** Trust The 35000+ Students Who Are Learning with Us & Kick Starting Their Career! ** Deal Price is Active; Save Now- £405! Offer Ends Soon; Hurry Up!! Are you looking to improve your current abilities or make a career move? Our unique CompTIA Network+ Certification (N10-007) Course might help you get there! Expand your expertise with high-quality training - study and get an expertly designed, great-value training experience. Learn from industry professionals and quickly equip yourself with the specific knowledge and skills you need to excel in your chosen career through the online training course. This online training course is accredited by CPD with 20 CPD points for professional development. Students can expect to complete this training course in around 23 hours. You'll also get dedicated expert assistance from us to answer any queries you may have while studying our course. The course is broken down into several in-depth modules to provide you with the most convenient and rich learning experience possible. Upon successful completion of the course, you will receive an instant e-certificate as proof of comprehensive skill development and competency. Add these amazing new skills to your resume and boost your employability by simply enrolling on this course. With this comprehensive course, you can achieve your dreams and train for your ideal career. The course provides students with an in-depth learning experience that they can work through at their own pace to enhance their professional development. You'll get a Free Student ID card by enrolling in this course. This ID card entitles you to discounts on bus tickets, movie tickets, and library cards. Enrolling on the course will ensure that you land your dream career faster than you thought possible. Stand out from the crowd and train for the job you want with the program. Experts created the CompTIA Network+ Certification (N10-007) course to provide a rich and in-depth training experience for all students who enrol in it. Enrol in the course right now and you'll have immediate access to all of the course materials. Then, from any internet-enabled device, access the course materials and learn when it's convenient for you. Start your learning journey straight away with this course and take a step toward a brighter future! Why Prefer this CompTIA Network+ Certification (N10-007) Course? Opportunity to earn a certificate accredited by CPD after completing this course Student ID card with amazing discounts - completely for FREE! (£10 postal charges will be applicable for international delivery) Standards-aligned lesson planning Innovative and engaging content and activities Assessments that measure higher-level thinking and skills Complete the program in your own time, at your own pace Each of our students gets full 24/7 tutor support *** Course Curriculum *** Here is the curriculum breakdown of course: Section 01: Introduction Introduction Section 02: Network Models What is a Model? OSI vs. TCP/IP Model Walking Through OSI and TCP/IP Meet the Frame The MAC Address Broadcast vs. Unicast Introduction to IP Addressing Packets and Ports Section 03: Cabling and Topology Network Topologies Coaxial Cabling Twisted Pair Cabling Cat Ratings Fiber Optic Cabling Fire Ratings Legacy Network Connections Section 04: Ethernet Basics What is Ethernet? Ethernet Frames Early Ethernet The Daddy of Ethernet, 10BaseT Terminating Twisted Pair Hubs vs. Switches Section 05: Modern Ethernet 100BaseT Connecting Switches Gigabit Ethernet and 10-Gigabit Ethernet Transceivers Connecting Ethernet Scenarios Section 06: Installing a Physical Network Introduction to Structured Cabling Terminating Structured Cabling Equipment Room Alternative Distribution Panels Testing Cable Troubleshooting Structured Cabling, Part 1 Troubleshooting Structured Cabling, Part 2 Using a Toner and Probe Wired Connection Scenarios Section 07: TCP/IP Basics Introduction to IP Addressing and Binary Introduction to ARP Classful Addressing Subnet Masks Subnetting with CIDR More CIDR Subnetting Practice Dynamic and Static IP Addressing Rogue DHCP Servers Special IP Addresses IP Addressing Scenarios Section 08: Routing Introducing Routers Understanding Ports Network Address Translation Implementing NAT Forwarding Ports Tour of a SOHO Router SOHO vs. Enterprise Static Routes Dynamic Routing RIP OSPF BGP Section 09: TCP/IP Applications TCP and UDP ICMP and IGMP Handy Tools Introduction to Wireshark Introduction to netstat Web Servers FTP E-mail Servers and Clients