COMPUTER OPERATION TRAINING TABLE OF CONTENT
FLOREDEST ICT GLOBAL SERVICES LIMITED
We Print As Low as 20 Naira per Copy
MICROSOFT OFFICE WORD TABLE OF CONTENT STUDENTS LEVEL [1]
Lesson 1: Getting Started with Word
Lesson 2: Identify the Word Interface
Lesson 3: Create a Word Document
Lesson 4: Editing a Document
Lesson 5: Navigate and Select Text
Lesson 6: Modify Text
Lesson 7: Find and Replace Text
Lesson 8: Formatting Text and Paragraphs
Lesson 9: Align Text Using Tabs
Lesson 10: Apply Borders and Shading
Lesson 11: Apply Styles
Lesson 12: Adding Tables
Lesson 13: Typing inside a Table
Lesson 14: Format a Table (Merge, Color & Increase Lines)
MICROSOFT OFFICE WORD TABLE OF CONTENT APPRENTICE / ADVANCE STUDENTS LEVEL [2]
Lesson 1: Getting Started with Word
Lesson 2: Identify the Word Interface
Lesson 3: Create a Word Document
Lesson 4: Editing a Document
Lesson 5: Navigate and Select Text
Lesson 6: Modify Text
Lesson 7: Find and Replace Text
Lesson 8: Formatting Text and Paragraphs
Lesson 9: Align Text Using Tabs
Lesson 10: Apply Borders and Shading
Lesson 11: Apply Styles
Lesson 12: Adding Tables
Lesson 13: Typing inside a Table
Lesson 14: Format a Table (Merge, Color & Increase Lines)
Lesson 15: Convert Text to a Table
Lesson 16: Inserting Graphic Objects
Lesson 17: Insert Symbols and Special Characters
Lesson 18: Add Images to a Document
Lesson 19: Apply a Page Border and Color
Lesson 20: Add a Watermark
Lesson 21: Add Headers and Footers
Lesson 22: Control Page Layout
Lesson 23: Check Spelling and Grammar
Lesson 24: Additional Save OptionsÂ
Lesson 25: Simplifying and Managing Long Documents
Lesson 26: Securing a Document
Lesson 27: Creating Forms
MICROSOFT EXCEL TABLE OF CONTENT APPRENTICE / ADVANCE STUDENTS LEVEL [1 ]
Lesson 1: Opening a Workbook
Lesson 2:Â Getting use to Cells
Lesson 3: Page Setup
Lesson 4: Page Orientation
Lesson 5:Â Merging and Editing Cells
Lesson 6: Inputting Text, Images and objects
Lesson 7: Printing
Lesson 7[a]: Range of Pages to Print
Lesson 7[b]: Print Page Orientation
Lesson 7[c]: Page Type
Lesson 7[a]: Margins
Lesson 7[a]: Scaling
MICROSOFT EXCEL TABLE OF CONTENT APPRENTICE / ADVANCE STUDENTS LEVEL [2]
Lesson 1: Opening a Workbook
Lesson 2:Â Getting use to Cells
Lesson 3: Page Setup
Lesson 4: Page Orientation
Lesson 5:Â Merging and Editing Cells
Lesson 6: Inputting Text, Images and objects
Lesson 7: Printing
Lesson 7[a]: Range of Pages to Print
Lesson 7[b]: Print Page Orientation
Lesson 7[c]: Page Type
Lesson 7[a]: Margins
Lesson 7[a]: Scaling
Lesson 8: Charts
Lesson 9: Sorting Data
Lesson 10: Find and Replace Option
Lesson 11: Paste Special Option
Lesson 12: Keyboard Shortcuts
Lesson 13: Conditional Formatting
MICROSOFT POWERPOINT TABLE OF CONTENT APPRENTICE / ADVANCE STUDENTS LEVEL [1 ]
Lesson 1: Introducing PowerPoint
Lesson 2: Beginning a New Presentation
Lesson 3: Inserting Slides & Presentation
Lesson 4: Applying a Theme
Lesson 5: Editing Text
Lesson 6: Inserting an Image
Lesson 7: Formatting an Image
Lesson 8: Inserting / Editing / Using Video
Lesson 9: Using the Shapes Gallery
Lesson 10: Creating a Table
Lesson 11: Adding Animations and Transitions
Lesson 12: Inserting Slide Numbers
Lesson 13: Preparing a Presentation for Delivery
Lesson 14: Delivering the Presentation
