COMPUTER OPERATION TRAINING TABLE OF CONTENT

FLOREDEST ICT GLOBAL SERVICES LIMITED

We Print As Low as 20 Naira per Copy

MICROSOFT OFFICE WORD TABLE OF CONTENT STUDENTS LEVEL [1]

Lesson 1: Getting Started with Word

Lesson 2: Identify the Word Interface

Lesson 3: Create a Word Document

Lesson 4: Editing a Document

Lesson 5: Navigate and Select Text

Lesson 6: Modify Text

Lesson 7: Find and Replace Text

Lesson 8: Formatting Text and Paragraphs

Lesson 9: Align Text Using Tabs

Lesson 10: Apply Borders and Shading

Lesson 11: Apply Styles

Lesson 12: Adding Tables

Lesson 13: Typing inside a Table

Lesson 14: Format a Table (Merge, Color & Increase Lines)

MICROSOFT OFFICE WORD TABLE OF CONTENT APPRENTICE / ADVANCE STUDENTS LEVEL [2]

Lesson 1: Getting Started with Word

Lesson 2: Identify the Word Interface

Lesson 3: Create a Word Document

Lesson 4: Editing a Document

Lesson 5: Navigate and Select Text

Lesson 6: Modify Text

Lesson 7: Find and Replace Text

Lesson 8: Formatting Text and Paragraphs

Lesson 9: Align Text Using Tabs

Lesson 10: Apply Borders and Shading

Lesson 11: Apply Styles

Lesson 12: Adding Tables

Lesson 13: Typing inside a Table

Lesson 14: Format a Table (Merge, Color & Increase Lines)

Lesson 15: Convert Text to a Table

Lesson 16: Inserting Graphic Objects

Lesson 17: Insert Symbols and Special Characters

Lesson 18: Add Images to a Document

Lesson 19: Apply a Page Border and Color

Lesson 20: Add a Watermark

Lesson 21: Add Headers and Footers

Lesson 22: Control Page Layout

Lesson 23: Check Spelling and Grammar

Lesson 24: Additional Save Options 

Lesson 25: Simplifying and Managing Long Documents

Lesson 26: Securing a Document

Lesson 27: Creating Forms


MICROSOFT EXCEL TABLE OF CONTENT APPRENTICE / ADVANCE STUDENTS LEVEL [1 ]

Lesson 1: Opening a Workbook

Lesson 2:  Getting use to Cells

Lesson 3: Page Setup

Lesson 4: Page Orientation

Lesson 5:  Merging and Editing Cells

Lesson 6: Inputting Text, Images and objects

Lesson 7: Printing

Lesson 7[a]: Range of Pages to Print

Lesson 7[b]: Print Page Orientation

Lesson 7[c]: Page Type

Lesson 7[a]: Margins

Lesson 7[a]: Scaling

MICROSOFT EXCEL TABLE OF CONTENT APPRENTICE / ADVANCE STUDENTS LEVEL [2]

Lesson 1: Opening a Workbook

Lesson 2:  Getting use to Cells

Lesson 3: Page Setup

Lesson 4: Page Orientation

Lesson 5:  Merging and Editing Cells

Lesson 6: Inputting Text, Images and objects

Lesson 7: Printing

Lesson 7[a]: Range of Pages to Print

Lesson 7[b]: Print Page Orientation

Lesson 7[c]: Page Type

Lesson 7[a]: Margins

Lesson 7[a]: Scaling

Lesson 8: Charts

Lesson 9: Sorting Data

Lesson 10: Find and Replace Option

Lesson 11: Paste Special Option

Lesson 12: Keyboard Shortcuts

Lesson 13: Conditional Formatting

MICROSOFT POWERPOINT TABLE OF CONTENT APPRENTICE / ADVANCE STUDENTS LEVEL [1 ]

