PLAB-AZ1 Azure Fundamentals
PLAB-AZ2 Azure Management Concepts
PLAB-AZ3 Azure Storage Management
PLAB-AZ4 Azure Security Concepts
PLAB-CS-FUND Cyber Security Fundamentals
PLAB-DIG-LIT Digital Literacy
IC3-GS5 IC3 Digital Literacy Certification - Global Standard 5
PLAB-WS-NMAP Introduction to Network Security Tools
PLAB-CEH-v10 Practice Labs - Ethical Hacker v10
PLABS-DFORENSIC Computer Forensics and Investigations
PLAB-WS01 Practice Labs Introduction to Wireshark
PLAB-SERVER-2012-R2-SANDBOX Practice Labs Server 2012R2 Sandbox
PLAB-SERVER-2019-SANDBOX Practice Labs Server 2019 Sandbox
PLAB-VULNERABILITY-SANDBOX Practice Labs Vulnerability Sandbox
PLAB-MIXED-ENVIRONMENT-SANDBOX Practice Labs Windows Mixed Environment
PLAB-RTBT-L1 Red Team and Blue Team Fundamentals
PLAB-SVR19-CM Windows Server 2019 - Configuring and Maintaining
PLAB-AZ1 Azure Fundamentals
PLAB-AZ1 Azure Fundamentals
- Cloud Essential Concepts
- The Azure Platform
- Azure Resource Groups
- Azure Networking Concepts
- Azure Virtual Machines
PLAB-AZ2 Azure Management Concepts
PLAB-AZ2 Azure Management Concepts
- Azure Service Level Agreements (SLA’s)
- Management Tools
- Monitoring Tools
- The Azure Marketplace
PLAB-AZ3 Azure Storage Management
PLAB-AZ3 Azure Storage Management
- Azure Storage Services
- Working with Blobs
- Azure SQL Databases
- Azure Cosmos Databases
PLAB-AZ4 Azure Security Concepts
PLAB-AZ4 Azure Security Concepts
- Using Azure Key Vault
- Security Tools
- Network Security
PLAB-CS-FUND Cyber Security Fundamentals
PLAB-CS-FUND Cyber Security Fundamentals
- Introduction to Data Security
- Configuring Endpoint Security
- Common Threats to a Wireless Network
- Configuring a Web Browser
- Email Security Concepts
- Securing Mobile Platforms
- Securing The Cloud
- Securing Network Connections
- Using Data Destruction and Disposal Methods
- Configuring File System Security
- Administering User and Group Accounts
- Securing Windows
- Configuring and Running Windows Update
- Configuring Firewall on Windows
- Encryption
- Data Backup and Disaster Recovery
- Implementing Basic Disaster Prevention and Recovery
- Methods
- Managing System Maintenance Tools
- Social Networking Security
- Instant Messaging Securit
PLAB-DIG-LIT Digital Literacy
PLAB-DIG-LIT Digital Literacy
- Computer Hardware and Troubleshooting
- Computer Software
- Operating System Types and Features – Part 1
- Operating System Types and Features – Part 2
- Introduction to Networking – Part 1
- Introduction to Networking – Part 2
- Online Communication
- Web Browsing
- Internet Security
- Microsoft Word Fundamentals – Part 1
- Microsoft Word Fundamentals – Part 2
- Microsoft Word Fundamentals – Part 3
- Microsoft Excel Fundamentals – Part 1
- Microsoft Excel Fundamentals – Part 2
- Microsoft PowerPoint Fundamentals – Part 1
- Microsoft PowerPoint Fundamentals – Part 2
- Microsoft Outlook Fundamentals – Part 1
- Microsoft Outlook Fundamentals – Part 2
IC3-GS5 IC3 Digital Literacy Certification - Global Standard 5
IC3-GS5 IC3 Digital Literacy Certification – Global Standard 5
- Configuring Mobile Devices
- Install Hyper-V and Fedora Linux Workstation
- Applying Patches and Updates for Windows Desktops
- File and Print Sharing in Homegroup
- Understand Utility Software – Anti-Malware, Software
- Firewalls, Maintenance and Compression Tools
- Understand Phishing
- Explain Backup Concepts
- Using Collaboration Software – Cloud Storage and Online Apps
- Basic Functions of an Operating System