Lesson 15: Saving and Packaging a Presentation
MICROSOFT PUBLISHER TABLE OF CONTENT APPRENTICE / ADVANCE STUDENTS [LEVEL 1]
LESSON 1: Templates in Microsoft Publisher
LESSON 2: Setting up your margins, orientation and paper size
LESSON 3: Change Page Background
LESSON 4: Create New Pages, Arrange, Delete
LESSON 5: Adding and formatting Text
LESSON 6: Insert and format tables
LESSON 7: Insert and format Images, Shapes
MICROSOFT PUBLISHER TABLE OF CONTENT APPRENTICE / ADVANCE STUDENTS [LEVEL 2]
LESSON 1: Templates in Microsoft Publisher
LESSON 2: Setting up your margins, orientation and paper size
LESSON 3: Change Page Background
LESSON 4: Create New Pages, Arrange, Delete
LESSON 5: Adding and formatting Text
LESSON 6: Insert and format tables
LESSON 7: Insert and format Images, Shapes
LESSON 8: Text Wrapping around shape
LESSON 9: Add Page parts, calendars, borders and Advertisements
LESSON 10: How to insert time and date
LESSON 11: Save and Export in different formats
LESSON 12: Creating Business, Wedding album, Flyer, brochure etc..
Telecommunications for Beginners and Non-Engineers
LESSON 1: Telecom definitions, History and fundamental Technology
LESSON 2: Fundamentals of Communication system
LESSON 3: Radio fundamentals,Â
LESSON 4: Devices and Systems
LESSON 5: Bandwidth and Spectrum
LESSON 6: Radio Frequency Spectrum
LESSON 7: RF Based Communications
LESSON 8: Telephone Networks
LESSON 9: Introduction to Internet of Things
IP Addresses, Packets and Routers
LESSON 1: Channelized Time-Division MultiplexingÂ
LESSON 2: Network Bandwidth on Demand
LESSON 3: RoutersÂ
LESSON 4: DHCP
LESSON 5: Public and Private IPv4
LESSON 6: IPv6 Address Allocations and Assignment
Ethernet, LANs and VLANS
LESSON 1: Introduction
LESSON 2: Buses
LESSON 3: MAC Addresses and Frames
LESSON 4: Ethernet and 802.3
LESSON 5: LAN SWITCHES / Cable categories etc.
LESSON 6: VLANS
LESSON 7: Gigabit and Optical Ethernet
SATELLITE COMMUNICATION
LESSON 1: Explain the Basics of Satellite Communications
LESSON 2: Understand new SATCOM services and features
LESSON 3: Understand Modern Satellite system design, Modulation and coding Schemes
LESSON 4: Understand Obital Aspects
LESSON 5: Understand Satellites subsystem & launching
LESSON 6: Small aperture Terminals (VSAT)
LESSON 7: Non Geosynchronous System (NGSO)
LESSON 8: Satellite subsystems & Launching
Certified VoIP Analyst
LESSON 1: Introduction to Terminals
LESSON 2: Voice in Packets
LESSON 3: Media ServersÂ
LESSON 4: Gateways
LESSON 5: LAN and WANs
LESSON 6: Key VoIP Standards
VoIP Architectures and Implementation Choices
LESSON 1: Intro + Internet Telephony
LESSON 2: Computer VoIP over the Internet
LESSON 3: Internet Telephony
LESSON 4: VSPS: Internet to Phone - Gmail clientÂ
LESSON 5: VSP Phone to Phone Over Internet - Vonage
LESSON 6: VoIP at Carriers
LESSON 7: VoIP Enabled PBX and MIgration Options
LESSON 8: Premise Softwitch - PBX Replacement
LESSON 9: Cloud Services and Hosted PBX
LESSON 10: IP Centrex
LESSON 11: IP Phone Features and Uses
Softswitches, SIP, Call Setup and SIP Trunking
LESSON 1: SIP's relationship to other Protocols
LESSON 2: SIP URIs - Telephone Numbers
LESSON 3: Register - Update your Location
LESSON 4: Invite Dialing
LESSON 5: Location Services -Getting the far end
LESSON 6: SIP Trapezoid