Lesson 1: Introducing PowerPoint

Lesson 2: Beginning a New Presentation

Lesson 3: Inserting Slides & Presentation

Lesson 4: Applying a Theme

Lesson 5: Editing Text

Lesson 6: Inserting an Image

Lesson 7: Formatting an Image

Lesson 8: Inserting / Editing / Using Video

Lesson 9: Using the Shapes Gallery

Lesson 10: Creating a Table

Lesson 11: Adding Animations and Transitions

Lesson 12: Inserting Slide Numbers

Lesson 13: Preparing a Presentation for Delivery

Lesson 14: Delivering the Presentation

Lesson 15: Saving and Packaging a Presentation


MICROSOFT PUBLISHER TABLE OF CONTENT APPRENTICE / ADVANCE STUDENTS [LEVEL 1]

LESSON 1: Templates in Microsoft Publisher

LESSON 2: Setting up your margins, orientation and paper size

LESSON 3: Change Page Background

LESSON 4: Create New Pages, Arrange, Delete

LESSON 5: Adding and formatting Text

LESSON 6: Insert and format tables

LESSON 7: Insert and format Images, Shapes

MICROSOFT PUBLISHER TABLE OF CONTENT APPRENTICE / ADVANCE STUDENTS [LEVEL 2]

LESSON 1: Templates in Microsoft Publisher

LESSON 2: Setting up your margins, orientation and paper size

LESSON 3: Change Page Background

LESSON 4: Create New Pages, Arrange, Delete

LESSON 5: Adding and formatting Text

LESSON 6: Insert and format tables

LESSON 7: Insert and format Images, Shapes

LESSON 8: Text Wrapping around shape

LESSON 9: Add Page parts, calendars, borders and Advertisements

LESSON 10: How to insert time and date

LESSON 11: Save and Export in different formats

LESSON 12: Creating Business, Wedding album, Flyer, brochure etc..




Telecommunications for Beginners and Non-Engineers

LESSON 1: Telecom definitions, History and fundamental Technology

LESSON 2: Fundamentals of Communication system

LESSON 3: Radio fundamentals, 

LESSON 4: Devices and Systems

LESSON 5: Bandwidth and Spectrum

LESSON 6: Radio Frequency Spectrum

LESSON 7: RF Based Communications

LESSON 8: Telephone Networks

LESSON 9: Introduction to Internet of Things

IP Addresses, Packets and Routers

LESSON 1: Channelized Time-Division Multiplexing 

LESSON 2: Network Bandwidth on Demand

LESSON 3: Routers 

LESSON 4: DHCP

LESSON 5: Public and Private IPv4

LESSON 6: IPv6 Address Allocations and Assignment

Ethernet, LANs and VLANS

LESSON 1: Introduction

LESSON 2: Buses

LESSON 3: MAC Addresses and Frames

LESSON 4: Ethernet and 802.3

LESSON 5: LAN SWITCHES / Cable categories etc.

LESSON 6: VLANS

LESSON 7: Gigabit and Optical Ethernet

SATELLITE COMMUNICATION

LESSON 1: Explain the Basics of Satellite Communications

LESSON 2: Understand new SATCOM services and features

LESSON 3: Understand Modern Satellite system design, Modulation and coding Schemes

LESSON 4: Understand Obital Aspects

LESSON 5: Understand Satellites subsystem & launching

LESSON 6: Small aperture Terminals (VSAT)

LESSON 7: Non Geosynchronous System (NGSO)

