Our Top 15 IT Labs Trending Today
Microsoft Endpoint Administrator (MD-102) Hands-On Labs
- Title: Practice, Exercise and Master Create and Configure a Microsoft 365 Account
- Title: Practice, Exercise and Master Deploy a Windows Client using Autopilot
- Title: Practice, Exercise and Master Configure Remote Management
- Title: Practice, Exercise and Master Implement Intune Compliance Policies
- Title: Practice, Exercise and Master Manage Device Lifecycle using Intune
- Title: Practice, Exercise and Master Manage Device Configuration using Intune
- Title: Practice, Exercise and Master Monitoring Devices using Intune
- Title: Practice, Exercise and Master Managing Device Updates using Intune
- Title: Practice, Exercise and Master Code of Ethics
- Title: Practice, Exercise and Master Personnel Security policies
- Title: Practice, Exercise and Master Employment candidate screening
- Title: Practice, Exercise and Master Employment agreements and policies
- Title: Practice, Exercise and Master Employment termination processes
- Title: Practice, Exercise and Master Vendor, consultant and contractor controls
- Title: Practice, Exercise and Master Risk Management
- Title: Practice, Exercise and Master Risk Estimation
- Title: Practice, Exercise and Master Monetary vales used in calculation of risk
- Title: Practice, Exercise and Master Risk Mitigation
- Title: Practice, Exercise and Master Identify different Windows Editions
- Title: Practice, Exercise and Master Explore Upgrade Pathways to Newer Windows Editions
- Title: Practice, Exercise and Master Differentiate between different Windows Editions
- Title: Practice, Exercise and Master Identify Windows In-place Upgrade Pathways
- Title: Practice, Exercise and Master Command-Line Navigation Tools
- Title: Practice, Exercise and Master Networking Command-Line Tools
- Title: Practice, Exercise and Master Disk Management Command-Line Tools
- Title: Practice, Exercise and Master System Management Command-Line Tools
- Title: Practice, Exercise and Master Navigation Commands
- Title: Practice, Exercise and Master The Ipconfig Command
- Title: Practice, Exercise and Master How to Configure a relying party trust for the claims web application
- Title: Practice, Exercise and Master How to Configure claim rules for the relying party trust
- Title: Practice, Exercise and Master How to Create a claims provider trust for the claims web application
- Title: Practice, Exercise and Master How to Configure claim rules for the claims provider trust
- Title: Practice, Exercise and Master How to integrate and troubleshoot advanced authentication and authorization technologies to support enterprise security objectives.
- Title: Practice, Exercise and Master Extracting Hashes from a System
- Title: Practice, Exercise and Master Cracking Extracted Hashes
- Title: Practice, Exercise and Master Cracking Passwords
- Title: Practice, Exercise and Master How to Use Pwdump Tool to Extract a Hash
- Title: Practice, Exercise and Master How to Use a Wordlist to Crack the Extracted Hash
- Title: Practice, Exercise and Master How to Use a Password Cracking Tool to Crack the Password
- Title: Practice, Exercise and Master Power BI Desktop Sandbox
- Title: Practice, Exercise and Master Working with a variety of data sources
- Title: Practice, Exercise and Master Manipulating your data and using data modelling in the Power BI Desktop environment
- Title: Practice, Exercise and Master How to work with measures and columns
- Title: Practice, Exercise and Master How to perform calculations
- Title: Practice, Exercise and Master How to apply filters
- Title: Practice, Exercise and Master How to work with reports on PowerBi.com
- Title: Practice, Exercise and Master How to perform advanced calculation, time intelligence and agreegations
- Title: Practice, Exercise and Master How to create advanced visualization, tables, advanced filtering and slicing
- Title: Practice, Exercise and Master How to create and share Power BI dashboards
- Title: Practice, Exercise and Master Explore Resource Groups in the Azure Portal
- Title: Practice, Exercise and Master Create an Azure resource in a Resource Group
- Title: Practice, Exercise and Master Delete an Azure resource in a Resource Group
- Title: Practice, Exercise and Master Navigate the Azure Portal and identify Resource Groups
- Title: Practice, Exercise and Master Different Virtual Networking Components
- Title: Practice, Exercise and Master Creating an Azure Virtual Network
- Title: Practice, Exercise and Master Connecting Different Azure Networks
- Title: Practice, Exercise and Master Exploring Azure Networking Components
- Title: Practice, Exercise and Master Configuring a Virtual Network
- Title: Practice, Exercise and Master Create an Azure Virtual Machine using the Azure portal
- Title: Practice, Exercise and Master How to Identify the core AWS services
- Title: Practice, Exercise and Master How to Identify AWS networking services
- Title: Practice, Exercise and Master Creating a Virtual Machine using AWS Management Console
- Title: Practice, Exercise and Master How to Create a Virtual Private Cloud (VPC)
- Title: Practice, Exercise and Master How to Create a Virtual Machine in the AWS Management Console
- Title: Practice, Exercise and Master How to Describe the categories of services on AWS (compute, storage, network, database)
- Title: Practice, Exercise and Master How to Identify AWS compute services
- Title: Practice, Exercise and Master How to Create a Database in AWS
- Title: Practice, Exercise and Master How to Create a Storage Solution in AWS
- Title: Practice, Exercise and Master How to Create a Virtual Private Cloud (VPC)
- Title: Practice, Exercise and Master IoT Countermeasures Challenges of OT
- Title: Practice, Exercise and Master OT Vulnerabilities
- Title: Practice, Exercise and Master OT Attacks
