANs. You'll learn all about how data gets sent over long distances and how the Internet changed expensive, long-distance network connections. You'll also learn how VPNs secure those Internet connections from prying eyes.

    Remote Access

    If you connect to the Internet, you use remote access. In this lesson, we'll explore the traditional means of connecting to remote LANs and talk about exactly how DSL and cable Internet access works. Then we'll discuss other means by which many people connect to the Internet, including wireless and cellular networks.

    Making Internet Connections

    In this lesson you'll apply many of the concepts you've learned so far in this course. We'll walk through the process of building a network with many different wired and wireless devices. Each step of the way, you'll come to understand what's going on behind the scenes. From there we'll jump to connecting to the Internet using broadband connections, configuring a home router, and testing what you've done.

    Review and Conclusion

    In our final lesson we'll tie all the previous lessons together, clarifying how new information about networks and networking can be quickly understood. You'll learn three categories into which networking knowledge can be placed, and see examples to apply your newfound network categories. By the end of this lesson, your understanding of networking will be solid as a rock, and you'll be well-prepared for a lifetime of continued learning about networks and networking!


    What you will learn

    • Learn how and why networks work rather than focusing on memorization of terms and numbers
    • Be capable of performing basic computer networking tasks
    • Understand the difference between client/server and peer-to peer networks
    • Learn how routers operate
    • Learn to connect to the Internet using broadband connections, configuring a home router, and testing what you've done
    • Be well prepared to apply your newfound knowledge to future changes in networks and networking

    How you will benefit

    • Easily understand how and why computer networking works
    • Have access to an instructor who completely understands networking and can convey that understanding to others
    • Prove helpful in your day to day dealings with computer networks and the Internet
    • Be well prepared for a lifetime of continued learning about networks and networking

    David Iseminger

    David Iseminger is an author and technology veteran, with expertise in computing, networking, wireless and cloud technologies, data and analytics, artificial intelligence, and blockchain. While with Microsoft, David worked on early versions of Windows and its core networking infrastructure, and on transmission protocols, security, data visualizations, and multiple emerging cloud technologies. David is passionate about education, serving as a School Board director for over 10 years, advocating at state and federal levels for increased learning standards, and has taught over 40,000 students through multiple technology courses. He has an awarded patent in Artificial Intelligence (AI) object detection and social posting methodologies, and is the founder and CEO of the blockchain company that created IronWeave, the unlimited scale blockchain platform, based on his patent-pending blockchain innovations and inventions.


    Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network. This course explains computer networking basics in easy-to-understand terms, using concepts common to everyday, non-computing experience.

 

  • Introduction to Networking 
  • Fee: $139.00
    Item Number: TesOCTP27365203
    Dates: 6/11/2025 - 12/22/2030
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network.


    Businesses, schools, and other organizations rely on computer networks, which explains why employees and contributors with networking skills are in high demand.

    Are you ready to learn the fundamentals of computer networking in terms you can easily understand? If so, the online Introduction to Networking course will help you understand why networks have become so important, how software and hardware make networking possible, and how networks function. This course will also give you the foundation to understand and get ahead in any career involving the world of computers, networks, the Internet, and the cloud.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 10 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    History of Networking

    Have you ever wondered how networks started? We're surrounded by networks, whether they're computer networks, networks of roads, or the network of telephones that allow us to communicate every day. In our first lesson, you'll learn how networks have evolved over the last hundred years. You'll also find out why every additional device that connects to a network greatly increases the value of the network. By the time you've completed this lesson, you'll have a framework of knowledge that will take you through the rest of the course.

    How Networks Operate

    In this lesson, you'll jump right into networks and networking, and learn how they work. We'll use examples from our everyday experience. You'll learn how to tell the difference between a network and networking, and realize that computer networks are a lot like freeway networks. You'll never look at an interstate the same way again! You'll also find out why shipping your data from one computer to the next is a lot like sending your distant uncle a new cookie jar for his birthday. Believe it or not, freeways and shipped gifts have a direct correlation to how networks and networking operate!

    Peer-To-Peer Versus Client/Server

    Have you ever heard someone refer to a computer as a server? Maybe you've heard someone talk about connecting computers in a peer-to-peer environment. Understanding the difference between client/server and peer-to-peer networks really helps you learn about computers and networking. So in this lesson, you'll learn how to tell the difference between client/server and peer-to-peer networks, and when to use one instead of the other.

    Network Types and Topologies

    Many people have heard of Ethernet, but what does that mean exactly? In this lesson, you'll learn all about Ethernet and a whole lot more. Here you'll learn the difference between a star topology and a bus topology, and the advantages of each. Is Ethernet or Token Ring the best modern network technology, and why? In this lesson you'll get those answers and many more!

    Segmentation and Routing

    In this lesson we'll explore how routers operate, and you'll see why routers operate a lot like how a receptionist in a growing company handles telephone calls. We'll build on information you learned in previous lessons, and then you'll find out how a single interconnected network (the Internet) can actually span the entire globe. A global network is an amazing feat, accomplished by interconnecting network segments and routing data! When you've completed this lesson, you'll understand how routing helps our data to cross the city, state, or an entire ocean.

    Protocols

    When people communicate they speak a language, such as English or French, to exchange information. Computers communicate similarly over a network, but instead of speaking a language they use something called a protocol. Protocols are similar to languages and in this lesson, you'll learn about the protocols used in networking. You'll also learn which protocol has emerged as the dominant computer protocol, and why!

    TCP/IP

    In this lesson you'll learn how the networking protocol TCP/IP operates. TCP/IP is a collection of protocols, and we'll discuss how TCP/IP divides its tasks. We'll go over how TCP/IP uses addresses to direct data to its rightful owner - it's similar to how we use street addresses.

    Name Resolution and Services

    Have you ever wondered how your computer converts a Web address into a website that appears on your screen? In this lesson you'll learn how the Domain Name System (DNS) translates names into numeric addresses, and how all that allows your favorite website, email, or file to appear on your computer screen. You'll also learn how the entire computer industry comes to a consensus about how the Internet should work.

    Wide Area Networks (WANs)

    We'll take a look at Wide Area Networks (WANs) and how they compare to Local Area Networks (LANs), and we'll discuss different types of modern WANs. You'll learn all about how data gets sent over long distances and how the Internet changed expensive, long-distance network connections. You'll also learn how VPNs secure those Internet connections from prying eyes.

    Remote Access

    If you connect to the Internet, you use remote access. In this lesson, we'll explore the traditional means of connecting to remote LANs and talk about exactly how DSL and cable Internet access works. Then we'll discuss other means by which many people connect to the Internet, including wireless and cellular networks.

    Making Internet Connections

    In this lesson you'll apply many of the concepts you've learned so far in this course. We'll walk through the process of building a network with many different wired and wireless devices. Each step of the way, you'll come to understand what's going on behind the scenes. From there we'll jump to connecting to the Internet using broadband connections, configuring a home router, and testing what you've done.

    Review and Conclusion

    In our final lesson we'll tie all the previous lessons together, clarifying how new information about networks and networking can be quickly understood. You'll learn three categories into which networking knowledge can be placed, and see examples to apply your newfound network categories. By the end of this lesson, your understanding of networking will be solid as a rock, and you'll be well-prepared for a lifetime of continued learning about networks and networking!


    What you will learn

    • Learn how and why networks work rather than focusing on memorization of terms and numbers
    • Be capable of performing basic computer networking tasks
    • Understand the difference between client/server and peer-to peer networks
    • Learn how routers operate
    • Learn to connect to the Internet using broadband connections, configuring a home router, and testing what you've done
    • Be well prepared to apply your newfound knowledge to future changes in networks and networking

    How you will benefit

    • Easily understand how and why computer networking works
    • Have access to an instructor who completely understands networking and can convey that understanding to others
    • Prove helpful in your day to day dealings with computer networks and the Internet
    • Be well prepared for a lifetime of continued learning about networks and networking

    David Iseminger

    David Iseminger is an author and technology veteran, with expertise in computing, networking, wireless and cloud technologies, data and analytics, artificial intelligence, and blockchain. While with Microsoft, David worked on early versions of Windows and its core networking infrastructure, and on transmission protocols, security, data visualizations, and multiple emerging cloud technologies. David is passionate about education, serving as a School Board director for over 10 years, advocating at state and federal levels for increased learning standards, and has taught over 40,000 students through multiple technology courses. He has an awarded patent in Artificial Intelligence (AI) object detection and social posting methodologies, and is the founder and CEO of the blockchain company that created IronWeave, the unlimited scale blockchain platform, based on his patent-pending blockchain innovations and inventions.


 

  • Introduction to Networking 
  • Fee: $139.00
    Item Number: 252OCTP273653
    Dates: 6/11/2025 - 6/30/2025
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network.


    Businesses, schools, and other organizations rely on computer networks, which explains why employees and contributors with networking skills are in high demand.

    Are you ready to learn the fundamentals of computer networking in terms you can easily understand? If so, the online Introduction to Networking course will help you understand why networks have become so important, how software and hardware make networking possible, and how networks function. This course will also give you the foundation to understand and get ahead in any career involving the world of computers, networks, the Internet, and the cloud.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 10 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    History of Networking

    Have you ever wondered how networks started? We're surrounded by networks, whether they're computer networks, networks of roads, or the network of telephones that allow us to communicate every day. In our first lesson, you'll learn how networks have evolved over the last hundred years. You'll also find out why every additional device that connects to a network greatly increases the value of the network. By the time you've completed this lesson, you'll have a framework of knowledge that will take you through the rest of the course.

    How Networks Operate

    In this lesson, you'll jump right into networks and networking, and learn how they work. We'll use examples from our everyday experience. You'll learn how to tell the difference between a network and networking, and realize that computer networks are a lot like freeway networks. You'll never look at an interstate the same way again! You'll also find out why shipping your data from one computer to the next is a lot like sending your distant uncle a new cookie jar for his birthday. Believe it or not, freeways and shipped gifts have a direct correlation to how networks and networking operate!

    Peer-To-Peer Versus Client/Server

    Have you ever heard someone refer to a computer as a server? Maybe you've heard someone talk about connecting computers in a peer-to-peer environment. Understanding the difference between client/server and peer-to-peer networks really helps you learn about computers and networking. So in this lesson, you'll learn how to tell the difference between client/server and peer-to-peer networks, and when to use one instead of the other.

    Network Types and Topologies

    Many people have heard of Ethernet, but what does that mean exactly? In this lesson, you'll learn all about Ethernet and a whole lot more. Here you'll learn the difference between a star topology and a bus topology, and the advantages of each. Is Ethernet or Token Ring the best modern network technology, and why? In this lesson you'll get those answers and many more!

    Segmentation and Routing

    In this lesson we'll explore how routers operate, and you'll see why routers operate a lot like how a receptionist in a growing company handles telephone calls. We'll build on information you learned in previous lessons, and then you'll find out how a single interconnected network (the Internet) can actually span the entire globe. A global network is an amazing feat, accomplished by interconnecting network segments and routing data! When you've completed this lesson, you'll understand how routing helps our data to cross the city, state, or an entire ocean.

    Protocols

    When people communicate they speak a language, such as English or French, to exchange information. Computers communicate similarly over a network, but instead of speaking a language they use something called a protocol. Protocols are similar to languages and in this lesson, you'll learn about the protocols used in networking. You'll also learn which protocol has emerged as the dominant computer protocol, and why!

    TCP/IP

    In this lesson you'll learn how the networking protocol TCP/IP operates. TCP/IP is a collection of protocols, and we'll discuss how TCP/IP divides its tasks. We'll go over how TCP/IP uses addresses to direct data to its rightful owner - it's similar to how we use street addresses.

    Name Resolution and Services

    Have you ever wondered how your computer converts a Web address into a website that appears on your screen? In this lesson you'll learn how the Domain Name System (DNS) translates names into numeric addresses, and how all that allows your favorite website, email, or file to appear on your computer screen. You'll also learn how the entire computer industry comes to a consensus about how the Internet should work.

    Wide Area Networks (WANs)

    We'll take a look at Wide Area Networks (WANs) and how they compare to Local Area Networks (LANs), and we'll discuss different types of modern WANs. You'll learn all about how data gets sent over long distances and how the Internet changed expensive, long-distance network connections. You'll also learn how VPNs secure those Internet connections from prying eyes.

    Remote Access

    If you connect to the Internet, you use remote access. In this lesson, we'll explore the traditional means of connecting to remote LANs and talk about exactly how DSL and cable Internet access works. Then we'll discuss other means by which many people connect to the Internet, including wireless and cellular networks.

    Making Internet Connections

    In this lesson you'll apply many of the concepts you've learned so far in this course. We'll walk through the process of building a network with many different wired and wireless devices. Each step of the way, you'll come to understand what's going on behind the scenes. From there we'll jump to connecting to the Internet using broadband connections, configuring a home router, and testing what you've done.

    Review and Conclusion

    In our final lesson we'll tie all the previous lessons together, clarifying how new information about networks and networking can be quickly understood. You'll learn three categories into which networking knowledge can be placed, and see examples to apply your newfound network categories. By the end of this lesson, your understanding of networking will be solid as a rock, and you'll be well-prepared for a lifetime of continued learning about networks and networking!


    What you will learn

    • Learn how and why networks work rather than focusing on memorization of terms and numbers
    • Be capable of performing basic computer networking tasks
    • Understand the difference between client/server and peer-to peer networks
    • Learn how routers operate
    • Learn to connect to the Internet using broadband connections, configuring a home router, and testing what you've done
    • Be well prepared to apply your newfound knowledge to future changes in networks and networking

    How you will benefit

    • Easily understand how and why computer networking works
    • Have access to an instructor who completely understands networking and can convey that understanding to others
    • Prove helpful in your day to day dealings with computer networks and the Internet
    • Be well prepared for a lifetime of continued learning about networks and networking

    David Iseminger

    David Iseminger is an author and technology veteran, with expertise in computing, networking, wireless and cloud technologies, data and analytics, artificial intelligence, and blockchain. While with Microsoft, David worked on early versions of Windows and its core networking infrastructure, and on transmission protocols, security, data visualizations, and multiple emerging cloud technologies. David is passionate about education, serving as a School Board director for over 10 years, advocating at state and federal levels for increased learning standards, and has taught over 40,000 students through multiple technology courses. He has an awarded patent in Artificial Intelligence (AI) object detection and social posting methodologies, and is the founder and CEO of the blockchain company that created IronWeave, the unlimited scale blockchain platform, based on his patent-pending blockchain innovations and inventions.


 

  • Introduction to Networking (Self-Guided) 
  • Fee: $139.00
    Item Number: TesOCTP276301
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network.


    Businesses, schools, and other organizations rely on computer networks, which explains why employees and contributors with networking skills are in high demand.

    Are you ready to learn the fundamentals of computer networking in terms you can easily understand? If so, the online Introduction to Networking course will help you understand why networks have become so important, how software and hardware make networking possible, and how networks function. This course will also give you the foundation to understand and get ahead in any career involving the world of computers, networks, the Internet, and the cloud.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 10 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network. This course explains computer networking basics in easy-to-understand terms, using concepts common to everyday, non-computing experience.


    History of Networking

    Have you ever wondered how networks started? We're surrounded by networks, whether they're computer networks, networks of roads, or the network of telephones that allow us to communicate every day. In our first lesson, you'll learn how networks have evolved over the last hundred years. You'll also find out why every additional device that connects to a network greatly increases the value of the network. By the time you've completed this lesson, you'll have a framework of knowledge that will take you through the rest of the course.

    How Networks Operate

    In this lesson, you'll jump right into networks and networking, and learn how they work. We'll use examples from our everyday experience. You'll learn how to tell the difference between a network and networking, and realize that computer networks are a lot like freeway networks. You'll never look at an interstate the same way again! You'll also find out why shipping your data from one computer to the next is a lot like sending your distant uncle a new cookie jar for his birthday. Believe it or not, freeways and shipped gifts have a direct correlation to how networks and networking operate!

    Peer-to-Peer versus Client/Server

    Have you ever heard someone refer to a computer as a server? Maybe you've heard someone talk about connecting computers in a peer-to-peer environment. Understanding the difference between client/server and peer-to-peer networks really helps you learn about computers and networking. So in this lesson, you'll learn how to tell the difference between client/server and peer-to-peer networks, and when to use one instead of the other.

    Network Types and Topologies

    Many people have heard of Ethernet, but what does that mean exactly? In this lesson, you'll learn all about Ethernet and a whole lot more. Here you'll learn the difference between a star topology and a bus topology, and the advantages of each. Is Ethernet or Token Ring the best modern network technology, and why? In this lesson you'll get those answers and many more!

    Segmentation and Routing

    In this lesson we'll explore how routers operate, and you'll see why routers operate a lot like how a receptionist in a growing company handles telephone calls. We'll build on information you learned in previous lessons, and then you'll find out how a single interconnected network (the Internet) can actually span the entire globe. A global network is an amazing feat, accomplished by interconnecting network segments and routing data! When you've completed this lesson, you'll understand how routing helps our data to cross the city, state, or an entire ocean.

    Protocols

    When people communicate they speak a language, such as English or French, to exchange information. Computers communicate similarly over a network, but instead of speaking a language they use something called a protocol. Protocols are similar to languages and in this lesson, you'll learn about the protocols used in networking. You'll also learn which protocol has emerged as the dominant computer protocol, and why!

    TCP/IP

    In this lesson you'll learn how the networking protocol TCP/IP operates. TCP/IP is a collection of protocols, and we'll discuss how TCP/IP divides its tasks. We'll go over how TCP/IP uses addresses to direct data to its rightful owner - it's similar to how we use street addresses.

    Name Resolution and Services

    Have you ever wondered how your computer converts a Web address into a website that appears on your screen? In this lesson you'll learn how the Domain Name System (DNS) translates names into numeric addresses, and how all that allows your favorite website, email, or file to appear on your computer screen. You'll also learn how the entire computer industry comes to a consensus about how the Internet should work.

    Wide Area Networks (WANs)

    We'll take a look at Wide Area Networks (WANs) and how they compare to Local Area Networks (LANs), and we'll discuss different types of modern WANs. You'll learn all about how data gets sent over long distances and how the Internet changed expensive, long-distance network connections. You'll also learn how VPNs secure those Internet connections from prying eyes.

    Remote Access

    If you connect to the Internet, you use remote access. In this lesson, we'll explore the traditional means of connecting to remote LANs and talk about exactly how DSL and cable Internet access works. Then we'll discuss other means by which many people connect to the Internet, including wireless and cellular networks.

    Making Internet Connections

    In this lesson you'll apply many of the concepts you've learned so far in this course. We'll walk through the process of building a network with many different wired and wireless devices. Each step of the way, you'll come to understand what's going on behind the scenes. From there we'll jump to connecting to the Internet using broadband connections, configuring a home router, and testing what you've done.

    Review and Conclusion

    In our final lesson we'll tie all the previous lessons together, clarifying how new information about networks and networking can be quickly understood. You'll learn three categories into which networking knowledge can be placed, and see examples to apply your newfound network categories. By the end of this lesson, your understanding of networking will be solid as a rock, and you'll be well-prepared for a lifetime of continued learning about networks and networking!


    What you will learn

    • Learn how and why networks work rather than focusing on memorization of terms and numbers
    • Be capable of performing basic computer networking tasks
    • Understand the difference between client/server and peer-to peer networks
    • Learn how routers operate
    • Learn to connect to the Internet using broadband connections, configuring a home router, and testing what you've done
    • Be well prepared to apply your newfound knowledge to future changes in networks and networking

    How you will benefit

    • Easily understand how and why computer networking works
    • Have access to an instructor who completely understands networking and can convey that understanding to others
    • Prove helpful in your day to day dealings with computer networks and the Internet
    • Be well prepared for a lifetime of continued learning about networks and networking

    Self-Study

    Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network. This course explains computer networking basics in easy-to-understand terms, using concepts common to everyday, non-computing experience.

 

  • Introduction to Networking (Self-Guided) 
  • Fee: $139.00
    Item Number: 252OCTP276301
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network.


    Businesses, schools, and other organizations rely on computer networks, which explains why employees and contributors with networking skills are in high demand.

    Are you ready to learn the fundamentals of computer networking in terms you can easily understand? If so, the online Introduction to Networking course will help you understand why networks have become so important, how software and hardware make networking possible, and how networks function. This course will also give you the foundation to understand and get ahead in any career involving the world of computers, networks, the Internet, and the cloud.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 10 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network. This course explains computer networking basics in easy-to-understand terms, using concepts common to everyday, non-computing experience.


    History of Networking

    Have you ever wondered how networks started? We're surrounded by networks, whether they're computer networks, networks of roads, or the network of telephones that allow us to communicate every day. In our first lesson, you'll learn how networks have evolved over the last hundred years. You'll also find out why every additional device that connects to a network greatly increases the value of the network. By the time you've completed this lesson, you'll have a framework of knowledge that will take you through the rest of the course.