LESSON 8: Satellite subsystems & Launching

Certified VoIP Analyst

LESSON 1: Introduction to Terminals

LESSON 2: Voice in Packets

LESSON 3: Media Servers 

LESSON 4: Gateways

LESSON 5: LAN and WANs

LESSON 6: Key VoIP Standards

VoIP Architectures and Implementation Choices

LESSON 1: Intro + Internet Telephony

LESSON 2: Computer VoIP over the Internet

LESSON 3: Internet Telephony

LESSON 4: VSPS: Internet to Phone - Gmail client 

LESSON 5: VSP Phone to Phone Over Internet - Vonage

LESSON 6: VoIP at Carriers

LESSON 7: VoIP Enabled PBX and MIgration Options

LESSON 8: Premise Softwitch - PBX Replacement

LESSON 9: Cloud Services and Hosted PBX

LESSON 10: IP Centrex

LESSON 11: IP Phone Features and Uses

Softswitches, SIP, Call Setup and SIP Trunking

LESSON 1: SIP's relationship to other Protocols

LESSON 2: SIP URIs - Telephone Numbers

LESSON 3: Register - Update your Location

LESSON 4: Invite Dialing

LESSON 5: Location Services -Getting the far end

LESSON 6: SIP Trapezoid

LESSON 7: SIP Messages and Session Description protocol

LESSON 8: SIP / Softswitches / Call Managers

Voice Packetization, Codecs and Voice Quality

LESSON 1: Voice Packetization

LESSON 2: Measuring Voice Quality

LESSON 3: Factors Affecting Voice Quality

LESSON 4: Codecs - voice Coding and Compression 

LESSON 5: RTP

LESSON 6: Protocol Stack - RTP, UDP, IP, MAC

LESSON 7: Jitter

LESSON 8: Packet Loss and Sound Samples

VIP Network Quality

LESSON 1: Virtual Circuit Technologies

LESSON 2: MPLS

LESSON 3: Service Level Agreements, Meters, Markers, Shapers and Droppers

LESSON 4: Networking Diff - Serv and MPLS

LESSON 5: Using 802.1P for QoS

LESSON 6: Implementing CoS - Queuing Techniques

WIRELESS TELECOMMUNICATIONS

LESSON 1: Mobile Network components

LESSON 2: Cellular Principles and AMPS

LESSON 3: 2G, 3G, 4G & 5G- Digital Radio - Cellular communications

LESSON 4: Spectrum-Sharing Technologies - FDMA, TDMA, CDMA, OFDMA

LESSON 5: Communication Satellites

LESSON 6: 802.11 Wireless LANs - Wifi

Certified Wireless Analyst

LESSON 1: Radio Fundamentals

LESSON 2: Wireless Spectrum and Radio Bands

LESSON 3: Analog Radio

LESSON 4: Digital Radio functions

LESSON 5: Propagation, Penetration and Fading

Certified Ethical Hacker

LESSON 1: Introduction to Ethical Hacking

LESSON 2: Foot Printing and Reconnaissance

LESSON 3: Scanning Networks

LESSON 4: Enumeration

LESSON 5: Vulnerability Analysis

LESSON 6: System Hacking

LESSON 7: Malware Threats

LESSON 8: Sniffing

LESSON 9: Session Hijacking

LESSON 10: Evading IDS, Firewall and Honey pots

LESSON 11: SQL Injection

LESSON 12: Hacking Mobile Platforms

LESSON 13: Hacking Web Servers

LESSON 14: Hacking Web Applications

LESSON 15: Hacking Wireless Networks

LESSON 16: Cryptography

LESSON 17: IoT Hacking

LESSON 18: Cloud Computing

LESSON 19: Social Engineering

LESSON 20: Denial of Service

Computer Hacking Forensic Investigator

LESSON 1: Cloud Forensics

LESSON 2: Malware Forensics

LESSON 3: Mobile Forensics

LESSON 4: Network Forensics

LESSON 5: Operating System Forensics

LESSON 6: Computer Forensics Investigation Process

LESSON 7: Investigating Web Attacks

LESSON 8: Investigative Reports

LESSON 9: Data Acquisition and Duplication

LESSON 10: Evading IDS, Firewall and Honey pots

LESSON 11: Defeating Anti-Forensics Techniques

LESSON 12: Hardisks and File Systems

LESSON 13: Hacking Web Servers

Certified Incident Handler

LESSON 1: Handling and responding to Cloud Security Incidents

LESSON 2: Handling and responding to Network Security Incidents

LESSON 3: Handling and Responding to Insider threat

LESSON 4: Handling and responding to Web application security incidents

LESSON 5: Incident Handling and response process

LESSON 6: Forensic readiness and first response 

LESSON 7: Responding to Malware threats

Certified Disaster Recovery / Virtualization Technology

LESSON 1: Introduction to Disaster Recovery and business continuity

LESSON 2: Risk Assessment

LESSON 3: Business Continuity Planning

LESSON 4: Data Backup Strategies

LESSON 5: Data Recovery Strategies

LESSON 6: Centralized and Decentralized System Recovery

LESSON 7: business Continuity management 

LESSON 8: Virtualization Based Disaster Recovery 

LESSON 9: System Recovery

Network Security Administrator

LESSON 1: Network Security threats, vulnerabilities, and Attacks.