- Folder and File Permissions
- Using Productivity Software
- Support Windows Store and Cloud Apps
- Managing Web Browsers
- Calendaring and Scheduling Overview
PLAB-WS-NMAP Introduction to Network Security Tools
PLAB-WS-NMAP Introduction to Network Security Tools
- Topology Discovery Part 1
- Topology Discovery Part 2
- Scanning Networks Part 1
- Scanning Networks Part 2
- Understand Network Protocols – HTTP, HTTPS, NetBIOS, TCP, UDP
- Network Security – Protocol Analyzers
- Threats – Network Vulnerabilities
- Threats – Vulnerability Scanning
- Network Security – Routing Protocols
- Network Security – Spam Filter
- Understand Common Ports and Protocols
- Understanding IDS Firewall Evasion and Honeypots
PLAB-CEH-v10 Practice Labs - Ethical Hacker v10
PLAB-CEH-v10 Practice Labs – Ethical Hacker v10
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- IoT Hacking
- Scanning Networks
- Enumeration
- System Hacking
- Malware Threats
- Sniffing
- Denial of Service
- Session Hijacking
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- Cryptography
- Social Engineering
- Vulnerability Analysis
- Cloud Computing
- Evading Firewalls
- Steganography
PLABS-DFORENSIC Computer Forensics and Investigations
PLABS-DFORENSIC Computer Forensics and Investigations
- Understanding the Digital Forensics Profession and
- Investigations
- Data Acquisition
- Processing Crime and Incident Scenes
- Working with Windows and CLI Systems
- Current Digital Forensics Tools
- Linux and Macintosh File Systems
- Recovering Graphics Files
- Digital Forensics Analysis and Validation
- Virtual Machine Forensics, Live Acquisitions, and Network
- Forensics
- E-mail and Social Media Investigations
- Mobile Device Forensics
- Cloud Forensics
- Report Writing for High-Tech Investigations
- Expert Testimony in Digital Investigations
- Ethics for the Expert Witness
PLAB-WS01 Practice Labs Introduction to Wireshark
PLAB-WS01 Practice Labs Introduction to Wireshark
- Understand Common Ports and Protocols
- Installing Wireshark
- Wireshark Functionality
- Customizing Wireshark
- Working with Captured Traffic
- Analyzing Captured Traffic
- Analyzing Protocols
- Packet Sniffing with Wireshark
PLAB-SERVER-2012-R2-SANDBOX Practice Labs Server 2012R2 Sandbox
PLAB-SERVER-2012-R2-SANDBOX Practice Labs Server 2012R2 Sandbox
- Introduction
PLAB-SERVER-2019-SANDBOX Practice Labs Server 2019 Sandbox
PLAB-SERVER-2019-SANDBOX Practice Labs Server 2019 Sandbox
- Introduction
PLAB-VULNERABILITY-SANDBOX Practice Labs Vulnerability Sandbox
PLAB-VULNERABILITY-SANDBOX Practice Labs Vulnerability Sandbox
- Introduction
PLAB-MIXED-ENVIRONMENT-SANDBOX Practice Labs Windows Mixed Environment
PLAB-MIXED-ENVIRONMENT-SANDBOX Practice Labs Windows Mixed Environment
- Introduction
PLAB-RTBT-L1 Red Team and Blue Team Fundamentals
PLAB-RTBT-L1 Red Team and Blue Team Fundamentals
- Introduction to Red Team and Blue Team Fundamentals
- Protocols and Ports Used for Exploits
- IP Addressing Concepts
- Red Team – Introduction to Kali Linux
- Blue Team – Server Operating System Basics
- Red Team – Wireshark Essentials
- Blue Team – Network Monitoring Tools in Server Operating
- Systems
- Red Team – Nmap Network Scanning Techniques
- Blue Team – Server Firewall Configuration
- Red Team – Man in the Middle Exploits
- Blue Team – Malware protection and Antivirus protection
- Red Team – Introduction to Metasploit
- Blue Team – Patch Management and Software Updates
- Red Team – Credential Harvesting Tools