    How Networks Operate

    In this lesson, you'll jump right into networks and networking, and learn how they work. We'll use examples from our everyday experience. You'll learn how to tell the difference between a network and networking, and realize that computer networks are a lot like freeway networks. You'll never look at an interstate the same way again! You'll also find out why shipping your data from one computer to the next is a lot like sending your distant uncle a new cookie jar for his birthday. Believe it or not, freeways and shipped gifts have a direct correlation to how networks and networking operate!

    Peer-to-Peer versus Client/Server

    Have you ever heard someone refer to a computer as a server? Maybe you've heard someone talk about connecting computers in a peer-to-peer environment. Understanding the difference between client/server and peer-to-peer networks really helps you learn about computers and networking. So in this lesson, you'll learn how to tell the difference between client/server and peer-to-peer networks, and when to use one instead of the other.

    Network Types and Topologies

    Many people have heard of Ethernet, but what does that mean exactly? In this lesson, you'll learn all about Ethernet and a whole lot more. Here you'll learn the difference between a star topology and a bus topology, and the advantages of each. Is Ethernet or Token Ring the best modern network technology, and why? In this lesson you'll get those answers and many more!

    Segmentation and Routing

    In this lesson we'll explore how routers operate, and you'll see why routers operate a lot like how a receptionist in a growing company handles telephone calls. We'll build on information you learned in previous lessons, and then you'll find out how a single interconnected network (the Internet) can actually span the entire globe. A global network is an amazing feat, accomplished by interconnecting network segments and routing data! When you've completed this lesson, you'll understand how routing helps our data to cross the city, state, or an entire ocean.

    Protocols

    When people communicate they speak a language, such as English or French, to exchange information. Computers communicate similarly over a network, but instead of speaking a language they use something called a protocol. Protocols are similar to languages and in this lesson, you'll learn about the protocols used in networking. You'll also learn which protocol has emerged as the dominant computer protocol, and why!

    TCP/IP

    In this lesson you'll learn how the networking protocol TCP/IP operates. TCP/IP is a collection of protocols, and we'll discuss how TCP/IP divides its tasks. We'll go over how TCP/IP uses addresses to direct data to its rightful owner - it's similar to how we use street addresses.

    Name Resolution and Services

    Have you ever wondered how your computer converts a Web address into a website that appears on your screen? In this lesson you'll learn how the Domain Name System (DNS) translates names into numeric addresses, and how all that allows your favorite website, email, or file to appear on your computer screen. You'll also learn how the entire computer industry comes to a consensus about how the Internet should work.

    Wide Area Networks (WANs)

    We'll take a look at Wide Area Networks (WANs) and how they compare to Local Area Networks (LANs), and we'll discuss different types of modern WANs. You'll learn all about how data gets sent over long distances and how the Internet changed expensive, long-distance network connections. You'll also learn how VPNs secure those Internet connections from prying eyes.

    Remote Access

    If you connect to the Internet, you use remote access. In this lesson, we'll explore the traditional means of connecting to remote LANs and talk about exactly how DSL and cable Internet access works. Then we'll discuss other means by which many people connect to the Internet, including wireless and cellular networks.

    Making Internet Connections

    In this lesson you'll apply many of the concepts you've learned so far in this course. We'll walk through the process of building a network with many different wired and wireless devices. Each step of the way, you'll come to understand what's going on behind the scenes. From there we'll jump to connecting to the Internet using broadband connections, configuring a home router, and testing what you've done.

    Review and Conclusion

    In our final lesson we'll tie all the previous lessons together, clarifying how new information about networks and networking can be quickly understood. You'll learn three categories into which networking knowledge can be placed, and see examples to apply your newfound network categories. By the end of this lesson, your understanding of networking will be solid as a rock, and you'll be well-prepared for a lifetime of continued learning about networks and networking!


    What you will learn

    • Learn how and why networks work rather than focusing on memorization of terms and numbers
    • Be capable of performing basic computer networking tasks
    • Understand the difference between client/server and peer-to peer networks
    • Learn how routers operate
    • Learn to connect to the Internet using broadband connections, configuring a home router, and testing what you've done
    • Be well prepared to apply your newfound knowledge to future changes in networks and networking

    How you will benefit

    • Easily understand how and why computer networking works
    • Have access to an instructor who completely understands networking and can convey that understanding to others
    • Prove helpful in your day to day dealings with computer networks and the Internet
    • Be well prepared for a lifetime of continued learning about networks and networking

    Self-Study

    Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network. This course explains computer networking basics in easy-to-understand terms, using concepts common to everyday, non-computing experience.

 

  • Introduction to PC Security 
  • Fee: $139.00
    Item Number: TesOCTP27452202
    Dates: 5/14/2025 - 12/22/2030
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn the fundamentals of PC and network security from this expert-developed course.


    Learn why you're at risk and what you can do to protect your precious personal and business data from the outside world. This course will quickly bring you up to speed on the fundamentals of PC and network security.

    You will understand and explore the vulnerability of operating systems, software, and networks. Then, you will get into the minds of hackers and crackers, developing an understanding of the exploits they use to access your computer without your knowledge. You will find out why, where and how viruses, worms, and blended threats are created. You will learn a safe way to handle files and data across the Internet through a virtual private network. By the end of this course you will be able to install and configure a firewall to build an impenetrable moat around your computer or network.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    Introduction to PC Security

    In this lesson, you will learn the facts and myths about PC security. By the end of the lesson, you will be able to assess your own risk, whether you're an individual or manage a network of any size. You will also perform a self-assessment to evaluate just how vulnerable you are to security flaws.

    Your PC and Network

    If you ever wondered what technical gurus are speaking about when they talk about LANs, WANs, VPNs, and P2P, you will find detailed answers in this lesson. Discover the basics of networks and how your PC connects to them.

    PCs, Networks, and Software Demystified

    Most people don't stop to think about how a Mac can talk to a PC and vice versa. Yet, different types of machines talk to each other on a daily basis across networks. They also talk to printers, fax machines, and a host of other devices. The OSI model for network connections lets you accomplish this, and you will learn all about it in this lesson.

    Viruses, Worms, Blended Threats, and More

    Get ready to investigate the world of viruses, worms, and blended threats. You'll learn what they are and the differences between all three. Of course, all this knowledge will also teach you how to protect yourself and your network from the hackers and crackers of the world.

    The Family of Malware

    This lesson introduces you to the ware family. What is the ware family? They are the products that download themselves onto your computer without your consent or knowledge—spyware, scumware, malware, and adware. You will meet them and learn all about where they live, places they frequent, and how to remove these unwelcome guests.

    Exploits and Vulnerabilities

    You may have heard of them: vulnerabilities, exploits, and exposure. But what are they? Have you ever wondered if someone really can control your computer without your knowledge? If you've been pondering these questions lately, then you will find your answers here, along with priceless information on protecting your computer and your network to keep your business and personal data private.

    Network Attacks

    Have you ever tried to access the web but received an error saying the page can't be displayed, you aren't connected, or you don't have access? Denial of Service attacks and SYN flooding are two types of network attacks that seem to go unnoticed on personal PCs and small networks. After this lesson, you will no longer be left wondering what happened to your Internet connection.

    Everything You Wanted to Know About Firewalls (Part One)

    This lesson will introduce you to firewalls. Join me in this lesson, and you will soon start building an impenetrable moat around your network.

    Everything You Wanted to Know About Firewalls (Part Two)

    Now that you have your moat built, it's time to arm up and defend yourself. In this lesson, you will learn how to configure your firewall and maximize your network security.

    Laptops, Notebooks, Netbooks, and Wireless Networking

    Laptops and wireless connectivity aren't as secure as they appear. You will understand why in this lesson.

    Virtual Private Networking (VPN)

    This lesson explores the Virtual Private Network and how it's different from standard networks, how it works, how to secure it, and how to set up your own. You can share files with family across the miles by allowing them to connect remotely to your designated shared folders. You can share music files, family pictures, and anything else you choose to give them access to.

    Changing Face of Security

    Now that you know what's out there, how can you possibly keep on top of security issues? There's so much information out there, how will you know what applies to you? You will learn about emerging security technology that will help make managing and securing your network easier. Finally, you can test yourself against the first security assessment to see how well you've secured your own PC or network.


    What you will learn

    • Learn to assess your own risk on your computer or network
    • Learn the weak links of security in software and operating systems
    • Learn to protect your network from hackers
    • Learn priceless information on protecting your computer and keep personal data private
    • Learn to build a firewall
    • Learn to set up your own Virtual Private Network

    How you will benefit

    • Understand when your computer is being attacked
    • Understand the many vulnerabilities of operating systems, software, and networks
    • Know how to protect your network from hackers
    • Keep your personal data private

    Alan Simpson

    Alan Simpson is an award-winning author with over 100 published books on computers, technology, and the internet, translated into more than a dozen languages. With extensive experience across nearly every aspect of the computer industry—including web development, operating systems, programming, networking, and security—he is widely regarded as a leading expert in the field.

    Alan's journey in tech began in the 1980s as an author, teacher, consultant, and software developer. His work in app development and web design sparked a deep interest in cybersecurity. This passion led him to pursue formal studies, and in 2007, he earned his Security+ certification from CompTIA, demonstrating his broad knowledge of the computer security field. The insights he shares in his courses reflect his years of experience and his commitment to building safe, secure applications and websites.


    Learn why you're at risk and what you can do to protect your precious personal and business data from the outside world. In this course, a security expert will teach you the fundamentals of PC and network security as you learn to install and configure a firewall to build an impenetrable moat around your computer or network.

 

  • Introduction to PC Security 
  • Fee: $139.00
    Item Number: 252OCTP274522
    Dates: 5/14/2025 - 6/30/2025
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn the fundamentals of PC and network security from this expert-developed course.


    Learn why you're at risk and what you can do to protect your precious personal and business data from the outside world. This course will quickly bring you up to speed on the fundamentals of PC and network security.

    You will understand and explore the vulnerability of operating systems, software, and networks. Then, you will get into the minds of hackers and crackers, developing an understanding of the exploits they use to access your computer without your knowledge. You will find out why, where and how viruses, worms, and blended threats are created. You will learn a safe way to handle files and data across the Internet through a virtual private network. By the end of this course you will be able to install and configure a firewall to build an impenetrable moat around your computer or network.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    Introduction to PC Security

    In this lesson, you will learn the facts and myths about PC security. By the end of the lesson, you will be able to assess your own risk, whether you're an individual or manage a network of any size. You will also perform a self-assessment to evaluate just how vulnerable you are to security flaws.

    Your PC and Network

    If you ever wondered what technical gurus are speaking about when they talk about LANs, WANs, VPNs, and P2P, you will find detailed answers in this lesson. Discover the basics of networks and how your PC connects to them.

    PCs, Networks, and Software Demystified

    Most people don't stop to think about how a Mac can talk to a PC and vice versa. Yet, different types of machines talk to each other on a daily basis across networks. They also talk to printers, fax machines, and a host of other devices. The OSI model for network connections lets you accomplish this, and you will learn all about it in this lesson.

    Viruses, Worms, Blended Threats, and More

    Get ready to investigate the world of viruses, worms, and blended threats. You'll learn what they are and the differences between all three. Of course, all this knowledge will also teach you how to protect yourself and your network from the hackers and crackers of the world.

    The Family of Malware

    This lesson introduces you to the ware family. What is the ware family? They are the products that download themselves onto your computer without your consent or knowledge—spyware, scumware, malware, and adware. You will meet them and learn all about where they live, places they frequent, and how to remove these unwelcome guests.

    Exploits and Vulnerabilities

    You may have heard of them: vulnerabilities, exploits, and exposure. But what are they? Have you ever wondered if someone really can control your computer without your knowledge? If you've been pondering these questions lately, then you will find your answers here, along with priceless information on protecting your computer and your network to keep your business and personal data private.

    Network Attacks

    Have you ever tried to access the web but received an error saying the page can't be displayed, you aren't connected, or you don't have access? Denial of Service attacks and SYN flooding are two types of network attacks that seem to go unnoticed on personal PCs and small networks. After this lesson, you will no longer be left wondering what happened to your Internet connection.

    Everything You Wanted to Know About Firewalls (Part One)

    This lesson will introduce you to firewalls. Join me in this lesson, and you will soon start building an impenetrable moat around your network.

    Everything You Wanted to Know About Firewalls (Part Two)

    Now that you have your moat built, it's time to arm up and defend yourself. In this lesson, you will learn how to configure your firewall and maximize your network security.

    Laptops, Notebooks, Netbooks, and Wireless Networking

    Laptops and wireless connectivity aren't as secure as they appear. You will understand why in this lesson.

    Virtual Private Networking (VPN)

    This lesson explores the Virtual Private Network and how it's different from standard networks, how it works, how to secure it, and how to set up your own. You can share files with family across the miles by allowing them to connect remotely to your designated shared folders. You can share music files, family pictures, and anything else you choose to give them access to.

    Changing Face of Security

    Now that you know what's out there, how can you possibly keep on top of security issues? There's so much information out there, how will you know what applies to you? You will learn about emerging security technology that will help make managing and securing your network easier. Finally, you can test yourself against the first security assessment to see how well you've secured your own PC or network.


    What you will learn

    • Learn to assess your own risk on your computer or network
    • Learn the weak links of security in software and operating systems
    • Learn to protect your network from hackers
    • Learn priceless information on protecting your computer and keep personal data private
    • Learn to build a firewall
    • Learn to set up your own Virtual Private Network

    How you will benefit

    • Understand when your computer is being attacked
    • Understand the many vulnerabilities of operating systems, software, and networks
    • Know how to protect your network from hackers
    • Keep your personal data private

    Alan Simpson

    Alan Simpson is an award-winning author with over 100 published books on computers, technology, and the internet, translated into more than a dozen languages. With extensive experience across nearly every aspect of the computer industry—including web development, operating systems, programming, networking, and security—he is widely regarded as a leading expert in the field.

    Alan's journey in tech began in the 1980s as an author, teacher, consultant, and software developer. His work in app development and web design sparked a deep interest in cybersecurity. This passion led him to pursue formal studies, and in 2007, he earned his Security+ certification from CompTIA, demonstrating his broad knowledge of the computer security field. The insights he shares in his courses reflect his years of experience and his commitment to building safe, secure applications and websites.


    Learn why you're at risk and what you can do to protect your precious personal and business data from the outside world. In this course, a security expert will teach you the fundamentals of PC and network security as you learn to install and configure a firewall to build an impenetrable moat around your computer or network.

 

  • Introduction to PC Security 
  • Fee: $139.00
    Item Number: TesOCTP27452203
    Dates: 6/11/2025 - 12/22/2030
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn the fundamentals of PC and network security from this expert-developed course.


    Learn why you're at risk and what you can do to protect your precious personal and business data from the outside world. This course will quickly bring you up to speed on the fundamentals of PC and network security.

    You will understand and explore the vulnerability of operating systems, software, and networks. Then, you will get into the minds of hackers and crackers, developing an understanding of the exploits they use to access your computer without your knowledge. You will find out why, where and how viruses, worms, and blended threats are created. You will learn a safe way to handle files and data across the Internet through a virtual private network. By the end of this course you will be able to install and configure a firewall to build an impenetrable moat around your computer or network.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    Introduction to PC Security

    In this lesson, you will learn the facts and myths about PC security. By the end of the lesson, you will be able to assess your own risk, whether you're an individual or manage a network of any size. You will also perform a self-assessment to evaluate just how vulnerable you are to security flaws.

    Your PC and Network

    If you ever wondered what technical gurus are speaking about when they talk about LANs, WANs, VPNs, and P2P, you will find detailed answers in this lesson. Discover the basics of networks and how your PC connects to them.

    PCs, Networks, and Software Demystified

    Most people don't stop to think about how a Mac can talk to a PC and vice versa. Yet, different types of machines talk to each other on a daily basis across networks. They also talk to printers, fax machines, and a host of other devices. The OSI model for network connections lets you accomplish this, and you will learn all about it in this lesson.

    Viruses, Worms, Blended Threats, and More

    Get ready to investigate the world of viruses, worms, and blended threats. You'll learn what they are and the differences between all three. Of course, all this knowledge will also teach you how to protect yourself and your network from the hackers and crackers of the world.

    The Family of Malware

    This lesson introduces you to the ware family. What is the ware family? They are the products that download themselves onto your computer without your consent or knowledge—spyware, scumware, malware, and adware. You will meet them and learn all about where they live, places they frequent, and how to remove these unwelcome guests.

    Exploits and Vulnerabilities

    You may have heard of them: vulnerabilities, exploits, and exposure. But what are they? Have you ever wondered if someone really can control your computer without your knowledge? If you've been pondering these questions lately, then you will find your answers here, along with priceless information on protecting your computer and your network to keep your business and personal data private.

    Network Attacks

    Have you ever tried to access the web but received an error saying the page can't be displayed, you aren't connected, or you don't have access? Denial of Service attacks and SYN flooding are two types of network attacks that seem to go unnoticed on personal PCs and small networks. After this lesson, you will no longer be left wondering what happened to your Internet connection.

    Everything You Wanted to Know About Firewalls (Part One)

    This lesson will introduce you to firewalls. Join me in this lesson, and you will soon start building an impenetrable moat around your network.

    Everything You Wanted to Know About Firewalls (Part Two)

    Now that you have your moat built, it's time to arm up and defend yourself. In this lesson, you will learn how to configure your firewall and maximize your network security.

    Laptops, Notebooks, Netbooks, and Wireless Networking

    Laptops and wireless connectivity aren't as secure as they appear. You will understand why in this lesson.

    Virtual Private Networking (VPN)

    This lesson explores the Virtual Private Network and how it's different from standard networks, how it works, how to secure it, and how to set up your own. You can share files with family across the miles by allowing them to connect remotely to your designated shared folders. You can share music files, family pictures, and anything else you choose to give them access to.

    Changing Face of Security

    Now that you know what's out there, how can you possibly keep on top of security issues? There's so much information out there, how will you know what applies to you? You will learn about emerging security technology that will help make managing and securing your network easier. Finally, you can test yourself against the first security assessment to see how well you've secured your own PC or network.


    What you will learn

    • Learn to assess your own risk on your computer or network
    • Learn the weak links of security in software and operating systems
    • Learn to protect your network from hackers
    • Learn priceless information on protecting your computer and keep personal data private
    • Learn to build a firewall
    • Learn to set up your own Virtual Private Network

    How you will benefit

    • Understand when your computer is being attacked
    • Understand the many vulnerabilities of operating systems, software, and networks
    • Know how to protect your network from hackers
    • Keep your personal data private

    Alan Simpson

    Alan Simpson is an award-winning author with over 100 published books on computers, technology, and the internet, translated into more than a dozen languages. With extensive experience across nearly every aspect of the computer industry—including web development, operating systems, programming, networking, and security—he is widely regarded as a leading expert in the field.

    Alan's journey in tech began in the 1980s as an author, teacher, consultant, and software developer. His work in app development and web design sparked a deep interest in cybersecurity. This passion led him to pursue formal studies, and in 2007, he earned his Security+ certification from CompTIA, demonstrating his broad knowledge of the computer security field. The insights he shares in his courses reflect his years of experience and his commitment to building safe, secure applications and websites.


 

  • Introduction to PC Security 
  • Fee: $139.00
    Item Number: 252OCTP274523
    Dates: 6/11/2025 - 6/30/2025
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn the fundamentals of PC and network security from this expert-developed course.


    Learn why you're at risk and what you can do to protect your precious personal and business data from the outside world. This course will quickly bring you up to speed on the fundamentals of PC and network security.

    You will understand and explore the vulnerability of operating systems, software, and networks. Then, you will get into the minds of hackers and crackers, developing an understanding of the exploits they use to access your computer without your knowledge. You will find out why, where and how viruses, worms, and blended threats are created. You will learn a safe way to handle files and data across the Internet through a virtual private network. By the end of this course you will be able to install and configure a firewall to build an impenetrable moat around your computer or network.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    Introduction to PC Security

    In this lesson, you will learn the facts and myths about PC security. By the end of the lesson, you will be able to assess your own risk, whether you're an individual or manage a network of any size. You will also perform a self-assessment to evaluate just how vulnerable you are to security flaws.

    Your PC and Network

    If you ever wondered what technical gurus are speaking about when they talk about LANs, WANs, VPNs, and P2P, you will find detailed answers in this lesson. Discover the basics of networks and how your PC connects to them.

    PCs, Networks, and Software Demystified

    Most people don't stop to think about how a Mac can talk to a PC and vice versa. Yet, different types of machines talk to each other on a daily basis across networks. They also talk to printers, fax machines, and a host of other devices. The OSI model for network connections lets you accomplish this, and you will learn all about it in this lesson.