LESSON 2: Network Security Policy Design and Implementation

LESSON 3: Physical Security

LESSON 4: Host Security

LESSON 5: Secure Firewall Configuration and Management

LESSON 6: Network and Defense fundamentals

LESSON 7: Secure IDs Configuration and Management

LESSON 8: Secure VPN configuration and Management 

LESSON 9: Wireless Network Defense

LESSON 10: Network Traffic Monitoring and Analysis

LESSON 11: Network Risk and Vulnerability Management

LESSON 12: Network Incident Response 

Certified Security Specialist

LESSON 1: Network fundamentals

LESSON 2: Hacking Cycle

LESSON 3: Cryptography

LESSON 4: Information Security fundamentals

LESSON 5: Web Security

LESSON 6: Wireless Network Security 

LESSON 7: Ethical Hacking and Pen-testing 

LESSON 8: Intrusion Detection, firewalls

LESSON 9: Data Backup and Virtual Private Network

LESSON 10: Digital Evidence

LESSON 11: Steganography

LESSON 12: Writing Investigative Report

LESSON 13: Network fundamentals

LESSON 14: Information Security threats and Attacks

LESSON 15: Social Engineering

Certified Secure Computer User

LESSON 1: Secure Network Connections

LESSON 2: Securing Operating Systems

LESSON 3: Data Backup and Disaster Recovery

LESSON 4: Securing Email Communications

LESSON 5: Securing the Cloud

LESSON 6: Securing Mobile Devices

LESSON 7: Security on Social Networking Sites

LESSON 8: Internet Security 

Project Management

LESSON 1: Risk Management

LESSON 2: Scope Management

LESSON 3: Communication Management

LESSON 4: Quality Management

LESSON 5: Resource Management

LESSON 6: Cost Management

LESSON 7: Project Management Concepts

Project Management

LESSON 1: Risk Management

LESSON 2: Scope Management

LESSON 3: Communication Management

LESSON 4: Quality Management

LESSON 5: Resource Management

LESSON 6: Cost Management

LESSON 7: Project Management Concepts

Data Centre Design Associate (DCDA)

LESSON 1: Data Centre Overview and Importance

LESSON 2: Availability and causes for downtime

LESSON 3: Data Centre Standards and Best Practices

LESSON 4: Light Design

LESSON 5: Power Infrastructure Design

LESSON 6: Earthing Grounding and Bonding

LESSON 7: EMF Consideration

LESSON 8: Equipment Racks Design Types

LESSON 9: Data Center Cabling Design

LESSON 10: Cooling Infrastructure Design

LESSON 11: Scalable Network Infrastructure Designing

LESSON 12: Environment control and Automation 

LESSON 13: Access control system

LESSON 14: Auxiliary Systems BMS, EMS DCIM

Foundation in IT Service Management 

LESSON 1: Generic Concepts and Definitions

LESSON 2: Service Management as a Practice

LESSON 3: The ITIL Service Lifecycle

LESSON 4: Key Principles and Models

LESSON 5: Functions - Processes - Roles

LESSON 6: Technology and Architecture

Linux foundation Certified System Administration 

LESSON 1: Linus File Structure, Commands and Processes 

LESSON 2: Package Management systems

LESSON 3: System and Process Monitoring

LESSON 4: Disk Management 

LESSON 5: User Account and Group management

LESSON 6: Network Management

LESSON 7: Backup and Recovery Methods

LESSON 8: Linus Security Modules

LESSON 9: Basic Troubleshooting

LESSON 10: System Rescue Methods 

IC PHP Developer Fundamentals 

LESSON 1: Development environment

LESSON 2: PHP fundamentals

LESSON 3: Conditional Instruction of control and Cycles

LESSON 4: Complex data structure

LESSON 5: PHP Code Management

LESSON 6: Data recovery and Check in an HTML Form

LESSON 7: DBMS MySQL and MariaDB

Unity Certified Programmer 

Unity is the leading content-creation platform for VR/AR, real-time 3D, and mobile 2D. Unity is used by students and professionals around the world to create everything from games to movies, 3D models to VR Simulations. 