Securing E-mail Telnet and SSH Network Time Protocol Network Service Scenarios Section 10: Network Naming Understanding DNS Applying DNS The Hosts File Net Command Windows Name Resolution Dynamic DNS DNS Troubleshooting Section 11: Securing TCP/IP Making TCP/IP Secure Symmetric Encryption Asymmetric Encryption Cryptographic Hashes Identification Access Control AAA Kerberos/EAP Single Sign-On Certificates and Trust Certificate Error Scenarios Section 12: Advanced Networking Devices Understanding IP Tunneling Virtual Private Networks Introduction to VLANs InterVLAN Routing Interfacing with Managed Switches Switch Port Protection Port Bonding Port Mirroring Quality of Service IDS vs. IPS Proxy Servers Load Balancing Device Placement Scenarios Section 13: IPv6 Introduction to IPv6 IPv6 Addressing IPv6 in Action IPv4 and IPv6 Tunneling Section 14: Remote Connectivity Telephony Technologies Optical Carriers Packet Switching Connecting with Dial-up Digital Subscriber Line (DSL) Connecting with Cable Modems Connecting with Satellites ISDN and BPL Remote Desktop Connectivity Advanced Remote Control Systems Section 15: Wireless Networking Introduction to 802.11 802.11 Standards Power over Ethernet (PoE) Antennas Wireless Security Standards Implementing Wireless Security Threats to Your Wireless Network Retro Threats Wi-Fi Protected Setup (WPS) Enterprise Wireless Installing a Wireless Network Wireless Scenarios More Wireless Scenarios Section 16: Virtualization and Cloud Computing Virtualization Basics Cloud Ownership Cloud Implementation Your First Virtual Machine NAS and SAN Platform as a Service (PaaS) Software as a Service (SaaS) Infrastructure as a Service (IaaS) Section 17: Mobile Networking Cellular Technologies Mobile Connectivity Deploying Mobile Devices Mobile Access Control Section 18: Building a Real-World Network Network Types Network Design Power Management Unified Communications Network Documentation Contingency Planning Predicting Hardware Failure Backups Section 19: Managing Risk What is Risk Management? Security Policies Change Management1 User Training Standard Business Documentation Mitigating Network Threats High Availability Section 20: Protecting Your Network Denial of Service Malware Social Engineering Access Control Man-in-the-Middle Introduction to Firewalls Firewalls DMZ Hardening Devices Physical Security Controls Testing Network Security Network Protection Scenarios Section 21: Network Monitoring SNMP Documenting Logs System Monitoring SIEM (Security Information and Event Management) Section 22: Network Troubleshooting Network Troubleshooting Theory Assessment Process Once you have completed all the modules in the CompTIA Network+ Certification (N10-007) course, you can assess your skills and knowledge with an optional assignment. Our expert trainers will assess your assignment and give you feedback afterwards. Show off Your New Skills with a Certificate of Completion The learners have to complete the assessment of this course to achieve the CPD accredited certificate. Digital certificates can be ordered for only £10. The learner can purchase printed hard copies inside the UK for £29, and international students can purchase printed hard copies for £39. CPD 20 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Is This CompTIA Network+ Certification (N10-007) Course Right for You? Anyone interested in learning more about this subject should take this course. This course will help you grasp the basic concepts as well as develop a thorough understanding of the subject. All are welcome to take this course. There are no prerequisites for enrolment, and you can access the course materials from any location in the world. Requirements The CompTIA Network+ Certification (N10-007) program does not require any prior knowledge; everyone may participate! This course is open to anyone interested in learning from anywhere in the world. Every student must be over the age of 16 and have a passion for learning and literacy. This 100% online course can be accessed from any internet-connected device, such as a computer, tablet, or smartphone. This course allows you to study at your speed and grow a quality skillset. Career path After completing this CompTIA Network+ Certification (N10-007) Course, you are to start your career or begin the next phase of your career in this field. Our entire course will help you to gain a position of respect and dignity over your competitors. The certificate enhances your CV and helps you find work in the field concerned.