    Viruses, Worms, Blended Threats, and More

    Get ready to investigate the world of viruses, worms, and blended threats. You'll learn what they are and the differences between all three. Of course, all this knowledge will also teach you how to protect yourself and your network from the hackers and crackers of the world.

    The Family of Malware

    This lesson introduces you to the ware family. What is the ware family? They are the products that download themselves onto your computer without your consent or knowledge—spyware, scumware, malware, and adware. You will meet them and learn all about where they live, places they frequent, and how to remove these unwelcome guests.

    Exploits and Vulnerabilities

    You may have heard of them: vulnerabilities, exploits, and exposure. But what are they? Have you ever wondered if someone really can control your computer without your knowledge? If you've been pondering these questions lately, then you will find your answers here, along with priceless information on protecting your computer and your network to keep your business and personal data private.

    Network Attacks

    Have you ever tried to access the web but received an error saying the page can't be displayed, you aren't connected, or you don't have access? Denial of Service attacks and SYN flooding are two types of network attacks that seem to go unnoticed on personal PCs and small networks. After this lesson, you will no longer be left wondering what happened to your Internet connection.

    Everything You Wanted to Know About Firewalls (Part One)

    This lesson will introduce you to firewalls. Join me in this lesson, and you will soon start building an impenetrable moat around your network.

    Everything You Wanted to Know About Firewalls (Part Two)

    Now that you have your moat built, it's time to arm up and defend yourself. In this lesson, you will learn how to configure your firewall and maximize your network security.

    Laptops, Notebooks, Netbooks, and Wireless Networking

    Laptops and wireless connectivity aren't as secure as they appear. You will understand why in this lesson.

    Virtual Private Networking (VPN)

    This lesson explores the Virtual Private Network and how it's different from standard networks, how it works, how to secure it, and how to set up your own. You can share files with family across the miles by allowing them to connect remotely to your designated shared folders. You can share music files, family pictures, and anything else you choose to give them access to.

    Changing Face of Security

    Now that you know what's out there, how can you possibly keep on top of security issues? There's so much information out there, how will you know what applies to you? You will learn about emerging security technology that will help make managing and securing your network easier. Finally, you can test yourself against the first security assessment to see how well you've secured your own PC or network.


    What you will learn

    • Learn to assess your own risk on your computer or network
    • Learn the weak links of security in software and operating systems
    • Learn to protect your network from hackers
    • Learn priceless information on protecting your computer and keep personal data private
    • Learn to build a firewall
    • Learn to set up your own Virtual Private Network

    How you will benefit

    • Understand when your computer is being attacked
    • Understand the many vulnerabilities of operating systems, software, and networks
    • Know how to protect your network from hackers
    • Keep your personal data private

    Alan Simpson

    Alan Simpson is an award-winning author with over 100 published books on computers, technology, and the internet, translated into more than a dozen languages. With extensive experience across nearly every aspect of the computer industry—including web development, operating systems, programming, networking, and security—he is widely regarded as a leading expert in the field.

    Alan's journey in tech began in the 1980s as an author, teacher, consultant, and software developer. His work in app development and web design sparked a deep interest in cybersecurity. This passion led him to pursue formal studies, and in 2007, he earned his Security+ certification from CompTIA, demonstrating his broad knowledge of the computer security field. The insights he shares in his courses reflect his years of experience and his commitment to building safe, secure applications and websites.


 

  • Introduction to PC Security (Self-Guided) 
  • Fee: $139.00
    Item Number: TesOCTP276351
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn the fundamentals of PC and network security from this expert-developed course.


    Learn why you're at risk and what you can do to protect your precious personal and business data from the outside world. This online course, will quickly bring you up to speed on the fundamentals of PC and network security.

    You will understand and explore the vulnerability of operating systems, software, and networks. Then, you will get into the minds of hackers and crackers, developing an understanding of the exploits they use to access your computer without your knowledge. You will find out why, where and how viruses, worms, and blended threats are created. You will learn a safe way to handle files and data across the Internet through a virtual private network. By the end of this course you will be able to install and configure a firewall to build an impenetrable moat around your computer or network.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Applications must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Learn the fundamentals of PC and network security from this expert-developed course.


    Introduction to PC Security

    In your first lesson, you will learn both the facts and myths surrounding PC security. By the end of the lesson, you will also be able to assess your own risk, whether you're an individual or manage a network of any size. You will also perform a self-assessment to evaluate just how vulnerable you are to security flaws.

    Your PC and Network

    If you ever wondered what technical gurus are speaking about when they talk about LANs, WANs, VPNs, and P2P, you will find detailed answers in this lesson. Discover the basics of networks and how your PC connects to them.

    PCs, Networks, and Software Demystified

    Most of us don't stop to think about how a Mac can talk to a PC and vice versa. Yet, different types of machines talk to each other on a daily basis across networks. They also talk to printers, fax machines, and a host of other devices. The OSI model for network connections lets you accomplish this, and you will learn all about it in this lesson.

    Viruses, Worms, Blended Threats, and More

    Get ready to investigate the world of viruses, worms, and blended threats. You will learn what they are and the differences between all three. Of course, all this knowledge will also teach you how to protect yourself and your network from the hackers and crackers of the world.

    The Family of Malware

    This lesson introduces you to the ware family. What is the ware family? They are the products that download themselves onto your computer without your consent or knowledge—spyware, scumware, malware, and adware. You will meet them and learn all about where they live, places they frequent, and how to remove these unwelcome guests.

    Exploits and Vulnerabilities

    You may have heard of them: vulnerabilities, exploits, and exposure. But what are they? Have you ever wondered if someone really can control your computer without your knowledge? If you've been pondering these questions lately, then you will find your answers here, along with priceless information on protecting your computer and your network to keep your business and personal data private.

    Network Attacks

    Have you ever tried to access the web but received an error saying the page can't be displayed, you aren't connected, or you don't have access? Denial of Service attacks and SYN flooding are two types of network attacks that seem to go unnoticed on personal PCs and small networks. After this lesson, you will no longer be left wondering what happened to your Internet connection.

    Everything You Wanted to Know About Firewalls. (Part One)

    This lesson will introduce you to firewalls. Join me in this lesson, and you will soon start building an impenetrable moat around your network.

    Everything You Wanted to Know About Firewalls. (Part Two)

    Now that you have your moat built, it's time to arm up and defend yourself. In this lesson, you will learn how to configure your firewall and maximize your network security.

    Laptops, Notebooks, Netbooks, and Wireless Networking

    Laptops and wireless connectivity aren't as secure as they appear. You will understand why in this lesson.

    Virtual Private Networking (VPN)

    This lesson explores the Virtual Private Network and how it's different from standard networks, how it works, how to secure it, and how to set up your own. You can share files with family across the miles by allowing them to connect remotely to your designated shared folders. You can share music files, family pictures, and anything else you choose to give them access to.

    The Changing Face of Security

    Now that you know what's out there, how can you possibly keep on top of security issues? There's so much information out there, how will you know what applies to you? You will learn about emerging security technology that will help make managing and securing your network easier. Finally, you can test yourself against the first security assessment to see how well you've secured your own PC or network.



    Self-Study

    Learn the fundamentals of PC and network security from this expert-developed course.

 

  • Introduction to PC Security (Self-Guided) 
  • Fee: $139.00
    Item Number: 252OCTP276351
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn the fundamentals of PC and network security from this expert-developed course.


    Learn why you're at risk and what you can do to protect your precious personal and business data from the outside world. This online course, will quickly bring you up to speed on the fundamentals of PC and network security.

    You will understand and explore the vulnerability of operating systems, software, and networks. Then, you will get into the minds of hackers and crackers, developing an understanding of the exploits they use to access your computer without your knowledge. You will find out why, where and how viruses, worms, and blended threats are created. You will learn a safe way to handle files and data across the Internet through a virtual private network. By the end of this course you will be able to install and configure a firewall to build an impenetrable moat around your computer or network.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Applications must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Learn the fundamentals of PC and network security from this expert-developed course.


    Introduction to PC Security

    In your first lesson, you will learn both the facts and myths surrounding PC security. By the end of the lesson, you will also be able to assess your own risk, whether you're an individual or manage a network of any size. You will also perform a self-assessment to evaluate just how vulnerable you are to security flaws.

    Your PC and Network

    If you ever wondered what technical gurus are speaking about when they talk about LANs, WANs, VPNs, and P2P, you will find detailed answers in this lesson. Discover the basics of networks and how your PC connects to them.

    PCs, Networks, and Software Demystified

    Most of us don't stop to think about how a Mac can talk to a PC and vice versa. Yet, different types of machines talk to each other on a daily basis across networks. They also talk to printers, fax machines, and a host of other devices. The OSI model for network connections lets you accomplish this, and you will learn all about it in this lesson.

    Viruses, Worms, Blended Threats, and More

    Get ready to investigate the world of viruses, worms, and blended threats. You will learn what they are and the differences between all three. Of course, all this knowledge will also teach you how to protect yourself and your network from the hackers and crackers of the world.

    The Family of Malware

    This lesson introduces you to the ware family. What is the ware family? They are the products that download themselves onto your computer without your consent or knowledge—spyware, scumware, malware, and adware. You will meet them and learn all about where they live, places they frequent, and how to remove these unwelcome guests.

    Exploits and Vulnerabilities

    You may have heard of them: vulnerabilities, exploits, and exposure. But what are they? Have you ever wondered if someone really can control your computer without your knowledge? If you've been pondering these questions lately, then you will find your answers here, along with priceless information on protecting your computer and your network to keep your business and personal data private.

    Network Attacks

    Have you ever tried to access the web but received an error saying the page can't be displayed, you aren't connected, or you don't have access? Denial of Service attacks and SYN flooding are two types of network attacks that seem to go unnoticed on personal PCs and small networks. After this lesson, you will no longer be left wondering what happened to your Internet connection.

    Everything You Wanted to Know About Firewalls. (Part One)

    This lesson will introduce you to firewalls. Join me in this lesson, and you will soon start building an impenetrable moat around your network.

    Everything You Wanted to Know About Firewalls. (Part Two)

    Now that you have your moat built, it's time to arm up and defend yourself. In this lesson, you will learn how to configure your firewall and maximize your network security.

    Laptops, Notebooks, Netbooks, and Wireless Networking

    Laptops and wireless connectivity aren't as secure as they appear. You will understand why in this lesson.

    Virtual Private Networking (VPN)

    This lesson explores the Virtual Private Network and how it's different from standard networks, how it works, how to secure it, and how to set up your own. You can share files with family across the miles by allowing them to connect remotely to your designated shared folders. You can share music files, family pictures, and anything else you choose to give them access to.

    The Changing Face of Security

    Now that you know what's out there, how can you possibly keep on top of security issues? There's so much information out there, how will you know what applies to you? You will learn about emerging security technology that will help make managing and securing your network easier. Finally, you can test yourself against the first security assessment to see how well you've secured your own PC or network.



    Self-Study

    Learn the fundamentals of PC and network security from this expert-developed course.

 

  • Introduction to PC Troubleshooting 
  • Fee: $139.00
    Item Number: TesOCTP27339202
    Dates: 5/14/2025 - 12/22/2030
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn to decipher and solve almost any problem with your PC.


    Don't spend your hard-earned cash on expensive PC repairs! The vast majority of the problems people experience with their computers are completely avoidable, and most can be solved with nothing more than a few minutes of your time. Intro to PC Troubleshooting takes you step by step through the typical hardware and operating system problems encountered by technicians, teaching troubleshooting techniques to decipher any problem, and giving you the skills you need to solve them.

    Once you've mastered the basics, the course launches into some of the more advanced and nasty problems that crop up in the PC, teaching you how to diagnose and fix those problems as well! Finally, Intro to PC Troubleshooting shows you how to maintain and optimize a Windows PC. So what are you waiting for? Get ready to troubleshoot and fix some PCs!


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.
    • You will also need access to one or more computers that do not contain any data you consider sensitive.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    The Computing Process

    This lesson starts you on the path to troubleshooting PCs like a pro. You'll first look at input devices, or how you tell the computer to do stuff. In the second part of the lesson, you'll explore the pieces that do the work inside the computer. The final section describes the output devices, where the computer communicates to you.

    Troubleshooting Theory

    This lesson will take you through the troubleshooting process. It's not a guide to solving specific computer problems, but the steps explained here will enable you to tackle any computer problems you might encounter. The three main steps are identifying the problem, testing solutions, and completing the process.

    Operating System Overview

    This lesson introduces you to some of the basic components and tools of an operating system. First, you'll find out about the primary functions of operating systems. You'll then explore the major parts of Microsoft Windows, including the Desktop and Windows Explorer. You'll finish the lesson by learning about the most important troubleshooting tools for fixing operating systems.

    OS Fixes

    This lesson leads you through the basic steps of troubleshooting an operating system, including startup, video, sound, and application errors. You'll look at tools like Safe Mode and the System Configuration utility and learn about driver rollback. You'll end the lesson by learning how to troubleshoot audio/visual errors.

    Avoiding OS Obstacles

    How would you like to prevent system problems instead of rushing to fix them? In this lesson, you'll master the three most important types of preventive maintenance: backing up data that's on a hard drive, updating or upgrading the operating system, and using Windows utilities that help you monitor and maintain the OS.

    Networking Basics

    This lesson covers the basics of networking. First, you'll find out how networks work and what the necessary components are for a wired network. Next, you'll discover wireless networks and everything that separates them from their wired-network brethren. Finally, you'll learn about the biggest network of them all, the Internet.

    Troubleshooting Network and Internet Issues

    This lesson covers the steps to take when trying to fix your network or Internet connections. You'll learn how to troubleshoot wired and wireless networks, share files, and fix a dial-up or broadband Internet connection.

    Preventing Internet Problems

    Keep your computer safe from Internet-based attacks, including viruses and spyware! You'll discover the many types of malicious software that can infect your computer, and go through the five-step process of recovering from a virus infection. You'll also read about safe browsing and safe email use and find out how to configure a firewall to help defend your PC.

    Introduction to PC Hardware

    All PC techs needs to get their hands dirty eventually, which means diving inside the case and checking things out from the inside. In this lesson, you'll learn about the power of different PC parts, including what to look for when shopping for new parts. The lesson will also guide you through the safe and proper handling of components.

    Installing Hardware

    Replacing hardware components can dramatically improve your PC's performance. For instance, RAM can speed up your computer, a second hard drive increases your data storage capacity, and expansion cards can add features and ports to your computer. In this lesson, you'll learn to handle RAM, hard drives, and expansion cards.

    Maintaining Hardware

    Dirt happens! You can't make your PC last forever, but you can make it last longer and run better by keeping it clean. Get out your canned air and your distilled water (but not your pencil erasers or your household vacuum cleaner), and learn safe and effective ways to check, clean, and maintain the inside and outside of your computer. You'll also learn about how to donate an old computer and how to throw away a computer without losing data or harming the environment.

    Life of a PC Troubleshooter

    You've come a long way since the beginning of this course. Before you complete your PC troubleshooting training, you'll be reminded about the computing process and troubleshooting theory. Combined with your new knowledge of PC hardware, software, and networking, you can use these tools to fix all sorts of problems. You'll learn more about your future as a PC troubleshooter, including the certifications and careers available to anyone with the right skills.


    What you will learn

    • Learn the typical hardware and operating system problems encountered by technicians
    • Gain the skills you need to solve common PC problems
    • Learn how to diagnose and fix more advanced problems as well
    • Learn how to maintain and optimize a Windows PC

    How you will benefit

    • Save time and money by learning to diagnose and troubleshoot common computer problems that you may encounter personally and professionally
    • Gain confidence as you learn to fix problems on your PC and business computers
    • Open the door to new career opportunities as the go to person for technology issues in most companies

    Mike Meyers

    Mike Meyers, also known as the "Alpha Geek," is widely recognized as the leading authority on CompTIA Certifications in the industry. He co-founded Total Seminars, LLC and National Cyber Group, LLC, and has been providing PC and network repair seminars, books, videos, and courseware to thousands of organizations worldwide. With his extensive experience in the computer and network repair industry since 1987, Mike has worked as a technician, instructor, author, consultant, and speaker.

    Mike is the author of several popular PC books and videos, including the best-selling CompTIA A+ Certification All-in-One Exam Guide and CompTIA Network+ Certification All-in-One Exam Guide. He also serves as the series editor for the highly successful Mike Meyers' Certification Passport series and the Mike Meyers' Guide to series. Mike has sold over a million IT and certification books.


    Don't spend your hard-earned cash on PC repairs that you can fix yourself with a little troubleshooting knowledge. This course takes you step-by-step through typical hardware and operating system problems and gives you the skills you need to solve them as you learn to maintain and optimize a Windows PC.

 

  • Introduction to PC Troubleshooting 
  • Fee: $139.00
    Item Number: 252OCTP273392
    Dates: 5/14/2025 - 6/30/2025
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn to decipher and solve almost any problem with your PC.


    Don't spend your hard-earned cash on expensive PC repairs! The vast majority of the problems people experience with their computers are completely avoidable, and most can be solved with nothing more than a few minutes of your time. Intro to PC Troubleshooting takes you step by step through the typical hardware and operating system problems encountered by technicians, teaching troubleshooting techniques to decipher any problem, and giving you the skills you need to solve them.

    Once you've mastered the basics, the course launches into some of the more advanced and nasty problems that crop up in the PC, teaching you how to diagnose and fix those problems as well! Finally, Intro to PC Troubleshooting shows you how to maintain and optimize a Windows PC. So what are you waiting for? Get ready to troubleshoot and fix some PCs!


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.
    • You will also need access to one or more computers that do not contain any data you consider sensitive.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    The Computing Process

    This lesson starts you on the path to troubleshooting PCs like a pro. You'll first look at input devices, or how you tell the computer to do stuff. In the second part of the lesson, you'll explore the pieces that do the work inside the computer. The final section describes the output devices, where the computer communicates to you.

    Troubleshooting Theory

    This lesson will take you through the troubleshooting process. It's not a guide to solving specific computer problems, but the steps explained here will enable you to tackle any computer problems you might encounter. The three main steps are identifying the problem, testing solutions, and completing the process.

    Operating System Overview

    This lesson introduces you to some of the basic components and tools of an operating system. First, you'll find out about the primary functions of operating systems. You'll then explore the major parts of Microsoft Windows, including the Desktop and Windows Explorer. You'll finish the lesson by learning about the most important troubleshooting tools for fixing operating systems.

    OS Fixes

    This lesson leads you through the basic steps of troubleshooting an operating system, including startup, video, sound, and application errors. You'll look at tools like Safe Mode and the System Configuration utility and learn about driver rollback. You'll end the lesson by learning how to troubleshoot audio/visual errors.

    Avoiding OS Obstacles

    How would you like to prevent system problems instead of rushing to fix them? In this lesson, you'll master the three most important types of preventive maintenance: backing up data that's on a hard drive, updating or upgrading the operating system, and using Windows utilities that help you monitor and maintain the OS.

    Networking Basics

    This lesson covers the basics of networking. First, you'll find out how networks work and what the necessary components are for a wired network. Next, you'll discover wireless networks and everything that separates them from their wired-network brethren. Finally, you'll learn about the biggest network of them all, the Internet.

    Troubleshooting Network and Internet Issues

    This lesson covers the steps to take when trying to fix your network or Internet connections. You'll learn how to troubleshoot wired and wireless networks, share files, and fix a dial-up or broadband Internet connection.

    Preventing Internet Problems

    Keep your computer safe from Internet-based attacks, including viruses and spyware! You'll discover the many types of malicious software that can infect your computer, and go through the five-step process of recovering from a virus infection. You'll also read about safe browsing and safe email use and find out how to configure a firewall to help defend your PC.

    Introduction to PC Hardware

    All PC techs needs to get their hands dirty eventually, which means diving inside the case and checking things out from the inside. In this lesson, you'll learn about the power of different PC parts, including what to look for when shopping for new parts. The lesson will also guide you through the safe and proper handling of components.

    Installing Hardware

    Replacing hardware components can dramatically improve your PC's performance. For instance, RAM can speed up your computer, a second hard drive increases your data storage capacity, and expansion cards can add features and ports to your computer. In this lesson, you'll learn to handle RAM, hard drives, and expansion cards.

    Maintaining Hardware

    Dirt happens! You can't make your PC last forever, but you can make it last longer and run better by keeping it clean. Get out your canned air and your distilled water (but not your pencil erasers or your household vacuum cleaner), and learn safe and effective ways to check, clean, and maintain the inside and outside of your computer. You'll also learn about how to donate an old computer and how to throw away a computer without losing data or harming the environment.

    Life of a PC Troubleshooter

    You've come a long way since the beginning of this course. Before you complete your PC troubleshooting training, you'll be reminded about the computing process and troubleshooting theory. Combined with your new knowledge of PC hardware, software, and networking, you can use these tools to fix all sorts of problems. You'll learn more about your future as a PC troubleshooter, including the certifications and careers available to anyone with the right skills.


