Get our Bestselling Ethical Hacker Course V13 for Only $12.99

For a limited time, check out some of our most popular courses for free on Udemy.  View Free Courses.

IT Manager’s Survival Bundle Training Series – 10 Courses

Course Level: Beginner
Duration: 174 Hrs 15 Min
Total Videos: 773 On-demand Videos

Master essential IT management, cloud security, networking, and leadership skills to advance your career and effectively lead technical teams in today's competitive environment.

Course Description

Managing IT teams involves juggling technical challenges, project deadlines, and stakeholder expectations. Without the right skills, it’s easy to get overwhelmed or deliver subpar results. This training series arms you with practical, actionable techniques to lead your team effectively, secure your cloud infrastructure, and streamline operations to meet business goals.

The IT Manager’s Survival Bundle Training Series covers a broad range of essential topics. It includes courses on agile and Scrum fundamentals, cloud architecture with AWS, cloud security best practices, Cisco networking essentials, and IT management strategies. If you’re aiming for certifications, this series provides exam-aligned knowledge for certifications like AWS Certified Solutions Architect or Cisco CCNA. What sets this training apart is its focus on real-world application—each skill is taught in a way that you can immediately implement on the job.

What You Will Learn

This series is designed to turn theory into practice. You will learn to:

  • Lead Scrum ceremonies such as sprint planning, daily stand-ups, and retrospectives with confidence and clarity.
  • Assess the security posture of cloud environments and implement best practices for safeguarding data and resources.
  • Understand core networking concepts, including routing, switching, and Cisco device management, to troubleshoot and optimize networks.
  • Navigate key cloud and network certifications with a clear understanding of exam requirements and practical knowledge.
  • Coordinate IT projects by applying project management principles tailored to technical teams.
  • Identify and address common technical debt issues without compromising strategic priorities.
  • Communicate IT value effectively to non-technical stakeholders, aligning technology initiatives with business goals.
  • Implement security controls and policies in cloud and on-premise environments to prevent breaches and ensure compliance.
  • Optimize IT operations by analyzing workflows, automating repetitive tasks, and improving team collaboration.
  • Develop leadership skills to motivate, manage, and resolve conflicts within diverse technical teams.

Who This Course Is For

This series is ideal for current or aspiring IT managers, team leads, or project coordinators who want to sharpen their leadership and technical skills. If you’re responsible for managing IT operations, leading projects, or overseeing cloud and network infrastructure, this training will add value. It’s especially suitable for professionals with some technical background who are looking to formalize their management approach or prepare for certifications.

Prerequisites include basic knowledge of IT concepts, networking, or cloud platforms. If you’re comfortable with general IT terminology and have some experience in technical roles, you’ll find this series accessible and highly relevant.

Why These Skills Matter

Mastering these skills positions you as a confident IT leader capable of driving projects, securing environments, and aligning technology with business priorities. Whether you aim to advance into senior management or improve your team’s operational effectiveness, these competencies are highly valued across organizations. They open doors to roles such as IT supervisor, cloud manager, network administrator, or project leader.

In today’s competitive tech landscape, being able to lead agile teams, secure cloud infrastructure, and communicate technical value clearly makes you indispensable. The ability to balance technical expertise with strategic leadership ensures you can deliver measurable results and contribute to your organization’s success. This training gives you a practical edge, enabling you to handle complex challenges with confidence and precision.

Who Benefits From This Course

Frequently Asked Questions

What skills and topics does the IT Manager’s Survival Bundle Training Series cover?

The IT Manager’s Survival Bundle Training Series offers a comprehensive curriculum designed to equip current and aspiring IT managers with essential technical and leadership skills. The series covers topics such as agile and Scrum methodologies, cloud architecture with AWS, and cloud security best practices. It also includes core networking concepts like routing, switching, and Cisco device management, providing a solid foundation for troubleshooting and optimizing network infrastructure.

Additional modules focus on project management strategies tailored for IT teams, managing technical debt, and effective communication of IT value to non-technical stakeholders. The training emphasizes practical application, ensuring that learners can implement techniques immediately in real-world scenarios. Whether you're aiming for certifications like the AWS Certified Solutions Architect or Cisco CCNA, this series prepares you with exam-aligned knowledge and skills that are directly applicable to your role as an IT leader.

