-
Risk Management
After watching this video; you will be able to outline measures to mitigate risk.
-
Adding a Project Member
After watching this video; you will be able to add a project member to manage a Cloud SQL instance.
-
Configuring MySQL Access Control
After watching this video; you will be able to create user accounts to allow applications to connect to MySQL instance via IP using the Developers Console.
-
Connecting through Google Cloud Compute
After watching this video; you will be able to connect to Cloud SQL using MySQL client from Google Cloud Compute Engine instance.
-
Connecting to a Cloud SQL Instance
After watching this video; you will be able to identify connection strings for user accounts and connect to a Cloud SQL instance using the MySQL client.
-
Connecting to a Cloud SQL Instance Using SSL
After watching this video; you will be able to connect to a Cloud SQL instance using an SSL connection.
-
Connecting with MySQL Workbench
After watching this video; you will be able to connect to Cloud SQL instances using MySQL Workbench; including SSL connections.
-
Connecting with Toad for MySQL
After watching this video; you will be able to connect to Cloud SQL instances using Toad for MySQL; including SSL connections.
-
Creating a Database
After watching this video; you will be able to create a database in a Cloud SQL instance using the Developers Console.
-
Creating and Managing a Cloud SQL Instance
After watching this video; you will be able to create and manage a Google Cloud SQL Instance using the Developers Console.
-
Editing a Cloud SQL Instance
After watching this video; you will be able to edit the settings defined for a Cloud SQL instance using the Developers Console.
-
Enabling Cloud SQL Read Replicas
After watching this video; you will be able to enable Cloud SQL Read Replicas.
-
Enabling External Read Replicas in Cloud SQL
After watching this video; you will be able to enable external read replicas for a Cloud SQL instance.
-
Exporting Data from Cloud SQL
After watching this video; you will be able to export data from Cloud SQL through the Developers Console.
-
Importing Data to Cloud SQL
After watching this video; you will be able to import data to Cloud SQL through the Developers Console.
-
Installing the Google Cloud SDK
After watching this video; you will be able to install the Google Cloud SDK and ensure the Cloud SQL API is installed.
-
Installing the MySQL Client
After watching this video; you will be able to install the MySQL client and configure the instance to allow access.
-
Managing Cloud SQL Read Replicas
After watching this video; you will be able to stop; start; promote; and check the status of a Cloud SQL read replica.
-
Migrating MySQL 5.5 to MySQL 6.6
After watching this video; you will be able to migrate MySQL 5.5 to MySQL 5.6 using the Developers Console.
-
Overview of Cloud SQL
After watching this video; you will be able to describe Cloud SQL.
-
Overview of the REST API and OAuth 2.0
After watching this video; you will be able to describe the REST API provided by Cloud SQL and OAuth 2.0 used to authorize requests.
-
Restoring from a Backup
After watching this video; you will be able to restore a Cloud SQL instance from a backup; including to another instance; using the Developers Console.
-
Scheduling Backups
After watching this video; you will be able to schedule backups and review backup history for a Cloud SQL instance using the Developers Console.
-
Size and Access Limits to Cloud SQL with App Engine
After watching this video; you will be able to identify the size and access limits to Cloud SQL from the Google App Engine applications.
-
Using the MySQL Client
After watching this video; you will be able to use the MySQL client to manage a Cloud SQL instance.
-
Viewing Instance Information
After watching this video; you will be able to view Cloud SQL instance usage data in the Developers Console.
-
Viewing Instance Operations Logs
After watching this video; you will be able to view Cloud SQL instance operation logs and view and export MySQL error logs.
-
Configuring and Verifying the Image Service
In OpenStack; you can add new images to Glance. In this video; Byron Hynes demonstrates how to use commands to pull down an image; copy a file for background storage; and upload an image file.
-
Cloud Offerings
OpenStack is an open-source cloud computing software platform. In this video; Byron Hynes discusses the features of three types of clouds that can be developed by using OpenStack: private clouds; public clouds; and hybrid clouds.
-
Cloud Service Features
OpenStack is an open-source cloud computing software platform which includes a number of services. In this video; Byron Hynes discusses the features that are available in cloud services; such as the ability to support computing; storage; and networking.
-
Configure Compute to Use Neutron
OpenStack allows you to set up your own private cloud using its newest style of networking provided by the neutron service. In this video; Byron Hynes demonstrates how to configure a compute node to use the advanced networking of OpenStack's neutron service.
-
Configure OpenStack Compute
In OpenStack; you can configure your controller to talk to the Compute environment that is going to run on the Compute nodes. In this video; Byron Hynes demonstrates how to use Glance on the controller to ensure that the system knows where to find images.
-
Configure Orchestration Service
OpenStack supports Heat; an orchestration service providing a template-based methodology to allocate resources within OpenStack. In this video; Byron Hynes demonstrates how to configure Heat on the controller node; from where he invokes it to create new instances based on a template.
-
Configuring a Tenant Network
Configuring tenant networks in OpenStack Fundamentals is a vital skill and is essential in cloud computing. In this video; Byron Hynes demonstrates how configure a tenant network using the OpenStack Horizon Dashboard.
-
Configuring Authentication
OpenStack supports authentication via projects from within the Horizon Dashboard. In this video; Byron Hynes demonstrates how to create and assign members to a project from the Horizon Dashboard; before explaining the ways in which project users may be authenticated and then authorized.
-
Configuring Authorization
OpenStack supports the authorization of users accessing resources owned by a project or projects. In this video; Byron Hynes discusses authentication; authorization; and resource ownership; before uploading and authorizing access to project resources identified by their UUID.
-
Configuring Block Storage
OpenStack provides administrators with block storage to manage; maintain; and store volumes. In this video; Byron Hynes demonstrates how to set up block storage for an instance with an attached volume.
-
Configuring Database Services
OpenStack supports Trove; a Database-as-a-Service (DBaaS) component that builds on Cinder; Keystone; and Neutron to provision database instances. In this video; Byron Hynes demonstrates how Trove interacts with OpenStack component services to provide database services and manage a data store.
-
Configuring Hypervisor Settings
OpenStack supports virtualization by working with the hypervisors on the compute node. In this video; Byron Hynes discusses the many hypervisors and feature sets available to OpenStack; before installing and configuring the OpenStack Hyper-V hypervisor on the compute node.
-
Configuring Identity Service
OpenStack is a free and open-source cloud computing system software platform that you can configure to suit your needs. In this video; Byron Hynes demonstrates how to make post installation configuration changes to the Identity Service (Keystone).
-
Configuring Multiple Nodes
OpenStack supports the addition of compute nodes on the controller. In this video; Byron Hynes demonstrates how to download and install the binaries to an additional node; amends a pre-existing configuration file to reflect the new node's IP address; and restarts its services.
-
Configuring OpenStack Object Storage
In OpenStack; Swift is an object storage system designed to store large volumes of data. In this video; Byron Hynes demonstrates how to configure an object storage node for use by Swift; using configuration files for the account server; container server; and object server on the node.
-
Configuring Replication
In OpenStack fundamentals; before using the Swift Object Storage system you need to set up replication. In this video; Byron Hynes uses the hashing algorithm to determine which replica or partition is getting any particular object.
-
Configuring SSL
In OpenStack fundamentals; you have to configure SSL externally to OpenStack. In this video; Byron Hynes uses the pound method to deal with the unencrypted HTTP traffic.
-
Configuring Virtual Machine Access
OpenStack denies remote access to virtual machines (VMs) on the compute node by default. In this video; Byron Hynes demonstrates how to configure access from the Internet and an external network through the OpenStack Management Network to virtual machines on this node.
-
Create a Neutron network
OpenStack supports the creation of neutron networks on the network node following the configuration of networking parameters on the controller node. In this video; Byron Hynes demonstrates how to create and configure a neutron network on the OpenStack network node.
-
Creating an instance
In an OpenStack system; you use the nova boot command to create virtual machine instances. In this video; Byron Hynes demonstrates how to create a virtual machine instance on the compute node and how to access a console for interacting with the instance.
-
Creating Credentials and Certificates
OpenStack supports secure access between the compute nodes and the controller node running the OpenStack Identity (Keystone) service. In this video; Byron Hynes demonstrates how to enable authentication on the controller's keystone.conf file; before editing the settings of the compute node's nova.conf file.
-
Examining Services on the Controller Node
In OpenStack fundamentals; you can examine services on the controller node. In this video; Byron Hynes uses a SQL database to keep track of everything that is going on in the OpenStack deployment.
-
Images and Instances
OpenStack is an open-source cloud computing software platform that uses images and instances. In this video; Byron Hynes discusses the function and purpose of images and instances in Openstack and how they are related to each other.other.
-
Install the Dashboard
OpenStack has a user-friendly dashboard that you can install which can be used to configure your own private cloud. In this video; Byron Hynes demonstrates how to install the Horizon Dashboard for OpenStack.
-
Installing Neutron Networking
OpenStack cloud computing supports the new; advanced networking service known as neutron; which is distributed across the OpenStack stack. In this video; Byron Hynes demonstrates how to install and configure a network controller node so that it is equipped to use neutron networking.
-
Installing OpenStack Compute
OpenStack is an open-source cloud computing software platform that has a number of service-based uses for cloud computing. In this video; Byron Hynes demonstrates how to install OpenStack and run an instance.
-
Installing OpenStack Object Storage
In OpenStack; Swift is a system for storing objects and their metadata. In this video; Byron Hynes demonstrates how to configure a system to support Swift and installs Swift on a controller.