    What you will learn

    • Learn the typical hardware and operating system problems encountered by technicians
    • Gain the skills you need to solve common PC problems
    • Learn how to diagnose and fix more advanced problems as well
    • Learn how to maintain and optimize a Windows PC

    How you will benefit

    • Save time and money by learning to diagnose and troubleshoot common computer problems that you may encounter personally and professionally
    • Gain confidence as you learn to fix problems on your PC and business computers
    • Open the door to new career opportunities as the go to person for technology issues in most companies

    Mike Meyers

    Mike Meyers, also known as the "Alpha Geek," is widely recognized as the leading authority on CompTIA Certifications in the industry. He co-founded Total Seminars, LLC and National Cyber Group, LLC, and has been providing PC and network repair seminars, books, videos, and courseware to thousands of organizations worldwide. With his extensive experience in the computer and network repair industry since 1987, Mike has worked as a technician, instructor, author, consultant, and speaker.

    Mike is the author of several popular PC books and videos, including the best-selling CompTIA A+ Certification All-in-One Exam Guide and CompTIA Network+ Certification All-in-One Exam Guide. He also serves as the series editor for the highly successful Mike Meyers' Certification Passport series and the Mike Meyers' Guide to series. Mike has sold over a million IT and certification books.


    Don't spend your hard-earned cash on PC repairs that you can fix yourself with a little troubleshooting knowledge. This course takes you step-by-step through typical hardware and operating system problems and gives you the skills you need to solve them as you learn to maintain and optimize a Windows PC.

 

  • Introduction to PC Troubleshooting 
  • Fee: $139.00
    Item Number: TesOCTP27339203
    Dates: 6/11/2025 - 12/22/2030
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn to decipher and solve almost any problem with your PC.


    Don't spend your hard-earned cash on expensive PC repairs! The vast majority of the problems people experience with their computers are completely avoidable, and most can be solved with nothing more than a few minutes of your time. Intro to PC Troubleshooting takes you step by step through the typical hardware and operating system problems encountered by technicians, teaching troubleshooting techniques to decipher any problem, and giving you the skills you need to solve them.

    Once you've mastered the basics, the course launches into some of the more advanced and nasty problems that crop up in the PC, teaching you how to diagnose and fix those problems as well! Finally, Intro to PC Troubleshooting shows you how to maintain and optimize a Windows PC. So what are you waiting for? Get ready to troubleshoot and fix some PCs!


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.
    • You will also need access to one or more computers that do not contain any data you consider sensitive.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    The Computing Process

    This lesson starts you on the path to troubleshooting PCs like a pro. You'll first look at input devices, or how you tell the computer to do stuff. In the second part of the lesson, you'll explore the pieces that do the work inside the computer. The final section describes the output devices, where the computer communicates to you.

    Troubleshooting Theory

    This lesson will take you through the troubleshooting process. It's not a guide to solving specific computer problems, but the steps explained here will enable you to tackle any computer problems you might encounter. The three main steps are identifying the problem, testing solutions, and completing the process.

    Operating System Overview

    This lesson introduces you to some of the basic components and tools of an operating system. First, you'll find out about the primary functions of operating systems. You'll then explore the major parts of Microsoft Windows, including the Desktop and Windows Explorer. You'll finish the lesson by learning about the most important troubleshooting tools for fixing operating systems.

    OS Fixes

    This lesson leads you through the basic steps of troubleshooting an operating system, including startup, video, sound, and application errors. You'll look at tools like Safe Mode and the System Configuration utility and learn about driver rollback. You'll end the lesson by learning how to troubleshoot audio/visual errors.

    Avoiding OS Obstacles

    How would you like to prevent system problems instead of rushing to fix them? In this lesson, you'll master the three most important types of preventive maintenance: backing up data that's on a hard drive, updating or upgrading the operating system, and using Windows utilities that help you monitor and maintain the OS.

    Networking Basics

    This lesson covers the basics of networking. First, you'll find out how networks work and what the necessary components are for a wired network. Next, you'll discover wireless networks and everything that separates them from their wired-network brethren. Finally, you'll learn about the biggest network of them all, the Internet.

    Troubleshooting Network and Internet Issues

    This lesson covers the steps to take when trying to fix your network or Internet connections. You'll learn how to troubleshoot wired and wireless networks, share files, and fix a dial-up or broadband Internet connection.

    Preventing Internet Problems

    Keep your computer safe from Internet-based attacks, including viruses and spyware! You'll discover the many types of malicious software that can infect your computer, and go through the five-step process of recovering from a virus infection. You'll also read about safe browsing and safe email use and find out how to configure a firewall to help defend your PC.

    Introduction to PC Hardware

    All PC techs needs to get their hands dirty eventually, which means diving inside the case and checking things out from the inside. In this lesson, you'll learn about the power of different PC parts, including what to look for when shopping for new parts. The lesson will also guide you through the safe and proper handling of components.

    Installing Hardware

    Replacing hardware components can dramatically improve your PC's performance. For instance, RAM can speed up your computer, a second hard drive increases your data storage capacity, and expansion cards can add features and ports to your computer. In this lesson, you'll learn to handle RAM, hard drives, and expansion cards.

    Maintaining Hardware

    Dirt happens! You can't make your PC last forever, but you can make it last longer and run better by keeping it clean. Get out your canned air and your distilled water (but not your pencil erasers or your household vacuum cleaner), and learn safe and effective ways to check, clean, and maintain the inside and outside of your computer. You'll also learn about how to donate an old computer and how to throw away a computer without losing data or harming the environment.

    Life of a PC Troubleshooter

    You've come a long way since the beginning of this course. Before you complete your PC troubleshooting training, you'll be reminded about the computing process and troubleshooting theory. Combined with your new knowledge of PC hardware, software, and networking, you can use these tools to fix all sorts of problems. You'll learn more about your future as a PC troubleshooter, including the certifications and careers available to anyone with the right skills.


    What you will learn

    • Learn the typical hardware and operating system problems encountered by technicians
    • Gain the skills you need to solve common PC problems
    • Learn how to diagnose and fix more advanced problems as well
    • Learn how to maintain and optimize a Windows PC

    How you will benefit

    • Save time and money by learning to diagnose and troubleshoot common computer problems that you may encounter personally and professionally
    • Gain confidence as you learn to fix problems on your PC and business computers
    • Open the door to new career opportunities as the go to person for technology issues in most companies

    Mike Meyers

    Mike Meyers, also known as the "Alpha Geek," is widely recognized as the leading authority on CompTIA Certifications in the industry. He co-founded Total Seminars, LLC and National Cyber Group, LLC, and has been providing PC and network repair seminars, books, videos, and courseware to thousands of organizations worldwide. With his extensive experience in the computer and network repair industry since 1987, Mike has worked as a technician, instructor, author, consultant, and speaker.

    Mike is the author of several popular PC books and videos, including the best-selling CompTIA A+ Certification All-in-One Exam Guide and CompTIA Network+ Certification All-in-One Exam Guide. He also serves as the series editor for the highly successful Mike Meyers' Certification Passport series and the Mike Meyers' Guide to series. Mike has sold over a million IT and certification books.


 

  • Introduction to PC Troubleshooting 
  • Fee: $139.00
    Item Number: 252OCTP273393
    Dates: 6/11/2025 - 6/30/2025
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn to decipher and solve almost any problem with your PC.


    Don't spend your hard-earned cash on expensive PC repairs! The vast majority of the problems people experience with their computers are completely avoidable, and most can be solved with nothing more than a few minutes of your time. Intro to PC Troubleshooting takes you step by step through the typical hardware and operating system problems encountered by technicians, teaching troubleshooting techniques to decipher any problem, and giving you the skills you need to solve them.

    Once you've mastered the basics, the course launches into some of the more advanced and nasty problems that crop up in the PC, teaching you how to diagnose and fix those problems as well! Finally, Intro to PC Troubleshooting shows you how to maintain and optimize a Windows PC. So what are you waiting for? Get ready to troubleshoot and fix some PCs!


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.
    • You will also need access to one or more computers that do not contain any data you consider sensitive.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    The Computing Process

    This lesson starts you on the path to troubleshooting PCs like a pro. You'll first look at input devices, or how you tell the computer to do stuff. In the second part of the lesson, you'll explore the pieces that do the work inside the computer. The final section describes the output devices, where the computer communicates to you.

    Troubleshooting Theory

    This lesson will take you through the troubleshooting process. It's not a guide to solving specific computer problems, but the steps explained here will enable you to tackle any computer problems you might encounter. The three main steps are identifying the problem, testing solutions, and completing the process.

    Operating System Overview

    This lesson introduces you to some of the basic components and tools of an operating system. First, you'll find out about the primary functions of operating systems. You'll then explore the major parts of Microsoft Windows, including the Desktop and Windows Explorer. You'll finish the lesson by learning about the most important troubleshooting tools for fixing operating systems.

    OS Fixes

    This lesson leads you through the basic steps of troubleshooting an operating system, including startup, video, sound, and application errors. You'll look at tools like Safe Mode and the System Configuration utility and learn about driver rollback. You'll end the lesson by learning how to troubleshoot audio/visual errors.

    Avoiding OS Obstacles

    How would you like to prevent system problems instead of rushing to fix them? In this lesson, you'll master the three most important types of preventive maintenance: backing up data that's on a hard drive, updating or upgrading the operating system, and using Windows utilities that help you monitor and maintain the OS.

    Networking Basics

    This lesson covers the basics of networking. First, you'll find out how networks work and what the necessary components are for a wired network. Next, you'll discover wireless networks and everything that separates them from their wired-network brethren. Finally, you'll learn about the biggest network of them all, the Internet.

    Troubleshooting Network and Internet Issues

    This lesson covers the steps to take when trying to fix your network or Internet connections. You'll learn how to troubleshoot wired and wireless networks, share files, and fix a dial-up or broadband Internet connection.

    Preventing Internet Problems

    Keep your computer safe from Internet-based attacks, including viruses and spyware! You'll discover the many types of malicious software that can infect your computer, and go through the five-step process of recovering from a virus infection. You'll also read about safe browsing and safe email use and find out how to configure a firewall to help defend your PC.

    Introduction to PC Hardware

    All PC techs needs to get their hands dirty eventually, which means diving inside the case and checking things out from the inside. In this lesson, you'll learn about the power of different PC parts, including what to look for when shopping for new parts. The lesson will also guide you through the safe and proper handling of components.

    Installing Hardware

    Replacing hardware components can dramatically improve your PC's performance. For instance, RAM can speed up your computer, a second hard drive increases your data storage capacity, and expansion cards can add features and ports to your computer. In this lesson, you'll learn to handle RAM, hard drives, and expansion cards.

    Maintaining Hardware

    Dirt happens! You can't make your PC last forever, but you can make it last longer and run better by keeping it clean. Get out your canned air and your distilled water (but not your pencil erasers or your household vacuum cleaner), and learn safe and effective ways to check, clean, and maintain the inside and outside of your computer. You'll also learn about how to donate an old computer and how to throw away a computer without losing data or harming the environment.

    Life of a PC Troubleshooter

    You've come a long way since the beginning of this course. Before you complete your PC troubleshooting training, you'll be reminded about the computing process and troubleshooting theory. Combined with your new knowledge of PC hardware, software, and networking, you can use these tools to fix all sorts of problems. You'll learn more about your future as a PC troubleshooter, including the certifications and careers available to anyone with the right skills.


    What you will learn

    • Learn the typical hardware and operating system problems encountered by technicians
    • Gain the skills you need to solve common PC problems
    • Learn how to diagnose and fix more advanced problems as well
    • Learn how to maintain and optimize a Windows PC

    How you will benefit

    • Save time and money by learning to diagnose and troubleshoot common computer problems that you may encounter personally and professionally
    • Gain confidence as you learn to fix problems on your PC and business computers
    • Open the door to new career opportunities as the go to person for technology issues in most companies

    Mike Meyers

    Mike Meyers, also known as the "Alpha Geek," is widely recognized as the leading authority on CompTIA Certifications in the industry. He co-founded Total Seminars, LLC and National Cyber Group, LLC, and has been providing PC and network repair seminars, books, videos, and courseware to thousands of organizations worldwide. With his extensive experience in the computer and network repair industry since 1987, Mike has worked as a technician, instructor, author, consultant, and speaker.

    Mike is the author of several popular PC books and videos, including the best-selling CompTIA A+ Certification All-in-One Exam Guide and CompTIA Network+ Certification All-in-One Exam Guide. He also serves as the series editor for the highly successful Mike Meyers' Certification Passport series and the Mike Meyers' Guide to series. Mike has sold over a million IT and certification books.


 

  • Management for IT Professionals 
  • Fee: $2,295.00
    Item Number: TesOILC205721
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn leadership skills that will help you succeed as a manager in the IT field by exploring different decision-making techniques. This course focuses on developing a successful leadership style that facilitates team building, collaboration, and a corporate culture that promotes success.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.
    • A high-speed Internet connection

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Office or equivalent (not included in enrollment).
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment. The following textbooks will be shipped to you approximately 7-10 business days after enrollment:

    • Managing by the Numbers: A Commonsense Guide to Understanding and using your Company's Financials
    • Strategic Planning - A Pragmatic Guide

    Please note: You will receive a digital book if the physical book is on backorder.


    If you manage IT professionals, this course is for you! The leaders in an organization often set the tone and establish the benchmarks for success. In this course, you'll explore different decision-making techniques in the context of successful leadership styles. The focus is on developing a successful leadership style that facilitates team building, collaboration, and a corporate culture that promotes success.

    The Management for IT Professionals Online Training course is particularly well suited for anyone in IT who has recently assumed management responsibilities, anyone who is managing IT professionals, or anyone who wants an introductory perspective on some of the unique issues facing the management of IT professionals. This course explores the developmental process and how to be successful in creating change. Since most business organizations are social systems, the Management for IT Professionals Online Training course will also focus on organizational culture and how it influences the way people work, so as to maximize the long-term health of the organization and its people. This course delivers essential leadership skills, business practices, budgeting strategies, communication skills, and more, all with the goal of helping you run your IT department better than ever before.


    1. Management Issues in the IT Environment
      1. Introduction and Components of a Successful Manager
      2. Organizational Culture and Change
      3. Power and Perceptions
      4. Leadership and Risk
      5. Strategies, Decision Making, Empowerment, and Accountability
      6. Customer Relationship Management and Quality
      7. Human Resource Management
      8. Financial Accountability
      9. Summary
    2. Collaborative Problem Solving
      1. Introduction
      2. Backgrounds, Management, and Leadership
      3. Communication, Motivation, and Development
      4. Summary
    3. Strategic Management in Operations
      1. Introduction and Overview
      2. Definitions and Business Models
      3. Categories of Strategies
      4. Strategic Planning Models
      5. Creating Strategic Alternatives
      6. Implementation
      7. Conclusion
    4. Business Best Practices
    5. Financial Accounting for IT Managers
      1. Introduction and Overview
      2. Importance of Financial Statements
      3. The Balance Sheet
      4. The Income Statement
      5. Statement of Cash Flows
      6. Financial Ratios
      7. Conclusion
    6. Legal Issues in Operations
      1. Introduction
      2. Sources of Law
      3. Agency and Employment Law
      4. Torts Law
      5. Sales and Products Liability
      6. Intellectual Property
      7. Ethics
      8. Summary
    7. Organizational Leadership and Decision Making
      1. Introduction and Overview
      2. What Is a Leader
      3. Sources of Power in Leadership
      4. Leadership Theories
      5. Transformational Leaders
      6. Decision Making and Empowerment
      7. Accountability
      8. Summary
    8. Organizational Development and Change
      1. Introduction and Overview
      2. The Culture of an Organization
      3. Types of Culture
      4. Organizational Change
      5. The Human Side of Change and Resistance
      6. Summary
    9. Negotiating Strategies
      1. Introduction
      2. Steps in Negotiating
      3. Tools in Negotiating
      4. Types of Negotiations
      5. Personality Types
      6. Preparing for Negotiations
      7. BATNA and Summary
    10. Seven Management Disciplines
      1. Introduction and Overview
      2. Strategy Management
      3. Human Resource Management
      4. Technology Management
      5. Production and Operations Management
      6. Sales and Marketing Management
      7. Customer Experience Management
      8. Financial Management
      9. Risk Management
      10. Summary
    11. Budgeting Essentials
      1. Introduction
      2. The Concept of Budgeting
      3. Activity Based Budgeting
      4. Factors to Consider in Budgeting
      5. Production Planning
      6. Inventory
      7. Sample Budget and Summary
    12. Persuasive Communication
      1. Introduction
      2. Fundamentals of Communication
      3. Knowing the Audience
      4. The Power of Listening
      5. Credibility of the Speaker
      6. Evidence in Persuasion
      7. Emotion in Persuasion
      8. Organizing the Argument
      9. Summary

    What you will learn

    • Learn to think about budgeting in a strategic, integrated manner
    • Gain strategies to solve problems and challenges on a collaborative basis
    • Understand the legal issues involved in operations, including agency and employment law
    • Learn seven management disciplines
    • Develop a foundation for negotiating with great awareness and effectiveness
    • Learn about the key areas of business management

    How you will benefit

    • Begin your career as an IT professional or develop your existing skills to move up at your current job
    • Learn to communicate and lead a team effectively
    • Understand how to successfully run a department and what financial and legal regulations you'll be held to
    • Discuss ways in which you can benefit your organization, from decision making to cultural shifts, that will make you an asset to any team

    Katrina McBride

    Katrina McBride's career reflects extensive experience in organizational leadership, marketing strategies, and market development in multi-national corporate environments. Her leadership abilities have been utilized to develop new programs and functional areas. In director-level positions for Nortel Networks, she led strategy for competitive intelligence, emerging markets, and lead generation. McBride holds an M.A. in organizational management and a B.S. in psychology.

    Katherine Squires Pang

    Katherine Squires Pang, J.D., LL.M., M.Ed has practiced law with since 1983. She has served as an adjunct faculty member in the Graduate School of Management at the University of Texas, Dallas, and has been an adjunct faculty member of many universities, including New York University and the University of California, Irvine. She received her B.A. in 1980 from Clark University, her J.D. from the University of Dayton Law School in 1982, her LL.M in Taxation from Georgetown University Law School in 1983, and her M.Ed from the University of Texas in 2001.


    If you manage IT professionals, this course is for you! The leaders in an organization often set the tone and establish the benchmarks for success. In this course, you'll explore different decision-making techniques in the context of successful leadership styles. The focus is on developing a successful leadership style that facilitates team building, collaboration, and a corporate culture that promotes success.

    The Management for IT Professionals Online Training course is particularly well suited for anyone in IT who has recently assumed management responsibilities, anyone who is managing IT professionals, or anyone who wants an introductory perspective on some of the unique issues facing the management of IT professionals. This course explores the developmental process and how to be successful in creating change. Since most business organizations are social systems, the Management for IT Professionals Online Training course will also focus on organizational culture and how it influences the way people work, so as to maximize the long-term health of the organization and its people. This course delivers essential leadership skills, business practices, budgeting strategies, communication skills, and more, all with the goal of helping you run your IT department better than ever before.

 

  • Management for IT Professionals 
  • Fee: $2,295.00
    Item Number: 252OILC205721
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn leadership skills that will help you succeed as a manager in the IT field by exploring different decision-making techniques. This course focuses on developing a successful leadership style that facilitates team building, collaboration, and a corporate culture that promotes success.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.
    • A high-speed Internet connection

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Office or equivalent (not included in enrollment).
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment. The following textbooks will be shipped to you approximately 7-10 business days after enrollment:

    • Managing by the Numbers: A Commonsense Guide to Understanding and using your Company's Financials
    • Strategic Planning - A Pragmatic Guide

    Please note: You will receive a digital book if the physical book is on backorder.


    If you manage IT professionals, this course is for you! The leaders in an organization often set the tone and establish the benchmarks for success. In this course, you'll explore different decision-making techniques in the context of successful leadership styles. The focus is on developing a successful leadership style that facilitates team building, collaboration, and a corporate culture that promotes success.

    The Management for IT Professionals Online Training course is particularly well suited for anyone in IT who has recently assumed management responsibilities, anyone who is managing IT professionals, or anyone who wants an introductory perspective on some of the unique issues facing the management of IT professionals. This course explores the developmental process and how to be successful in creating change. Since most business organizations are social systems, the Management for IT Professionals Online Training course will also focus on organizational culture and how it influences the way people work, so as to maximize the long-term health of the organization and its people. This course delivers essential leadership skills, business practices, budgeting strategies, communication skills, and more, all with the goal of helping you run your IT department better than ever before.