How does this training series prepare me for certifications like AWS Certified Solutions Architect or Cisco CCNA?

This training series is designed to align with key certification exams such as the AWS Certified Solutions Architect and Cisco CCNA. It provides in-depth coverage of core concepts tested in these certifications, including cloud architecture principles, security best practices, and networking fundamentals. Through exam-focused modules, learners gain a clear understanding of the exam scope, question formats, and practical knowledge needed to succeed.

In addition to theoretical understanding, the courses include real-world scenarios, hands-on labs, and practical tips for exam preparation. This combination ensures that students are not only ready to pass the exams but also equipped to implement their knowledge effectively in professional environments. Passing these certifications can significantly enhance your career opportunities and validate your technical expertise in cloud and networking domains.

What are the career benefits of completing the IT Manager’s Survival Bundle Training Series?

Completing this training series positions you as a well-rounded IT leader capable of managing technical teams, securing cloud environments, and aligning IT initiatives with business goals. It prepares you for roles such as IT supervisor, cloud manager, or network administrator, with a focus on strategic leadership and technical proficiency. Earning certifications like AWS Solutions Architect or Cisco CCNA further enhances your marketability and credibility in the industry.

The skills gained also improve your ability to troubleshoot complex issues, lead projects effectively, and communicate technical concepts to non-technical stakeholders. These competencies are highly valued across organizations seeking to leverage technology for competitive advantage. Overall, this training accelerates your professional growth, increases your leadership potential, and opens up new opportunities in the evolving tech landscape.

What strategies does the series recommend for effectively managing IT projects and teams?

The series emphasizes practical project management strategies tailored for IT environments, including agile and Scrum frameworks. It covers techniques such as sprint planning, daily stand-ups, and retrospectives to foster collaboration and transparency within technical teams. Learners are guided on how to prioritize tasks, manage competing deadlines, and address technical debt without compromising strategic objectives.

Leadership skills are also a focal point, with advice on motivating teams, resolving conflicts, and improving communication across diverse stakeholders. The courses highlight the importance of automating repetitive tasks, streamlining workflows, and leveraging collaboration tools to enhance operational efficiency. These strategies enable IT managers to deliver projects on time, maintain team productivity, and achieve organizational goals effectively.

What prerequisites are needed to benefit from this IT management training series?

This training series is designed for professionals with a basic understanding of IT concepts, networking, or cloud platforms. A familiarity with general IT terminology, such as servers, networks, security, and cloud services, is recommended to maximize learning. While prior experience in technical roles is beneficial, the courses are structured to be accessible to those who are comfortable with foundational IT knowledge and are looking to formalize their management approach.

Having some experience managing IT operations, leading projects, or working with cloud and network infrastructure will help learners grasp the material more quickly. The series is suitable for current or aspiring IT managers, team leads, or project coordinators aiming to strengthen their leadership and technical skills for certification or career advancement.

Included In This Course

Module 0 - Course introduction

  •    0.1 Instructor Intro
  •    0.2 Course Overview

Module 1 - Networking Fundamentals

  •    1.1 Intro to Networking
  •    1.1.1 Activity: Creating a Network
  •    1.2 Common Terminology
  •    1.2.1 Activity: Examining Ports and Sockets
  •    1.3 OSI Model
  •    1.4 DoD Model
  •    1.4.1 Activity: Examining Network Layers
  •    1.5 TCP, UDP, IP
  •    1.5.1 Activity: Examining TCP
  •    1.5.2 Activity: Examining UDP
  •    1.5.3 Activity: Examining IP
  •    1.6 ICMP, IGMP, ARP
  •    1.6.1 Activity: Examining ICMP
  •    1.6.2 Activity: Examining ARP
  •    1.6.3 Activity: Examining IGMP
  •    1.7 Network Topologies
  •    1.8 Network Types
  •    1.9 Part 1: Network Characteristics
  •    1.9 Part 2: Network Characteristics
  •    1.10 Module 1 outro