-
Installing the Controller Services
Once prerequisite software is in place; you can start installing and configuring OpenStack services. In this video; Byron Hynes demonstrates how to install and configure the Identity service; also known as Keystone.
-
Installing the Image Service (Glance)
In OpenStack; the Image Service; also known as Glance; allows you to store images and create instances. In this video; Byron Hynes demonstrates how to build out your OpenStack cloud by installing and configuring the Image Service consisting of Glance API and Glance registry.
-
Key Management Using Dashboard
In OpenStack; key pairs are created in projects and are used to sign into instances once the instances have been launched. In this video; Byron Hynes demonstrates how to use the Horizon Dashboard from to create and manage key pairs.
-
Launching Instances Using Dashboard
In OpenStack; there are many different ways an instance can be launched. The simplest way to launch an instance is with the Horizon Dashboard. In this video; Byron Hynes demonstrates how to launch an instance with the dashboard.
-
Logical OpenStack Architecture
OpenStack is an open-source cloud computing software platform that provides Infrastructure as a Service (IaaS) solutions. In this video; Byron Hynes demonstrates the logical architecture of the components that make up OpenStack.
-
Managing containers
In OpenStack fundamentals; you need to set up the initial ring before you can use the nodes and start the Object Storage services. In this video; Byron Hynes uses the ring-builder utility to create configuration files to determine the storage architecture for each node.
-
Managing Networking
OpenStack provides administrators with the Neutron component; which provides network connectivity and addressing. In this video; Byron Hynes discusses how plugins for Neutron provide increased flexibility and scalability over and above basic network management; and compares Neutron networking with Nova networking.
-
Managing Networks
OpenStack supports network management through an external interface on the network node; configured by commands issued on the controller node. In this video; Byron Hynes demonstrates how to create and configure virtual and physical network infrastructure; including networks; subnets; and routers.
-
Managing objects
In OpenStack fundamentals; you can upload or download files and create containers in Swift. In this video; Byron Hynes uses the swift upload command to upload an object into Object Storage.
-
Managing Security Groups Using Dashboard
You can manage security groups using OpenStack. In this video; Byron Hynes demonstrates how to manage security groups to manage access to instances in the environment.
-
Managing Users and Tenants Using Dashboard
In OpenStack; you can create multiple new projects and assign users to them. In this video; Byron Hynes uses the Horizon Dashboard in OpenStack to create new projects/tenants and users; and then manage them.
-
OpenStack Block Storage
OpenStack provides administrators with a number of ways to manage storage of blocks and objects. In this video; Byron Hynes discusses block storage; which works with volumes by interacting with OpenStack Compute or Nova and uses Logical Volume Manager (LVM).
-
OpenStack Deployment
OpenStack is an open-source cloud computing software platform that provides Infrastructure as a Service (IaaS) solutions. In this video; Byron Hynes discusses some of the options for OpenStack deployment.
-
OpenStack Identity Services
An important component of the OpenStack system is the Identity service; also known as Keystone. In this video; Byron Hynes discusses the functions of the Keystone component and defines basic concepts associated with the service it provides.
-
OpenStack Object Storage
OpenStack object storage allows you to store and retrieve large amounts of data. In this video; Byron Hynes discusses the advantages; uses; and benefits of OpenStack object storage.
-
Overview of Dashboard
The Dashboard; also known as Horizon; is a web-based interface that provides administrative access to the cloud-based resources in an OpenStack system. In this video; Byron Hynes discusses the Dashboard; explaining what it is; noting that it can be customized; and describing the types of tasks it can be used to perform.
-
Overview of OpenStack
OpenStack is an open-source cloud computing software platform that can be used to develop an Infrastructure as a Service (IaaS) solution. In this video; Byron Hynes discusses what the OpenStack project is and explains the programming languages that it is based on.
-
Project Release Cycle
OpenStack is an open-source cloud computing software platform. In this video; Byron Hynes discusses the project release cycle of the OpenStack project and how often new editions are released.
-
Setting Configuration Options
The OpenStack image service; known as Glance; catalogs and retrieves virtual machine images. In this video; Byron Hynes demonstrates where to access Glance configuration settings and how to add a disk image to a Glance controller from the command line.
-
Types of Service
OpenStack is an open-source cloud computing software platform which offers a number of different services. In this video; Byron Hynes discusses the three main types of services that are offered in a cloud environment and explains why OpenStack is positioned to provide Infrastructure as a Service (IaaS) solutions.
-
Understanding Image Service
OpenStack provides administrators with Glance; an image service that maintains a catalog of virtual machine images. In this video; Byron Hynes discusses where images can be stored and how clients can use Glance to access; create; and manage those images.
-
Understanding OpenStack Compute
One of the key components of the OpenStack platform is the Compute function; also known as Nova. In this video; Byron Hynes demonstrates what Nova does; what it interacts with; and the processes and services it includes.
-
Using Automatic Scaling
OpenStack provides administrators with the Heat and Ceilometer features; which; when combined; enable automatic scaling. In this video; Byron Hynes discusses how Heat orchestrates complex deployments in conjunction with Ceilometer; which collects and measures data to perform automatic scaling.
-
Using Installation Packages
Once required software is in place; you can install OpenStack services using the DevStack installation package or by installing and configuring the services individually. In this video; Byron Hynes demonstrates the installation options for OpenStack and how to install prerequisite packages.
-
Virtualization and Compute
In OpenStack; the Compute node includes the code that runs and hosts the virtual machines. In this video; Byron Hynes demonstrates how to use the apt-get command to pull in binaries to install in the Compute node.
-
Advantages and Disadvantages of Virtual Computing
After watching this video; you will be able to identify the advantages and disadvantages of virtual computing.
-
Applying Optimized Drivers
After watching this video; you will be able to apply optimized drivers to increase performance and functionality.
-
Benefits of Virtualization
After watching this video; you will be able to identify the benefits of virtualization.
-
Choosing Drivers for Hardware
After watching this video; you will be able to choose the correct drivers for your hardware in virtual environments.
-
Common Virtualization Settings
After watching this video; you will be able to describe the settings that can be changed on any virtualization manager.
-
Comparing Different Hypervisors
After watching this video; you will be able to compare the different types of hypervisors.
-
Compatibility Between Hosts and Guests
After watching this video; you will be able to describe the compatibility between hypervisors and guests and the incompatibilities when the host and guests are from different operating systems.
-
Configuring Hardware for Virtualization
After watching this video; you will be able to identify if your hardware is properly configured for virtualization.
-
Connecting Virtual Machines to External Devices
After watching this video; you will be able to describe how to connect to external devices; such as printers; removable storage; or any other device recognized by the host.
-
Controlling and Troubleshooting Access in Linux
After watching this video; you will be able to describe how to control access and troubleshoot access control in Linux.
-
Determining Hypervisor Requirements
After watching this video; you will be able to identify if your hardware is capable of running the desired hypervisor.
-
Different Types of Virtualization
After watching this video; you will be able to identify the different types of virtualization based on the type of hypervisor used.
-
Exploring Libvirt
After watching this video; you will be able to describe the linux virtualization API; service; and command line tools.
-
Exploring oVirt
After watching this video; you will be able to describe the upstream project that contributes to Red Hat's Enterprise Virtualization product.
-
Exploring Virsh
After watching this video; you will be able to configure virtual machines using the command line in Linux.
-
Features of Different Hypervisors
After watching this video; you will be able to identify the features of different hypervisors and compare them.
-
Getting Direct Access to Hardware on Physical Host
After watching this video; you will be able to describe how to get direct access to hardware on a physical host.
-
Getting Help on Linux Virtualization
After watching this video; you will be able to identify the resources that provide help for virtualization on Linux.
-
Identify the Attributes of Virtualization
After watching this video; you will be able to identify the common attributes of all virtualization platforms.
-
Installing Software in Enterprise Linux
After watching this video; you will be able to describe the essential commands for installing software in Enterprise Linux.
-
Limitations of a Guest Operating System
After watching this video; you will be able to identify the limitations of a guest operating system.
-
Linux Commands for KVM Virtualization
After watching this video; you will be able to describe the basic Linux commands to support virtualization.
-
Linux Networking versus Regular Networking
After watching this video; you will be able to describe how Linux networking is different from regular networking.
-
Managing Any Virtualization on Linux
After watching this video; you will be able to describe how to leverage Linux software to manage any virtualization.
-
Managing Services
After watching this video; you will be able to manage services.
-
Managing Virtual Network Resources
After watching this video; you will be able to describe how a hypervisor manages various network resources for virtual machines.
-
Managing Virtual Processors
After watching this video; you will be able to describe how a hypervisor manages processor resources for virtual machines.
-
Managing Virtual RAM
After watching this video; you will be able to describe how a hypervisor manages memory resources for virtual machines.
-
Managing Virtual Storage Resources
After watching this video; you will be able to describe how a hypervisor manages various storage resources for virtual machines.
-
Physical Systems versus Virtual Machines
After watching this video; you will be able to distinguish between physical systems and virtual machines.
-
Recognizing Red Hat Enterprise Management Solution
After watching this video; you will be able to recognize the Red Hat Enterprise management solution for virtualization.
-
Recognizing Virtual and Physical Environments
After watching this video; you will be able to recognize the environment you are working in.
-
Relationship Between Virtual Machine and its Server
After watching this video; you will be able to describe the relationship of a virtual machine with the server it resides on.