    1. Management Issues in the IT Environment
      1. Introduction and Components of a Successful Manager
      2. Organizational Culture and Change
      3. Power and Perceptions
      4. Leadership and Risk
      5. Strategies, Decision Making, Empowerment, and Accountability
      6. Customer Relationship Management and Quality
      7. Human Resource Management
      8. Financial Accountability
      9. Summary
    2. Collaborative Problem Solving
      1. Introduction
      2. Backgrounds, Management, and Leadership
      3. Communication, Motivation, and Development
      4. Summary
    3. Strategic Management in Operations
      1. Introduction and Overview
      2. Definitions and Business Models
      3. Categories of Strategies
      4. Strategic Planning Models
      5. Creating Strategic Alternatives
      6. Implementation
      7. Conclusion
    4. Business Best Practices
    5. Financial Accounting for IT Managers
      1. Introduction and Overview
      2. Importance of Financial Statements
      3. The Balance Sheet
      4. The Income Statement
      5. Statement of Cash Flows
      6. Financial Ratios
      7. Conclusion
    6. Legal Issues in Operations
      1. Introduction
      2. Sources of Law
      3. Agency and Employment Law
      4. Torts Law
      5. Sales and Products Liability
      6. Intellectual Property
      7. Ethics
      8. Summary
    7. Organizational Leadership and Decision Making
      1. Introduction and Overview
      2. What Is a Leader
      3. Sources of Power in Leadership
      4. Leadership Theories
      5. Transformational Leaders
      6. Decision Making and Empowerment
      7. Accountability
      8. Summary
    8. Organizational Development and Change
      1. Introduction and Overview
      2. The Culture of an Organization
      3. Types of Culture
      4. Organizational Change
      5. The Human Side of Change and Resistance
      6. Summary
    9. Negotiating Strategies
      1. Introduction
      2. Steps in Negotiating
      3. Tools in Negotiating
      4. Types of Negotiations
      5. Personality Types
      6. Preparing for Negotiations
      7. BATNA and Summary
    10. Seven Management Disciplines
      1. Introduction and Overview
      2. Strategy Management
      3. Human Resource Management
      4. Technology Management
      5. Production and Operations Management
      6. Sales and Marketing Management
      7. Customer Experience Management
      8. Financial Management
      9. Risk Management
      10. Summary
    11. Budgeting Essentials
      1. Introduction
      2. The Concept of Budgeting
      3. Activity Based Budgeting
      4. Factors to Consider in Budgeting
      5. Production Planning
      6. Inventory
      7. Sample Budget and Summary
    12. Persuasive Communication
      1. Introduction
      2. Fundamentals of Communication
      3. Knowing the Audience
      4. The Power of Listening
      5. Credibility of the Speaker
      6. Evidence in Persuasion
      7. Emotion in Persuasion
      8. Organizing the Argument
      9. Summary

    What you will learn

    • Learn to think about budgeting in a strategic, integrated manner
    • Gain strategies to solve problems and challenges on a collaborative basis
    • Understand the legal issues involved in operations, including agency and employment law
    • Learn seven management disciplines
    • Develop a foundation for negotiating with great awareness and effectiveness
    • Learn about the key areas of business management

    How you will benefit

    • Begin your career as an IT professional or develop your existing skills to move up at your current job
    • Learn to communicate and lead a team effectively
    • Understand how to successfully run a department and what financial and legal regulations you'll be held to
    • Discuss ways in which you can benefit your organization, from decision making to cultural shifts, that will make you an asset to any team

    Katrina McBride

    Katrina McBride's career reflects extensive experience in organizational leadership, marketing strategies, and market development in multi-national corporate environments. Her leadership abilities have been utilized to develop new programs and functional areas. In director-level positions for Nortel Networks, she led strategy for competitive intelligence, emerging markets, and lead generation. McBride holds an M.A. in organizational management and a B.S. in psychology.

    Katherine Squires Pang

    Katherine Squires Pang, J.D., LL.M., M.Ed has practiced law with since 1983. She has served as an adjunct faculty member in the Graduate School of Management at the University of Texas, Dallas, and has been an adjunct faculty member of many universities, including New York University and the University of California, Irvine. She received her B.A. in 1980 from Clark University, her J.D. from the University of Dayton Law School in 1982, her LL.M in Taxation from Georgetown University Law School in 1983, and her M.Ed from the University of Texas in 2001.


    If you manage IT professionals, this course is for you! The leaders in an organization often set the tone and establish the benchmarks for success. In this course, you'll explore different decision-making techniques in the context of successful leadership styles. The focus is on developing a successful leadership style that facilitates team building, collaboration, and a corporate culture that promotes success.

    The Management for IT Professionals Online Training course is particularly well suited for anyone in IT who has recently assumed management responsibilities, anyone who is managing IT professionals, or anyone who wants an introductory perspective on some of the unique issues facing the management of IT professionals. This course explores the developmental process and how to be successful in creating change. Since most business organizations are social systems, the Management for IT Professionals Online Training course will also focus on organizational culture and how it influences the way people work, so as to maximize the long-term health of the organization and its people. This course delivers essential leadership skills, business practices, budgeting strategies, communication skills, and more, all with the goal of helping you run your IT department better than ever before.

 

  • Understanding the Cloud 
  • Fee: $139.00
    Item Number: TesOCTP27560202
    Dates: 5/14/2025 - 12/22/2030
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn everything you need to truly understand the cloud—including how it works, what drives it, why it's so popular, and how to make the cloud work for you.


    What is the cloud? If you have trouble answering this question, you are not alone. In this course, you will explore how the cloud works, what drives its incredible growth, and how you can use cloud services. You will start by looking at the building blocks of the cloud, where it started, and how it transitioned. You will gain a clear understanding of IaaS (infrastructure), SaaS (software), and PaaS (platforms), and examine why each may be attractive to some businesses, but not to others. You will learn about the different kinds of clouds (public, private, and hybrid).

    You will also look inside the engine rooms of the cloud: data centers. You will examine the concept of big data and how the cloud infrastructure enables data to zip across the globe at lightning speed. You will look at how Facebook and Twitter contribute to the cloud, and how apps go from idea to app store. You will gain an understanding of how mobile devices and major mobile ecosystems continue to shape the cloud. Whatever your technical background, by the end of this course, you will be thoroughly cloud-savvy.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    What the Cloud Is

    Confused about the cloud? You're in the right place! This lesson will clear up some confusion and start with the basics. It will explain the building blocks of the cloud, and that will lead you to a durable definition of the cloud that you'll use as a foundation for the rest of the course. The lesson will also discuss what the cloud means to you, its impact on your life, and why it'll be helpful for you to understand how it works.

    How the Cloud Started and What It Solves

    So how did the cloud get started? In this lesson, you'll learn the history of the cloud and how it was a natural evolution of networked computers and Internet connectivity. The lesson will also discuss why the cloud is so important, and then you'll look at the business challenges and opportunities that the cloud addresses. By the end of the lesson, you'll have a solid understanding of how this technology got to where it is now and how business computing operated before the cloud.

    Different Kinds of Clouds: Public, Private, Hybrid

    Ever wonder why some people believe the cloud is simple, while others believe that it's complex? In this lesson, you'll learn why they're both right—and you'll learn how to think about the cloud from two perspectives. The lesson will also discuss the different types of clouds: public, private, and hybrid. You'll get a glimpse inside the big business technology world and find out why the cloud can be such a compelling move for large organizations.

    How the Cloud Grows

    What's the difference between the cloud and a collection of computers? A bunch—and much of that comes down to virtualization. In this lesson, you'll learn what virtualization is and why it's so fundamental in how the cloud operates. The lesson will also discuss the issue of scaling and how it relates to virtualization. Finally, you'll see how endpoints make all the connections work.

    Cloud Services

    As you'll recall, "services" is one of the five building blocks in the definition of the cloud. In this lesson, you'll look at those services. Specifically, you'll look at three categories of cloud services: infrastructure (or Infrastructure as a Service, or IaaS), platforms (or Platform as a Service, or PaaS), and software (or Software as a Service, or SaaS). The lesson will discuss how these three categories compare and individuals and business can take advantage of them.

    Data Centers: Where the Cloud Computes

    All the computing power of the cloud needs to live somewhere, and it's not in the atmosphere. In this lesson, you'll learn all about data centers—how they operate, what they look like, where they're located, and what makes them tick. You'll also learn what makes one data center more efficient than another, and you'll get perspective on what it costs to make them operate. It's a fascinating tour, with a lot to learn and even more to explore!

    Understanding Data, Including Big Data

    Your experience in the cloud includes the storing and transmission of data, either across the hall or across the world. In this lesson, you'll understand how to think about data in terms of its importance in the cloud and learn why companies often leave worrying about data to someone else. The lesson will discuss how all the data in the cloud moves across continents, across the ocean, and over airwaves. Finally, you'll look at a clear definition of big data and see some examples of where big data may be headed.

    Understanding Cloud Providers

    Making sense of how cloud providers offer their services is an important step in truly understanding the cloud. In this lesson, you'll see how a well-established cloud provider organizes and presents its offerings. You'll go through each group of the cloud provider's offered services and map them to what you've already learned about the cloud and the categories you're familiar with.

    Cloud Providers and Big Platforms

    In this lesson, you'll learn where websites fit into the cloud and what other elements, offerings, or activities are driving the adoption and popularity of the cloud and its varied services. The lesson will also cover what it means to be a big provider, and you'll examine the largest platforms—and largest overall service providers—that are in the cloud today.

    Getting Into the Cloud

    Learn about what goes into creating a cloud app, and how the three (plus one) ecosystems dominate the world of cloud applications. In this lesson, you also learn about the different types of devices, how they are categorized, and how they align with the types of cloud apps that are available. You'll also learn about ecosystems, and why they define how cloud apps are created, distributed, and sold.

    The Cloud and #You

    In this lesson, you'll look at how social network sites like Facebook, LinkedIn, and Twitter work in the cloud and how users and organizations can create apps that connect with their huge base of users. You'll learn how social media sites let software developers interact with their sites, create apps and games that operate within and outside their sites, and why they do this. You'll also learn about social media tools on Facebook and Twitter, including why the hashtag was created (#), how it's used, and how to use these sites yourself.

    Conclusions, Connections, and the Future of the Cloud

    This lesson ties together everything you've learned in this course. You'll learn how you can view the cloud from two primary perspectives—consumer and business—and about the primary benefits (and drivers) that have propelled cloud adoption from participants of both perspectives. The lesson will also discuss where these two perspectives share a common, clear force that continues to be the biggest benefit of the cloud. Finally, you'll look into the future of what the cloud may hold and what that future might mean.


    What you will learn

    • Gain a definition of the cloud, what the cloud means to you, and its impact on your life
    • Learn why the cloud is so important, and business challenges and opportunities that the cloud addresses
    • Learn what virtualization is and why it is so fundamental in how the cloud operates
    • Explore cloud services and how individuals and business can take advantage of them
    • Learn all about data in the cloud and how it moves across continents, oceans, and airwaves
    • Discover what goes into a cloud app, and the types of cloud apps available
    • Learn how social networks work in the cloud and how users and organizations can create apps that connect with a huge base of users
    • Look at the cloud from both a consumer and business perspective

    How you will benefit

    • Gain answers to questions you may have about what the cloud is and how it works
    • Gain a better understanding of services that can be offered from a consumer and business perspective using the cloud
    • Discover how the cloud can work for you

    David Iseminger

    David Iseminger is an author and technology veteran, with expertise in computing, networking, wireless and cloud technologies, data and analytics, artificial intelligence, and blockchain. While with Microsoft, David worked on early versions of Windows and its core networking infrastructure, and on transmission protocols, security, data visualizations, and multiple emerging cloud technologies. David is passionate about education, serving as a School Board director for over 10 years, advocating at state and federal levels for increased learning standards, and has taught over 40,000 students through multiple technology courses. He has an awarded patent in Artificial Intelligence (AI) object detection and social posting methodologies, and is the founder and CEO of the blockchain company that created IronWeave, the unlimited scale blockchain platform, based on his patent-pending blockchain innovations and inventions.


    Learn everything you need to understand cloud computing. This course explores how the cloud works, what drives it, why it is so popular, and what it can do for you.

 

  • Understanding the Cloud 
  • Fee: $139.00
    Item Number: 252OCTP275602
    Dates: 5/14/2025 - 6/30/2025
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn everything you need to truly understand the cloud—including how it works, what drives it, why it's so popular, and how to make the cloud work for you.


    What is the cloud? If you have trouble answering this question, you are not alone. In this course, you will explore how the cloud works, what drives its incredible growth, and how you can use cloud services. You will start by looking at the building blocks of the cloud, where it started, and how it transitioned. You will gain a clear understanding of IaaS (infrastructure), SaaS (software), and PaaS (platforms), and examine why each may be attractive to some businesses, but not to others. You will learn about the different kinds of clouds (public, private, and hybrid).

    You will also look inside the engine rooms of the cloud: data centers. You will examine the concept of big data and how the cloud infrastructure enables data to zip across the globe at lightning speed. You will look at how Facebook and Twitter contribute to the cloud, and how apps go from idea to app store. You will gain an understanding of how mobile devices and major mobile ecosystems continue to shape the cloud. Whatever your technical background, by the end of this course, you will be thoroughly cloud-savvy.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    What the Cloud Is

    Confused about the cloud? You're in the right place! This lesson will clear up some confusion and start with the basics. It will explain the building blocks of the cloud, and that will lead you to a durable definition of the cloud that you'll use as a foundation for the rest of the course. The lesson will also discuss what the cloud means to you, its impact on your life, and why it'll be helpful for you to understand how it works.

    How the Cloud Started and What It Solves

    So how did the cloud get started? In this lesson, you'll learn the history of the cloud and how it was a natural evolution of networked computers and Internet connectivity. The lesson will also discuss why the cloud is so important, and then you'll look at the business challenges and opportunities that the cloud addresses. By the end of the lesson, you'll have a solid understanding of how this technology got to where it is now and how business computing operated before the cloud.

    Different Kinds of Clouds: Public, Private, Hybrid

    Ever wonder why some people believe the cloud is simple, while others believe that it's complex? In this lesson, you'll learn why they're both right—and you'll learn how to think about the cloud from two perspectives. The lesson will also discuss the different types of clouds: public, private, and hybrid. You'll get a glimpse inside the big business technology world and find out why the cloud can be such a compelling move for large organizations.

    How the Cloud Grows

    What's the difference between the cloud and a collection of computers? A bunch—and much of that comes down to virtualization. In this lesson, you'll learn what virtualization is and why it's so fundamental in how the cloud operates. The lesson will also discuss the issue of scaling and how it relates to virtualization. Finally, you'll see how endpoints make all the connections work.

    Cloud Services

    As you'll recall, "services" is one of the five building blocks in the definition of the cloud. In this lesson, you'll look at those services. Specifically, you'll look at three categories of cloud services: infrastructure (or Infrastructure as a Service, or IaaS), platforms (or Platform as a Service, or PaaS), and software (or Software as a Service, or SaaS). The lesson will discuss how these three categories compare and individuals and business can take advantage of them.

    Data Centers: Where the Cloud Computes

    All the computing power of the cloud needs to live somewhere, and it's not in the atmosphere. In this lesson, you'll learn all about data centers—how they operate, what they look like, where they're located, and what makes them tick. You'll also learn what makes one data center more efficient than another, and you'll get perspective on what it costs to make them operate. It's a fascinating tour, with a lot to learn and even more to explore!

    Understanding Data, Including Big Data

    Your experience in the cloud includes the storing and transmission of data, either across the hall or across the world. In this lesson, you'll understand how to think about data in terms of its importance in the cloud and learn why companies often leave worrying about data to someone else. The lesson will discuss how all the data in the cloud moves across continents, across the ocean, and over airwaves. Finally, you'll look at a clear definition of big data and see some examples of where big data may be headed.

    Understanding Cloud Providers

    Making sense of how cloud providers offer their services is an important step in truly understanding the cloud. In this lesson, you'll see how a well-established cloud provider organizes and presents its offerings. You'll go through each group of the cloud provider's offered services and map them to what you've already learned about the cloud and the categories you're familiar with.

    Cloud Providers and Big Platforms

    In this lesson, you'll learn where websites fit into the cloud and what other elements, offerings, or activities are driving the adoption and popularity of the cloud and its varied services. The lesson will also cover what it means to be a big provider, and you'll examine the largest platforms—and largest overall service providers—that are in the cloud today.

    Getting Into the Cloud

    Learn about what goes into creating a cloud app, and how the three (plus one) ecosystems dominate the world of cloud applications. In this lesson, you also learn about the different types of devices, how they are categorized, and how they align with the types of cloud apps that are available. You'll also learn about ecosystems, and why they define how cloud apps are created, distributed, and sold.

    The Cloud and #You

    In this lesson, you'll look at how social network sites like Facebook, LinkedIn, and Twitter work in the cloud and how users and organizations can create apps that connect with their huge base of users. You'll learn how social media sites let software developers interact with their sites, create apps and games that operate within and outside their sites, and why they do this. You'll also learn about social media tools on Facebook and Twitter, including why the hashtag was created (#), how it's used, and how to use these sites yourself.

    Conclusions, Connections, and the Future of the Cloud

    This lesson ties together everything you've learned in this course. You'll learn how you can view the cloud from two primary perspectives—consumer and business—and about the primary benefits (and drivers) that have propelled cloud adoption from participants of both perspectives. The lesson will also discuss where these two perspectives share a common, clear force that continues to be the biggest benefit of the cloud. Finally, you'll look into the future of what the cloud may hold and what that future might mean.


    What you will learn

    • Gain a definition of the cloud, what the cloud means to you, and its impact on your life
    • Learn why the cloud is so important, and business challenges and opportunities that the cloud addresses
    • Learn what virtualization is and why it is so fundamental in how the cloud operates
    • Explore cloud services and how individuals and business can take advantage of them
    • Learn all about data in the cloud and how it moves across continents, oceans, and airwaves
    • Discover what goes into a cloud app, and the types of cloud apps available
    • Learn how social networks work in the cloud and how users and organizations can create apps that connect with a huge base of users
    • Look at the cloud from both a consumer and business perspective

    How you will benefit

    • Gain answers to questions you may have about what the cloud is and how it works
    • Gain a better understanding of services that can be offered from a consumer and business perspective using the cloud
    • Discover how the cloud can work for you

    David Iseminger

    David Iseminger is an author and technology veteran, with expertise in computing, networking, wireless and cloud technologies, data and analytics, artificial intelligence, and blockchain. While with Microsoft, David worked on early versions of Windows and its core networking infrastructure, and on transmission protocols, security, data visualizations, and multiple emerging cloud technologies. David is passionate about education, serving as a School Board director for over 10 years, advocating at state and federal levels for increased learning standards, and has taught over 40,000 students through multiple technology courses. He has an awarded patent in Artificial Intelligence (AI) object detection and social posting methodologies, and is the founder and CEO of the blockchain company that created IronWeave, the unlimited scale blockchain platform, based on his patent-pending blockchain innovations and inventions.


    Learn everything you need to understand cloud computing. This course explores how the cloud works, what drives it, why it is so popular, and what it can do for you.

 

  • Understanding the Cloud 
  • Fee: $139.00
    Item Number: TesOCTP27560203
    Dates: 6/11/2025 - 12/22/2030
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn everything you need to truly understand the cloud—including how it works, what drives it, why it's so popular, and how to make the cloud work for you.


    What is the cloud? If you have trouble answering this question, you are not alone. In this course, you will explore how the cloud works, what drives its incredible growth, and how you can use cloud services. You will start by looking at the building blocks of the cloud, where it started, and how it transitioned. You will gain a clear understanding of IaaS (infrastructure), SaaS (software), and PaaS (platforms), and examine why each may be attractive to some businesses, but not to others. You will learn about the different kinds of clouds (public, private, and hybrid).

    You will also look inside the engine rooms of the cloud: data centers. You will examine the concept of big data and how the cloud infrastructure enables data to zip across the globe at lightning speed. You will look at how Facebook and Twitter contribute to the cloud, and how apps go from idea to app store. You will gain an understanding of how mobile devices and major mobile ecosystems continue to shape the cloud. Whatever your technical background, by the end of this course, you will be thoroughly cloud-savvy.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    What the Cloud Is

    Confused about the cloud? You're in the right place! This lesson will clear up some confusion and start with the basics. It will explain the building blocks of the cloud, and that will lead you to a durable definition of the cloud that you'll use as a foundation for the rest of the course. The lesson will also discuss what the cloud means to you, its impact on your life, and why it'll be helpful for you to understand how it works.

    How the Cloud Started and What It Solves

    So how did the cloud get started? In this lesson, you'll learn the history of the cloud and how it was a natural evolution of networked computers and Internet connectivity. The lesson will also discuss why the cloud is so important, and then you'll look at the business challenges and opportunities that the cloud addresses. By the end of the lesson, you'll have a solid understanding of how this technology got to where it is now and how business computing operated before the cloud.