LESSON 7: SIP Messages and Session Description protocol
LESSON 8: SIP / Softswitches / Call Managers
Voice Packetization, Codecs and Voice Quality
LESSON 1: Voice Packetization
LESSON 2: Measuring Voice Quality
LESSON 3: Factors Affecting Voice Quality
LESSON 4: Codecs - voice Coding and CompressionÂ
LESSON 5: RTP
LESSON 6: Protocol Stack - RTP, UDP, IP, MAC
LESSON 7: Jitter
LESSON 8: Packet Loss and Sound Samples
VIP Network Quality
LESSON 1: Virtual Circuit Technologies
LESSON 2: MPLS
LESSON 3: Service Level Agreements, Meters, Markers, Shapers and Droppers
LESSON 4: Networking Diff - Serv and MPLS
LESSON 5: Using 802.1P for QoS
LESSON 6: Implementing CoS - Queuing Techniques
WIRELESS TELECOMMUNICATIONS
LESSON 1: Mobile Network components
LESSON 2: Cellular Principles and AMPS
LESSON 3: 2G, 3G, 4G & 5G- Digital Radio - Cellular communications
LESSON 4: Spectrum-Sharing Technologies - FDMA, TDMA, CDMA, OFDMA
LESSON 5: Communication Satellites
LESSON 6: 802.11 Wireless LANs - Wifi
Certified Wireless Analyst
LESSON 1: Radio Fundamentals
LESSON 2: Wireless Spectrum and Radio Bands
LESSON 3: Analog Radio
LESSON 4: Digital Radio functions
LESSON 5: Propagation, Penetration and Fading
Certified Ethical Hacker
LESSON 1: Introduction to Ethical Hacking
LESSON 2: Foot Printing and Reconnaissance
LESSON 3: Scanning Networks
LESSON 4: Enumeration
LESSON 5: Vulnerability Analysis
LESSON 6: System Hacking
LESSON 7: Malware Threats
LESSON 8: Sniffing
LESSON 9: Session Hijacking
LESSON 10: Evading IDS, Firewall and Honey pots
LESSON 11: SQL Injection
LESSON 12: Hacking Mobile Platforms
LESSON 13: Hacking Web Servers
LESSON 14: Hacking Web Applications
LESSON 15: Hacking Wireless Networks
LESSON 16: Cryptography
LESSON 17: IoT Hacking
LESSON 18: Cloud Computing
LESSON 19: Social Engineering
LESSON 20: Denial of Service
Computer Hacking Forensic Investigator
LESSON 1: Cloud Forensics
LESSON 2: Malware Forensics
LESSON 3: Mobile Forensics
LESSON 4: Network Forensics
LESSON 5: Operating System Forensics
LESSON 6: Computer Forensics Investigation Process
LESSON 7: Investigating Web Attacks
LESSON 8: Investigative Reports
LESSON 9: Data Acquisition and Duplication
LESSON 10: Evading IDS, Firewall and Honey pots
LESSON 11: Defeating Anti-Forensics Techniques
LESSON 12: Hardisks and File Systems
LESSON 13: Hacking Web Servers
Certified Incident Handler
LESSON 1: Handling and responding to Cloud Security Incidents
LESSON 2: Handling and responding to Network Security Incidents
LESSON 3: Handling and Responding to Insider threat
LESSON 4: Handling and responding to Web application security incidents
LESSON 5: Incident Handling and response process
LESSON 6: Forensic readiness and first responseÂ
LESSON 7: Responding to Malware threats
Certified Disaster Recovery / Virtualization Technology
LESSON 1: Introduction to Disaster Recovery and business continuity
LESSON 2: Risk Assessment
LESSON 3: Business Continuity Planning
LESSON 4: Data Backup Strategies
LESSON 5: Data Recovery Strategies
LESSON 6: Centralized and Decentralized System Recovery
LESSON 7: business Continuity managementÂ
LESSON 8: Virtualization Based Disaster RecoveryÂ
LESSON 9: System Recovery
Network Security Administrator
LESSON 1: Network Security threats, vulnerabilities, and Attacks.