-
Remote File Management
After watching this video; you will be able to use Linux tools to send and receive files across networks.
-
Saving Resources through Virtualization
After watching this video; you will be able to describe how to save resources through virtualization.
-
Securing Guests through Hypervisors
After watching this video; you will be able to describe how hypervisors secure and isolate guests; and protect guests from each other.
-
Setting Up a Sandbox for Virtualization
After watching this video; you will be able to create a safe place to explore virtualization settings.
-
Storage Management
After watching this video; you will be able to configure and access local and remote storage for various puposes.
-
Understanding Activity Logs
After watching this video; you will be able to describe how system logs errors.
-
Use virt-install to Install a Guest OS
After watching this video; you will be able to install a virtual machine by using virt-install.
-
Using QEMU Emulator
After watching this video; you will be able to test images; system configuration; and available resources using QEMU emulation.
-
Using virt-install
After watching this video; you will be able to use command line tools to install virtual machines.
-
Using virt-manager
After watching this video; you will be able to use graphical tools to install and configure virtual machines.
-
Using Virtualization in Production Environments
After watching this video; you will be able to describe how virtualization is used in production environments.
-
Using virt-viewer
After watching this video; you will be able to access local and remote virtual machines using virt-viewer.
-
Verifying System for Virtualization
After watching this video; you will be able to verify whether a system is ready for virtualization.
-
Virtual Device Drivers
After watching this video; you will be able to recognize when special virtual device drivers are required.
-
Virtualization Tools in GNU/Linux
After watching this video; you will be able to describe the universal virtualization tools in GNU/Linux.
-
Virtualized and Emulated Devices
After watching this video; you will be able to describe virtual hardware entirely represented by software.
-
Working with the Guest Management Software
After watching this video; you will be able to manage virtual maching guests by using the appropriate management software.
-
Working with Virtualization
After watching this video; you will be able to work with virtualization.
-
Abstracted Services Shared Responsibility
After watching this video; you will be able to describe abstracted services in the context of the shared responsibility model on Amazon Web Services.
-
Activating Storage Gateway
After watching this video; you will be able to activate Amazon Web Services' Storage Gateway.
-
Adding a VPC Subnet
After watching this video; you will be able to add a subnet to a Virtual Private Cloud in Amazon Web Services.
-
Adding an Account to a Consolidated Billing Family
After watching this video; you will be able to add an account to consolidated billing on Amazon Web Services.
-
Amazon Machine Images
After watching this video; you will be able to describe how Amazon Machine Images are used on Amazon Web Services.
-
Application Life Cycle Analyze Phase
After watching this video; you will be able to describe the analyze phase of the application life cycle on Amazon Web Services.
-
Application Life Cycle Build Phase
After watching this video; you will be able to describe the build phase of the application life cycle on Amazon Web Services.
-
Application Life Cycle Development Phase
After watching this video; you will be able to describe the development phase of the application life cycle on Amazon Web Services.
-
Application Life Cycle Release Phase
After watching this video; you will be able to describe the release phase of the application life cycle on Amazon Web Services.
-
Application Life Cycle Test Phase
After watching this video; you will be able to describe the test phase of the application life cycle on Amazon Web Services.
-
Application Migration Phase
After watching this video; you will be able to describe the application migration phase of a cloud migration.
-
Assigning Elastic IP
After watching this video; you will be able to assign an Elastic IP to an Elastic Compute Cloud instance on Amazon Web Services.
-
Auto Scaling
After watching this video; you will be able to describe how Auto Scaling is used in loosely coupled systems on Amazon Web Services.
-
Auto Scaling Groups for Front-End
After watching this video; you will be able to describe how Auto Scaling Groups can be used for scaling the front-end of application architectures on Amazon Web Services.
-
Auto Scaling Groups for Middle Tier
After watching this video; you will be able to describe how Auto Scaling Groups can be used for scaling the middle-tier of application architectures on Amazon Web Services.
-
Auto Scaling Load Balanced Site Costing Example
After watching this video; you will be able to describe a costing example using auto scaling and load balancing on Amazon Web Services.
-
AWS Application Life Cycle
After watching this video; you will be able to describe the application life cycle on Amazon Web Services.
-
AWS Cost Drivers
After watching this video; you will be able to describe the cost drivers on Amazon Web Services.
-
AWS Pricing Principles
After watching this video; you will be able to describe the principles of cloud pricing generally; and Amazon Web Services specifically.
-
AWS Region Overview
After watching this video; you will be able to Describe regions in Amazon Web Services and the part they play in disaster recovery systems.
-
AWS Storage Gateway Overview
After watching this video; you will be able to describe Amazon Web Services' Storage Gateway.
-
Billing and Cost Management Overview
After watching this video; you will be able to describe billing and cost management principles on Amazon Web Services.
-
Bootstrapping and Self-healing
After watching this video; you will be able to describe how bootstrapping is used in a self-healing system on Amazon Web Services.
-
Build Architecture
After watching this video; you will be able to describe Amazon Web Services' architecture for build environments.
-
Business Benefits of Cloud Architectures
After watching this video; you will be able to describe the business benefits of different cloud architectures.
-
Cloud Assessment Phase
After watching this video; you will be able to describe the cloud assessment phase of a cloud migration.
-
Cloud Leveraging Phase
After watching this video; you will be able to describe the cloud leveraging phase of a cloud migration.
-
Cloud Migration Strategy
After watching this video; you will be able to describe strategies for migrating to the cloud.
-
CloudFormation and Elastic Beanstalk
After watching this video; you will be able to describe how Amazon Web Services' CloudFormation and Elastic Beanstalk can be used together to manage infrastructure.
-
CloudFormation Overview
After watching this video; you will be able to describe the features and functionality of Amazon Web Services' CloudFormation.
-
CloudFormation Templates
After watching this video; you will be able to describe how templates are used in Amazon Web Services' CloudFormation.
-
CloudFront CDN
After watching this video; you will be able to describe how CloudFront CDN can be used for scaling the front-end of application architectures on Amazon Web Services.
-
CloudFront Pricing Characteristics
After watching this video; you will be able to describe the pricing characteristics of Amazon Web Services' CloudFront.
-
Configuring Availability Levels
After watching this video; you will be able to describe levels of availability configurable through Amazon Web Services.
-
Configuring S3 Cross Region Replication
After watching this video; you will be able to configure cross region replication for a Simple Storage Service bucket in Amazon Web Services.
-
Consolidated Billing Overview
After watching this video; you will be able to describe consolidated billing for multiple Amazon Web Services accounts.
-
Container Services Shared Responsibility
After watching this video; you will be able to describe container services in the context of the shared responsibility model on Amazon Web Services.
-
Content and Media Serving Example
After watching this video; you will be able to describe an example of content and media serving architecture on Amazon Web Services.
-
Converting a Payer Account to a Linked Account
After watching this video; you will be able to convert a payer account to a linked account in consolidated billing on Amazon Web Services.
-
Cost Explorer
After watching this video; you will be able to use Amazon Web Services' Cost Explorer to view and analyze spending on Amazon Web Services.
-
Costing a Cloud App
After watching this video; you will be able to describe tools and techniques used to cost a cloud application on Amazon Web Services.
-
Costing Analysis Methodology
After watching this video; you will be able to describe a cost analysis methodology on Amazon Web Services.
-
Costing Analysis Tools
After watching this video; you will be able to use costing analysis tools to derive cost information for Amazon Web Services.
-
Creating a CloudFormation Template with CloudFormer
After watching this video; you will be able to use CloudFormer to create a CloudFormation template.
-
Creating a Linux Stack
After watching this video; you will be able to create a Linux stack using OpsWorks on Amazon Web Services.
-
Creating a VPC
After watching this video; you will be able to create a Virtual Private Cloud in Amazon Web Services.
-
Creating a VPN Connection
After watching this video; you will be able to create a virtual private network connection in Amazon Web Services.
-
Creating a VPN Gateway
After watching this video; you will be able to create a virtual private network gateway in Amazon Web Services.
-
Creating a Windows Stack
After watching this video; you will be able to create a Windows stack using OpsWorks on Amazon Web Services.
-
Creating an Application with Elastic Beanstalk
After watching this video; you will be able to create an application in Amazon Web Services' Elastic Beanstalk.
-
Creating Storage Architecture
After watching this video; you will be able to design a storage architecture for a given set of constraints on Amazon Web Services.
-
Data Migration Phase
After watching this video; you will be able to describe the data migration phase of a cloud migration.
-
Data Warehousing
After watching this video; you will be able to describe an example of data warehousing architecture on Amazon Web Services.
-
Databases on AMIs
After watching this video; you will be able to describe an example of architecture that uses databases on Amazon Machine Images in Amazon Web Services.
-
Decommissioning Data
After watching this video; you will be able to describe considerations for decommissioning data on Amazon Web Services.
-
Defining and Categorizing Assets
After watching this video; you will be able to define and categorize assets on Amazon Web Services as part of an information security management system.
-
Deleting a Subnet
After watching this video; you will be able to delete a subnet from a Virtual Private Cloud in Amazon Web Services.
-
Deploying a Web App
After watching this video; you will be able to describe the stages and tools used to deploy an application on Amazon Web Services.
-
Designing an Information Security Management System
After watching this video; you will be able to design an information security management system for Amazon Web Services.
-
Designing for Failure
After watching this video; you will be able to describe the principle of designing for failure as it relates to cloud application on Amazon Web Services.