Module 2 - Cables and Connectors

  •    2.1 Ethernet Standards
  •    2.2 Copper Cable Types
  •    2.3 Fiber Optic Cable Types
  •    2.4 Connector Types
  •    2.4.1 Activity: Selecting the Right Cable
  •    2.5 Media Converters and Transceivers
  •    2.6 Cable Management
  •    2.7 Module 2 Outro

Module 3 - Internet Protocol (IP)

  •    3.1 IPv4 Basics
  •    3.2 IP Packet and Interface Types
  •    3.2.1 Activity: Configuring Client IP Settings
  •    3.3 Binary Numbering System
  •    3.4 Classful and Classless Addressing
  •    3.5 Understanding CIDR Notation
  •    3.6 IPv4 Subnetting Method
  •    3.7 Verifying with Binary
  •    3.8 Finding Subnet IDs
  •    3.8.1 Activity: Subnetting a Class C Network
  •    3.9 The Delta in Action
  •    3.9.1 Activity: Subnetting With the Delta
  •    3.10 Subnetting Based on Hosts
  •    3.11 Subnetting in Other Octets
  •    3.12 Supernetting
  •    3.12.1 Activity: Supernetting
  •    3.13 IPv6
  •    3.14 IPv4 - IPv6 Transition Mechanisms
  •    3.15 Module 3 Outro

Module 4 - Layer 7 Protocols

  •    4.1 Remote Control Protocols
  •    4.2 File Sharing Protocols
  •    4.3 Web Protcols
  •    4.4 Email Protocols
  •    4.5 Database Protocols
  •    4.6 Voice Protocols
  •    4.7 Security Protocols
  •    4.8 Management Protocols
  •    4.9 Module 4 Outro

Module 5 - Network Services

  •    5.1 DHCP
  •    5.1.1 Activity: Configuring DHCP
  •    5.1.2 Activity: Configuring a DHCP Relay Agent
  •    5.2 DNS
  •    5.2.1 Activity: Configuring DNS - Part 1
  •    5.2.2 Activity: Configuring DNS - Part 2
  •    5.3 NTP
  •    5.4 Corporate and Datacenter Network Architecture
  •    5.5 Cloud Concepts and Connectivity Options
  •    5.6 Module 5 Outro

Module 6 - Networking Devices

  •    6.1 Introductory Concepts
  •    6.2 Repeaters and Hubs
  •    6.2.1 Activity: Connecting Devices with a Hub
  •    6.3 Bridges and Switches
  •    6.3.1 Activity: Connecting Devices with a Switch
  •    6.4 Routers and Multilayer Switches
  •    6.5 Security Devices
  •    6.6 Modems
  •    6.7 Module 6 Outro

Module 7 - Networked Devices

  •    7.1 IP Devices
  •    7.2 IoT
  •    7.2.1 Activity - Programming IoT Devices
  •    7.3 ICS/SCADA
  •    7.4 Module 7 Outro

Module 8 - Routing and Bandwidth Management

  •    8.1 Routing Basics
  •    8.1.1 Activity: Configuring Static Routes
  •    8.2 Packet Delivery on the Same Network
  •    8.3 IP Routing Across a Single Router
  •    8.4 IP Routing Across Multiple Hops
  •    8.4.1 Activity: Static Routes - CHALLENGE
  •    8.5 Route Selection
  •    8.6 RIP
  •    8.6.1 Activity: Configuring RIP - CHALLENGE
  •    8.7 OSPF
  •    8.8 EIGRP
  •    8.9 BGP
  •    8.10 NAT/PAT
  •    8.11 Bandwidth Management (with Module 8 Outro)

Module 9 - Ethernet Switching

  •    9.1 Ethernet Basics
  •    9.2 Switching Overview
  •    9.2.1 Activity: Examining a MAC Table
  •    9.3 VLANs
  •    9.3.1 Activity: Creating VLANs
  •    9.4 VLAN Trunking
  •    9.4.1 Activity: Configuring VLAN Trunking
  •    9.5 VLAN Routing
  •    9.5.1 Activity: Configuring VLAN Routing
  •    9.6 Contention Management
  •    9.7 Switchport Configuration (with Module 9 Outro)