Duration 5 Days 30 CPD hours This course is intended for Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks. Overview In interactive labs, you will explore firewall policies, user authentication, basic VPNs, explicit proxy, virus detection, web filtering, application control and more. These administrative fundamentals will provide you with a solid understanding of how to integrate and maintain basic network security. In the last three days you will review topics including features commonly used in complex or larger enterprise/MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, security-as-a-service (SaaS), advanced IPsec VPN, IPS, SSO, certificates, data leak prevention, diagnostics, and fine-tuning performance. The Fortinet NSE 4 Bundle is a 5-day event that provides the basic configuration and administration of the most commonly used features of FortiGate appliances and a selection of advanced FortiGate networking and security features. The Fortinet NSE 4 Bundle is a 5-day event that provides the basic configuration and administration of the most commonly used features of FortiGate appliances and a selection of advanced FortiGate networking and security features. Additional course details: Nexus Humans NSE 4 Bundle training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the NSE 4 Bundle course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is designed for students who already have experience creating Modern SharePoint sites and populating them with content, who want to learn advanced features to extend SharePoint's capabilities, make information easier to find and manage, use SharePoint features to improve governance and compliance, and improve the security of information and services within the SharePoint environment. Overview Create a custom site template to reduce the time spent creating similarly configured SharePoint sites. Configure managed metadata, including custom term sets, content types, and metadata-based navigation. Control access through permissions. Improve overall security of sites, lists, libraries, folders, list items, and documents. Microsoft© SharePoint©, in conjunction with the Microsoft 365? productivity and office automation suite, provides tools to create and manage a corporate intranet, facilitate content sharing and collaboration, and enable users to create, access, store, and track documents and data in a central location. Users who already have experience as SharePoint site members and owners may be ready to move on to more advanced site-building tasks such as using custom site templates, custom themes, applying advanced permissions settings, improving security, and preparing sites to support governance and compliance. Advanced site builders may be ready to undertake more advanced site management tasks, working in conjunction with their SharePoint Administrator to create and use custom site templates, term sets and metadata, manage information governance and compliance, and get deeper into SharePoint security configuration. This course focuses on these advanced site-building and administration tasks. Prerequisites To ensure your success in this course, you should have SharePoint site user skills such as the ability to view and enter data in SharePoint lists and libraries, and to navigate a typical SharePoint site. You should also have intermediate site builder skills such as the ability to create a SharePoint site, apply a site template, populate sites with pages, create lists and libraries, and connect a site to a hub site. NOTE: This course was developed using Microsoft 365 Business Standard edition. If you opt to use one of the Enterprise editions, be sure to key the course activities before you deliver the class so you will be able to anticipate any differences that students might see with the edition you use. Lesson 1: Creating Custom Site Templates Topic A: Prepare a Site Script Topic B: Generate and Use a Custom Site Template Lesson 2: Managing Content Services Topic A: Plan and Configure Managed Metadata Topic B: Create and Manage Content Types Topic C: Use Managed Metadata for Navigation and Filtering Lesson 3: Controlling Access Through Permissions Topic A: Assign Permissions Topic B: Manage Permissions Inheritance Lesson 4: Improving Security Topic A: Manage Access at the Site Level Topic B: Manage Access at the Tenant Level
Duration 3 Days 18 CPD hours This course is intended for This course is intended for networking and security professionals involved in the administration and support of a security infrastructure using FortiGate appliances. Overview Monitor traffic passing through FortiGate Optimize FortiGate memory usage Diagnose using FortiGate tools such as the built-in sniffer and ''diagnose debug flow'' command Monitor statistics for user traffic, traffic shaping, user authentication, IPsec, web proxy, BGP, OSPF and HA Troubleshoot issues with conserve mode, high CPU, firewall policies, session helpers, user authentication, *IPsec, FortiGuard, UTM inspection, explicit web proxy, routing, and HA Describe the processing flow of FortiGate packet inspection Configure FortiGate for external BGP and OSPF This 3-day class provides more in-depth work with FortiGate infrastructure and architecture, combined with enhanced troubleshooting methods and tools to isolate and fix the most common issues in networks with FortiGate devices. Module 1: Security Fabric Configuring the Security Fabric Troubleshooting: Security Fabric Physical and logical topology views Module 2: FortiOS Architecture System information Module 3: System Troubleshooting Crash Logs Module 4: Traffic and Session