-
Designing Network Connectivity
After watching this video; you will be able to design an Amazon Web Services network and connectivity for a hybrid cloud app.
-
Development Architecture
After watching this video; you will be able to describe Amazon Web Services' architecture for development environments.
-
Direct Connect Overview
After watching this video; you will be able to describe Amazon Web Services' Direct Connect.
-
Disaster Recovery Example
After watching this video; you will be able to describe an example of disaster recovery architecture on Amazon Web Services.
-
EBS and AMIs
After watching this video; you will be able to describe how Elastic Block Store is used with Amazon Machine Images on Amazon Web Services.
-
EBS Pricing Characteristics
After watching this video; you will be able to describe the pricing characteristics of Amazon Web Services' Elastic Block Store.
-
EBS Snapshot Replication
After watching this video; you will be able to describe snapshot replication for Elastic Block Store on Amazon Web Services.
-
EBS Storage Architecture
After watching this video; you will be able to describe the storage architecture for Amazon Web Services' Elastic Block Store.
-
EC2 and RDS Dynamic Site Costing Example
After watching this video; you will be able to describe a costing example using Elastic Compute Cloud and Relational Database Service on Amazon Web Services.
-
EC2 Instances for Front-End
After watching this video; you will be able to describe how Elastic Compute Cloud instances can be used for scaling the front-end of application architectures on Amazon Web Services.
-
EC2 Instances for Middle Tier
After watching this video; you will be able to describe how Elastic Compute Cloud instances can be used for scaling the middle-tier of application architectures on Amazon Web Services.
-
EC2 Pricing Characteristics
After watching this video; you will be able to describe the pricing characteristics of Amazon Web Services Elastic Compute Cloud.
-
Elastic Beanstalk Architecture
After watching this video; you will be able to describe the architecture of Amazon Web Services Elastic Beanstalk.
-
Elastic Beanstalk Overview
After watching this video; you will be able to describe the features and functionality of Amazon Web Services' Elastic Beanstalk.
-
Elastic IP
After watching this video; you will be able to describe the Elastic IP service on Amazon Web Services.
-
Elastic Load Balancer for Front-End
After watching this video; you will be able to describe how Elastic Load Balancer can be used for scaling the front-end of application architectures on Amazon Web Services.
-
Elastic Load Balancer for Middle Tier
After watching this video; you will be able to describe how Elastic Load Balancer can be used for scaling the middle-tier of application architectures on Amazon Web Services.
-
Elastic Load Balancing
After watching this video; you will be able to describe how Elastic Load Balancing is used in loosely coupled systems on Amazon Web Services.
-
ElastiCache Caching Service
After watching this video; you will be able to describe an example of architecture using ElastiCache on Amazon Web Services.
-
Enabling Access to a VPN
After watching this video; you will be able to enable access to a virtual private network in Amazon Web Services.
-
Failover and Failback
After watching this video; you will be able to describe the process of failover and failback in a disaster recovery solution on Amazon Web Services.
-
File Synchronization Example
After watching this video; you will be able to describe an example of file synchronization architecture on Amazon Web Services.
-
Gateway-Virtual Tape Library Architecture
After watching this video; you will be able to describe Amazon Web Services' Storage Gateway gateway-virtual tape library.
-
Horizontal Scaling
After watching this video; you will be able to describe horizontal scaling for applications on Amazon Web Services.
-
Horizontal Scaling Use Cases
After watching this video; you will be able to describe use cases for horizontal scaling on Amazon Web Services.
-
Hybrid Cloud Overview
After watching this video; you will be able to describe hybrid cloud architectures.
-
Hybrid Cloud with Direct Connect
After watching this video; you will be able to describe a hybrid cloud implementation with Amazon Web Services' Direct Connect.
-
Hybrid Cloud with VPN
After watching this video; you will be able to describe a hybrid cloud implementation with virtual private networks.
-
Hybrid DNS Configuration
After watching this video; you will be able to describe Domain Name System configurations for hybrid cloud implementations.
-
Identity Federation
After watching this video; you will be able to describe security considerations for identity federation on Amazon Web Services.
-
Implementing High Availability and DR
After watching this video; you will be able to choose Amazon Web Services components to create a high availability solution and a disaster recovery solution.
-
Infrastructure Services Shared Responsibility
After watching this video; you will be able to describe infrastructure services in the context of the shared responsibility model on Amazon Web Services.
-
Launching an Instance in a VPC
After watching this video; you will be able to launch an Elastic Compute Cloud instance into a Virtual Private Cloud on Amazon Web Services.
-
Layered Security Defense
After watching this video; you will be able to describe a layered approach to security defence for Amazon Web Services.
-
Loose Coupling Overview
After watching this video; you will be able to describe the architectural technique of loose coupling for application on Amazon Web Services.
-
Managing Accounts and Identity
After watching this video; you will be able to describe security considerations for accounts and identities on Amazon Web Services.
-
Managing an Elastic Beanstalk Environment
After watching this video; you will be able to manage an Amazon Web Services Elastic Beanstalk environment.
-
Managing AWS Account and Billing
After watching this video; you will be able to manage billing for Amazon Web Services accounts.
-
Managing Encryption Keys
After watching this video; you will be able to describe security considerations for managing encryption keys on Amazon Web Services.
-
Managing OS Level Access
After watching this video; you will be able to describe security considerations for managing access to Elastic Compute Cloud instances on Amazon Web Services.
-
Media Sharing Example
After watching this video; you will be able to describe an example of media sharing architecture on Amazon Web Services.
-
Mitigating Compromise and Abuse
After watching this video; you will be able to describe steps for mitigating compromise and abuse of systems on Amazon Web Services.
-
Moving an Account to a Different Consolidated Bill
After watching this video; you will be able to move an account from one bill to another in consolidated billing on Amazon Web Services.
-
Multi-Availability Zone HA
After watching this video; you will be able to describe multi-availability zone high availability on Amazon Web Services.
-
Multi-AZ Architectures
After watching this video; you will be able to describe how Multi-Availability zone architectures are used on Amazon Web Services.
-
Multi-Region HA
After watching this video; you will be able to describe multi-region high availability on Amazon Web Services.
-
Network Security with VPC
After watching this video; you will be able to describe network security implementation with Amazon Web Services Virtual Private Cloud.
-
Nonrelational Databases
After watching this video; you will be able to describe an example of Nonrelational database architecture on Amazon Web Services.
-
NoSQL Scalability
After watching this video; you will be able to describe scalability in an Amazon Web Services NoSQL database.
-
OpsWorks Overview
After watching this video; you will be able to describe Amazon Web Services' OpsWorks.
-
Planning AWS Storage Gateway Deployment
After watching this video; you will be able to plan a deployment of Amazon Web Services' Storage Gateway.
-
Proof of Concept Phase
After watching this video; you will be able to describe the proof of concept phase of a cloud migration.
-
Protecting Administration Traffic
After watching this video; you will be able to describe steps for protecting Amazon Web Services administration traffic.
-
Protecting Data at Rest on EBS
After watching this video; you will be able to describe mitigation steps for protecting data at rest on Amazon Web Services' Elastic Block Store.
-
Protecting Data at Rest on EMR
After watching this video; you will be able to describe mitigation steps for protecting data at rest on Amazon Web Services' Elastic MapReduce.
-
Protecting Data at Rest on Glacier
After watching this video; you will be able to describe mitigation steps for protecting data at rest on Amazon Web Services' Glacier.
-
Protecting Data at Rest on RDS
After watching this video; you will be able to describe mitigation steps for protecting data at rest on Amazon Web Services' Relational Database Service.
-
Protecting Data at Rest on S3
After watching this video; you will be able to describe mitigation steps for protecting data at rest on Amazon Web Services' Simple Storage Service.
-
Protecting Data in Transit to EMR
After watching this video; you will be able to describe mitigation steps for protecting data in transit to Amazon Web Services Elastic MapReduce.
-
Protecting Data in Transit to S3 and RDS
After watching this video; you will be able to describe mitigation steps for protecting data in transit to Amazon Web Services Simple Storage Service and Relational Database Service.
-
RDS DB Instance Replication
After watching this video; you will be able to describe Amazon Web Services' Relational Database Service instance replication.
-
RDS Pricing Characteristics
After watching this video; you will be able to describe the pricing characteristics of Amazon Web Services' Relational Database Service.
-
RDS Scalability
After watching this video; you will be able to describe scalability options for Amazon Web Services' Relational Database Service.
-
Redundant VPNs
After watching this video; you will be able to describe redundant virtual private network architectures on Amazon Web Services.
-
Relational Databases
After watching this video; you will be able to describe an example of relational database architecture on Amazon Web Services.
-
Reserved Instances
After watching this video; you will be able to describe how the reserved instances feature is used in a self-healing system on Amazon Web Services.
-
Risks to Data at Rest
After watching this video; you will be able to describe risks to data at rest in Amazon Web Services.
-
Risks to Data in Transit
After watching this video; you will be able to describe risks to data in transit on Amazon Web Services.
-
Route53 DNS
After watching this video; you will be able to describe how Route53 Domain Name Service can be used for scaling the front-end of application architectures on Amazon Web Services.
-
S3 Cross Region Replication Scenarios
After watching this video; you will be able to describe Simple Storage Service cross Region replication scenarios.
-
S3 Pricing Characteristics
After watching this video; you will be able to describe the pricing characteristics of Amazon Web Services' Simple Storage Service.