LESSON 1: Creating Code

LESSON 2: Evaluating code

LESSON 3: Navigating the Interface

LESSON 4: Debugging, Problem-Solving, and API

Microsoft 360 Certified Fundamentals 

LESSON 1: What is Microsoft 365

LESSON 2: Microsoft 365 core Services and Features

LESSON 3: Teamwork in Microsoft 365

LESSON 4: Microsoft 365 Endpoint Management

LESSON 5: Compliance Tool in Microsoft 365

LESSON 6: Microsoft 365 Cloud deployment model

Microsoft Dynamics


LESSON 1: Introduction to Dynamics 365

LESSON 2: Cloud Concepts - Principles of Cloud Computing 

LESSON 3: Explore Licensing, Onboarding, and Support Options - fundamentals

LESSON 4: Unified Operations Product - Fundamentals

LESSON 5: Managing Deployments and Releases - fundamentals

App Development 




LESSON 1: Introduction to App Development

LESSON 2: Introduction to UIKit

LESSON 3: Navigation and Workflows

LESSON 4: Building AR Apps with Xcode

LESSON 5: Tables and Persistence 

LESSON 6: Working with the Web

LESSON 7: Prototyping and project planning


PROJECT MANAGEMENT




LESSON 1: Introduction to Project management and project Concept

LESSON 2: Scope Management

LESSON 3: Schedule Management

LESSON 4: Cost Management

LESSON 5: Recourse Management

LESSON 6: Quality Management

LESSON 7: Integration management

LESSON 8: Procurement Management

LESSON 9: Communication Management

LESSON 10: Risk Management

LESSON 11: Stakeholder Management


Data Centre Design Associate (DCDA)


LESSON 1: Importance of Data Centre

LESSON 2: Availability and Causes for downtime

LESSON 3: Data Centre Standards and Best Practices 

LESSON 4: Data Centre Location Selection, building and Construction 

LESSON 5: Raised Floor / Suspended Ceiling

LESSON 6: Light Design

LESSON 7: Power Infrastructure Design - Earthing Grounding & bonding

LESSON 8: EMF considerations 

LESSON 9: Data Center Cabling Desing 

LESSON 10: Scalable Network Infrastructure Design

LESSON 11: Environment Control and Automation

LESSON 12: Access Control System 

LESSON 13: Auxiliary Systems BMS, EMS DCIM

Foundation in IT Service Management

LESSON 1: Generic Concepts and Definitions of IT Service Management

LESSON 2: Key Principles and Models

LESSON 3: Function - Processes - Roles of IT Service Management

LESSON 4: Technology and Architecture 

LESSON 5: Competence and Training

LESSON 6: The ITIL Service Lifecycle

Linux foundation Certified System Administration 

LESSON 1: Linux file Structure, Commands, and Processes

LESSON 2: Package Management Systems 

LESSON 3: System and Process Monitoring

LESSON 4: Memory - Usage Monitoring and Tuning 

LESSON 5: Disk Management

LESSON 6: User Account and Group Management

LESSON 7: System Rescue and Basic Troubleshooting

LESSON 8: Linus Security Modules

LESSON 9: Backup and Recovery Methods

IC PHP Developer Fundamentals (2)