Monitoring Exploring the session table Troubleshooting: Connectivity issues Module 5: Routing Failover of existing sessions Troubleshooting: Routing Module 6: FortiGuard Troubleshooting: Local FDS issue Troubleshooting: Rating lookups Module 7: Central Management FortiManager and registration Module 8: OSPF Configuring OSPF Troubleshooting: OSPF Module 9: Web Filtering and Antivirus Configuring Web Filtering and AV Troubleshooting: Web Filetering Troubleshooting: Antivirus Module 10: IPS Configuring IPS IPS custom signatures Module 11: BGP Configuring BGP Troubleshooting: BGHP neighbor Troubleshooting: BGP routing Configuring prefix lists Module 12: IPsec Troubleshooting: IPsec VPN Manager Module 13: Auto Discovery VPN Configuring ADVPN and IBGP Troubleshooting: OSPF and BGP' Additional course details: Nexus Humans Enterprise Firewall (NSE 7) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Enterprise Firewall (NSE 7) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
CCTV Surveillance, Close Protection, Cyber Security & Lifeguard Training Are you looking for any course like CCTV Operator Training to keep your community safe? We have designed an amazing CCTV Operator Training course for you to train about this instrument and its activities. This CCTV Operator Training will teach you everything to getting into an exciting and rewarding field. From the CCTV Operator Training, you'll learn about the different types of CCTV systems and how to operate them effectively. Also, the CCTV Operator Training teaches how to identify and report suspicious activity. Moreover, the CCTV Operator Training explains the legal and ethical considerations of CCTV operation. overall, the CCTV Operator Training is perfect for learning how to protect your data. Enrol our CCTV Operator Training to learn about monitoring CCTV footage so that you can report any suspicious activity with proper proof. Learning Outcome of CCTV Operator Training After the CCTV Operator Training completion learners will know about: The introduction to CCTV systems. CCTV Operator Training teaches CCTV camera technology. Video signals and transmission are also described in the CCTV Operator Training. CCTV Operator Training elaborates on the CCTV recording techniques and storage system. Monitoring, control, CCTV system setup and configuration are included in this CCTV Operator Training. CCTV Operator Training involves CCTV system maintenance and troubleshooting methods. Legal and ethical considerations are beautifully described in this CCTV Operator Training. You will learn to handle emergency response and incident handling with the help of this CCTV Operator Training. Main Course: CCTV Operator Training Free Courses are including with this CCTV Operator Training Course Along with The CCTV Operator Training Course, We Offer a free Close Protection Course Along with The CCTV Operator Training Course, We Offer a free Cyber Security Course Along with The CCTV Operator Training Course, We Offer a free Lifeguard Training Course Special Offers of this CCTV Operator Training Course This CCTV Operator Training Course includes a FREE PDF Certificate. Lifetime access to this CCTV Operator Training Course Instant access to this CCTV Operator Training Course Get FREE Tutor Support from Monday to Friday in this CCTV Operator Training Course [ Note: Free Digital certificate as soon as completing the CCTV Operator Training Course] CCTV Surveillance, Close Protection, Cyber Security & Lifeguard Training Embark on an enriching journey with our CCTV Operator Training, designed to equip you with the essential skills for a compelling and gratifying career. Throughout the program, you will delve into diverse aspects, including an in-depth understanding of various CCTV systems and the proficient operation thereof. The curriculum not only imparts knowledge on effective system utilization but also guides you in identifying and reporting suspicious activities. Furthermore, our CCTV Operator Training sheds light on the legal and ethical dimensions of CCTV operation. In essence, this comprehensive training is an ideal resource for mastering the art of safeguarding your data. Who is this course for? CCTV Surveillance, Close Protection, Cyber Security & Lifeguard Training This CCTV Operator Training is suitable for anyone interested in understanding the intricacies of CCTV technology. Requirements CCTV Surveillance, Close Protection, Cyber Security & Lifeguard Training To enrol in this CCTV Operator Training Course, students must fulfil the following requirements. To join in our CCTV Operator Training Course, you must have a strong command of the English language. To successfully complete our CCTV Operator Training Course, you must be vivacious and self driven. To complete our CCTV Operator Training Course, you must have a basic understanding of computers. A minimum age limit of 15 is required to enrol in this CCTV Operator Training Course. Career path CCTV Surveillance, Close Protection, Cyber Security & Lifeguard Training After completing the CCTV Operator Training, various job opportunities will be open for you. Such as: Entry-level CCTV Operator Experienced CCTV Operator Senior CCTV Operator CCTV Control Room Manager
Explore capture-the-flag exercises that will strengthen your ethical hacking skills
This course covers the important topics needed to pass the AWS Certified Data Analytics-Specialty exam (AWS DAS-C01). You will learn about Kinesis, EMR, DynamoDB, and Redshift, and get ready for the exam by working through quizzes, exercises, and practice exams, along with exploring essential tips and techniques.