-
S3 Storage Architecture
After watching this video; you will be able to describe the storage architecture for Amazon Web Services' Simple Storage Service.
-
SAN with EBS Volumes
After watching this video; you will be able to describe storage area networks with Amazon Web Services' Elastic Block Store volumes.
-
Scaling Cloud Applications
After watching this video; you will be able to plan scaling options for an application on Amazon Web Services.
-
Scaling DynamoDB
After watching this video; you will be able to describe how Dynamo can be used to scale the database-tier of application architectures on Amazon Web Services.
-
Scaling EBS Storage
After watching this video; you will be able to describe how Elastic Block Store can be used to scale the database-tier of application architectures on Amazon Web Services.
-
Scaling NoSQL
After watching this video; you will be able to describe how NoSQL can be used to scale the database-tier of application architectures on Amazon Web Services.
-
Scaling RDS
After watching this video; you will be able to describe how Relational Database Service can be used to scale the database-tier of application architectures on Amazon Web Services.
-
Scaling Up on S3
After watching this video; you will be able to describe how Simple Storage Service can be used for scaling the front-end of application architectures on Amazon Web Services.
-
Securing Cloud Services
After watching this video; you will be able to describe a security approach for an application with a given set of services on Amazon Web Services.
-
Securing Peripheral Systems
After watching this video; you will be able to describe mitigation steps for securing systems peripheral to Amazon Web Services.
-
Security Zoning and Segmentation
After watching this video; you will be able to describe security zoning and segmentation for security on Amazon Web Services.
-
Self-healing AWS Components
After watching this video; you will be able to describe the self-healing capabilities of individual Amazon Web Services components.
-
Self-healing Overview
After watching this video; you will be able to describe Amazon Web Services' self-healing capabilities.
-
Shared Responsibility Model
After watching this video; you will be able to describe the shared responsibility model on Amazon Web Services.
-
Signing up for Consolidated Billing
After watching this video; you will be able to sign up for consolidated billing on Amazon Web Services.
-
Simple Monthly Calculator
After watching this video; you will be able to calculate the cost of a service using the Amazon Web Services Simple Monthly Calculator.
-
Static Site Costing Example
After watching this video; you will be able to describe a static site costing example on Amazon Web Services.
-
Subnet Routing
After watching this video; you will be able to describe the process of routing between subnets on Amazon Web Services.
-
Subnet Security
After watching this video; you will be able to describe security measures for network security and subnet routing in Amazon Web Services.
-
Test Architecture
After watching this video; you will be able to describe Amazon Web Services' architecture for test environments.
-
Using EC2 Reserved Instances
After watching this video; you will be able to describe how Amazon Web Services' Elastic Compute Cloud reserved instances can be used to lower costs.
-
Using the OpsWorks Console
After watching this video; you will be able to use the OpsWorks console for administration on Amazon Web Services.
-
Vertical Scaling
After watching this video; you will be able to describe vertical scaling for applications on Amazon Web Services.
-
Vertical Scaling Use Cases
After watching this video; you will be able to describe use cases for vertical scaling on Amazon Web Services.
-
Virtual Private Networks
After watching this video; you will be able to describe virtual private networks on Amazon Web Services.
-
Volume Gateway Architecture – Gateway-Cached
After watching this video; you will be able to describe Amazon Web Services' Storage Gateway gateway-cached volumes.
-
Volume Gateway Architecture – Gateway-Stored
After watching this video; you will be able to describe Amazon Web Services' Storage Gateway gateway-stored volumes.
-
VPC and Subnets
After watching this video; you will be able to describe the relationship between Virtual Private Clouds and IP subnets on Amazon Web Services.
-
VPC Overview
After watching this video; you will be able to describe Virtual Private Clouds on Amazon Web Services.
-
VPN Routing Options
After watching this video; you will be able to describe options for routing when using virtual private networks on Amazon Web Services.
-
Web Application Hosting Example
After watching this video; you will be able to describe an example of web application hosting architecture on Amazon Web Services.
-
Working with Budgets
After watching this video; you will be able to create and view a budget on Amazon Web Services.
-
Auto-Scaling – Getting Started
Amazon Web Services Auto Scaling service allows you to make efficient use of your resources by scaling EC2 instances automatically based upon predefined conditions. In this video; David Castillo demonstrates how to get started with Auto Scaling by creating a launch configuration; Auto Scaling group; and a scaling plan in the AWS Management Console.
-
Auto-Scaling – Integrating with Load Balancers
Amazon Web Services Auto Scaling service allows you to scale the capacity of EC2 instances up or down according to predefined conditions using an Elastic Load Balancer to automatically distribute traffic across multiple instances. In this video; David Castillo demonstrates a launch configuration and load balancer; and how to configure an Auto Scaling group using the AWS management Console.
-
Bound Parameters and Event Systems
In Amazon Web Services; the JavaScript SDK is used in conjunction with seven supported AWS services in a browser. In this video; David Castillo demonstrates how to construct an AWS service; bind parameters; make requests in the browser; and access the response data that's contained in the response object.
-
Building the Javascript SDK
Amazon Web Services (AWS) allows you to create your own build of the AWS SDK for JavaScript in the browser. In this video; David Castillo demonstrates how to clone the Git repository and download the dependency modules for the SDK and build tool; before using the build tool to build specific services into a customized version of the AWS SDK.
-
CloudFormation – Creating a Stack
Amazon Web Services provides AWS CloudFormation; a service that allows you to easily create a stack that launches the AWS resources required by live streaming. In this video; David Castillo uses the Create Stack wizard from within the AWS Management Console to create an AWS CloudFormation stack for live streaming.
-
CloudFormation – Running a Stack
Amazon Web Services allow you to automate stack creation. In this video; David Castillo demonstrates the automation process by exploring a CloudFormation stack for live streaming.
-
CloudFormation – Stack Details
In Amazon Web Services; you can view and change various details of one or more stacks. In this video; David Castillo demonstrates what the stack Overview page is; how to access it; how to find certain information; and how to configure the information presented in it.
-
CloudFormation – Templating Language
You can use Amazon Web Services to create a stack from scratch as well as from an existing collection of resources. In this video; David Castillo explains what stack templates consist of and the templating language that drives cloud formations.
-
CloudFront – Working with Streaming Distributions
Amazon Web Services provides CloudFront; a web service that speeds up the streaming distribution of your media content to end users. In this video; David Castillo demonstrates how to create an RTMP and web distribution; deploy and test a distribution; and delete a streaming distribution using the CloudFront console.
-
CloudFront – Working with Web Distribution
In Amazon Web Services; you can use CloudFront to speed up distribution by ensuring the lowest latency possible. In this video; David Castillo demonstrates how to use CloudFront to give your users a quicker and more efficient service.
-
CloudTrail
In Amazon Web Services; you can use CloudTrail to diagnose operational issues; meet compliance requirements; and trace security issues. In this video; David Castillo demonstrates what CloudTrail is; how it works; and how to get started with CloudTrail.
-
CloudWatch – Alarms
Amazon Web Services allows you to set basic and detailed alarms using CloudWatch Alarms. In this video; David Castillo demonstrates how to specify user-configurable threshold conditions and actions for sustained conditions; such as sending notifications or an AutoScaling Policy.
-
CloudWatch – Metrics
In Amazon Web Services; you can use CloudWatch Metrics to keep track of your system's health and performance data in your decision-making processes. In this video; David Castillo demonstrates how to use the CloudWatch console to collect and track metrics.
-
Command Line Interface Installation and Configuration
Amazon Web Services provides an installation file that allows users to set up and configure an AWS configuration file for storing user credentials via the command line. In this video; David Castillo demonstrates how to set up and configure AWS via the command line interface.
-
Command Structure and Parameters
Amazon Web Services provide several commands and Help files that allow users to make configuration changes via the command line interface. In this video; David Castillo demonstrates how to use the AWS command line interface.
-
Command Structure in NodeJS
Amazon Web Services (AWS) SDK for JavaScript in Node.js allows you to write server-side applications through a simple command structure. In this video; David Castillo demonstrates the structure and general syntax used to construct a service object; pass specific configuration data; and uses the object to make requests.
-
DynamoDB – Advanced Topics
In Amazon Web Services; once you have settled into using DynamoDB; it can be used to keep your running costs down by providing automatic scaling that supplies high performance and high availability. In this video; David Castillo demonstrates how to use the advanced tools for this application.
-
DynamoDB – Getting Started
In Amazon Web Services; when you have an application that you want to scale but don’t know how to administer; DynamoDB will help you provide automatic scaling that supplies high performance and high availability. In this video; David Castillo demonstrates how to get started using this application.
-
DynamoDB – Scans and Queries
In Amazon Web Services; you can use the scanning or querying capabilities of DynamoDB to search for specific data items. In this video; David Castillo demonstrates how to use DynamoDB to query data in a table.
-
DynamoDB – Working with Items
In Amazon Web Services; it's easy to modify the DynamoDB items in your table. In this video; David Castillo demonstrates how to use the DynamoDB console to add; update; copy; and delete items in a table.
-
EBS – Snapshots
Amazon Web Services allows you to back up applications using snapshots; which are point-in-time; incremental; persistent copies of Amazon EBS volumes stored in S3. In this video; David Castillo demonstrates how to create or copy a snapshot; create a volume from a snapshot; and share a snapshot publically or privately.