Module 10 - Wireless Technologies

  •    10.1 Wireless Overview
  •    10.2 Radio Basics
  •    10.3 Modulation
  •    10.4 Wi-Fi Standards
  •    10.5 Antennas
  •    10.6 Wi-Fi Service Sets
  •    10.7 Wi-Fi Security
  •    10.8 Cellular

Module 11 Network Performance

  •    11.1 Monitoring Performance
  •    11.2 Common Metrics
  •    11.2.1 Activity: Examining Interface Statistics
  •    11.3 SNMP
  •    11.4 Netflow
  •    11.5 Network Security Monitoring (with Module 11 Outro)

Module 12 High Availability and Disaster Recovery

  •    12.1 HA and DR Concepts
  •    12.2 High Availability Mechanisms
  •    12.3 Disaster Recovery Mechanisms
  •    12.4 Facility and Infrastructure Support (with Module 12 Outro)

Module 13 Organizational Documents

  •    13.1 Plans and Procedures
  •    13.2 Security Policies
  •    13.3 Loss Prevention
  •    13.4 Common Agreements
  •    13.5 Common Documentation
  •    13.6 Structured Cabling - MDF and IDF
  •    13.7 Horizontal and Vertical Cabling
  •    13.7.1 Activity - Implementing Cable Management
  •    13.8 Labeling
  •    13.9 Surveys and Assessments (with Module 13 Outro)

Module 14 Network Security

  •    14.1 Common Security Concepts
  •    14.2 Common Attack Types
  •    14.3 Spoofing-based Attacks
  •    14.4 Hijacking and MITM
  •    14.5 Social Engineering
  •    14.6 Network Segmentation
  •    14.7 Private VLANs
  •    14.8 Single Organization Authentication
  •    14.9 Extending Authentication
  •    14.10 Authorization
  •    14.11 Network Device Hardening
  •    14.12 Wireless Security
  •    14.13 Remote Access Security
  •    14.14 IoT Security
  •    14.15 Physical Security (with Module 14 Outro)

Module 15 Network Troubleshooting

  •    15.1 Troubleshooting Methodology
  •    15.2 Physical Connectivity Issues
  •    15.3 Hardware Testing Tools
  •    15.3.1 Activity - Testing an Ethernet Cable
  •    15.3.2 Activity - Crimping on an RJ-45 Connector
  •    15.3.3 Activity - Punching Down Twisted Pair
  •    15.3.4 Activity - Using a Telephone Toner
  •    15.4 Understanding Electricity
  •    15.4.1 Activity - Checking Cable Continuity
  •    15.4.2 Activity - Testing DC Voltage
  •    15.4.3 Activity - Testing AC Voltage
  •    15.5 Twisted Pair Pinout Problems
  •    15.6 Twisted Pair Termination Problems
  •    15.7 Repairing Damaged Twisted Pair Cable
  •    15.8 Fiber Optic Connectivity Issues
  •    15.8.1 Activity - Testing a Fiber Optic Cable
  •    15.9 Common Port Problems
  •    15.9.1 Working with Ports and Their Devices
  •    15.10 Common Software Testing Tools
  •    15.10.1 Activity - Scanning for Open Ports
  •    15.11 Common Command Line Utilities
  •    15.12 Troubleshooting Basic IP Networking Issues
  •    15.13 Common Switching Issues
  •    15.14 Switching Test Tools and Techniques
  •    15.15 Common IP Routing Issues
  •    15.16 Wi-Fi Access Point Issues
  •    15.17 Wirelss Interference
  •    15.17.1 Activity - Using a Spectrum Analyzer
  •    15.18 Wireless Antenna Issues
  •    15.18.1 Activity - Configuring a Wi-Fi Router
  •    15.19 WAP Placement Strategies
  •    15.20 Infrastructure Service Issues (DHCP)
  •    15.21 Infrastructure Service Issues (DNS)
  •    15.22 Infrastructure Service Issues (NTP)
  •    15.23 Fireall / ACL Issues
  •    15.24 VPN Issues
  •    15.25 Additional Network Security Troubleshooting and Tips
  •    15.26 Advanced Networking Issues
  •    15.27 Troubleshooting Server Services (with Module 15 Outro)
  •    CompTIA Network+ N10-008 Course Outro