LESSON 1: Development Environment

LESSON 2: PHP Fundamentals 

LESSON 3: conditional Instruction Control and cycles 

LESSON 4: complex data structures  

LESSON 5: PHP Code Management

LESSON 6: Data Recovery and check in an HTML Form

LESSON 7: Maintain Information in PHP

LESSON 8: The DBMS MySQL and Interaction with DBMS and MariaDB

Unity Certified Programmer

LESSON 1: Introduction 

LESSON 2: Creating and Evaluating Code

LESSON 3: Navigating the Interface 

LESSON 4: Debugging 

LESSON 5: Interpreting the API

LESSON 6: Problem solving Techniques

Microsoft 360 Certified Fundamentals 

LESSON 1: Introduction to Microsoft 365 Certified Fundamentals

LESSON 2: Teamwork in Microsoft 365

LESSON 3: Unified endpoint Management

LESSON 4: Security in Microsoft 365

LESSON 5: Introduction to Compliance Tools in Microsoft 365

LESSON 6: How to Management your Microsoft 365 Subscription

LESSON 7: Cloud Development Model

Microsoft Dynamics

LESSON 1: Introduction 

LESSON 2: Engagement apps - fundamentals 

LESSON 3: Unified Operations and Product fundamentals

LESSON 4: Explore Licensing, Onboarding, and Support Option - Fundamentals


Microsoft Certified Azure fundamentals 

LESSON 1: Introduction 

LESSON 2: Principles of cloud Computing

LESSON 3: Core Cloud Services - Azure Architecture and 

LESSON 4: Manage Services with the Azure Portal

LESSON 5: Control and organize Azure Resources with Azure Resource Manager

LESSON 6: Azure Networking Options

LESSON 7: Azure compute Options

LESSON 8: Security, responsibility and trust in Azure

Administering a SQL Database Infrastructure 

LESSON 1: Authenticating and authorizing users

LESSON 2: Assigning Server and Database Roles

LESSON 3: Authorizing User to Access Resources 

LESSON 4: Protecting Data with Encryption and Auditing

LESSON 5: SQL Server Recovery Models

LESSON 6: Backup of SQL Server Databases

LESSON 7: Monitoring SQL Server with Alerts and Notifications

LESSON 8: Managing SQL

LESSON 9: Importing and Exporting Data

LESSON 10: Troubleshooting SQL Server

LESSON 11: Configuring Security for SQL Server Agent

LESSON 12: Automating SQL Server Management 

LESSON 13: Tracing Access to SQL Server

Certified Information System Security Professional 

LESSON 1: Security and Risk Management

LESSON 2: Asset Security

LESSON 3: Security Architecture and Engineering

LESSON 4: Communication and Network Security

LESSON 5: Identity and Access Management

LESSON 6: Security Assessment and Testing

LESSON 7: Security Operations

LESSON 8: Managing SQL

LESSON 9: Security and Software Development

Performance Tuning and Optimizing SQL Database

LESSON 1: Introduction 

LESSON 2: SQL Server Architecture

LESSON 3: SQL Server I/O

LESSON 4: Database Structures

LESSON 5: SQL Server Concurrency

LESSON 6: Statistics and Index Internals

LESSON 7: Monitoring, Tracing and Baselining

LESSON 8: Plan Caching and Recompilation 

LESSON 9: Extended Events

Programing in C#

LESSON 1: Introduction to C# Syntax

LESSON 2: Creating Methods, Monitoring Applications and Exceptions