-
EBS – Volumes
Amazon Web Services provides you with Elastic Block Store (EBS) to resolve data persistence problems caused by instance store-backed AMIs. In this video; David Castillo demonstrates the features and requirements of EBS; and how to create an EBS volume and attach it to an instance.
-
EC2 – Amazon Machine Images
In Amazon Web Services; if you need assistance with installing and configuring development and business applications then Amazon Machine Images can help provide you with the assistance needed to launch instances for applications. In this video; David Castillo demonstrates how to navigate the Amazon Machine Images console.
-
EC2 – Elastic IP
In Amazon Web Services; it's possible to allocate a Public IP address to your account even after you've shut down your server; thanks to Elastic IP addresses. In this video; David Castillo demonstrates how users can allocate and associate an IP address to their instance and; when done; disassociate and release the Elastic IP address.
-
EC2 – Elastic Load Balancers
Amazon Web Services provides the Elastic Load Balancer which helps improve performance during peak traffic. In this video; David Castillo demonstrates how the Elastic Load Balancer; can help improve availability and overall application performance.
-
EC2 – Key Pairs
In Amazon Web Services; Amazon EC2 Key Pairs allow you to encrypt your data with a combination of keys in order to control who can access it. In this video; David Castillo demonstrates how to create a Key Pair and use the key to log into your Amazon EC2 instance.
-
EC2 – Launching an Instance
In Amazon Web Services; it's easy to configure and reuse EC2 instances. In this video; David Castillo demonstrates how to use the Launch Instance wizard to configure and launch an EC2 instance.
-
EC2 – Security Groups
Amazon Web Services allows you to control the security of virtual servers using security groups. In this video; David Castillo demonstrates how to create security groups and configure rules within those security groups to control inbound and outbound traffic to and from an associated instance.
-
Elastic Transcoder – Jobs
Amazon Web Services provides the Elastic Transcoder which allows you to configure your transcoding jobs for maximum flexibility and efficiency. In this video; David Castillo demonstrates how the Elastic Transcoder can be used to efficiently configure various transcoding jobs; and highlights a number of features including clip time; thumbnails; job details; and input containers.
-
Elastic Transcoder – Pipelines
In Amazon Web Services; you can use the Elastic Transcoder; which is a fast and easy cloud transcoding solution; to run multiple transcoding jobs. In this video; David Castillo demonstrates how the Elastic Transcoder can be used to create input and output buckets and different priority pipelines for jobs.
-
Elastic Transcoder – Presets
Amazon Web Services provides Elastic Transcoder presets; which allow you to more easily use the Elastic Transcoder. In this video; David Castillo demonstrates the power of Elastic Transcoder presets; what they are; how to use them; and how to create your own.
-
Getting Started with Browser Based Applications
Amazon Web Services (AWS) allows you to load the SDK directly using the hosted package. This enables you to quickly get started with browser-based application development utilizing API operations on AWS services. In this video; David Castillo demonstrates loading the SDK; configuring Cross-Origin Resource Sharing (CORS) for an Amazon S3 bucket; and hard-coding credentials in an application.
-
IAM – Access Control Policies
Amazon Web Services has a powerful access control feature which allows you to configure who has access to what services and what actions can be performed. In this video; David Castillo demonstrates the default settings of the access control policy; how policies are evaluated; and some of its key components.
-
IAM – Managing Passwords and MFA
Amazon Web Services provides account administrators with Multi-Factor Authentication (MFA); which they can use to manage security credentials for Identity and Access Management (IAM) users. In this video; David Castillo demonstrates how to specify a custom password for a user; set authentication codes on a device; and synchronize the device to the user's account.
-
IAM – Multi-Factor Authentication
In Amazon Web Services; you can enhance your security as an administrator using IAM Multi-factor Authentication (MFA) to add an extra layer of security for your root accounts. In this video; David Castillo demonstrates how to synchronize your virtual MFA device to your root account; navigate to the IAM console; and generate 6-digit authentication codes to improve security.
-
IAM – Policy Simulator
Amazon Web Services provides account administrators with a Policy Simulator to verify Identity and Access Management (IAM) policies in a sandbox environment. In this video; David Castillo demonstrates how to selectively deny access to individual services and actions within services so as to apply custom authentication credentials and privileges.
-
IAM – Resource Level Restrictions
Amazon Web Services provides account administrators with Identity and Access Management (IAM) Access Control Policies to control user or group access to resources at resource level. In this video; David Castillo demonstrates how to use the Policy Generator to tailor a user's global access to resources by denying access to a specific resource.
-
IAM – Working with Users and Groups
Amazon Web Services provides account administrators with Identity and Access Management (IAM) with which to manage all users and groups. In this video; David Castillo demonstrates how to use the IAM Dashboard; create users and groups; add users to a group; and generate policies for users and groups.
-
Installing and Configuring AWS SDK for NodeJS
Amazon Web Services (AWS) provides a useful toolset that takes the complexity out of coding JavaScript objects that work with AWS services. In this video; David Castillo demonstrates how to install the AWS SDK in Node.js using the npm package manager; configure the SDK; and set AWS credentials.
-
Introduction to JSON.org
JSON is a data interchange format that is used by many environments; including Amazon Web Services. In this video; David Castillo provides an introduction to JSON and how it can be used to describe very complex data structures.
-
Introduction to the Console
The Amazon Web Services (AWS) Management Console provides a user friendly interface when getting started with Amazon Web Services. In this video; David Castillo demonstrates how to navigate the AWS Management Console and how it can be used to familiarize yourself with AWS.
-
Marketplace
Amazon Web Services provides the AWS Marketplace where customers can purchase preconfigured software for use by the hour or month. In this video; David Castillo demonstrates the offerings available on Marketplace from the Software Infrastructure; Developer Tools; and Business Software categories.
-
Putting It All Together in the Browser SDK
In Amazon Web Services; using the Web Identity Federation allows you to authenticate users as they log in via their Amazon; Facebook; and Google identity providers. In this video; David Castillo demonstrates how to set up an HTML host page to authenticate users with Web Identity Federation.
-
S3 – Cold Storage with Glacier
In Amazon Web Services; Glacier is an inexpensive cold storage solution suited to storing the less frequently accessed information of your organisation. In this video; David Castillo explains the benefits of Glaciers cold storage platform and how to create a vault.
-
S3 – Organizer
In Amazon Web Services; there is an easy way to move files to and from your S3 buckets without having to log into the console every time. In this video; David Castillo demonstrates how to use the S3 Organizer to create an account; as well as to upload and download files.
-
S3 – Working with Buckets
In Amazon Web Services; the Amazon Simple Storage Service; or S3; allows you to easily store; organize; and share large volumes of content using buckets. In this video; David Castillo demonstrates how to create and manage a content storage bucket.
-
S3 – Working with Objects
In Amazon Web Services; using the Amazon Simple Storage Service; or S3; you can easily upload to and manage objects held in buckets. In this video; David Castillo demonstrates how to add; modify; and organize objects within your content storage buckets.
-
SimpleDB – Domains
Amazon Web Services' Web-based data store; SimpleDB; allows the addition and management of metadata apps using common API requests to query or retrieve multiple elements grouped by domain. In this video; David Castillo demonstrates how to configure a domain; invoke requests; and view XML responses.
-
SimpleDB – Operations
Amazon Web Services' Web-based data store; SimpleDB; allows the storage of data in domains as items comprising attribute name-value pairs. In this video; David Castillo demonstrates how to compile and input attribute name-value pairs; before running SQL-like queries or requests against the domain to extract XML responses.
-
SimpleDB – Running Queries
Amazon Web Services' Web-based data store; SimpleDB; allows you to run complex queries against domains containing items with multiple attributes and values. In this video; David Castillo demonstrates the syntax; statements; reserved words; and conditions used to run complex matching and range queries.
-
SNS – Basic Operations
In Amazon Web Services; the Simple Notification Service (SNS) offers application publishers and clients hosted; multi-protocol "push" messaging capabilities. In this video; David Castillo demonstrates how a publisher creates an SNS topic and subscription using a time-dependent subscription notification supported by a recognized protocol; before deleting the subscription and topic.
-
SNS – Integrating with SQS
In Amazon Web Services; the Simple Queue Service (SQS) allows; through an array of topic actions; automation of Simple Notification Service (SNS) responses. In this video; David Castillo demonstrates how to define topic and delivery policies for publishers and subscribers; select Amazon SQS as a subscription protocol; and create a subscription.
-
SQS – Advanced Topics
Amazon Web Services Simple Queue Service (SQS) provides advanced configuration options that allow you to isolate and manage unsuccessfully processed messages. In this video; David Castillo demonstrates how to create and configure a dead letter queue; and subscribe the queue to an Amazon SNS topic from within the AWS Management Console.
-
SQS – Basic Operations
Amazon Web Services allows you to use Simple Queuing Services to automatically handle notifications as they are generated and consumed. In this video; David Castillo demonstrates the lifecycle of a message in a queue; and how to create; configure; view; and work with these message queues.
-
Web Identity Federation for Browser Based Applications
Amazon Web Services (AWS) supports web identity federation to authenticate users of a browser-based application through trusted third-party identity providers. In this video; David Castillo demonstrates how to configure web identity federation in the browser by setting up Facebook as an identity provider with the SDK.
-
Working with Cloudwatch Metrics and Alarms Using the Command Line Interface
The Amazon Web Services Command Line Interface can be used to work with Cloud Watch Metrics and Alarms. In this video; David Castillo demonstrates how to put an alarm on a metric; describe an alarm on a metric; and disable an alarm.