Module 1: Architecture

  •    1.1 About Your Instructor
  •    1.2 Course Introduction
  •    1.3 Welcome to the Architecture Domain
  •    1.4 Classic 3 and 2 Tier Models
  •    1.5 2 Tier Spine Leaf
  •    1.6 Fabric Capacity Planning
  •    1.7 High Availability
  •    1.8 Designing a WLAN Deployment
  •    1.9 Cloud vs On-Prem
  •    1.10 The Cisco SD-WAN
  •    1.11 Cisco SD-Access
  •    1.12 QoS
  •    1.13 Hardware vs Software Switching

Module 2: Virtualization

  •    2.1 Welcome to the Virtualization Domain
  •    2.2 Device Virtualization Technologies
  •    2.3 Data Path Virtualization
  •    2.4 Network Virtualization Concepts

Module 3: Infrastructure

  •    3.1 Welcome to the Infrastructure Domain
  •    3.2 Trunking - VTP - EtherChannel
  •    3.3 RSTP and MST
  •    3.4 EIGRP vs OSPF
  •    3.4 OSPF
  •    3.5 eBGP
  •    3.6 eBGP Part 2
  •    3.7 WLANs
  •    3.8 NTP NAT PAT
  •    3.9 HSRP VRRP GLBP
  •    3.10 Multicast

Module 4: Network Assurance

  •    4.1 Welcome to the Network Assurance Module
  •    4.2 Diagnose Network Issues
  •    4.3 NetFlow
  •    4.4 SPAN
  •    4.5 IP SLA
  •    4.6 DNA Center

Module 5: Security

  •    5.1 Welcome to the Security Module
  •    5.2 Device Access Control
  •    5.3 ACLs and CoPP
  •    5.4 Wireless Security
  •    5.5 Components in Security Design

Module 6: Automation

  •    6.1 Welcome to the Automation Module
  •    6.2 Python
  •    6.3 JSON
  •    6.4 YANG
  •    6.5 NETCONF-RESTCONF
  •    6.6 APIs
  •    6.7 EEM
  •    6.8 Orchestration Tools

Module 1: Information Security Roles Security Control and Framework Types

  •    Introduction and Overview
  •    Compare and Contrast Information Security Roles
  •    Compare and Contrast Security Control and Framework Types
  •    Module Summary

Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources

  •    Explain Threat Actor Types and Attack Vectors
  •    Explain Threat Intelligence Sources
  •    Module Summary

Module 3: Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing

  •    Assess Organizational Security with Network Reconnaissance Tools
  •    Packet Capture and Replay Demo
  •    Explain Security Concerns with General Vulnerability Types
  •    Summarize Vulnerability Scanning Techniques
  •    Explain Penetration Testing Concepts
  •    Module Summary

Module 4: Social Engineering, Indicators of Malware Attacks

  •    Compare and Contrast Social Engineering Techniques
  •    Analyze Indicators of Malware-based Attacks
  •    Fork Bomb Malware Demo
  •    Module Summary

Module 5: Cryptography

  •    Compare and Contrast Cryptographic Ciphers
  •    Summarize Cryptographic Modes of Operation
  •    Summarize Cryptographic Use Cases and Weaknesses
  •    Summarize Other Cryptographic Technologies
  •    Module Summary

Module 6: Certificates and PKI

  •    Implement Certificates and Certificate Authorities
  •    Implement PKI Management
  •    Implementing a PKI Demo
  •    Module Summary

Module 7: Authentication

  •    Summarize Authentication Design Concepts
  •    Implement Knowledge-based Authentication
  •    Password Cracker Demo
  •    Implement Authentication Technologies
  •    Summarize Biometrics Authentication Concepts
  •    Module Summary

Module 8: Identity and Accounts, Authorization, Personnel Polices

  •    Implement Identity and Account Types
  •    Implement Account Policies
  •    Account Types and Polices Demo
  •    Implement Authorization Solutions
  •    Explain the Importance of Personnel Policies
  •    Module Summary

Module 9: Network Design and Hardware (Part 1)