Duration 1 Days 6 CPD hours This course is intended for Cybersecurity Essentials provides foundational knowledge in cybersecurity and is recommended for all non-technical professionals who wish to develop an understanding of cyber safety. Overview After completing this course, students will be able to: Identify and reduce human errors that put organizations at risk for a cyber-attacks. Define Ransomware, Phishing, and Data Breaches to understand the differences. Identify the motives of hackers. Assess how data breaches occur. Develop a plan on how to protect accounts and privacy. Create a strong and secure password. Work in a secure manner while using remote Wi-Fi access. Safely use Virtual Private Networks (VPN). Identify vulnerabilities in home networks to keep them secure. Identity different social engineering techniques e.g. phishing, vishing. Detect social engineering attempts and prevent potential breaches. Prevent hackers from accessing a Mobile phone. Cybersecurity Essentials was developed using unparalleled learning methodology that prepares cadets for the Israeli Cyber and Intelligence Unit. It is designed to tackle human error by helping develop an advanced understanding and skills to protect individuals and organizations against the most common cyber threats. INTRODUCTION TO CYBERSECURITY Introduction to the world of cybersecurity; basic terminology, and why cybersecurity is so important. Review of famous cyber-attacks. ACCOUNTS & CREDENTIALS SECURITY One of the most common elements linking cyber-attacks is compromised or weak credentials. Learn different ways hackers can acquire passwords, and what to do when accounts have been compromised. How to prevent such attacks including best protection methods and password management and introduction to tools for testing and creating strong passwords. REMOTE SECURITY: WI-FI & VPN Evaluate main risks that arise when using public and non-protected Wi-Fi networks. Differentiate between private and public Wi-Fi networks, define what a VPN is and how to use it, and how to browse safely in remote environments. SOCIAL ENGINEERING How hackers take advantage of ?human-based vulnerabilities?. Define social engineering and the different types of attacks that can leverage social engineering, such as phishing or vishing. Learn how to detect social engineering attempts and prevent future breaches. MOBILE SECURITY Minimize the risk of an attack on mobile device and understand basic security principles for mobile applications. Learn how to protect photos, browsing history, text messages, and confidential business information such as emails, documents, access permission and more. Additional course details: Nexus Humans Cybersecurity Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cybersecurity Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
DNS training course description This three-day hands on DNS training course studies both the UNIX BIND and the Microsoft (MS DNS) implementations. The course starts with the big picture of how DNS works, then client configuration. Primary and secondary servers are then configured, progressing to DDNS, subdomains and security issues. Hands on sessions follow all sections ensuring that troubleshooting techniques are used throughout the course. Students choose whether to use Windows or UNIX for the hands on sessions. What will you learn Describe the architecture of DNS. Explain how DNS works. Install, configure, maintain and troubleshoot DNS DNS training course details Who will benefit: Technical staff wanting to learn DNS including: Network personnel System administrators. Prerequisites: UNIX Fundamentals (or Windows knowledge). TCP/IP foundation for engineers. Duration 3 days DNS training course contents What is DNS? Hostnames, Name resolution, host files, host file problems, What is DNS? The DNS namespace, TLDs, gTLDs, registering domains, Nameservers, how DNS works. Hands on Testing DNS servers on the Internet. DNS clients Ways to use DNS, dynamic and static configuration, multiple nameservers, domain name, searchlist, resolution issues, testing the configuration. Hands on Client configuration. DNS server software Implementations, Microsoft, BIND, daemons and services, installation, starting and stopping servers. Hands on Setting up a DNS server. DNS zone files What is a zone, Zone file overview, Forward zones, Reverse zones, Resource records, A records, PTR, CNAME, Root hints, local zone file. BIND and Microsoft configuration. Hands on Server configuration files. NS and applications MX records, Mail server load balancing, SPF, SRV records, VoIP and SRV, Microsoft and SRV, NAPTR. Hands on Testing records with dig and nslookup. DNS slaves and other servers DNS server types, Server resilience, Slaves, Zone transfers, SOA