- Blue Team – Securing Servers with Policies
- Initiate a Denial of Service Attack on a Server
- Exploiting Telnet Vulnerabilities
- SMB Exploit with Responder
- Performing a Brute Force Password Attack
- Exploit Windows with Metasploit (Eternal Blue)
- Introduction to Cyber Ranges
PLAB-SVR19-CM Windows Server 2019 - Configuring and Maintaining
PLAB-SVR19-CM Windows Server 2019 – Configuring and Maintaining
- Manage IPv6 Connectivity
- Implement DHCP Relay Agent
- Install and Configure Enterprise Root CA
- Manage Certificate Revocation Lists
- Manage Server Certificates
- Manage Enterprise Certificates
- Implement Microsoft VPN Services Part One
- Implement Microsoft VPN Services Part Two
- Implement Microsoft VPN Services Part Three
- Implement Microsoft VPN Services Part Four
- Implement Network Policy Server
- Configure LAN Routing
- Configure Network Address Translation
- Manage Interoperability of IPv4 and IPv6 Addresses
- Manage Group Policy Objects Part One
- Manage Group Policy Objects Part Two
- Manage Group Policy Objects Part Three
- Deploy and Manage Domain Controllers
- Manage Active Directory Accounts Part One
- Manage Active Directory Accounts Part Two
- Administer Active Directory Groups and OUs
- Maintain Active Directory
- Configuring Distributed File System
- Cloud Essential Concepts
- The Azure Platform
- Azure Resource Groups
- Azure Networking Concepts
- Azure Virtual Machines
- Azure Service Level Agreements (SLA’s)
- Management Tools
- Monitoring Tools
- The Azure Marketplace
- Azure Storage Services
- Working with Blobs
- Azure SQL Databases
- Azure Cosmos Databases
- Using Azure Key Vault
- Security Tools
- Network Security
- Introduction to Data Security
- Configuring Endpoint Security
- Common Threats to a Wireless Network
- Configuring a Web Browser
- Email Security Concepts
- Securing Mobile Platforms
- Securing The Cloud
- Securing Network Connections
- Using Data Destruction and Disposal Methods
- Configuring File System Security
- Administering User and Group Accounts
- Securing Windows
- Configuring and Running Windows Update
- Configuring Firewall on Windows
- Encryption
- Data Backup and Disaster Recovery
- Implementing Basic Disaster Prevention and Recovery
- Methods
- Managing System Maintenance Tools
- Social Networking Security
- Instant Messaging Securit
- Computer Hardware and Troubleshooting
- Computer Software
- Operating System Types and Features – Part 1
- Operating System Types and Features – Part 2
- Introduction to Networking – Part 1
- Introduction to Networking – Part 2
- Online Communication
- Web Browsing
- Internet Security
- Microsoft Word Fundamentals – Part 1
- Microsoft Word Fundamentals – Part 2
- Microsoft Word Fundamentals – Part 3
- Microsoft Excel Fundamentals – Part 1
- Microsoft Excel Fundamentals – Part 2
- Microsoft PowerPoint Fundamentals – Part 1
- Microsoft PowerPoint Fundamentals – Part 2
- Microsoft Outlook Fundamentals – Part 1
- Microsoft Outlook Fundamentals – Part 2
- Configuring Mobile Devices
- Install Hyper-V and Fedora Linux Workstation
- Applying Patches and Updates for Windows Desktops
- File and Print Sharing in Homegroup
- Understand Utility Software – Anti-Malware, Software
- Firewalls, Maintenance and Compression Tools
- Understand Phishing
- Explain Backup Concepts
- Using Collaboration Software – Cloud Storage and Online Apps
- Basic Functions of an Operating System
- Folder and File Permissions
- Using Productivity Software
- Support Windows Store and Cloud Apps