- Title: Practice, Exercise and Master OT Hacking Methodology and Tools
- Title: Practice, Exercise and Master OT Countermeasures
- Title: Practice, Exercise and Master Cloud Computing Services
- Title: Practice, Exercise and Master Cloud Deployment Models
- Title: Practice, Exercise and Master Benefits of Cloud Computing
- Title: Practice, Exercise and Master Cloud Service Providers
- Title: Practice, Exercise and Master Container Technology
- Title: Practice, Exercise and Master Enabling Windows Advanced Options
- Title: Practice, Exercise and Master Performing Backup and Restore in Windows
- Title: Practice, Exercise and Master How to Create a System Image Backup
- Title: Practice, Exercise and Master How to Enable System Restore Point
- Title: Practice, Exercise and Master How to Create a System Restore Point
- Title: Practice, Exercise and Master How to Rollback to an Earlier State Using System Restore
- Title: Practice, Exercise and Master How to Enable Advanced Startup
- Title: Practice, Exercise and Master How to Perform a Full Backup in Windows
- Title: Practice, Exercise and Master How to Perform an Incremental Backup in Windows
- Title: Practice, Exercise and Master How to Restore Backed Up Data
- Title: Practice, Exercise and Master Describing differences between Next-Generation Firewalls and Traditional Firewalls
- Title: Practice, Exercise and Master the Workings of NGIPS (Next-gen InstrusionPrevention System)
- Title: Practice, Exercise and Master the TCP/IP protocol
- Title: Practice, Exercise and Master the UDP protocol
- Title: Practice, Exercise and Master the Purpose of CISCO DNA (Digital Network Architecture)
- Title: Practice, Exercise and Master the Purpose of CISCO DNA (Digital Network Architecture)
- Title: Practice, Exercise and Master the Purpose of CISCO WLC (Wireless LAN Controller)
- Title: Practice, Exercise and Master the Purpose of Endpoints and Servers
- Title: Practice, Exercise and Master the Difference between 2 Tier and 3 Tier Architecture
- Title: Practice, Exercise and Master the Characteristics of Spine-Leaf Network Topology
- Title: Practice, Exercise and Master How to Open, read, and close text files in Python programs
- Title: Practice, Exercise and Master Working with Files
- Title: Practice, Exercise and Master Making Copies of Text Files
- Title: Practice, Exercise and Master How to Copy the contents of one text file to another in Python programs
- Title: Practice, Exercise and Master Merging Mails
- Title: Practice, Exercise and Master How to Merge text files in Python programs
- Title: Practice, Exercise and Master Creating a Simple Calculator
- Title: Practice, Exercise and Master How to Accept console inputs and print formatted output in Python programs
- Title: Practice, Exercise and Master Processing Command-Line Arguments
- Title: Practice, Exercise and Master How to Use command-line arguments in a Python program
- Title: Practice, Exercise and Master Deploy a Smart Contract to a public test network
- Title: Practice, Exercise and Master Interact with the deployed contract
- Title: Practice, Exercise and Master Confirm Contract deployment and functionality
- Title: Practice, Exercise and Master Now answer the assessment questions
- Title: Practice, Exercise and Master how to Design and implement an Ethereum Smart Contract for project crowdfunding
- Title: Practice, Exercise and Master how to One Smart Contract per project to be funded
- Title: Practice, Exercise and Master How to Create your own token on the Ethereum network by Writing a token Smart Contract
- Title: Practice, Exercise and Master How to Create your own token on the Ethereum network by Deploying the Smart Contract to the Ropsten test network using Metamask
- Title: Practice, Exercise and Master How to Publish verification source code to Ropsten
- Title: Practice, Exercise and Master How to Add your new tokens to your wallet
- Title: Practice, Exercise and Master AI Analytics Dashboard
- Title: Practice, Exercise and Master AI Applications Across Industries
- Title: Practice, Exercise and Master A Chief AI Architect's First Presentation to CIO
- Title: Practice, Exercise and Master An example of an AI Architect's Decision
- Title: Practice, Exercise and Master Comparing and Contrasting AI Architecture Patterns
- Title: Practice, Exercise and Master Applying AI Explainability Methods to New Scenarios
- Title: Practice, Exercise and Master Applying AI Explainability Methods to Recognize Artistic Style
- Title: Practice, Exercise and Master Network Scanning
- Title: Practice, Exercise and Master Remote Access
- Title: Practice, Exercise and Master Website Vulnerability Search
- Title: Practice, Exercise and Master Packet Capture and Analysis
- Title: Practice, Exercise and Master Packet Filtering
- Title: Practice, Exercise and Master Program Verification
- Title: Practice, Exercise and Master Scripting for Analysis
- Title: Practice, Exercise and Master Multifaceted Service Test
- Title: Practice, Exercise and Master Implementing Web Browser Best Practices
- Title: Practice, Exercise and Master Preventing Brute Force Attacks
- Title: Practice, Exercise and Master Installing the SANS Investigative Forensic Toolkit (SIFT)
- Title: Practice, Exercise and Master
- Title: Practice, Exercise and Master Auditing Network Security
- Title: Practice, Exercise and Master Applying Caesar Cipher Encryption Technique
- Title: Practice, Exercise and Master Implementing Secure Coding Techniques
- Title: Practice, Exercise and Master Implementing Symmetric Encryption
Certified Information Security Manager (CISM) 2022
- Title: CISM 2022: Information Security Governance
- Title: CISM 2022: Business Continuity & Security
- Title: CISM 2022: Incident Response
- Title: CISM 2022: Security Standards
- Title: CISM 2022: Managing Risk
- Title: CISM 2022: Data Privacy