  •    Implement Secure Network Designs
  •    Implement Secure Switching and Routing
  •    Various Types of Network Attacks Demo
  •    Implement Secure Wireless Infrastructure
  •    Implement Load Balancers
  •    Module Summary

Module 10: Network Hardware (Part 2)

  •    Implement Firewalls and Proxy Servers
  •    Implement Network Security Monitoring
  •    Summarize the Use of SIEM
  •    Module Summary

Module 11: Network Protocols

  •    Implement Secure Network Operations Protocols
  •    Implement Secure Application Protocols
  •    Implement Secure Remote Access Protocols
  •    Module Summary

Module 12: Endpoint Security

  •    Implement Secure Firmware
  •    Implement Endpoint Security
  •    Endpoint Protection Demo
  •    Explain Embedded System Security Implications
  •    Module Summary

Module 13: Mobile Devices

  •    Implement Mobile Device Management
  •    Implement Secure Mobile Device Connections
  •    Module Summary

Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation

  •    Analyze Indicators of Application Attack
  •    Analyze Indicators of Web Application Attacks
  •    Summarize Secure Coding Practices
  •    Implement Secure Script Environments
  •    Summarize Deployment and Automation Concepts
  •    Module Summary

Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualization

  •    Summarize Secure Cloud and Virtualization Services
  •    Apply Cloud Security Solutions
  •    Summarize Infrastructure as Code Concepts
  •    Module Summary

Module 16: Privacy and Data Protection

  •    Explain Privacy and Data Sensitivity Concepts
  •    Explain Privacy and Data Protection Controls
  •    Module Summary

Module 17: Incident Response

  •    Summarize Incident Response Procedures
  •    Utilize Appropriate Data Sources for Incident Response
  •    Apply Mitigation Controls
  •    Module Summary

Module 18: Forensics

  •    Explain Key Aspects of Digital Forensics Documentation
  •    Explain Key Aspects of Digital Forensics Evidence Acquisition
  •    Module Summary

Module 19: Risk Management and Business Impact Analysis

  •    Explain Risk Management Processes and Concepts
  •    Explain Business Impact Analysis Concepts
  •    Module Summary

Module 20: Redundancy and Backup Strategies

  •    Implement Redundancy Strategies
  •    Implement Backup Strategies
  •    Implement Cybersecurity Resiliency Strategies
  •    Module Summary

Module 21: Physical Security

  •    Explain the Importance of Physical Site Controls
  •    Explain the Importance of Physical Host Security Controls
  •    Module Summary

Module 22: Afterword

  •    Conclusion and General Exam Tips

Module 1: Introduction

  •    Instructor Introduction
  •    Course Overview
  •    Expectations

Module 2: Cloud Fundamentals

  •    What is the Cloud
  •    Basic Terms
  •    Types of cloud computing
  •    Cloud Service Models

Module 3: Azure’s Architecture

  •    Regions and Availability
  •    Resource Groups and Management
  •    Azure Marketplace
  •    Demo- Azure Console Exploration

Module 4: Compute

  •    Virtual Machines
  •    Containers
  •    Demo - Containers
  •    Functions
  •    Demo - Functions
  •    Windows Virtual Desktop and App Services

Module 5: Networking and CDN

  •    Virtual Networks
  •    Load Balancers
  •    Gateways
  •    Content Delivery Network
  •    Network Security
  •    Demo - Connecting two VMs

Module 6: Storage

  •    Storage
  •    Big Data and Analytics
  •    Databases
  •    Demo - SQL Database
  •    Database Migration

Module 7: Azure Solutions

  •    IoT
  •    Demo - IoT Hub
  •    AI
  •    Serverless Computing

Module 8: Administration

  •    Security
  •    Identity and Access Management
  •    Demo - Adding Users and Groups
  •    Governance
  •    Demo - Resource Locks
  •    Privacy and Compliance

Module 9: Pricing and Service Level Agreements

  •    Managing Costs
  •    Demo - Pricing Calculator
  •    Service Level Agreements and Service Lifecycles

Module 10: Exam Preparation

  •    Exam Layout
  •    Best Practices and Study Tips
  •    Overview and Conclusion