    Different Kinds of Clouds: Public, Private, Hybrid

    Ever wonder why some people believe the cloud is simple, while others believe that it's complex? In this lesson, you'll learn why they're both right—and you'll learn how to think about the cloud from two perspectives. The lesson will also discuss the different types of clouds: public, private, and hybrid. You'll get a glimpse inside the big business technology world and find out why the cloud can be such a compelling move for large organizations.

    How the Cloud Grows

    What's the difference between the cloud and a collection of computers? A bunch—and much of that comes down to virtualization. In this lesson, you'll learn what virtualization is and why it's so fundamental in how the cloud operates. The lesson will also discuss the issue of scaling and how it relates to virtualization. Finally, you'll see how endpoints make all the connections work.

    Cloud Services

    As you'll recall, "services" is one of the five building blocks in the definition of the cloud. In this lesson, you'll look at those services. Specifically, you'll look at three categories of cloud services: infrastructure (or Infrastructure as a Service, or IaaS), platforms (or Platform as a Service, or PaaS), and software (or Software as a Service, or SaaS). The lesson will discuss how these three categories compare and individuals and business can take advantage of them.

    Data Centers: Where the Cloud Computes

    All the computing power of the cloud needs to live somewhere, and it's not in the atmosphere. In this lesson, you'll learn all about data centers—how they operate, what they look like, where they're located, and what makes them tick. You'll also learn what makes one data center more efficient than another, and you'll get perspective on what it costs to make them operate. It's a fascinating tour, with a lot to learn and even more to explore!

    Understanding Data, Including Big Data

    Your experience in the cloud includes the storing and transmission of data, either across the hall or across the world. In this lesson, you'll understand how to think about data in terms of its importance in the cloud and learn why companies often leave worrying about data to someone else. The lesson will discuss how all the data in the cloud moves across continents, across the ocean, and over airwaves. Finally, you'll look at a clear definition of big data and see some examples of where big data may be headed.

    Understanding Cloud Providers

    Making sense of how cloud providers offer their services is an important step in truly understanding the cloud. In this lesson, you'll see how a well-established cloud provider organizes and presents its offerings. You'll go through each group of the cloud provider's offered services and map them to what you've already learned about the cloud and the categories you're familiar with.

    Cloud Providers and Big Platforms

    In this lesson, you'll learn where websites fit into the cloud and what other elements, offerings, or activities are driving the adoption and popularity of the cloud and its varied services. The lesson will also cover what it means to be a big provider, and you'll examine the largest platforms—and largest overall service providers—that are in the cloud today.

    Getting Into the Cloud

    Learn about what goes into creating a cloud app, and how the three (plus one) ecosystems dominate the world of cloud applications. In this lesson, you also learn about the different types of devices, how they are categorized, and how they align with the types of cloud apps that are available. You'll also learn about ecosystems, and why they define how cloud apps are created, distributed, and sold.

    The Cloud and #You

    In this lesson, you'll look at how social network sites like Facebook, LinkedIn, and Twitter work in the cloud and how users and organizations can create apps that connect with their huge base of users. You'll learn how social media sites let software developers interact with their sites, create apps and games that operate within and outside their sites, and why they do this. You'll also learn about social media tools on Facebook and Twitter, including why the hashtag was created (#), how it's used, and how to use these sites yourself.

    Conclusions, Connections, and the Future of the Cloud

    This lesson ties together everything you've learned in this course. You'll learn how you can view the cloud from two primary perspectives—consumer and business—and about the primary benefits (and drivers) that have propelled cloud adoption from participants of both perspectives. The lesson will also discuss where these two perspectives share a common, clear force that continues to be the biggest benefit of the cloud. Finally, you'll look into the future of what the cloud may hold and what that future might mean.


    What you will learn

    • Gain a definition of the cloud, what the cloud means to you, and its impact on your life
    • Learn why the cloud is so important, and business challenges and opportunities that the cloud addresses
    • Learn what virtualization is and why it is so fundamental in how the cloud operates
    • Explore cloud services and how individuals and business can take advantage of them
    • Learn all about data in the cloud and how it moves across continents, oceans, and airwaves
    • Discover what goes into a cloud app, and the types of cloud apps available
    • Learn how social networks work in the cloud and how users and organizations can create apps that connect with a huge base of users
    • Look at the cloud from both a consumer and business perspective

    How you will benefit

    • Gain answers to questions you may have about what the cloud is and how it works
    • Gain a better understanding of services that can be offered from a consumer and business perspective using the cloud
    • Discover how the cloud can work for you

    David Iseminger

    David Iseminger is an author and technology veteran, with expertise in computing, networking, wireless and cloud technologies, data and analytics, artificial intelligence, and blockchain. While with Microsoft, David worked on early versions of Windows and its core networking infrastructure, and on transmission protocols, security, data visualizations, and multiple emerging cloud technologies. David is passionate about education, serving as a School Board director for over 10 years, advocating at state and federal levels for increased learning standards, and has taught over 40,000 students through multiple technology courses. He has an awarded patent in Artificial Intelligence (AI) object detection and social posting methodologies, and is the founder and CEO of the blockchain company that created IronWeave, the unlimited scale blockchain platform, based on his patent-pending blockchain innovations and inventions.


 

  • Understanding the Cloud 
  • Fee: $139.00
    Item Number: 252OCTP275603
    Dates: 6/11/2025 - 6/30/2025
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn everything you need to truly understand the cloud—including how it works, what drives it, why it's so popular, and how to make the cloud work for you.


    What is the cloud? If you have trouble answering this question, you are not alone. In this course, you will explore how the cloud works, what drives its incredible growth, and how you can use cloud services. You will start by looking at the building blocks of the cloud, where it started, and how it transitioned. You will gain a clear understanding of IaaS (infrastructure), SaaS (software), and PaaS (platforms), and examine why each may be attractive to some businesses, but not to others. You will learn about the different kinds of clouds (public, private, and hybrid).

    You will also look inside the engine rooms of the cloud: data centers. You will examine the concept of big data and how the cloud infrastructure enables data to zip across the globe at lightning speed. You will look at how Facebook and Twitter contribute to the cloud, and how apps go from idea to app store. You will gain an understanding of how mobile devices and major mobile ecosystems continue to shape the cloud. Whatever your technical background, by the end of this course, you will be thoroughly cloud-savvy.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    What the Cloud Is

    Confused about the cloud? You're in the right place! This lesson will clear up some confusion and start with the basics. It will explain the building blocks of the cloud, and that will lead you to a durable definition of the cloud that you'll use as a foundation for the rest of the course. The lesson will also discuss what the cloud means to you, its impact on your life, and why it'll be helpful for you to understand how it works.

    How the Cloud Started and What It Solves

    So how did the cloud get started? In this lesson, you'll learn the history of the cloud and how it was a natural evolution of networked computers and Internet connectivity. The lesson will also discuss why the cloud is so important, and then you'll look at the business challenges and opportunities that the cloud addresses. By the end of the lesson, you'll have a solid understanding of how this technology got to where it is now and how business computing operated before the cloud.

    Different Kinds of Clouds: Public, Private, Hybrid

    Ever wonder why some people believe the cloud is simple, while others believe that it's complex? In this lesson, you'll learn why they're both right—and you'll learn how to think about the cloud from two perspectives. The lesson will also discuss the different types of clouds: public, private, and hybrid. You'll get a glimpse inside the big business technology world and find out why the cloud can be such a compelling move for large organizations.

    How the Cloud Grows

    What's the difference between the cloud and a collection of computers? A bunch—and much of that comes down to virtualization. In this lesson, you'll learn what virtualization is and why it's so fundamental in how the cloud operates. The lesson will also discuss the issue of scaling and how it relates to virtualization. Finally, you'll see how endpoints make all the connections work.

    Cloud Services

    As you'll recall, "services" is one of the five building blocks in the definition of the cloud. In this lesson, you'll look at those services. Specifically, you'll look at three categories of cloud services: infrastructure (or Infrastructure as a Service, or IaaS), platforms (or Platform as a Service, or PaaS), and software (or Software as a Service, or SaaS). The lesson will discuss how these three categories compare and individuals and business can take advantage of them.

    Data Centers: Where the Cloud Computes

    All the computing power of the cloud needs to live somewhere, and it's not in the atmosphere. In this lesson, you'll learn all about data centers—how they operate, what they look like, where they're located, and what makes them tick. You'll also learn what makes one data center more efficient than another, and you'll get perspective on what it costs to make them operate. It's a fascinating tour, with a lot to learn and even more to explore!

    Understanding Data, Including Big Data

    Your experience in the cloud includes the storing and transmission of data, either across the hall or across the world. In this lesson, you'll understand how to think about data in terms of its importance in the cloud and learn why companies often leave worrying about data to someone else. The lesson will discuss how all the data in the cloud moves across continents, across the ocean, and over airwaves. Finally, you'll look at a clear definition of big data and see some examples of where big data may be headed.

    Understanding Cloud Providers

    Making sense of how cloud providers offer their services is an important step in truly understanding the cloud. In this lesson, you'll see how a well-established cloud provider organizes and presents its offerings. You'll go through each group of the cloud provider's offered services and map them to what you've already learned about the cloud and the categories you're familiar with.

    Cloud Providers and Big Platforms

    In this lesson, you'll learn where websites fit into the cloud and what other elements, offerings, or activities are driving the adoption and popularity of the cloud and its varied services. The lesson will also cover what it means to be a big provider, and you'll examine the largest platforms—and largest overall service providers—that are in the cloud today.

    Getting Into the Cloud

    Learn about what goes into creating a cloud app, and how the three (plus one) ecosystems dominate the world of cloud applications. In this lesson, you also learn about the different types of devices, how they are categorized, and how they align with the types of cloud apps that are available. You'll also learn about ecosystems, and why they define how cloud apps are created, distributed, and sold.

    The Cloud and #You

    In this lesson, you'll look at how social network sites like Facebook, LinkedIn, and Twitter work in the cloud and how users and organizations can create apps that connect with their huge base of users. You'll learn how social media sites let software developers interact with their sites, create apps and games that operate within and outside their sites, and why they do this. You'll also learn about social media tools on Facebook and Twitter, including why the hashtag was created (#), how it's used, and how to use these sites yourself.

    Conclusions, Connections, and the Future of the Cloud

    This lesson ties together everything you've learned in this course. You'll learn how you can view the cloud from two primary perspectives—consumer and business—and about the primary benefits (and drivers) that have propelled cloud adoption from participants of both perspectives. The lesson will also discuss where these two perspectives share a common, clear force that continues to be the biggest benefit of the cloud. Finally, you'll look into the future of what the cloud may hold and what that future might mean.


    What you will learn

    • Gain a definition of the cloud, what the cloud means to you, and its impact on your life
    • Learn why the cloud is so important, and business challenges and opportunities that the cloud addresses
    • Learn what virtualization is and why it is so fundamental in how the cloud operates
    • Explore cloud services and how individuals and business can take advantage of them
    • Learn all about data in the cloud and how it moves across continents, oceans, and airwaves
    • Discover what goes into a cloud app, and the types of cloud apps available
    • Learn how social networks work in the cloud and how users and organizations can create apps that connect with a huge base of users
    • Look at the cloud from both a consumer and business perspective

    How you will benefit

    • Gain answers to questions you may have about what the cloud is and how it works
    • Gain a better understanding of services that can be offered from a consumer and business perspective using the cloud
    • Discover how the cloud can work for you

    David Iseminger

    David Iseminger is an author and technology veteran, with expertise in computing, networking, wireless and cloud technologies, data and analytics, artificial intelligence, and blockchain. While with Microsoft, David worked on early versions of Windows and its core networking infrastructure, and on transmission protocols, security, data visualizations, and multiple emerging cloud technologies. David is passionate about education, serving as a School Board director for over 10 years, advocating at state and federal levels for increased learning standards, and has taught over 40,000 students through multiple technology courses. He has an awarded patent in Artificial Intelligence (AI) object detection and social posting methodologies, and is the founder and CEO of the blockchain company that created IronWeave, the unlimited scale blockchain platform, based on his patent-pending blockchain innovations and inventions.


 

  • Understanding the Cloud (Self-Guided) 
  • Fee: $139.00
    Item Number: TesOCTP278371
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn everything you need to truly understand the cloud—including how it works, what drives it, why it's so popular, and how to make the cloud work for you.


    What is the cloud? If you have trouble answering this question, you are not alone. In this course, you will explore how the cloud works, what drives its incredible growth, and how you can use cloud services. You will start by looking at the building blocks of the cloud, where it started, and how it transitioned. You will gain a clear understanding of IaaS (infrastructure), SaaS (software), and PaaS (platforms), and examine why each may be attractive to some businesses, but not to others. You will learn about the different kinds of clouds (public, private, and hybrid).

    You will also look inside the engine rooms of the cloud: data centers. You will examine the concept of big data and how the cloud infrastructure enables data to zip across the globe at lightning speed. You will look at how Facebook and Twitter contribute to the cloud, and how apps go from idea to app store. You will gain an understanding of how mobile devices and major mobile ecosystems continue to shape the cloud. Whatever your technical background, by the end of this course, you will be thoroughly cloud-savvy.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    Learn everything you need to truly understand the cloud—including how it works, what drives it, why it's so popular, and how to make the cloud work for you.


    What the Cloud Is

    Confused about the cloud? You're in the right place! This first lesson will clear up some confusion and start with the basics. It will explain the building blocks of the cloud, and that will lead you to a durable definition of the cloud that you'll use as a foundation for the rest of the course. The lesson will also discuss what the cloud means to you, its impact on your life, and why it'll be helpful for you to understand how it works.

    How the Cloud Started and What It Solves

    So how did the cloud get started? In this lesson, you'll learn the history of the cloud and how it was a natural evolution of networked computers and Internet connectivity. The lesson will also discuss why the cloud is so important, and then you'll look at the business challenges and opportunities that the cloud addresses. By the end of the lesson, you'll have a solid understanding of how this technology got to where it is now and how business computing operated before the cloud.

    Different Kinds of Clouds: Public, Private, Hybrid

    Ever wonder why some people believe the cloud is simple, while others believe that it's complex? In this lesson, you'll learn why they're both right—and you'll learn how to think about the cloud from two perspectives. The lesson will also discuss the different types of clouds: public, private, and hybrid. You'll get a glimpse inside the big business technology world and find out why the cloud can be such a compelling move for large organizations.

    How the Cloud Grows

    What's the difference between the cloud and a collection of computers? A bunch—and much of that comes down to virtualization. In this lesson, you'll learn what virtualization is and why it's so fundamental in how the cloud operates. The lesson will also discuss scale and how it relates to virtualization. Finally, you'll see how endpoints make all the connections work.

    Cloud Services

    As you'll recall, "services" is one of the five building blocks in the definition of the cloud. In this lesson, you'll look at those services. Specifically, you'll look at three categories of cloud services: infrastructure (or Infrastructure as a Service, or IaaS), platforms (or Platform as a Service, or PaaS), and software (or Software as a Service, or SaaS). The lesson will discuss how these three categories compare and individuals and business can take advantage of them.

    Data Centers: Where the Cloud Computes

    All the computing power of the cloud needs to live somewhere, and it's not in the atmosphere. In this lesson, you'll learn all about data centers—how they operate, what they look like, where they're located, and what makes them tick. You'll also learn what makes one data center more efficient than another, and you'll get perspective on what it costs to make them operate. It's a fascinating tour, with a lot to learn and even more to explore!

    Understanding Data, Including Big Data

    Your experience in the cloud includes the storing and transmission of data, either across the hall or across the world. In this lesson, you'll understand how to think about data in terms of its importance in the cloud and learn why companies often leave worrying about data to someone else. The lesson will discuss how all the data in the cloud moves across continents, across the ocean, and over airwaves. Finally, you'll look at a clear definition of big data and see some examples of where big data may be headed.

    Understanding Cloud Providers

    Making sense of how cloud providers offer their services is an important step in truly understanding the cloud. In this lesson, you'll see how a well-established cloud provider organizes and presents its offerings. You'll go through each group of the cloud provider's offered services and map them to what you've already learned about the cloud and the categories you're familiar with.

    Cloud Providers and Big Platforms

    In this lesson, you'll learn where websites fit into the cloud and what other elements, offerings, or activities are driving the adoption and popularity of the cloud and its varied services. The lesson will also cover what it means to be a big provider, and you'll examine the largest platforms—and largest overall service providers—that are in the cloud today.

    Getting Into the Cloud

    Learn about what goes into creating a cloud app, and how the three (plus one) ecosystems dominate the world of cloud applications. In this lesson, you also learn about the different types of devices, how they are categorized, and how they align to the types of cloud apps that are available. You'll also learn about ecosystems, and why they define how cloud apps are created, distributed, and sold.

    The Cloud and #You

    In this lesson, you'll look at how social network sites like Facebook, LinkedIn, and Twitter work in the cloud and how users and organizations can create apps that connect with their huge base of users. You'll learn how social media sites let software developers interact with their sites, create apps and games that operate within and outside their sites, and why they do this. Also, you'll learn about social media tools on Facebook and in Twitter, including why the hashtag was created (#), how it's used, and how to use these sites yourself.

    Conclusions, Connections, and the Future of the Cloud

    This lesson ties together everything you've learned in this course. You'll learn how you can view the cloud from two primary perspectives—consumer and business—and about the primary benefits (and drivers) that have propelled cloud adoption from participants of both perspectives. The lesson will also discuss where these two perspectives share a common, clear force that continues to be the biggest benefit of the cloud. Finally, you'll look into the future of what the cloud may hold and what that future might mean.



    Self-Study

    Learn everything you need to truly understand the cloud—including how it works, what drives it, why it's so popular, and how to make the cloud work for you.

 

  • Understanding the Cloud (Self-Guided) 
  • Fee: $139.00
    Item Number: 252OCTP278371
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn everything you need to truly understand the cloud—including how it works, what drives it, why it's so popular, and how to make the cloud work for you.


    What is the cloud? If you have trouble answering this question, you are not alone. In this course, you will explore how the cloud works, what drives its incredible growth, and how you can use cloud services. You will start by looking at the building blocks of the cloud, where it started, and how it transitioned. You will gain a clear understanding of IaaS (infrastructure), SaaS (software), and PaaS (platforms), and examine why each may be attractive to some businesses, but not to others. You will learn about the different kinds of clouds (public, private, and hybrid).

    You will also look inside the engine rooms of the cloud: data centers. You will examine the concept of big data and how the cloud infrastructure enables data to zip across the globe at lightning speed. You will look at how Facebook and Twitter contribute to the cloud, and how apps go from idea to app store. You will gain an understanding of how mobile devices and major mobile ecosystems continue to shape the cloud. Whatever your technical background, by the end of this course, you will be thoroughly cloud-savvy.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    Learn everything you need to truly understand the cloud—including how it works, what drives it, why it's so popular, and how to make the cloud work for you.


    What the Cloud Is

    Confused about the cloud? You're in the right place! This first lesson will clear up some confusion and start with the basics. It will explain the building blocks of the cloud, and that will lead you to a durable definition of the cloud that you'll use as a foundation for the rest of the course. The lesson will also discuss what the cloud means to you, its impact on your life, and why it'll be helpful for you to understand how it works.

    How the Cloud Started and What It Solves

    So how did the cloud get started? In this lesson, you'll learn the history of the cloud and how it was a natural evolution of networked computers and Internet connectivity. The lesson will also discuss why the cloud is so important, and then you'll look at the business challenges and opportunities that the cloud addresses. By the end of the lesson, you'll have a solid understanding of how this technology got to where it is now and how business computing operated before the cloud.

    Different Kinds of Clouds: Public, Private, Hybrid

    Ever wonder why some people believe the cloud is simple, while others believe that it's complex? In this lesson, you'll learn why they're both right—and you'll learn how to think about the cloud from two perspectives. The lesson will also discuss the different types of clouds: public, private, and hybrid. You'll get a glimpse inside the big business technology world and find out why the cloud can be such a compelling move for large organizations.

    How the Cloud Grows

    What's the difference between the cloud and a collection of computers? A bunch—and much of that comes down to virtualization. In this lesson, you'll learn what virtualization is and why it's so fundamental in how the cloud operates. The lesson will also discuss scale and how it relates to virtualization. Finally, you'll see how endpoints make all the connections work.

    Cloud Services

    As you'll recall, "services" is one of the five building blocks in the definition of the cloud. In this lesson, you'll look at those services. Specifically, you'll look at three categories of cloud services: infrastructure (or Infrastructure as a Service, or IaaS), platforms (or Platform as a Service, or PaaS), and software (or Software as a Service, or SaaS). The lesson will discuss how these three categories compare and individuals and business can take advantage of them.