LESSON 2: Network Security Policy Design and Implementation
LESSON 3: Physical Security
LESSON 4: Host Security
LESSON 5: Secure Firewall Configuration and Management
LESSON 6: Network and Defense fundamentals
LESSON 7: Secure IDs Configuration and Management
LESSON 8: Secure VPN configuration and ManagementÂ
LESSON 9: Wireless Network Defense
LESSON 10: Network Traffic Monitoring and Analysis
LESSON 11: Network Risk and Vulnerability Management
LESSON 12: Network Incident ResponseÂ
Certified Security Specialist
LESSON 1: Network fundamentals
LESSON 2: Hacking Cycle
LESSON 3: Cryptography
LESSON 4: Information Security fundamentals
LESSON 5: Web Security
LESSON 6: Wireless Network SecurityÂ
LESSON 7: Ethical Hacking and Pen-testingÂ
LESSON 8: Intrusion Detection, firewalls
LESSON 9: Data Backup and Virtual Private Network
LESSON 10: Digital Evidence
LESSON 11: Steganography
LESSON 12: Writing Investigative Report
LESSON 13: Network fundamentals
LESSON 14: Information Security threats and Attacks
LESSON 15: Social Engineering
Certified Secure Computer User
LESSON 1: Secure Network Connections
LESSON 2: Securing Operating Systems
LESSON 3: Data Backup and Disaster Recovery
LESSON 4: Securing Email Communications
LESSON 5: Securing the Cloud
LESSON 6: Securing Mobile Devices
LESSON 7: Security on Social Networking Sites
LESSON 8: Internet SecurityÂ
Project Management
LESSON 1: Risk Management
LESSON 2: Scope Management
LESSON 3: Communication Management
LESSON 4: Quality Management
LESSON 5: Resource Management
LESSON 6: Cost Management
LESSON 7: Project Management Concepts
Project Management
LESSON 1: Risk Management
LESSON 2: Scope Management
LESSON 3: Communication Management
LESSON 4: Quality Management
LESSON 5: Resource Management
LESSON 6: Cost Management
LESSON 7: Project Management Concepts
Data Centre Design Associate (DCDA)
LESSON 1: Data Centre Overview and Importance
LESSON 2: Availability and causes for downtime
LESSON 3: Data Centre Standards and Best Practices
LESSON 4: Light Design
LESSON 5: Power Infrastructure Design
LESSON 6: Earthing Grounding and Bonding
LESSON 7: EMF Consideration
LESSON 8: Equipment Racks Design Types
LESSON 9: Data Center Cabling Design
LESSON 10: Cooling Infrastructure Design
LESSON 11: Scalable Network Infrastructure Designing
LESSON 12: Environment control and AutomationÂ
LESSON 13: Access control system
LESSON 14: Auxiliary Systems BMS, EMS DCIM
Foundation in IT Service ManagementÂ
LESSON 1: Generic Concepts and Definitions
LESSON 2: Service Management as a Practice
LESSON 3: The ITIL Service Lifecycle
LESSON 4: Key Principles and Models
LESSON 5: Functions - Processes - Roles
LESSON 6: Technology and Architecture
Linux foundation Certified System AdministrationÂ
LESSON 1: Linus File Structure, Commands and ProcessesÂ
LESSON 2: Package Management systems
LESSON 3: System and Process Monitoring
LESSON 4: Disk ManagementÂ
LESSON 5: User Account and Group management
LESSON 6: Network Management
LESSON 7: Backup and Recovery Methods
LESSON 8: Linus Security Modules
LESSON 9: Basic Troubleshooting
LESSON 10: System Rescue MethodsÂ
IC PHP Developer FundamentalsÂ
LESSON 1: Development environment
LESSON 2: PHP fundamentals
LESSON 3: Conditional Instruction of control and Cycles
LESSON 4: Complex data structure
LESSON 5: PHP Code Management
LESSON 6: Data recovery and Check in an HTML Form
LESSON 7: DBMS MySQL and MariaDB
Unity Certified ProgrammerÂ