LESSON 3: Developing the Code for a Graphical Application 

LESSON 4: Creating Classes and Implementing Type-safe Collections

LESSON 5: Creating a Class Hierarchy by Using Inheritance

Java Programing 

LESSON 1: Introduction to Java

LESSON 2: Fundamental Programing Structures in Java

LESSON 3: Objects and Classes

LESSON 4: Inheritance

LESSON 5: Logging, Assertions and Exceptions

HTML and CSS programing 

LESSON 1: Introduction to HTML

LESSON 2: Building a Basic HTML Document

LESSON 3: Introduction to CSS

LESSON 4: Building and Styling HTML Text 

LESSON 5: HTML Semantic Elements

LESSON 6: Adjusting Fonts

LESSON 7: Creating, and Decorating Pages with Color

LESSON 8: Creating and Adjusting the Borders of Elements

LESSON 9: Adjusting Images and Multimedia 

LESSON 10: Creating Responsive Layout

LESSON 8: Writing Tables

LESSON 9: Building and Using HTML Forms

LESSON 10: Advance Web Page Designing

Introduction to Python Programing

LESSON 1: Introduction to Python 

LESSON 2: Perform Operations using Data Types and Operators

LESSON 3: Control flow with Decisions and Loops

LESSON 4: Perform Input and Output Operations

LESSON 5: Document and Structure Code

LESSON 6: Perform Troubleshooting and Error Handling

LESSON 7: Perform Operations using Modules and Tools

MTA 98-367 Security fundamentals 

LESSON 1: Understanding Security Layers

LESSON 2: Understanding authentication

LESSON 3: Understanding Authorization and Accounting

LESSON 4: Security Policies

LESSON 5: Protecting the Server and Client

LESSON 6: Understanding Network Security

MTA 98-366 Networking Fundamentals 

LESSON 1: Introduction to Local Area Networking

LESSON 2: Defining Networks with the OSI Model

LESSON 3: Understanding Wired and Wireless Networks

LESSON 4: Understanding Internet Protocol

LESSON 5: Implementing TCP/IP in the Command Line

LESSON 6: Working with Networking Services

LESSON 7: Defining Network Infrastructures and Network Security

LESSON 8: Internet Protocol

Certified Incident Handler

LESSON 1: Understanding Incident Handling and Response

LESSON 2: Incident Handling and response Process

LESSON 3: Forensic Readiness and First response

LESSON 4: Responding to Malware Incidents

LESSON 5: Responding to Email Security Incidents

LESSON 6: Web Application Security Incidents

LESSON 7: Cloud Security Incidents Handling

LESSON 8: Network Security Incidents

Certified Disaster Recovery / Virtualization Technology

LESSON 1: Disaster Recovery and business continuity

LESSON 2: Business continuity Management (BCM)

LESSON 3: Business Impact Analysis (BIA)

LESSON 4: Business Continuity Planning (BCP)

LESSON 5: Data Backup Strategies

LESSON 6: Data Recovery Strategies

LESSON 7: System Recovery

LESSON 8: BCP Testing, Maintenance, and Training Handling and responding to network security incidents.

LESSON 9: Risk Management

LESSON 10: Centralized and Decentralized System Recovery

Network Security Administrator

LESSON 1: Introduction

LESSON 2: Computer Network and Defense Fundamentals

LESSON 3: Network Security Threats, vulnerabilities, and Attacks.