-
Working with Cloudwatch Metrics and Alarms Using the NodeJS SDK
In Amazon Web Services; there are a number of functions that you can run with the Cloudwatch service using the Node SDK. In this video; David Castillo demonstrates how to configure and test the put alarm operation and describe alarms function; as well as how to enable and disable an alarm using Cloudwatch.
-
Working with DynamoDB in NodeJS CRUD Operations Using the SDK
In Amazon Web Services; there are a number of operations that you can perform using the NodeSDK running against the DynamoDB. In this video; David Castillo demonstrates how you can run and test get item; put item; and update item operations; as well as the delete item function in the command line prompt.
-
Working with DynamoDB in NodeJS Queries and Scans
In Amazon Web Services; you can perform query and scan operations against DynamoDB using the Node SDK. In this video; David Castillo demonstrates how to configure and run scripts and objects for use with the types of queries and scans you may wish to use.
-
Working with DynamoDB in NodeJS Tables
In Amazon Web Services (AWS); you can use Amazon DynamoDB which is a database service supporting operations to create and manage tables for storing and retrieving data. In this video; David Castillo demonstrates how to use the operations that enable you to create tables; list tables; return information about tables; and delete tables.
-
Working with DynamoDB Items CRUD
In the Amazon Web Services Command Line Interface; you can execute various actions with DynamoDB tables. In this video; David Castillo demonstrates how to call items from a table; insert items into a table; delete; and update items in a table.
-
Working with DynamoDB Tables
You can use the Amazon Web Services Command Line Interface to work with DynamoDB tables. In this video; David Castillo demonstrates how to create; describe; and delete tables; as well as how to list all the available tables.
-
Working with EC2 in NodeJS Elastic IP
Amazon Web Services (AWS) allows you to configure Elastic IP (EIP) addresses when working with EC2 instances in the AWS SDK for Node.js. In this video; David Castillo demonstrates the operations and syntax used to allocate; associate; dissociate; and release EIP addresses.
-
Working with EC2 in NodeJS ELB
Amazon Web Services (AWS) supports operations used in the Node.js SDK when utilizing the Elastic Load Balancing (ELB) service to improve the availability and scalability of applications running on Amazon EC2. In this video; David Castillo demonstrates how to create and delete load balancers; and register or deregister instances to and from load balancers.
-
Working with EC2 in NodeJS Instances
In Amazon Web Services (AWS); you can manage and deploy Amazon EC2 instances using the AWS SDK for Node.js. In this video; David Castillo demonstrates how to instantiate an EC2 object and run operations against the object that will enable you to run; stop; start; describe; and terminate EC2 instances from within Node.js applications.
-
Working with EC2 in NodeJS Volumes
Amazon Web Services (AWS) allows you to work with Amazon EBS storage volumes for use with EC2 instances in AWS SDK for Node.js. In this video; David Castillo demonstrates how to create; attach; detach; describe; and delete Amazon EBS volumes in Node.js.
-
Working with EC2 Instances Using the Command Line Interface
You can work with Amazon Web Services instances directly from the command line. In this video; David Castillo demonstrates how to work with EC2 instances using the command line interface.
-
Working with EC2 Key Pairs and Security Groups (Command Line)
In Amazon Web Services; you can create and work with EC2 key pairs and security groups directly from the command line. In this video; David Castillo demonstrates how to work with key pairs and security groups using the command line interface.
-
Working with EC2 Volumes and Snapshots (Command Line)
In Amazon Web Services; you can work with EC2 volumes and snapshots directly from the command line. In this video; David Castillo demonstrates how to work with volumes and snapshots using the command line interface.
-
Working with Elastic Load Balancing Using the Command Line Interface
Amazon Web Services offers various operations for working with Elastic IP addresses. In this video; David Castillo demonstrates how to allocate; associate; and disassociate Elastic IP addresses; as well as how to release addresses which are not in use.
-
Working with Elastic Transcoder Jobs Using the Command Line Interface
In Amazon Web Services; the Command Line Interface can be used to make working with Elastic Transcoder jobs easier. In this video; David Castillo demonstrates how to run operations to create; cancel; list; and read Elastic Transcoder jobs.
-
Working with Elastic Transcoder Pipelines Using the Command Line Interface
In Amazon Web Services; the Command Line Interface can be used to run operations in the Elastic Transcoder. In this video; David Castillo demonstrates how to run operations to create; delete; list or configure pipelines in the Command Line Interface when working with pipelines in Elastic Transcoder.
-
Working with Elasticache
In Amazon Web Services; you can run operations against Elasticache using the Command Line Interface. In this video; David Castillo demonstrates how to use Elasticache to manage and scale a distributed in-memory cache environment in the cloud.
-
Working with IAM Groups and Policies in NodeJS
In Amazon Web Services (AWS); you can use operations in the Node.js SDK to manage collections of users and user permissions in AWS. In this video; David Castillo demonstrates how to use operations to create a new IAM group and manage individual users within a specified group.
-
Working with IAM Users and Access Keys in NodeJS
In Amazon Web Services (AWS); you can use operations in the Node.js SDK to provide AWS identities for people in your AWS account. In this video; David Castillo demonstrates how to use operations to create new IAM users; update a username; retrieve user information; and delete specific users.
-
Working with IAM Groups and Policies Using the Command Line Interface
In Amazon Web Services; you can use the Command Line interface to execute basic actions with IAM groups. In this video; David Castillo demonstrates how to use a range of operations to create; configure; and delete groups in IAM.
-
Working with IAM Users and Access Keys using the Command Line Interface
Amazon Web Services has various user operations available in the command line interface. In this video; David Castillo demonstrates how to create users; list users; and change or delete user information.
-
Working with S3 Buckets Using the NodeJS SDK
In Amazon Web Services; there are a number of functions that you can perform when working with the S3 buckets in the Node SDK. In this video; David Castillo demonstrates some of the actions that you can perform; including create bucket; list bucket; put bucket website; and delete bucket.
-
Working with S3 High level commands
You can use the Amazon Web Services Command Line Interface to execute S3 High level commands. In this video; David Castillo demonstrates how to create an S3 bucket and access its items. He also demonstrates how to configure and remove a bucket and the items within it and explains available options for copying; and moving bucket objects; and synchronizing buckets.
-
Working with S3 Objects Using the NodeJS SDK
In Amazon Web Services; there are various operations that you can perform when working with objects in S3 using the Node SDK. In this video; David Castillo demonstrates how to use the get; put; list; and delete object functions.
-
Working with S3API Buckets and Policies
The Amazon Web Services interface can be used to perform S3API operations. In this video; David Castillo demonstrates how to create; list; set and remove the permissions on a bucket. He also demonstrates how to delete a bucket and the policy associated with it.
-
Working with S3API Objects Using the Command Line Interface
In Amazon Web Services; operations using the S3API service can be run via the command prompt to add; list; copy; retrieve; and delete S3API objects. In this video; David Castillo demonstrates how to work with S3API objects when running operations in the command line interface.
-
Working with SimpleDB Domains
In Amazon Web Services (AWS); you can use operations in the Node.js SDK to get started with Amazon SimpleDB. In this video; David Castillo demonstrates how to use the operations that allow you to create and verify domains; add items to a domain; and delete a domain.
-
Working with SimpleDB Items and Attributes
In Amazon Web Services (AWS); the SimpleDB service supports operations that allow you to manipulate the attributes associated with the items in a domain using the Node.js SDK. In this video; David Castillo demonstrates how to use the operations that enable you to return attributes associated with an item; replace an attribute; and delete attributes.
-
Working with SimpleDB Select
Amazon Web Services (AWS) allows you to use the Select operation to create and execute Amazon SimpleDB queries from within the Node.js SDK. In this video; David Castillo demonstrates how to run the Select operation against a SimpleDB object using comparison operators to execute simple and range queries.
-
Working with SNS in NodeJS
In Amazon Web Services; there are a number of functions that you can perform using the NodeSDK running against the Simple Notification Service (SNS). In this video; David Castillo demonstrates operations you can run against the SNS; such as subscription; publish; and unsubscribe.
-
Working with SNS Topics
The Amazon Web Services Command Line Interface allows web administrators to work with the Simple Notifications Service; or SNS. In this video; David Castillo demonstrates how to execute SNS operations including creating a topic; setting topic attributes and publishing a message to a topic.
-
Working with SQS in NodeJS
Amazon Web Services includes a Command Line Interface that Web administrators can use to execute simple queue operations. In this video; David Castillo demonstrates how to create a queue; send and receive messages between queues; and delete a queue.
-
Working with Trails and Logging
Amazon Web Services includes a command line interface that allows you to execute various Cloudtrail operations. In this video; David Castillo demonstrates how to execute basic Cloudtrail operations including creating and deleting a trail.
-
Enterprise-managed VPNs Overview
After watching this video; you will be able to manage the configuration of your application.
-
Adding Rules to an EC2 Security Group
After watching this video; you will be able to add rules to a security group on the Elastic Compute Cloud platform.
-
Amazon Elastic MapReduce Overview
After watching this video; you will be able to describe the Elastic MapReduce service on Amazon Web Services; and how it integrates with other big data services.
-
Amazon Kinesis Overview
After watching this video; you will be able to describe the Amazon Kinesis data processing service.