Unity is the leading content-creation platform for VR/AR, real-time 3D, and mobile 2D. Unity is used by students and professionals around the world to create everything from games to movies, 3D models to VR Simulations.Â
LESSON 1: Creating Code
LESSON 2: Evaluating code
LESSON 3: Navigating the Interface
LESSON 4: Debugging, Problem-Solving, and API
Microsoft 360 Certified FundamentalsÂ
LESSON 1: What is Microsoft 365
LESSON 2: Microsoft 365 core Services and Features
LESSON 3: Teamwork in Microsoft 365
LESSON 4: Microsoft 365 Endpoint Management
LESSON 5: Compliance Tool in Microsoft 365
LESSON 6: Microsoft 365 Cloud deployment model
Microsoft Dynamics
LESSON 1: Introduction to Dynamics 365
LESSON 2: Cloud Concepts - Principles of Cloud ComputingÂ
LESSON 3: Explore Licensing, Onboarding, and Support Options - fundamentals
LESSON 4: Unified Operations Product - Fundamentals
LESSON 5: Managing Deployments and Releases - fundamentals
App DevelopmentÂ
LESSON 1: Introduction to App Development
LESSON 2: Introduction to UIKit
LESSON 3: Navigation and Workflows
LESSON 4: Building AR Apps with Xcode
LESSON 5: Tables and PersistenceÂ
LESSON 6: Working with the Web
LESSON 7: Prototyping and project planning
PROJECT MANAGEMENT
LESSON 1: Introduction to Project management and project Concept
LESSON 2: Scope Management
LESSON 3: Schedule Management
LESSON 4: Cost Management
LESSON 5: Recourse Management
LESSON 6: Quality Management
LESSON 7: Integration management
LESSON 8: Procurement Management
LESSON 9: Communication Management
LESSON 10: Risk Management
LESSON 11: Stakeholder Management
Data Centre Design Associate (DCDA)
LESSON 1: Importance of Data Centre
LESSON 2: Availability and Causes for downtime
LESSON 3: Data Centre Standards and Best PracticesÂ
LESSON 4: Data Centre Location Selection, building and ConstructionÂ
LESSON 5: Raised Floor / Suspended Ceiling
LESSON 6: Light Design
LESSON 7: Power Infrastructure Design - Earthing Grounding & bonding
LESSON 8: EMF considerationsÂ
LESSON 9: Data Center Cabling DesingÂ
LESSON 10: Scalable Network Infrastructure Design
LESSON 11: Environment Control and Automation
LESSON 12: Access Control SystemÂ
LESSON 13: Auxiliary Systems BMS, EMS DCIM
Foundation in IT Service Management
LESSON 1: Generic Concepts and Definitions of IT Service Management
LESSON 2: Key Principles and Models
LESSON 3: Function - Processes - Roles of IT Service Management
LESSON 4: Technology and ArchitectureÂ
LESSON 5: Competence and Training
LESSON 6: The ITIL Service Lifecycle
Linux foundation Certified System AdministrationÂ
LESSON 1: Linux file Structure, Commands, and Processes
LESSON 2: Package Management SystemsÂ
LESSON 3: System and Process Monitoring
LESSON 4: Memory - Usage Monitoring and TuningÂ
LESSON 5: Disk Management
LESSON 6: User Account and Group Management
LESSON 7: System Rescue and Basic Troubleshooting
LESSON 8: Linus Security Modules
LESSON 9: Backup and Recovery Methods
IC PHP Developer Fundamentals (2)
LESSON 1: Development Environment
LESSON 2: PHP FundamentalsÂ
LESSON 3: conditional Instruction Control and cyclesÂ
LESSON 4: complex data structures Â
LESSON 5: PHP Code Management
LESSON 6: Data Recovery and check in an HTML Form
LESSON 7: Maintain Information in PHP
LESSON 8: The DBMS MySQL and Interaction with DBMS and MariaDB
Unity Certified Programmer
LESSON 1: IntroductionÂ
LESSON 2: Creating and Evaluating Code
LESSON 3: Navigating the InterfaceÂ
LESSON 4: DebuggingÂ
LESSON 5: Interpreting the API
LESSON 6: Problem solving Techniques
Microsoft 360 Certified FundamentalsÂ