    Data Centers: Where the Cloud Computes

    All the computing power of the cloud needs to live somewhere, and it's not in the atmosphere. In this lesson, you'll learn all about data centers—how they operate, what they look like, where they're located, and what makes them tick. You'll also learn what makes one data center more efficient than another, and you'll get perspective on what it costs to make them operate. It's a fascinating tour, with a lot to learn and even more to explore!

    Understanding Data, Including Big Data

    Your experience in the cloud includes the storing and transmission of data, either across the hall or across the world. In this lesson, you'll understand how to think about data in terms of its importance in the cloud and learn why companies often leave worrying about data to someone else. The lesson will discuss how all the data in the cloud moves across continents, across the ocean, and over airwaves. Finally, you'll look at a clear definition of big data and see some examples of where big data may be headed.

    Understanding Cloud Providers

    Making sense of how cloud providers offer their services is an important step in truly understanding the cloud. In this lesson, you'll see how a well-established cloud provider organizes and presents its offerings. You'll go through each group of the cloud provider's offered services and map them to what you've already learned about the cloud and the categories you're familiar with.

    Cloud Providers and Big Platforms

    In this lesson, you'll learn where websites fit into the cloud and what other elements, offerings, or activities are driving the adoption and popularity of the cloud and its varied services. The lesson will also cover what it means to be a big provider, and you'll examine the largest platforms—and largest overall service providers—that are in the cloud today.

    Getting Into the Cloud

    Learn about what goes into creating a cloud app, and how the three (plus one) ecosystems dominate the world of cloud applications. In this lesson, you also learn about the different types of devices, how they are categorized, and how they align to the types of cloud apps that are available. You'll also learn about ecosystems, and why they define how cloud apps are created, distributed, and sold.

    The Cloud and #You

    In this lesson, you'll look at how social network sites like Facebook, LinkedIn, and Twitter work in the cloud and how users and organizations can create apps that connect with their huge base of users. You'll learn how social media sites let software developers interact with their sites, create apps and games that operate within and outside their sites, and why they do this. Also, you'll learn about social media tools on Facebook and in Twitter, including why the hashtag was created (#), how it's used, and how to use these sites yourself.

    Conclusions, Connections, and the Future of the Cloud

    This lesson ties together everything you've learned in this course. You'll learn how you can view the cloud from two primary perspectives—consumer and business—and about the primary benefits (and drivers) that have propelled cloud adoption from participants of both perspectives. The lesson will also discuss where these two perspectives share a common, clear force that continues to be the biggest benefit of the cloud. Finally, you'll look into the future of what the cloud may hold and what that future might mean.



    Self-Study

    Learn everything you need to truly understand the cloud—including how it works, what drives it, why it's so popular, and how to make the cloud work for you.

 

  • Wireless Networking 
  • Fee: $139.00
    Item Number: TesOCTP27450202
    Dates: 5/14/2025 - 12/22/2030
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Industry expert shows you how wireless networking works, as well as how to plan, deploy, and connect to wireless networks.


    Wireless networking is one of the fastest growing segments of the computer industry. Every electronic device seems capable of wireless connections these days: computers, handhelds, cell phones, and even digital cameras are all capable of transmitting without a tether. To many people, those wireless connections are nothing short of technical wizardry. This course will remove the mystery and give you a thorough understanding of this fascinating and lucrative technology.

    Becoming knowledgeable about wireless networking is easier than ever. With a practical and thoughtful approach to teaching and an emphasis on giving you a practical, hands-on understanding of how wireless works, this course will teach you everything you want to know about the world of wireless connectivity.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    Networking Basics

    The first Internet connection was made at UCLA in September 1969 with a thick gray cable between two computers. Times sure have changed! Today, the Internet serves millions of emails and web pages every few minutes, connecting billions of users from all over the world. Don't forget about wireless networking, which is one of the hottest networking technology around. Learning how all those wireless networks operate is as interesting as the Internet itself. In this first lesson, you'll learn about basic network facts and operation, preparing you to expand your knowledge in subsequent lessons.

    How Wireless Networking Works

    Have you ever wondered how a radio turns invisible waves into music? Or why you can hear bass sounds from farther away than cymbals? Why does a radio station cut out when you go through a mountain tunnel or around a bend? Wireless networks have similar characteristics to radio music transmissions, but there are important differences. This lesson will explain how wireless networking actually works in simple everyday terms that make it easy to understand. You'll also learn about different methods used to pull computer data out of thin air.

    Standards in the Wireless World

    Why do some electronic devices gain widespread popularity while others sit on the shelf? In this lesson, you'll learn how standards in the networking world help drive the adoption of technology. You'll also get a firsthand look at how standards operate in every real-world business, like clothes and batteries and shampoo. In doing so, you'll learn why some wireless networking technologies have flourished while others have failed miserably (early wireless technologies were a flop!). By the end of this lesson, you'll know who makes the standards, how something becomes standardized, and why it's so important. You'll also see how all this applies to wireless networking standards and gain insight on why wireless networking is so popular today.

    Wireless Devices

    If you've considered buying wireless networking equipment, you know that there are lots of choices out there. How do you make sense of it all? Which technology is better? What do all of those extra features mean to you? In this lesson, you'll learn all about wireless network devices, what role each device plays, and how to make sense of it all! By the end of this chapter, you'll know exactly what each wireless networking device is capable of doing and which one is right for you.

    Wireless Networks—Short Range

    In this lesson, you'll investigate short-range wireless network technologies. You'll learn all about Bluetooth, Wi-Fi, and the details that make each technology unique. You'll also take a firsthand look at why one is better than the other and where each technology fits into the larger wireless networking picture.

    Wireless Networks—Long Range

    Would you consider a wireless networking technology capable of traveling 90,000 miles a long-range wireless technology? Probably so! In this lesson, you'll learn which wireless technology can go beyond your house, beyond your neighborhood, and even beyond the atmosphere. You'll also learn the drawbacks of having your data travel into space and back, and about some long-range wireless technologies that might give DSL or cable Internet access a run for their long-range money.

    Creating a Wireless Network—Part 1

    Now that you've learned all about wireless technologies, it's time to put your knowledge to work. In this lesson, you'll learn how to plan a wireless network. After all, once you learn about wireless networking, you'll want to get wireless working in your house or office! This lesson will walk you through each planning phase, complete with network drawings that depict how a real-life wireless network should be prepared.

    Creating a Wireless Network—Part 2

    In the previous lesson, you planned a network. In this lesson, you'll install a wireless access point (WAP) to get the wireless network up and running. You'll also learn about issues you should address when configuring a wireless network, including interference with neighboring networks and how to extend your network to reach far-off corners of your home or office.

    Connecting to a Wireless Network—Part 1

    Once you have a wireless network ready for computers to access, you're ready for the next step: connecting wireless devices. In this lesson, you'll learn how to outfit a computer with a wireless network card, how to connect that computer to your wireless network, and how to make sure that wireless network connection is properly configured. By the end of this lesson, you'll be ready to surf the Internet from your couch! Then, you'll look at the similarities and differences between Windows and Apple software.

    Connecting to a Wireless Network—Part 2

    Computers aren't the only devices capable of connecting to wireless networks these days. There are all sorts of wireless devices, like Personal Data Assistants (PDAs), that you can connect. In this lesson, you'll learn how to hook those other devices into the wireless network you created in previous lessons. Then you'll get a chance to explore how Bluetooth networks operate, how they differ from Wi-Fi, and how to go about connecting one Bluetooth device to another.

    Security in Wireless Networks

    You can't take the security of your computer (or network) for granted these days. In this lesson, you'll discover how wireless networks provide security for wireless devices that connect to them. You'll also learn how to make your own wireless network secure, ensuring that only the people you want to connect to your wireless network are capable of doing so. You'll also learn how to secure your wireless device, such as a computer or PDA, when you're roaming all those cool (but potentially unsafe) public access areas like coffee shops or downtown wireless districts.

    Conclusions and the Future

    What is the future of wireless networking? Is this as cool as it's going to get, or will you see all sorts of new wireless technologies in the future? This lesson will discuss where the future of wireless networking is headed and what that future might have in store. You'll learn about the future of cellular networks, the future of answering the telephone on the Internet, and how power lines and broadband might be a match made in heaven! Of course, the future is uncertain, but it's fun to make some educated guesses based on history and how networking technology has moved in the past. Be prepared to add your own thoughts to the discussion on the future of networking—this will be an especially interesting and exciting lesson!


    What you will learn

    • Learn how wireless works
    • Understand how wireless devices connect to networks
    • Learn how to build and connect to your own wireless network
    • Explore wireless standards and wireless security
    • Discover the future of wireless

    How you will benefit

    • Gain skills in the fastest growing segment of the computer industry
    • Open the door to new opportunities with skills that can transfer to any organization

    David Iseminger

    David Iseminger is an author and technology veteran, with expertise in computing, networking, wireless and cloud technologies, data and analytics, artificial intelligence, and blockchain. While with Microsoft, David worked on early versions of Windows and its core networking infrastructure, and on transmission protocols, security, data visualizations, and multiple emerging cloud technologies. David is passionate about education, serving as a School Board director for over 10 years, advocating at state and federal levels for increased learning standards, and has taught over 40,000 students through multiple technology courses. He has an awarded patent in Artificial Intelligence (AI) object detection and social posting methodologies, and is the founder and CEO of the blockchain company that created IronWeave, the unlimited scale blockchain platform, based on his patent-pending blockchain innovations and inventions.


    Learn how to plan, deploy, and connect wireless networks from an industry expert. This course removes the mystery behind wireless connections and provide a thorough overview of this fascinating and lucrative technology.

 

  • Wireless Networking 
  • Fee: $139.00
    Item Number: 252OCTP274502
    Dates: 5/14/2025 - 6/30/2025
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Industry expert shows you how wireless networking works, as well as how to plan, deploy, and connect to wireless networks.


    Wireless networking is one of the fastest growing segments of the computer industry. Every electronic device seems capable of wireless connections these days: computers, handhelds, cell phones, and even digital cameras are all capable of transmitting without a tether. To many people, those wireless connections are nothing short of technical wizardry. This course will remove the mystery and give you a thorough understanding of this fascinating and lucrative technology.

    Becoming knowledgeable about wireless networking is easier than ever. With a practical and thoughtful approach to teaching and an emphasis on giving you a practical, hands-on understanding of how wireless works, this course will teach you everything you want to know about the world of wireless connectivity.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    Networking Basics

    The first Internet connection was made at UCLA in September 1969 with a thick gray cable between two computers. Times sure have changed! Today, the Internet serves millions of emails and web pages every few minutes, connecting billions of users from all over the world. Don't forget about wireless networking, which is one of the hottest networking technology around. Learning how all those wireless networks operate is as interesting as the Internet itself. In this first lesson, you'll learn about basic network facts and operation, preparing you to expand your knowledge in subsequent lessons.

    How Wireless Networking Works

    Have you ever wondered how a radio turns invisible waves into music? Or why you can hear bass sounds from farther away than cymbals? Why does a radio station cut out when you go through a mountain tunnel or around a bend? Wireless networks have similar characteristics to radio music transmissions, but there are important differences. This lesson will explain how wireless networking actually works in simple everyday terms that make it easy to understand. You'll also learn about different methods used to pull computer data out of thin air.

    Standards in the Wireless World

    Why do some electronic devices gain widespread popularity while others sit on the shelf? In this lesson, you'll learn how standards in the networking world help drive the adoption of technology. You'll also get a firsthand look at how standards operate in every real-world business, like clothes and batteries and shampoo. In doing so, you'll learn why some wireless networking technologies have flourished while others have failed miserably (early wireless technologies were a flop!). By the end of this lesson, you'll know who makes the standards, how something becomes standardized, and why it's so important. You'll also see how all this applies to wireless networking standards and gain insight on why wireless networking is so popular today.

    Wireless Devices

    If you've considered buying wireless networking equipment, you know that there are lots of choices out there. How do you make sense of it all? Which technology is better? What do all of those extra features mean to you? In this lesson, you'll learn all about wireless network devices, what role each device plays, and how to make sense of it all! By the end of this chapter, you'll know exactly what each wireless networking device is capable of doing and which one is right for you.

    Wireless Networks—Short Range

    In this lesson, you'll investigate short-range wireless network technologies. You'll learn all about Bluetooth, Wi-Fi, and the details that make each technology unique. You'll also take a firsthand look at why one is better than the other and where each technology fits into the larger wireless networking picture.

    Wireless Networks—Long Range

    Would you consider a wireless networking technology capable of traveling 90,000 miles a long-range wireless technology? Probably so! In this lesson, you'll learn which wireless technology can go beyond your house, beyond your neighborhood, and even beyond the atmosphere. You'll also learn the drawbacks of having your data travel into space and back, and about some long-range wireless technologies that might give DSL or cable Internet access a run for their long-range money.

    Creating a Wireless Network—Part 1

    Now that you've learned all about wireless technologies, it's time to put your knowledge to work. In this lesson, you'll learn how to plan a wireless network. After all, once you learn about wireless networking, you'll want to get wireless working in your house or office! This lesson will walk you through each planning phase, complete with network drawings that depict how a real-life wireless network should be prepared.

    Creating a Wireless Network—Part 2

    In the previous lesson, you planned a network. In this lesson, you'll install a wireless access point (WAP) to get the wireless network up and running. You'll also learn about issues you should address when configuring a wireless network, including interference with neighboring networks and how to extend your network to reach far-off corners of your home or office.

    Connecting to a Wireless Network—Part 1

    Once you have a wireless network ready for computers to access, you're ready for the next step: connecting wireless devices. In this lesson, you'll learn how to outfit a computer with a wireless network card, how to connect that computer to your wireless network, and how to make sure that wireless network connection is properly configured. By the end of this lesson, you'll be ready to surf the Internet from your couch! Then, you'll look at the similarities and differences between Windows and Apple software.

    Connecting to a Wireless Network—Part 2

    Computers aren't the only devices capable of connecting to wireless networks these days. There are all sorts of wireless devices, like Personal Data Assistants (PDAs), that you can connect. In this lesson, you'll learn how to hook those other devices into the wireless network you created in previous lessons. Then you'll get a chance to explore how Bluetooth networks operate, how they differ from Wi-Fi, and how to go about connecting one Bluetooth device to another.

    Security in Wireless Networks

    You can't take the security of your computer (or network) for granted these days. In this lesson, you'll discover how wireless networks provide security for wireless devices that connect to them. You'll also learn how to make your own wireless network secure, ensuring that only the people you want to connect to your wireless network are capable of doing so. You'll also learn how to secure your wireless device, such as a computer or PDA, when you're roaming all those cool (but potentially unsafe) public access areas like coffee shops or downtown wireless districts.

    Conclusions and the Future

    What is the future of wireless networking? Is this as cool as it's going to get, or will you see all sorts of new wireless technologies in the future? This lesson will discuss where the future of wireless networking is headed and what that future might have in store. You'll learn about the future of cellular networks, the future of answering the telephone on the Internet, and how power lines and broadband might be a match made in heaven! Of course, the future is uncertain, but it's fun to make some educated guesses based on history and how networking technology has moved in the past. Be prepared to add your own thoughts to the discussion on the future of networking—this will be an especially interesting and exciting lesson!


    What you will learn

    • Learn how wireless works
    • Understand how wireless devices connect to networks
    • Learn how to build and connect to your own wireless network
    • Explore wireless standards and wireless security
    • Discover the future of wireless

    How you will benefit

    • Gain skills in the fastest growing segment of the computer industry
    • Open the door to new opportunities with skills that can transfer to any organization

    David Iseminger

    David Iseminger is an author and technology veteran, with expertise in computing, networking, wireless and cloud technologies, data and analytics, artificial intelligence, and blockchain. While with Microsoft, David worked on early versions of Windows and its core networking infrastructure, and on transmission protocols, security, data visualizations, and multiple emerging cloud technologies. David is passionate about education, serving as a School Board director for over 10 years, advocating at state and federal levels for increased learning standards, and has taught over 40,000 students through multiple technology courses. He has an awarded patent in Artificial Intelligence (AI) object detection and social posting methodologies, and is the founder and CEO of the blockchain company that created IronWeave, the unlimited scale blockchain platform, based on his patent-pending blockchain innovations and inventions.


    Learn how to plan, deploy, and connect wireless networks from an industry expert. This course removes the mystery behind wireless connections and provide a thorough overview of this fascinating and lucrative technology.

 

  • Wireless Networking 
  • Fee: $139.00
    Item Number: TesOCTP27450203
    Dates: 6/11/2025 - 12/22/2030
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Industry expert shows you how wireless networking works, as well as how to plan, deploy, and connect to wireless networks.


    Wireless networking is one of the fastest growing segments of the computer industry. Every electronic device seems capable of wireless connections these days: computers, handhelds, cell phones, and even digital cameras are all capable of transmitting without a tether. To many people, those wireless connections are nothing short of technical wizardry. This course will remove the mystery and give you a thorough understanding of this fascinating and lucrative technology.

    Becoming knowledgeable about wireless networking is easier than ever. With a practical and thoughtful approach to teaching and an emphasis on giving you a practical, hands-on understanding of how wireless works, this course will teach you everything you want to know about the world of wireless connectivity.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    Networking Basics

    The first Internet connection was made at UCLA in September 1969 with a thick gray cable between two computers. Times sure have changed! Today, the Internet serves millions of emails and web pages every few minutes, connecting billions of users from all over the world. Don't forget about wireless networking, which is one of the hottest networking technology around. Learning how all those wireless networks operate is as interesting as the Internet itself. In this first lesson, you'll learn about basic network facts and operation, preparing you to expand your knowledge in subsequent lessons.

    How Wireless Networking Works

    Have you ever wondered how a radio turns invisible waves into music? Or why you can hear bass sounds from farther away than cymbals? Why does a radio station cut out when you go through a mountain tunnel or around a bend? Wireless networks have similar characteristics to radio music transmissions, but there are important differences. This lesson will explain how wireless networking actually works in simple everyday terms that make it easy to understand. You'll also learn about different methods used to pull computer data out of thin air.

    Standards in the Wireless World

    Why do some electronic devices gain widespread popularity while others sit on the shelf? In this lesson, you'll learn how standards in the networking world help drive the adoption of technology. You'll also get a firsthand look at how standards operate in every real-world business, like clothes and batteries and shampoo. In doing so, you'll learn why some wireless networking technologies have flourished while others have failed miserably (early wireless technologies were a flop!). By the end of this lesson, you'll know who makes the standards, how something becomes standardized, and why it's so important. You'll also see how all this applies to wireless networking standards and gain insight on why wireless networking is so popular today.

    Wireless Devices

    If you've considered buying wireless networking equipment, you know that there are lots of choices out there. How do you make sense of it all? Which technology is better? What do all of those extra features mean to you? In this lesson, you'll learn all about wireless network devices, what role each device plays, and how to make sense of it all! By the end of this chapter, you'll know exactly what each wireless networking device is capable of doing and which one is right for you.

    Wireless Networks—Short Range

    In this lesson, you'll investigate short-range wireless network technologies. You'll learn all about Bluetooth, Wi-Fi, and the details that make each technology unique. You'll also take a firsthand look at why one is better than the other and where each technology fits into the larger wireless networking picture.

    Wireless Networks—Long Range

    Would you consider a wireless networking technology capable of traveling 90,000 miles a long-range wireless technology? Probably so! In this lesson, you'll learn which wireless technology can go beyond your house, beyond your neighborhood, and even beyond the atmosphere. You'll also learn the drawbacks of having your data travel into space and back, and about some long-range wireless technologies that might give DSL or cable Internet access a run for their long-range money.

    Creating a Wireless Network—Part 1

    Now that you've learned all about wireless technologies, it's time to put your knowledge to work. In this lesson, you'll learn how to plan a wireless network. After all, once you learn about wireless networking, you'll want to get wireless working in your house or office! This lesson will walk you through each planning phase, complete with network drawings that depict how a real-life wireless network should be prepared.

    Creating a Wireless Network—Part 2

    In the previous lesson, you planned a network. In this lesson, you'll install a wireless access point (WAP) to get the wireless network up and running. You'll also learn about issues you should address when configuring a wireless network, including interference with neighboring networks and how to extend your network to reach far-off corners of your home or office.

    Connecting to a Wireless Network—Part 1

    Once you have a wireless network ready for computers to access, you're ready for the next step: connecting wireless devices. In this lesson, you'll learn how to outfit a computer with a wireless network card, how to connect that computer to your wireless network, and how to make sure that wireless network connection is properly configured. By the end of this lesson, you'll be ready to surf the Internet from your couch! Then, you'll look at the similarities and differences between Windows and Apple software.

    Connecting to a Wireless Network—Part 2

    Computers aren't the only devices capable of connecting to wireless networks these days. There are all sorts of wireless devices, like Personal Data Assistants (PDAs), that you can connect. In this lesson, you'll learn how to hook those other devices into the wireless network you created in previous lessons. Then you'll get a chance to explore how Bluetooth networks operate, how they differ from Wi-Fi, and how to go about connecting one Bluetooth device to another.