records, Serial numbers, recommendations, polling based zone transfers, NOTIFY, AD integration, DNS caching, Negative caching, TTL, Caching only servers. Hands on Masters, slaves and zone transfers. The DNS protocol The DNS stack, DNS port numbers, DNS queries, The DNS header, header section format, question format, other section format. Hands on Troubleshooting DNS with Wireshark. Dynamic DNS DHCP, DDNS, IXFR, WINS integration. Hands on Dynamic DNS. Subdomains Root servers, root server selection, Authority, delegation, NS records, subdomain with and without delegation, reverse delegation. Hands on Delegation, setting up a subdomain server. DNS security Restricting queries, DNS and firewalls, Split DNS, forwarders, internal root servers, the use of proxy servers, DNSSEC, TSIG. Hands on Hardening a DNS server. DNS and IPv6 What is IPv6, IPv6 addressing, IPv6 DNS issues, AAAA, IPv6 reverse delegation. Troubleshooting DNS Problem solving, DNS troubleshooting, Zone file checking, Some common errors, Log files, tools, nslookup, dig, host, DNS design, performance, load balancing. Hands on Putting it all together. Summary Useful books, Internet sites, RFCs. Appendix: ENUM What is ENUM, How ENUM works, NAPTR.
Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in designing and implementing DevOps processes or in passing the Microsoft Azure DevOps Solutions certification exam. This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms Prerequisites Successful learners will have prior knowledge and understanding of: Cloud computing concepts, including an understanding of PaaS, SaaS, and IaaS implementations. Both Azure administration and Azure development with proven expertise in at least one of these areas. Version control, Agile software development, and core software development principles. It would be helpful to have experience in an organization that delivers software. AZ-104T00 - Microsoft Azure Administrator AZ-204T00: Developing Solutions for Microsoft Azure 1 - Introduction to DevOps What is DevOps? Explore the DevOps journey Identify transformation teams Explore shared goals and define timelines 2 - Choose the right project Explore greenfield and brownfield projects Decide when to use greenfield and brownfield projects Decide when to use systems of record versus systems of engagement Identify groups to minimize initial resistance Identify project metrics and key performance indicators (KPIs) 3 - Describe team structures Explore agile development practices Explore principles of agile development Define organization structure for agile practices Explore ideal DevOps team members Enable in-team and cross-team collaboration Select tools and processes for agile practices 4 - Choose the DevOps tools What is Azure DevOps? What is GitHub? Explore an authorization and access strategy Migrate or integrate existing work management tools Migrate or integrate existing test management tools Design a license management strategy 5 - Plan Agile with GitHub Projects and Azure Boards Link GitHub to Azure Boards Configure GitHub Projects Manage work with GitHub Project boards Customize Project views Collaborate using team discussions Agile Plan and Portfolio Management with Azure Boards 6 - Introduction to source control Explore DevOps foundational practices What is source control? Explore benefits of source control Explore best practices for source control 7 - Describe types of source control systems Understand centralized source control Understand distributed source control Explore Git and Team Foundation Version Control Examine and choose Git Understand objections to using Git Describe working with Git locally 8 - Work with Azure Repos and GitHub Migrate from TFVC to Git Use GIT-TFS Develop online with GitHub Codespaces 9 - Structure your Git Repo Explore monorepo versus multiple repos Implement a change log 10 - Manage Git branches and workflows Explore branch workflow types Explore feature branch workflow Explore Git branch model for continuous delivery Explore GitHub flow Explore fork workflow Version Control with Git in Azure Repos 11 - Collaborate with pull requests in Azure Repos Collaborate with pull requests Examine GitHub mobile for pull request approvals 12 - Identify technical debt Examine code quality Examine complexity and quality metrics Measure and manage technical debt Integrate other code quality tools Plan effective code reviews 13 - Explore Git hooks Implement Git hooks 14 - Plan foster inner source Explore foster inner source Implement the fork workflow Describe inner source with forks 15 - Manage Git repositories Work with large repositories Purge repository data Manage releases with GitHub Repos Automate release notes with GitHub 16 - Explore Azure Pipelines Explore the concept of pipelines in DevOps Describe