LESSON 1: Introduction to Microsoft 365 Certified Fundamentals
LESSON 2: Teamwork in Microsoft 365
LESSON 3: Unified endpoint Management
LESSON 4: Security in Microsoft 365
LESSON 5: Introduction to Compliance Tools in Microsoft 365
LESSON 6: How to Management your Microsoft 365 Subscription
LESSON 7: Cloud Development Model
Microsoft Dynamics
LESSON 1: IntroductionÂ
LESSON 2: Engagement apps - fundamentalsÂ
LESSON 3: Unified Operations and Product fundamentals
LESSON 4: Explore Licensing, Onboarding, and Support Option - Fundamentals
Microsoft Certified Azure fundamentalsÂ
LESSON 1: IntroductionÂ
LESSON 2: Principles of cloud Computing
LESSON 3: Core Cloud Services - Azure Architecture andÂ
LESSON 4: Manage Services with the Azure Portal
LESSON 5: Control and organize Azure Resources with Azure Resource Manager
LESSON 6: Azure Networking Options
LESSON 7: Azure compute Options
LESSON 8: Security, responsibility and trust in Azure
Administering a SQL Database InfrastructureÂ
LESSON 1: Authenticating and authorizing users
LESSON 2: Assigning Server and Database Roles
LESSON 3: Authorizing User to Access ResourcesÂ
LESSON 4: Protecting Data with Encryption and Auditing
LESSON 5: SQL Server Recovery Models
LESSON 6: Backup of SQL Server Databases
LESSON 7: Monitoring SQL Server with Alerts and Notifications
LESSON 8: Managing SQL
LESSON 9: Importing and Exporting Data
LESSON 10: Troubleshooting SQL Server
LESSON 11: Configuring Security for SQL Server Agent
LESSON 12: Automating SQL Server ManagementÂ
LESSON 13: Tracing Access to SQL Server
Certified Information System Security ProfessionalÂ
LESSON 1: Security and Risk Management
LESSON 2: Asset Security
LESSON 3: Security Architecture and Engineering
LESSON 4: Communication and Network Security
LESSON 5: Identity and Access Management
LESSON 6: Security Assessment and Testing
LESSON 7: Security Operations
LESSON 8: Managing SQL
LESSON 9: Security and Software Development
Performance Tuning and Optimizing SQL Database
LESSON 1: IntroductionÂ
LESSON 2: SQL Server Architecture
LESSON 3: SQL Server I/O
LESSON 4: Database Structures
LESSON 5: SQL Server Concurrency
LESSON 6: Statistics and Index Internals
LESSON 7: Monitoring, Tracing and Baselining
LESSON 8: Plan Caching and RecompilationÂ
LESSON 9: Extended Events
Programing in C#
LESSON 1: Introduction to C# Syntax
LESSON 2: Creating Methods, Monitoring Applications and Exceptions
LESSON 3: Developing the Code for a Graphical ApplicationÂ
LESSON 4: Creating Classes and Implementing Type-safe Collections
LESSON 5: Creating a Class Hierarchy by Using Inheritance
Java ProgramingÂ
LESSON 1: Introduction to Java
LESSON 2: Fundamental Programing Structures in Java
LESSON 3: Objects and Classes
LESSON 4: Inheritance
LESSON 5: Logging, Assertions and Exceptions
HTML and CSS programingÂ
LESSON 1: Introduction to HTML
LESSON 2: Building a Basic HTML Document
LESSON 3: Introduction to CSS
LESSON 4: Building and Styling HTML TextÂ
LESSON 5: HTML Semantic Elements
LESSON 6: Adjusting Fonts
LESSON 7: Creating, and Decorating Pages with Color
LESSON 8: Creating and Adjusting the Borders of Elements
LESSON 9: Adjusting Images and MultimediaÂ
LESSON 10: Creating Responsive Layout
LESSON 8: Writing Tables
LESSON 9: Building and Using HTML Forms
LESSON 10: Advance Web Page Designing
Introduction to Python Programing
LESSON 1: Introduction to PythonÂ
LESSON 2: Perform Operations using Data Types and Operators
LESSON 3: Control flow with Decisions and Loops
LESSON 4: Perform Input and Output Operations