LESSON 4: Physical Security

LESSON 5: Host Security

LESSON 6: Network Security Policy Design and Implementation 

LESSON 7: Network Security Controls, Protocols, and Devices

LESSON 8: Secure Firewall configuration and Management 

LESSON 9: Data Backup and Recovery

LESSON 10: Network Incident Response and Management

LESSON 11: Secure VPN configuration and Management  

LESSON 12: Secure IDS configuration

LESSON 13: Network Traffic Monitoring

Certified Security Specialist

LESSON 1: Introduction to Information Security fundamentals

LESSON 2: Networking fundamentals

LESSON 3: Information Security Threats and Attacks

LESSON 4: Social engineering

LESSON 5: Hacking Cycle

LESSON 6: Identification

LESSON 7: Authentication and Authorization

LESSON 8: Cryptography

LESSON 9: Intrusion Detection

LESSON 10: Firewalls

LESSON 11: Data Backup and Virtual Private Network

LESSON 12: Wireless Network Security 

LESSON 13: Web Security 

LESSON 14: Ethical Hacking and Pentesting 

LESSON 15: Incidence Response 

LESSON 16: Digital Evidence


Certified Secure Computer User

LESSON 1: Introduction Security

LESSON 2: Securing Operating Systems

LESSON 3: Malware and Antivirus

LESSON 4: Internet Security

LESSON 5: Security on Social Networking Sites

LESSON 6: Securing Email communications

LESSON 7: Data backup and Disaster Recovery

LESSON 8: Securing Network Connections

LESSON 9: Securing the Cloud

LESSON 10: Securing Mobile Devices

Certified Ethical Hacker

LESSON 1: Understanding Ethical Hacking

LESSON 2: Reconnaissance and Foot Printing

LESSON 3: Enumeration

LESSON 4: Vulnerability Analysis

LESSON 5: Scanning Networks

LESSON 6: System Hacking

LESSON 7: Malware Threats

LESSON 8: Cloud Computing

LESSON 9: IoT Hacking

LESSON 10: Cryptography

LESSON 11: Social Engineering

LESSON 12: Denial of Service

LESSON 13: Session Hijacking

LESSON 14: Evading Firewall and Honey Pots

LESSON 15: Evading IDS

LESSON 16: Hacking Web Applications

LESSON 17: SQL Injection

LESSON 18: Hacking Mobile Platform

Computer Hacking Forensic Investigator

LESSON 1: Computer Forensics in Today's World

LESSON 2: Computer Forensics Investigation Process

LESSON 3: Understanding Hard Disks and File systems

LESSON 4: Operating System Forensics

LESSON 5: Defeating Anti Forensics Techniques

LESSON 6: Data Acquisition and Duplication

LESSON 7: Network Forensics

LESSON 8: Investigating Web Attacks

LESSON 9: Database Forensics

LESSON 10: Malware Forensics

LESSON 11: Mobile Forensics

Interactive Media [Adobe flash Professional]

LESSON 1: Understanding Interactive Media

LESSON 2: Introduction to Game Design

LESSON 3: Understanding Project Management and Teamwork

LESSON 4: Understanding Project Planning

LESSON 5: Introduction to Adobe Flash Professional

LESSON 6: Animation

LESSON 7: Testing and Publishing a flash Project

LESSON 8: Presenting Design Project

LESSON 9: Creating content by Using Adobe Flash Professional

LESSON 10: Importing and Organizing content in Adobe Flash Professional

Graphic Design & Illustration

LESSON 1: Introduction to Adobe Illustrator

LESSON 2: Introduction to Project Planning, Project Management, and Teamwork

LESSON 3: Design Project review and Redesign

LESSON 4: Editing Images and Graphics

LESSON 5: Presenting Design Projects

LESSON 6: Preparing Images and Graphics for Web, Print and Video

LESSON 7: Working with Clients

Web Authoring

LESSON 1: Introduction to Adobe Illustrator

LESSON 2: Introduction to Project Planning, Project Management 

LESSON 3: Design Project review and Redesign

LESSON 4: Editing Images and Graphics

LESSON 5: Presenting Design Projects

LESSON 6: Preparing Images and Graphics for Web, Print and Video

LESSON 7: Working with Clients

Autodesk Inventor

LESSON 1: Introduction

LESSON 2: Inventor File types and Standard templates

LESSON 3: Basic Assembly constraints

LESSON 4: Ground base component of an assembly

LESSON 5: Apply an offset to constrained parts

LESSON 6: Determine the Degrees of Freedom of a component 

LESSON 7: Create a presentation Model

LESSON 8: Create drawing view based on an assembly and presentation file

LESSON 9: Apply Fillets and chamfers

LESSON 10: Create Hole Features

LESSON 11: Create revolve features

LESSON 12: Place threads

LESSON 13: Toggle Visibility of Features and Sketches

LESSON 14: Create a Pattern of features

LESSON 15: Create a Shell Feature

LESSON 16: Project Geometry

LESSON 17: Create and Modify Geometric Shapes

LESSON 18: Place threads

LESSON 19: Modify an Inventor Model

AUTOCAD

LESSON 1: Introduction to Autocad

LESSON 2: Draw Lines and rectangles

LESSON 3: Draw Circles, arcs and polygons

LESSON 4: Draw Polylines

LESSON 5: Move and Copy Object

LESSON 6: Create and Use Arrays

LESSON 7: Trim and extend Objects

LESSON 8: Offset Objects

LESSON 9: Mirror Objects

LESSON 10: Use Grip Editing

LESSON 11: Use Coordinate Systems

LESSON 12: Use Object-snap tracking

LESSON 13: Fillet and Chamfer Object

LESSON 14: Use Inquiry Commands

LESSON 15: Create Selection Sets

LESSON 16: Use Dimensions

LESSON 17: Add and Modify Text

LESSON 18: Inset Blocks

LESSON 19: Control Layer Visibility

LESSON 20: Alter Layer assignments for Objects