Azure Pipelines Understand Azure Pipelines key terms 17 - Manage Azure Pipeline agents and pools Choose between Microsoft-hosted versus self-hosted agents Explore job types Explore predefined agent pool Understand typical situations for agent pools Communicate with Azure Pipelines Communicate to deploy to target servers Examine other considerations Describe security of agent pools Configure agent pools and understanding pipeline styles 18 - Describe pipelines and concurrency Understand parallel jobs Estimate parallel jobs Describe Azure Pipelines and open-source projects Explore Azure Pipelines and Visual Designer Describe Azure Pipelines and YAML 19 - Explore continuous integration Learn the four pillars of continuous integration Explore benefits of continuous integration Describe build properties Enable Continuous Integration with Azure Pipelines 20 - Implement a pipeline strategy Configure agent demands Implement multi-agent builds Explore source control types supported by Azure Pipelines 21 - Integrate with Azure Pipelines Describe the anatomy of a pipeline Understand the pipeline structure Detail templates Explore YAML resources Use multiple repositories in your pipeline 22 - Introduction to GitHub Actions What are Actions? Explore Actions flow Understand workflows Describe standard workflow syntax elements Explore events Explore jobs Explore runners Examine release and test an action 23 - Learn continuous integration with GitHub Actions Describe continuous integration with actions Examine environment variables Share artifacts between jobs Examine Workflow badges Describe best practices for creating actions Mark releases with Git tags Create encrypted secrets Use secrets in a workflow Implement GitHub Actions for CI/CD 24 - Design a container build strategy Examine structure of containers Work with Docker containers Understand Dockerfile core concepts Examine multi-stage dockerfiles Examine considerations for multiple stage builds Explore Azure container-related services Deploy Docker containers to Azure App Service web apps 25 - Introduction to continuous delivery Explore traditional IT development cycle What is continuous delivery? Move to continuous delivery Understand releases and deployments Understand release process versus release 26 - Create a release pipeline Describe Azure DevOps release pipeline capabilities Explore release pipelines Explore artifact sources Choose the appropriate artifact source Examine considerations for deployment to stages Explore build and release tasks Explore custom build and release tasks Explore release jobs Configure Pipelines as Code with YAML 27 - Explore release recommendations Understand the delivery cadence and three types of triggers Explore release approvals Explore release gates Use release gates to protect quality Control Deployments using Release Gates 28 - Provision and test environments Provision and configure target environments Configure automated integration and functional test automation Understand Shift-left Set up and run availability tests Explore Azure Load Testing Set up and run functional tests 29 - Manage and modularize tasks and templates Examine task groups Explore variables in release pipelines Understand variable groups 30 - Automate inspection of health Automate inspection of health Explore events and notifications Explore service hooks Configure Azure DevOps notifications Configure GitHub notifications Explore how to measure quality of your release process Examine release notes and documentation Examine considerations for choosing release management tools Explore common release management tools 31 - Introduction to deployment patterns Explore microservices architecture Examine classical deployment patterns Understand modern deployment patterns 32 - Implement blue-green deployment and feature toggles What is blue-green deployment? Explore deployment slots Describe feature toggle maintenance 33 - Implement canary releases and dark launching Explore canary releases Examine Traffic Manager Understand dark launching 34 - Implement A/B testing and progressive exposure deployment What is A/B testing? Explore CI-CD with deployment rings 35 - Integrate with identity management systems Integrate GitHub with single sign-on (SSO) Explore service principals Explore Managed Identity 36 - Manage application configuration data Rethink application configuration data Explore separation of concerns Understand external configuration store patterns Examine Key-value pairs Examine App configuration feature management Integrate Azure Key Vault with Azure Pipelines Manage secrets, tokens and certificates Examine DevOps inner and outer loop Integrate Azure Key Vault with Azure DevOps Enable Dynamic Configuration and Feature Flags 37 - Explore infrastructure