LESSON 5: Document and Structure Code
LESSON 6: Perform Troubleshooting and Error Handling
LESSON 7: Perform Operations using Modules and Tools
MTA 98-367 Security fundamentalsÂ
LESSON 1: Understanding Security Layers
LESSON 2: Understanding authentication
LESSON 3: Understanding Authorization and Accounting
LESSON 4: Security Policies
LESSON 5: Protecting the Server and Client
LESSON 6: Understanding Network Security
MTA 98-366 Networking FundamentalsÂ
LESSON 1: Introduction to Local Area Networking
LESSON 2: Defining Networks with the OSI Model
LESSON 3: Understanding Wired and Wireless Networks
LESSON 4: Understanding Internet Protocol
LESSON 5: Implementing TCP/IP in the Command Line
LESSON 6: Working with Networking Services
LESSON 7: Defining Network Infrastructures and Network Security
LESSON 8: Internet Protocol
Certified Incident Handler
LESSON 1: Understanding Incident Handling and Response
LESSON 2: Incident Handling and response Process
LESSON 3: Forensic Readiness and First response
LESSON 4: Responding to Malware Incidents
LESSON 5: Responding to Email Security Incidents
LESSON 6: Web Application Security Incidents
LESSON 7: Cloud Security Incidents Handling
LESSON 8: Network Security Incidents
Certified Disaster Recovery / Virtualization Technology
LESSON 1: Disaster Recovery and business continuity
LESSON 2: Business continuity Management (BCM)
LESSON 3: Business Impact Analysis (BIA)
LESSON 4: Business Continuity Planning (BCP)
LESSON 5: Data Backup Strategies
LESSON 6: Data Recovery Strategies
LESSON 7: System Recovery
LESSON 8: BCP Testing, Maintenance, and Training Handling and responding to network security incidents.
LESSON 9: Risk Management
LESSON 10: Centralized and Decentralized System Recovery
Network Security Administrator
LESSON 1: Introduction
LESSON 2: Computer Network and Defense Fundamentals
LESSON 3: Network Security Threats, vulnerabilities, and Attacks.
LESSON 4: Physical Security
LESSON 5: Host Security
LESSON 6: Network Security Policy Design and ImplementationÂ
LESSON 7: Network Security Controls, Protocols, and Devices
LESSON 8: Secure Firewall configuration and ManagementÂ
LESSON 9: Data Backup and Recovery
LESSON 10: Network Incident Response and Management
LESSON 11: Secure VPN configuration and Management Â
LESSON 12: Secure IDS configuration
LESSON 13: Network Traffic Monitoring
Certified Security Specialist
LESSON 1: Introduction to Information Security fundamentals
LESSON 2: Networking fundamentals
LESSON 3: Information Security Threats and Attacks
LESSON 4: Social engineering
LESSON 5: Hacking Cycle
LESSON 6: Identification
LESSON 7: Authentication and Authorization
LESSON 8: Cryptography
LESSON 9: Intrusion Detection
LESSON 10: Firewalls
LESSON 11: Data Backup and Virtual Private Network
LESSON 12: Wireless Network SecurityÂ
LESSON 13: Web SecurityÂ
LESSON 14: Ethical Hacking and PentestingÂ
LESSON 15: Incidence ResponseÂ
LESSON 16: Digital Evidence
Certified Secure Computer User
LESSON 1: Introduction Security
LESSON 2: Securing Operating Systems
LESSON 3: Malware and Antivirus
LESSON 4: Internet Security
LESSON 5: Security on Social Networking Sites
LESSON 6: Securing Email communications
LESSON 7: Data backup and Disaster Recovery
LESSON 8: Securing Network Connections
LESSON 9: Securing the Cloud
LESSON 10: Securing Mobile Devices
Certified Ethical Hacker
LESSON 1: Understanding Ethical Hacking
LESSON 2: Reconnaissance and Foot Printing
LESSON 3: Enumeration
LESSON 4: Vulnerability Analysis