    Security in Wireless Networks

    You can't take the security of your computer (or network) for granted these days. In this lesson, you'll discover how wireless networks provide security for wireless devices that connect to them. You'll also learn how to make your own wireless network secure, ensuring that only the people you want to connect to your wireless network are capable of doing so. You'll also learn how to secure your wireless device, such as a computer or PDA, when you're roaming all those cool (but potentially unsafe) public access areas like coffee shops or downtown wireless districts.

    Conclusions and the Future

    What is the future of wireless networking? Is this as cool as it's going to get, or will you see all sorts of new wireless technologies in the future? This lesson will discuss where the future of wireless networking is headed and what that future might have in store. You'll learn about the future of cellular networks, the future of answering the telephone on the Internet, and how power lines and broadband might be a match made in heaven! Of course, the future is uncertain, but it's fun to make some educated guesses based on history and how networking technology has moved in the past. Be prepared to add your own thoughts to the discussion on the future of networking—this will be an especially interesting and exciting lesson!


    What you will learn

    • Learn how wireless works
    • Understand how wireless devices connect to networks
    • Learn how to build and connect to your own wireless network
    • Explore wireless standards and wireless security
    • Discover the future of wireless

    How you will benefit

    • Gain skills in the fastest growing segment of the computer industry
    • Open the door to new opportunities with skills that can transfer to any organization

    David Iseminger

    David Iseminger is an author and technology veteran, with expertise in computing, networking, wireless and cloud technologies, data and analytics, artificial intelligence, and blockchain. While with Microsoft, David worked on early versions of Windows and its core networking infrastructure, and on transmission protocols, security, data visualizations, and multiple emerging cloud technologies. David is passionate about education, serving as a School Board director for over 10 years, advocating at state and federal levels for increased learning standards, and has taught over 40,000 students through multiple technology courses. He has an awarded patent in Artificial Intelligence (AI) object detection and social posting methodologies, and is the founder and CEO of the blockchain company that created IronWeave, the unlimited scale blockchain platform, based on his patent-pending blockchain innovations and inventions.


 

  • Wireless Networking 
  • Fee: $139.00
    Item Number: 252OCTP274503
    Dates: 6/11/2025 - 6/30/2025
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Industry expert shows you how wireless networking works, as well as how to plan, deploy, and connect to wireless networks.


    Wireless networking is one of the fastest growing segments of the computer industry. Every electronic device seems capable of wireless connections these days: computers, handhelds, cell phones, and even digital cameras are all capable of transmitting without a tether. To many people, those wireless connections are nothing short of technical wizardry. This course will remove the mystery and give you a thorough understanding of this fascinating and lucrative technology.

    Becoming knowledgeable about wireless networking is easier than ever. With a practical and thoughtful approach to teaching and an emphasis on giving you a practical, hands-on understanding of how wireless works, this course will teach you everything you want to know about the world of wireless connectivity.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    Networking Basics

    The first Internet connection was made at UCLA in September 1969 with a thick gray cable between two computers. Times sure have changed! Today, the Internet serves millions of emails and web pages every few minutes, connecting billions of users from all over the world. Don't forget about wireless networking, which is one of the hottest networking technology around. Learning how all those wireless networks operate is as interesting as the Internet itself. In this first lesson, you'll learn about basic network facts and operation, preparing you to expand your knowledge in subsequent lessons.

    How Wireless Networking Works

    Have you ever wondered how a radio turns invisible waves into music? Or why you can hear bass sounds from farther away than cymbals? Why does a radio station cut out when you go through a mountain tunnel or around a bend? Wireless networks have similar characteristics to radio music transmissions, but there are important differences. This lesson will explain how wireless networking actually works in simple everyday terms that make it easy to understand. You'll also learn about different methods used to pull computer data out of thin air.

    Standards in the Wireless World

    Why do some electronic devices gain widespread popularity while others sit on the shelf? In this lesson, you'll learn how standards in the networking world help drive the adoption of technology. You'll also get a firsthand look at how standards operate in every real-world business, like clothes and batteries and shampoo. In doing so, you'll learn why some wireless networking technologies have flourished while others have failed miserably (early wireless technologies were a flop!). By the end of this lesson, you'll know who makes the standards, how something becomes standardized, and why it's so important. You'll also see how all this applies to wireless networking standards and gain insight on why wireless networking is so popular today.

    Wireless Devices

    If you've considered buying wireless networking equipment, you know that there are lots of choices out there. How do you make sense of it all? Which technology is better? What do all of those extra features mean to you? In this lesson, you'll learn all about wireless network devices, what role each device plays, and how to make sense of it all! By the end of this chapter, you'll know exactly what each wireless networking device is capable of doing and which one is right for you.

    Wireless Networks—Short Range

    In this lesson, you'll investigate short-range wireless network technologies. You'll learn all about Bluetooth, Wi-Fi, and the details that make each technology unique. You'll also take a firsthand look at why one is better than the other and where each technology fits into the larger wireless networking picture.

    Wireless Networks—Long Range

    Would you consider a wireless networking technology capable of traveling 90,000 miles a long-range wireless technology? Probably so! In this lesson, you'll learn which wireless technology can go beyond your house, beyond your neighborhood, and even beyond the atmosphere. You'll also learn the drawbacks of having your data travel into space and back, and about some long-range wireless technologies that might give DSL or cable Internet access a run for their long-range money.

    Creating a Wireless Network—Part 1

    Now that you've learned all about wireless technologies, it's time to put your knowledge to work. In this lesson, you'll learn how to plan a wireless network. After all, once you learn about wireless networking, you'll want to get wireless working in your house or office! This lesson will walk you through each planning phase, complete with network drawings that depict how a real-life wireless network should be prepared.

    Creating a Wireless Network—Part 2

    In the previous lesson, you planned a network. In this lesson, you'll install a wireless access point (WAP) to get the wireless network up and running. You'll also learn about issues you should address when configuring a wireless network, including interference with neighboring networks and how to extend your network to reach far-off corners of your home or office.

    Connecting to a Wireless Network—Part 1

    Once you have a wireless network ready for computers to access, you're ready for the next step: connecting wireless devices. In this lesson, you'll learn how to outfit a computer with a wireless network card, how to connect that computer to your wireless network, and how to make sure that wireless network connection is properly configured. By the end of this lesson, you'll be ready to surf the Internet from your couch! Then, you'll look at the similarities and differences between Windows and Apple software.

    Connecting to a Wireless Network—Part 2

    Computers aren't the only devices capable of connecting to wireless networks these days. There are all sorts of wireless devices, like Personal Data Assistants (PDAs), that you can connect. In this lesson, you'll learn how to hook those other devices into the wireless network you created in previous lessons. Then you'll get a chance to explore how Bluetooth networks operate, how they differ from Wi-Fi, and how to go about connecting one Bluetooth device to another.

    Security in Wireless Networks

    You can't take the security of your computer (or network) for granted these days. In this lesson, you'll discover how wireless networks provide security for wireless devices that connect to them. You'll also learn how to make your own wireless network secure, ensuring that only the people you want to connect to your wireless network are capable of doing so. You'll also learn how to secure your wireless device, such as a computer or PDA, when you're roaming all those cool (but potentially unsafe) public access areas like coffee shops or downtown wireless districts.

    Conclusions and the Future

    What is the future of wireless networking? Is this as cool as it's going to get, or will you see all sorts of new wireless technologies in the future? This lesson will discuss where the future of wireless networking is headed and what that future might have in store. You'll learn about the future of cellular networks, the future of answering the telephone on the Internet, and how power lines and broadband might be a match made in heaven! Of course, the future is uncertain, but it's fun to make some educated guesses based on history and how networking technology has moved in the past. Be prepared to add your own thoughts to the discussion on the future of networking—this will be an especially interesting and exciting lesson!


    What you will learn

    • Learn how wireless works
    • Understand how wireless devices connect to networks
    • Learn how to build and connect to your own wireless network
    • Explore wireless standards and wireless security
    • Discover the future of wireless

    How you will benefit

    • Gain skills in the fastest growing segment of the computer industry
    • Open the door to new opportunities with skills that can transfer to any organization

    David Iseminger

    David Iseminger is an author and technology veteran, with expertise in computing, networking, wireless and cloud technologies, data and analytics, artificial intelligence, and blockchain. While with Microsoft, David worked on early versions of Windows and its core networking infrastructure, and on transmission protocols, security, data visualizations, and multiple emerging cloud technologies. David is passionate about education, serving as a School Board director for over 10 years, advocating at state and federal levels for increased learning standards, and has taught over 40,000 students through multiple technology courses. He has an awarded patent in Artificial Intelligence (AI) object detection and social posting methodologies, and is the founder and CEO of the blockchain company that created IronWeave, the unlimited scale blockchain platform, based on his patent-pending blockchain innovations and inventions.


 

  • Wireless Networking (Self-Guided) 
  • Fee: $139.00
    Item Number: TesOCTP278491
    Dates: 9/5/2018 - 12/22/2030
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Industry expert shows you how wireless networking works, as well as how to plan, deploy, and connect to wireless networks.


    Wireless networking is one of the fastest growing segments of the computer industry. Every electronic device seems capable of wireless connections these days: computers, handhelds, cell phones, and even digital cameras are all capable of transmitting without a tether. To many people, those wireless connections are nothing short of technical wizardry. This course will remove the mystery and give you a thorough understanding of this fascinating and lucrative technology.

    Becoming knowledgeable about wireless networking is easier than ever. With a practical and thoughtful approach to teaching and an emphasis on giving you a practical, hands-on understanding of how wireless works, this course will teach you everything you want to know about the world of wireless connectivity.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Learn how to plan, deploy, and connect wireless networks from an industry expert. This course removes the mystery behind wireless connections and provide a thorough overview of this fascinating and lucrative technology.


    Networking Basics

    The first Internet connection was made at UCLA in September 1969 with a thick gray cable between two computers. Times sure have changed! Today, the Internet serves millions of emails and web pages every few minutes, connecting billions of users from all over the world. Don't forget about wireless networking, which is one of the hottest networking technology around. Learning how all those wireless networks operate is as interesting as the Internet itself. In this first lesson, you'll learn about basic network facts and operation, preparing you to expand your knowledge in subsequent lessons.

    How Wireless Networking Works

    Have you ever wondered how a radio turns invisible waves into music? Or why you can hear bass sounds from farther away than cymbals? Why does a radio station cut out when you go through a mountain tunnel or around a bend? Wireless networks have similar characteristics to radio music transmissions, but there are important differences. This lesson will explain how wireless networking actually works in simple everyday terms that make it easy to understand. You'll also learn about different methods used to pull computer data out of thin air.

    Standards in the Wireless World

    Why do some electronic devices gain widespread popularity while others sit on the shelf? In this lesson, you'll learn how standards in the networking world help drive the adoption of technology. You'll also get a firsthand look at how standards operate in every real-world business, like clothes and batteries and shampoo. In doing so, you'll learn why some wireless networking technologies have flourished while others have failed miserably (early wireless technologies were a flop!). By the end of this lesson, you'll know who makes the standards, how something becomes standardized, and why it's so important. You'll also see how all this applies to wireless networking standards and gain insight on why wireless networking is so popular today.

    Wireless Devices

    If you've considered buying wireless networking equipment, you know that there are lots of choices out there. How do you make sense of it all? Which technology is better? What do all of those extra features mean to you? In this lesson, you'll learn all about wireless network devices, what role each device plays, and how to make sense of it all! By the end of this chapter, you'll know exactly what each wireless networking device is capable of doing and which one is right for you.

    Wireless Networks—Short Range

    In this lesson, you'll investigate short-range wireless network technologies. You'll learn all about Bluetooth, Wi-Fi, and the details that make each technology unique. You'll also take a firsthand look at why one is better than the other and where each technology fits into the larger wireless networking picture.

    Wireless Networks—Long Range

    Would you consider a wireless networking technology capable of traveling 90,000 miles a long-range wireless technology? Probably so! In this lesson, you'll learn which wireless technology can go beyond your house, beyond your neighborhood, and even beyond the atmosphere. You'll also learn the drawbacks of having your data travel into space and back, and about some long-range wireless technologies that might give DSL or cable Internet access a run for their long-range money.

    Creating a Wireless Network—Part 1

    Now that you've learned all about wireless technologies, it's time to put your knowledge to work. In this lesson, you'll learn how to plan a wireless network. After all, once you learn about wireless networking, you'll want to get wireless working in your house or office! This lesson will walk you through each planning phase, complete with network drawings that depict how a real-life wireless network should be prepared.

    Creating a Wireless Network—Part 2

    In the previous lesson, you planned a network. In this lesson, you'll install a wireless access point (WAP) to get the wireless network up and running. You'll also learn about issues you should address when configuring a wireless network, including interference with neighboring networks and how to extend your network to reach far-off corners of your home or office.

    Connecting to a Wireless Network—Part 1

    Once you have a wireless network ready for computers to access, you're ready for the next step: connecting wireless devices. In this lesson, you'll learn how to outfit a computer with a wireless network card, how to connect that computer to your wireless network, and how to make sure that wireless network connection is properly configured. By the end of this lesson, you'll be ready to surf the Internet from your couch! Then, you'll look at the similarities and differences between Windows and Apple software.

    Connecting to a Wireless Network—Part 2

    Computers aren't the only devices capable of connecting to wireless networks these days. There are all sorts of wireless devices, like Personal Data Assistants (PDAs), that you can connect. In this lesson, you'll learn how to hook those other devices into the wireless network you created in previous lessons. Then you'll get a chance to explore how Bluetooth networks operate, how they differ from Wi-Fi, and how to go about connecting one Bluetooth device to another.

    Security in Wireless Networks

    You can't take the security of your computer (or network) for granted these days. In this lesson, you'll discover how wireless networks provide security for wireless devices that connect to them. You'll also learn how to make your own wireless network secure, ensuring that only the people you want to connect to your wireless network are capable of doing so. You'll also learn how to secure your wireless device, such as a computer or PDA, when you're roaming all those cool (but potentially unsafe) public access areas like coffee shops or downtown wireless districts.

    Conclusions and the Future

    What is the future of wireless networking? Is this as cool as it's going to get or will you see all sorts of new wireless technologies in the future? This lesson will discuss where the future of wireless networking is headed and what that future might have in store. You'll learn about the future of cellular networks, the future of answering the telephone on the Internet, and how power lines and broadband might be a match made in heaven! Of course, the future is uncertain, but it's fun to make some educated guesses based on history and how networking technology has moved in the past. Be prepared to add your own thoughts to the discussion on the future of networking—this will be an especially interesting and exciting lesson!



    Self-Study

    Learn how to plan, deploy, and connect wireless networks from an industry expert. This course removes the mystery behind wireless connections and provide a thorough overview of this fascinating and lucrative technology.

 

  • Wireless Networking (Self-Guided) 
  • Fee: $139.00
    Item Number: 252OCTP278491
    Dates: 4/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Industry expert shows you how wireless networking works, as well as how to plan, deploy, and connect to wireless networks.


    Wireless networking is one of the fastest growing segments of the computer industry. Every electronic device seems capable of wireless connections these days: computers, handhelds, cell phones, and even digital cameras are all capable of transmitting without a tether. To many people, those wireless connections are nothing short of technical wizardry. This course will remove the mystery and give you a thorough understanding of this fascinating and lucrative technology.

    Becoming knowledgeable about wireless networking is easier than ever. With a practical and thoughtful approach to teaching and an emphasis on giving you a practical, hands-on understanding of how wireless works, this course will teach you everything you want to know about the world of wireless connectivity.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Learn how to plan, deploy, and connect wireless networks from an industry expert. This course removes the mystery behind wireless connections and provide a thorough overview of this fascinating and lucrative technology.


    Networking Basics

    The first Internet connection was made at UCLA in September 1969 with a thick gray cable between two computers. Times sure have changed! Today, the Internet serves millions of emails and web pages every few minutes, connecting billions of users from all over the world. Don't forget about wireless networking, which is one of the hottest networking technology around. Learning how all those wireless networks operate is as interesting as the Internet itself. In this first lesson, you'll learn about basic network facts and operation, preparing you to expand your knowledge in subsequent lessons.

    How Wireless Networking Works

    Have you ever wondered how a radio turns invisible waves into music? Or why you can hear bass sounds from farther away than cymbals? Why does a radio station cut out when you go through a mountain tunnel or around a bend? Wireless networks have similar characteristics to radio music transmissions, but there are important differences. This lesson will explain how wireless networking actually works in simple everyday terms that make it easy to understand. You'll also learn about different methods used to pull computer data out of thin air.

    Standards in the Wireless World

    Why do some electronic devices gain widespread popularity while others sit on the shelf? In this lesson, you'll learn how standards in the networking world help drive the adoption of technology. You'll also get a firsthand look at how standards operate in every real-world business, like clothes and batteries and shampoo. In doing so, you'll learn why some wireless networking technologies have flourished while others have failed miserably (early wireless technologies were a flop!). By the end of this lesson, you'll know who makes the standards, how something becomes standardized, and why it's so important. You'll also see how all this applies to wireless networking standards and gain insight on why wireless networking is so popular today.

    Wireless Devices

    If you've considered buying wireless networking equipment, you know that there are lots of choices out there. How do you make sense of it all? Which technology is better? What do all of those extra features mean to you? In this lesson, you'll learn all about wireless network devices, what role each device plays, and how to make sense of it all! By the end of this chapter, you'll know exactly what each wireless networking device is capable of doing and which one is right for you.

    Wireless Networks—Short Range

    In this lesson, you'll investigate short-range wireless network technologies. You'll learn all about Bluetooth, Wi-Fi, and the details that make each technology unique. You'll also take a firsthand look at why one is better than the other and where each technology fits into the larger wireless networking picture.

    Wireless Networks—Long Range

    Would you consider a wireless networking technology capable of traveling 90,000 miles a long-range wireless technology? Probably so! In this lesson, you'll learn which wireless technology can go beyond your house, beyond your neighborhood, and even beyond the atmosphere. You'll also learn the drawbacks of having your data travel into space and back, and about some long-range wireless technologies that might give DSL or cable Internet access a run for their long-range money.

    Creating a Wireless Network—Part 1

    Now that you've learned all about wireless technologies, it's time to put your knowledge to work. In this lesson, you'll learn how to plan a wireless network. After all, once you learn about wireless networking, you'll want to get wireless working in your house or office! This lesson will walk you through each planning phase, complete with network drawings that depict how a real-life wireless network should be prepared.

    Creating a Wireless Network—Part 2

    In the previous lesson, you planned a network. In this lesson, you'll install a wireless access point (WAP) to get the wireless network up and running. You'll also learn about issues you should address when configuring a wireless network, including interference with neighboring networks and how to extend your network to reach far-off corners of your home or office.

    Connecting to a Wireless Network—Part 1

    Once you have a wireless network ready for computers to access, you're ready for the next step: connecting wireless devices. In this lesson, you'll learn how to outfit a computer with a wireless network card, how to connect that computer to your wireless network, and how to make sure that wireless network connection is properly configured. By the end of this lesson, you'll be ready to surf the Internet from your couch! Then, you'll look at the similarities and differences between Windows and Apple software.

    Connecting to a Wireless Network—Part 2

    Computers aren't the only devices capable of connecting to wireless networks these days. There are all sorts of wireless devices, like Personal Data Assistants (PDAs), that you can connect. In this lesson, you'll learn how to hook those other devices into the wireless network you created in previous lessons. Then you'll get a chance to explore how Bluetooth networks operate, how they differ from Wi-Fi, and how to go about connecting one Bluetooth device to another.

    Security in Wireless Networks

    You can't take the security of your computer (or network) for granted these days. In this lesson, you'll discover how wireless networks provide security for wireless devices that connect to them. You'll also learn how to make your own wireless network secure, ensuring that only the people you want to connect to your wireless network are capable of doing so. You'll also learn how to secure your wireless device, such as a computer or PDA, when you're roaming all those cool (but potentially unsafe) public access areas like coffee shops or downtown wireless districts.

    Conclusions and the Future

    What is the future of wireless networking? Is this as cool as it's going to get or will you see all sorts of new wireless technologies in the future? This lesson will discuss where the future of wireless networking is headed and what that future might have in store. You'll learn about the future of cellular networks, the future of answering the telephone on the Internet, and how power lines and broadband might be a match made in heaven! Of course, the future is uncertain, but it's fun to make some educated guesses based on history and how networking technology has moved in the past. Be prepared to add your own thoughts to the discussion on the future of networking—this will be an especially interesting and exciting lesson!



    Self-Study

    Learn how to plan, deploy, and connect wireless networks from an industry expert. This course removes the mystery behind wireless connections and provide a thorough overview of this fascinating and lucrative technology.

 

Some Title



Your Cart

×