as code and configuration management Explore environment deployment Examine environment configuration Understand imperative versus declarative configuration Understand idempotent configuration 38 - Create Azure resources using Azure Resource Manager templates Why use Azure Resource Manager templates? Explore template components Manage dependencies Modularize templates Manage secrets in templates Deployments using Azure Bicep templates 39 - Create Azure resources by using Azure CLI What is Azure CLI? Work with Azure CLI 40 - Explore Azure Automation with DevOps Create automation accounts What is a runbook? Understand automation shared resources Explore runbook gallery Examine webhooks Explore source control integration Explore PowerShell workflows Create a workflow Examine checkpoint and parallel processing 41 - Implement Desired State Configuration (DSC) Understand configuration drift Explore Desired State Configuration (DSC) Explore Azure Automation State configuration (DSC) Examine DSC configuration file Explore hybrid management Implement DSC and Linux Automation on Azure 42 - Implement Bicep What is Bicep? Install Bicep Understand Bicep file structure and syntax 43 - Introduction to Secure DevOps Describe SQL injection attack Understand DevSecOps Explore Secure DevOps Pipeline Explore key validation points Explore continuous security validation Understand threat modeling 44 - Implement open-source software Explore how software is built What is open-source software Explore corporate concerns with open-source software components Explore common open-source licenses Examine license implications and ratings 45 - Software Composition Analysis Inspect and validate code bases for compliance Explore software composition analysis (SCA) Integrate Mend with Azure Pipelines Implement GitHub Dependabot alerts and security updates Integrate software composition analysis checks into pipelines Examine tools for assess package security and license rate Interpret alerts from scanner tools Implement security and compliance in an Azure Pipeline 46 - Static analyzers Explore SonarCloud Explore CodeQL in GitHub Manage technical debt with SonarCloud and Azure DevOps 47 - OWASP and Dynamic Analyzers Plan Implement OWASP Secure Coding Practices Explore OWASP ZAP penetration test Explore OWASP ZAP results and bugs 48 - Security Monitoring and Governance Implement pipeline security Explore Microsoft Defender for Cloud Examine Microsoft Defender for Cloud usage scenarios Explore Azure Policy Understand policies Explore initiatives Explore resource locks Explore Azure Blueprints Understand Microsoft Defender for Identity 49 - Explore package dependencies What is dependency management? Describe elements of a dependency management strategy Identify dependencies Understand source and package componentization Decompose your system Scan your codebase for dependencies 50 - Understand package management Explore packages Understand package feeds Explore package feed managers Explore common public package sources Explore self-hosted and SaaS based package sources Consume packages Publish packages Package management with Azure Artifacts 51 - Migrate consolidating and secure artifacts Identify existing artifact repositories Migrate and integrating artifact repositories Secure access to package feeds Examine roles Examine permissions Examine authentication 52 - Implement a versioning strategy Understand versioning of artifacts Explore semantic versioning Examine release views Promote packages Explore best practices for versioning 53 - Introduction to GitHub Packages Publish packages Install a package Delete and restore a package Explore package access control and visibility 54 - Implement tools to track usage and flow Understand the inner loop Explore Azure Monitor and Log Analytics Examine Kusto Query Language (KQL) Explore Application Insights Implement Application Insights Monitor application performance with Application Insights 55 - Develop monitor and status dashboards Explore Azure Dashboards Examine view designer in Azure Monitor Explore Azure Monitor workbooks Explore Power BI Build your own custom application 56 - Share knowledge within teams Share acquired knowledge within development teams Integrate with Azure Boards Share team knowledge using Azure Project Wiki 57 - Design processes to automate application analytics Explore rapid responses and augmented search Integrate telemetry Examine monitoring tools and technologies 58 - Manage alerts, blameless retrospectives and a just culture Examine when get a notification Explore how to fix it Explore smart detection notifications Improve performance Understand server response time degradation Reduce meaningless and non-actionable alerts Examine blameless retrospective Develop a just culture