LESSON 5: Scanning Networks
LESSON 6: System Hacking
LESSON 7: Malware Threats
LESSON 8: Cloud Computing
LESSON 9: IoT Hacking
LESSON 10: Cryptography
LESSON 11: Social Engineering
LESSON 12: Denial of Service
LESSON 13: Session Hijacking
LESSON 14: Evading Firewall and Honey Pots
LESSON 15: Evading IDS
LESSON 16: Hacking Web Applications
LESSON 17: SQL Injection
LESSON 18: Hacking Mobile Platform
Computer Hacking Forensic Investigator
LESSON 1: Computer Forensics in Today's World
LESSON 2: Computer Forensics Investigation Process
LESSON 3: Understanding Hard Disks and File systems
LESSON 4: Operating System Forensics
LESSON 5: Defeating Anti Forensics Techniques
LESSON 6: Data Acquisition and Duplication
LESSON 7: Network Forensics
LESSON 8: Investigating Web Attacks
LESSON 9: Database Forensics
LESSON 10: Malware Forensics
LESSON 11: Mobile Forensics
Interactive Media [Adobe flash Professional]
LESSON 1: Understanding Interactive Media
LESSON 2: Introduction to Game Design
LESSON 3: Understanding Project Management and Teamwork
LESSON 4: Understanding Project Planning
LESSON 5: Introduction to Adobe Flash Professional
LESSON 6: Animation
LESSON 7: Testing and Publishing a flash Project
LESSON 8: Presenting Design Project
LESSON 9: Creating content by Using Adobe Flash Professional
LESSON 10: Importing and Organizing content in Adobe Flash Professional
Graphic Design & Illustration
LESSON 1: Introduction to Adobe Illustrator
LESSON 2: Introduction to Project Planning, Project Management, and Teamwork
LESSON 3: Design Project review and Redesign
LESSON 4: Editing Images and Graphics
LESSON 5: Presenting Design Projects
LESSON 6: Preparing Images and Graphics for Web, Print and Video
LESSON 7: Working with Clients
Web Authoring
LESSON 1: Introduction to Adobe Illustrator
LESSON 2: Introduction to Project Planning, Project ManagementÂ
LESSON 3: Design Project review and Redesign
LESSON 4: Editing Images and Graphics
LESSON 5: Presenting Design Projects
LESSON 6: Preparing Images and Graphics for Web, Print and Video
LESSON 7: Working with Clients
Autodesk Inventor
LESSON 1: Introduction
LESSON 2: Inventor File types and Standard templates
LESSON 3: Basic Assembly constraints
LESSON 4: Ground base component of an assembly
LESSON 5: Apply an offset to constrained parts
LESSON 6: Determine the Degrees of Freedom of a componentÂ
LESSON 7: Create a presentation Model
LESSON 8: Create drawing view based on an assembly and presentation file
LESSON 9: Apply Fillets and chamfers
LESSON 10: Create Hole Features
LESSON 11: Create revolve features
LESSON 12: Place threads
LESSON 13: Toggle Visibility of Features and Sketches
LESSON 14: Create a Pattern of features
LESSON 15: Create a Shell Feature
LESSON 16: Project Geometry
LESSON 17: Create and Modify Geometric Shapes
LESSON 18: Place threads
LESSON 19: Modify an Inventor Model
AUTOCAD
LESSON 1: Introduction to Autocad
LESSON 2: Draw Lines and rectangles
LESSON 3: Draw Circles, arcs and polygons
LESSON 4: Draw Polylines
LESSON 5: Move and Copy Object
LESSON 6: Create and Use Arrays
LESSON 7: Trim and extend Objects
LESSON 8: Offset Objects
LESSON 9: Mirror Objects
LESSON 10: Use Grip Editing
LESSON 11: Use Coordinate Systems
LESSON 12: Use Object-snap tracking
LESSON 13: Fillet and Chamfer Object
LESSON 14: Use Inquiry Commands
LESSON 15: Create Selection Sets
LESSON 16: Use Dimensions
LESSON 17: Add and Modify Text
LESSON 18: Inset Blocks
LESSON 19: Control Layer Visibility
LESSON 20: Alter Layer assignments for Objects