- Managing Web Browsers
- Calendaring and Scheduling Overview
- Topology Discovery Part 1
- Topology Discovery Part 2
- Scanning Networks Part 1
- Scanning Networks Part 2
- Understand Network Protocols – HTTP, HTTPS, NetBIOS, TCP, UDP
- Network Security – Protocol Analyzers
- Threats – Network Vulnerabilities
- Threats – Vulnerability Scanning
- Network Security – Routing Protocols
- Network Security – Spam Filter
- Understand Common Ports and Protocols
- Understanding IDS Firewall Evasion and Honeypots
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- IoT Hacking
- Scanning Networks
- Enumeration
- System Hacking
- Malware Threats
- Sniffing
- Denial of Service
- Session Hijacking
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- Cryptography
- Social Engineering
- Vulnerability Analysis
- Cloud Computing
- Evading Firewalls
- Steganography
- Understanding the Digital Forensics Profession and
- Investigations
- Data Acquisition
- Processing Crime and Incident Scenes
- Working with Windows and CLI Systems
- Current Digital Forensics Tools
- Linux and Macintosh File Systems
- Recovering Graphics Files
- Digital Forensics Analysis and Validation
- Virtual Machine Forensics, Live Acquisitions, and Network
- Forensics
- E-mail and Social Media Investigations
- Mobile Device Forensics
- Cloud Forensics
- Report Writing for High-Tech Investigations
- Expert Testimony in Digital Investigations
- Ethics for the Expert Witness
- Understand Common Ports and Protocols
- Installing Wireshark
- Wireshark Functionality
- Customizing Wireshark
- Working with Captured Traffic
- Analyzing Captured Traffic
- Analyzing Protocols
- Packet Sniffing with Wireshark
- Introduction to Red Team and Blue Team Fundamentals
- Protocols and Ports Used for Exploits
- IP Addressing Concepts
- Red Team – Introduction to Kali Linux
- Blue Team – Server Operating System Basics
- Red Team – Wireshark Essentials
- Blue Team – Network Monitoring Tools in Server Operating Systems
- Red Team – Nmap Network Scanning Techniques
- Blue Team – Server Firewall Configuration
- Red Team – Man in the Middle Exploits
- Blue Team – Malware protection and Antivirus protection
- Red Team – Introduction to Metasploit
- Blue Team – Patch Management and Software Updates
- Red Team – Credential Harvesting Tools
- Blue Team – Securing Servers with Policies
- Initiate a Denial of Service Attack on a Server
- Exploiting Telnet Vulnerabilities
- SMB Exploit with Responder
- Performing a Brute Force Password Attack
- Exploit Windows with Metasploit (Eternal Blue)
- Introduction to Cyber Ranges
- Manage IPv6 Connectivity
- Implement DHCP Relay Agent
- Install and Configure Enterprise Root CA
- Manage Certificate Revocation Lists
- Manage Server Certificates
- Manage Enterprise Certificates
- Implement Microsoft VPN Services Part One
- Implement Microsoft VPN Services Part Two
- Implement Microsoft VPN Services Part Three
- Implement Microsoft VPN Services Part Four
- Implement Network Policy Server
- Configure LAN Routing
- Configure Network Address Translation
- Manage Interoperability of IPv4 and IPv6 Addresses
- Manage Group Policy Objects Part One
- Manage Group Policy Objects Part Two
- Manage Group Policy Objects Part Three
- Deploy and Manage Domain Controllers
- Manage Active Directory Accounts Part One
- Manage Active Directory Accounts Part Two
- Administer Active Directory Groups and OUs
- Maintain Active Directory
- Configuring Distributed File System