Module 11: Review Questions

  •    Module 11 pt 1
  •    Module 11 pt 2
  •    Module 11 pt 3
  •    Module 11 pt 4

Module 1: Understanding Cloud Computing Concepts

Module 2: Applying Cloud Business Principles

Module 3: Advising a Cloud Design and Migration

Module 4: Operating in the Cloud

Module 5: Managing Cloud Governance

Module 6: Exam Information, Review and Summary

Module 7: Activities

Module 8: Tools and Resources

Cloud Concepts, Architecture and Design

Legal, Risk and Compliance

Cloud Data Security

Cloud Platform and Infrastructure Security

Cloud Application Security

Cloud Security Operations

Module 1: Exploring the Functions of Networking

Module 2: Introducing the Host-To-Host Communications Model

Module 3: Introducing LANs

Module 4: Exploring the TCP/IP Link Layer

Module 5: Subnetting

Module 6: Explaining the TCP/IP Transport Layer and Application Layer

Module 7: Exploring the Functions of Routing

Module 8: Exploring the Packet Delivery Process

Module 9: Troubleshooting a Simple Network

Module 10: Introducing Basic IPv6

Module 11: Configuring Static Routing

Module 12: Implementing VLANs and Trunks

Module 13: Routing Between VLANs

Module 14: Introducing OSPF

Module 15: Building Redundant Switched Topologies

Module 16: Improving Redundant Switched Topologies with EtherChannel

Module 17: Exploring Layer 3 Redundancy

Module 18: Introducing WAN Technologies

Module 19: Explaining Basics of ACL

Module 20: Enabling Internet Connectivity

Module 21: Introducing QoS

Module 22: Introducing Architectures and Virtualization

Module 23: Introducing System Monitoring

Module 24: Managing Cisco Devices

Module 25: Examining the Security Threat Landscape

Module 26: Implementing Threat Defense Technologies

Module 27: Exam Preparation

Module 28: Practice Demos

Module 1: Introduction to AWS Basics

Module 2: AWS Web Services and Cloud Platform Services

Module 3: AWS Basic Summary

Module 4: Introduction to AWS Deep Dive

Module 5: AWS Management of Services and Features Deep Dive

Module 6: AWS Deep Dive Summary

Module 1 : Agile Principles and Mindset

Module 2 : Value Driven Delivery

Module 3 : Stakeholder Engagement

Module 4 : Team Performance

Module 5 : Adaptive Planning

Module 6 : Problem Detection and Resolution

Module 7 : Continuous Improvement

Module 1: Intro and what will this course cover?

Module 2: My Story and background

Module 3: Let's get on the same page

Module 4: Two personality types

Module 5: A Good vs Bad Manager

Module 6: What are the best ways to manage your team?

Module 7: Mentalities to avoid

Module 8: How to approach a problem with an employee?

Module 9: Diversity in your team

Module 10: My personal difficulty with careless employees

Module 11: Discipline

Module 12: Angry employees

Module 13: When it is time to say goodbye

Module 14: Disrespect from your team

Module 15: Common management mistakes

Module 16: How do I become a better manager?

Module 17: How to manage if you aren't the big, big boss

Module 18: Dealing with other managers

Module 19: Conclusion and summary of course

Module 1: Development Methods

Module 2: Agile Manifesto Principles

Module 3: Scrum

Module 4: Why Scrum

Module 5: Scrum-Roles Overview

Module 6: Product Owner

Module 7: Scrum Master

Module 8: Scrum Team

Module 9: Scrum Process

Module 10: Scrum Project Phase

Module 11: Plan and Estimate

Module 12: Implement

Module 13: Review and Retrospect

Module 14: Release

Module 15: Project Vision

Module 16: Scrum Master and Stake Holder(s)

Module 17: Form Scrum Team

Module 18: Develop Epics

Module 19: User Stories

Module 20: Justifications and Sample Change(s)

Module 21: Creating a Prioritized Backlog

Module 22: Conduct Release Planning

Module 23: Sprints

Module 24: Scrum Framework

Module 25: Scrum of Scrums

Module 26: Scrum Demo

Module 27: Review