-
Analytics Components
After watching this video; you will be able to describe the Amazon Web Services analytics components.
-
Application Services Components
After watching this video; you will be able to describe the Amazon Web Services application services components.
-
Attaching an Instance to an Auto Scaling Group
After watching this video; you will be able to attach an instance to an Auto Scaling group on Elastic Compute Cloud.
-
AWS Accounts and Login
After watching this video; you will be able to create an account for Amazon Web Services and log in to the service.
-
AWS Marketplace
After watching this video; you will be able to use the AWS marketplace to find system images.
-
AWS Shared Responsibility Model
After watching this video; you will be able to describe the Shared Responsibility Model in Amazon Web Services.
-
Building Applications Using Best Practices
After watching this video; you will be able to describe best practices for building web applications on Amazon Web Services.
-
CDN Overview
After watching this video; you will be able to describe the function on a content delivery network and CloudFront on Amazon Web Services.
-
CloudSearch Overview
After watching this video; you will be able to describe the Amazon Web Services CloudSearch service.
-
Compute Components
After watching this video; you will be able to describe the Amazon Web Services compute components.
-
Configure Virtual Private Cloud Subnets
After watching this video; you will be able to configure network subnets in Amazon Web Services Virtual Private Clouds.
-
Configuring Active Directory Integration
After watching this video; you will be able to describe how Microsoft Active Directory can be integrated with Amazon Web Services.
-
Configuring an IAM Role for EC2 with AWS CLI
After watching this video; you will be able to configure an Identity and Access Management role for Elastic Compute Cloud using the Amazon Web Services command line interface.
-
Configuring EC2 Load Balancers
After watching this video; you will be able to configure a load balancer on the Elastic Compute Cloud platform.
-
Configuring EC2 Security Groups for VPC
After watching this video; you will be able to configure a security group on the Elastic Compute Cloud platform for Virtual Private Cloud.
-
Configuring IAM for an Account
After watching this video; you will be able to configure Identity and Access Management for an account in Amazon Web Services.
-
Configuring Route 53 as your DNS Provider
After watching this video; you will be able to configure Route 53 as your DNS service provider.
-
Configuring the AWS Command Line Interface
After watching this video; you will be able to configure the Amazon Web Services command line interface.
-
Configuring the cloud-init Directive
After watching this video; you will be able to configure the cloud-init directive on Linux for Amazon Web Services.
-
Configuring Two-Factor Authentication
After watching this video; you will be able to configure two-factor authentication in Amazon Web Services.
-
Configuring Virtual Private Cloud Access Control Lists
After watching this video; you will be able to configure access control lists on Amazon Web Services Virtual Private Clouds.
-
Configuring VPC Network Address Translation
After watching this video; you will be able to configure network address translation on Amazon Web Services Virtual Private Clouds.
-
Connecting to an EC2 Instance
After watching this video; you will be able to connect to a Windows and a Linux instance on the Elastic Compute Cloud platform.
-
Create a Virtual Private Cloud
After watching this video; you will be able to create a Virtual Private Cloud on Amazon Web Services.
-
Creating a CDN with CloudFront
After watching this video; you will be able to create a CloudFront content delivery network in Amazon Web Services.
-
Creating a Data Pipeline
After watching this video; you will be able to create an Amazon Web Services Data Pipeline.
-
Creating a Launch Configuration
After watching this video; you will be able to create a launch configuration on Elastic Compute Cloud.
-
Creating a Launch Configuration from an Instance
After watching this video; you will be able to create a launch configuration from an Elastic Compute Cloud image.
-
Creating a Linux EC2 Instance
After watching this video; you will be able to create a Linux instance on the Elastic Compute Cloud platform.
-
Creating a Placement Group
After watching this video; you will be able to create a placement group on Elastic Compute Cloud.
-
Creating a Simple Application Stack with OpsWorks
After watching this video; you will be able to create a simple application stack using OpsWorks.
-
Creating a Windows EC2 Instance
After watching this video; you will be able to create a Windows instance on the Elastic Compute Cloud platform.
-
Creating an AMI in EC2
After watching this video; you will be able to create an Amazon Machine Image on the Elastic Compute Cloud platform.
-
Creating an Audit Trail with CloudTrail
After watching this video; you will be able to create an audit trail on Amazon Web Services using CloudTrail.
-
Creating an Auto Scaling Group
After watching this video; you will be able to create an Auto Scaling group on Elastic Compute Cloud.
-
Creating an Auto Scaling Group from an Instance
After watching this video; you will be able to create an Auto Scaling group from an Elastic Compute Cloud instance.
-
Creating an EBS RAID Array on Linux
After watching this video; you will be able to create a Linux RAID array on Elastic Block Store on the Elastic Compute Cloud platform.
-
Creating an EBS RAID Array on Windows
After watching this video; you will be able to create a Windows RAID array on Elastic Block Store on the Elastic Compute Cloud platform.
-
Creating an IAM Role for EC2 with AWS CLI
After watching this video; you will be able to create an Identity and Access Management role for Elastic Compute Cloud using the Amazon Web Services command line interface.
-
Creating an S3 Bucket
After watching this video; you will be able to create an S3 bucket in Amazon Web Services.
-
Creating and Deleting a Connection
After watching this video; you will be able to create and delete an Amazon Web Services Direct Connect connection.
-
Creating and Deleting an EC2 Security Group
After watching this video; you will be able to create and delete a security group on the Elastic Compute Cloud platform.
-
Creating EBS Volumes
After watching this video; you will be able to create an Elastic Block Store volume on the Elastic Compute Cloud platform.
-
Creating EC2 Snapshots
After watching this video; you will be able to create a snapshot on the Elastic Compute Cloud platform.
-
Data Location
After watching this video; you will be able to describe best practice for determining data location in Amazon Web Services applications.
-
Database Components
After watching this video; you will be able to describe the Amazon Web Services database components.
-
Decouple Components
After watching this video; you will be able to describe application decoupling best practice for building apps on Amazon Web Services.
-
Define and Categorize Assets
After watching this video; you will be able to describe the process of defining and categorizing assets on Amazon Web Services as part of an Information Security Management System.
-
Deleting a Placement Group
After watching this video; you will be able to delete an Elastic Compute Cloud placement group.
-
Deployment and Management Components
After watching this video; you will be able to describe the Amazon Web Services deployment and management components.
-
Design for Failure
After watching this video; you will be able to describe design for failure best practice when architecting Amazon Web Services cloud services.
-
Design ISMS to Protect AWS Assets
After watching this video; you will be able to design an Information Security Management System to protect assets on Amazon Web Services.
-
Detaching an Instance from an Auto Scaling Group
After watching this video; you will be able to detach an instance from an Auto Scaling group on Elastic Compute Cloud.
-
Distributing Content with CloudFront
After watching this video; you will be able to create an S3 bucket and distribute content with CloudFront.
-
DynamoDB Concepts
After watching this video; you will be able to describe the basic concepts of DynamoDB databases on Amazon Web Services.
-
EBS Data at Rest
After watching this video; you will be able to describe EBS best practice for mitigating risk to data at rest.
-
EBS RAID Configuration Options
After watching this video; you will be able to describe options for configuring RAID arrays on Elastic Block Store on the Elastic Compute Cloud platform.
-
EC2 Amazon Machine Images
After watching this video; you will be able to describe Amazon Machine Images and how they are used on the Elastic Compute Cloud platform.
-
EC2 Components
After watching this video; you will be able to describe components relating to the Elastic Compute Cloud platform.
-
EC2 Concepts
After watching this video; you will be able to describe the architecture and concepts of Elastic Compute Cloud platform.
-
EC2 Security Groups Overview
After watching this video; you will be able to describe the use of security groups on the Elastic Compute Cloud platform.
-
Elastic Block Store Overview
After watching this video; you will be able to describe the Elastic Block Store service on the Elastic Compute Cloud platform.
-
Encrypting RDS Resources
After watching this video; you will be able to describe options for encrypting databases on Amazon Web Services Relational Database Services.
-
Exercise: Creating an Auto Scaling Group
After watching this video; you will be able to create a load balanced Auto Scaling group in Elastic Compute Cloud.
-
IAM Best Practice
After watching this video; you will be able to list best practices pertaining to Identity and Access Management on the Amazon Web Services platform.
-
IAM Features
After watching this video; you will be able to describe the basic concepts of Identity and Access Management on the Amazon Web Services platform.
-
Implement Elasticity
After watching this video; you will be able to describe best practice for implementing elasticity in Amazon Web Services applications.
-
Implementing Policies on Glacier
After watching this video; you will be able to configure policies on the Glacier storage service in Amazon Web Services.
-
Importing and Exporting an AMI in EC2
After watching this video; you will be able to import and export an Amazon Machine Image on the Elastic Compute Cloud platform.
-
Installing AWS Command Line Interface on Linux
After watching this video; you will be able to install the Amazon Web Services command line interface on a Linux instance.
-
Installing AWS Command Line Interface on Windows
After watching this video; you will be able to install the Amazon Web Services command line interface on a Windows instance.
-
Launch an EC2 Instance into a Virtual Private Cloud
After watching this video; you will be able to launch an EC2 instance into a Virtual Private Cloud on Amazon Web Services.
-
Launching an ElastiCache Cluster
After watching this video; you will be able to launch an ElastiCache cluster using the Amazon Web Services management console.
-
Launching an Instance into a Placement Group
After watching this video; you will be able to launch an Elastic Compute Cloud instance into a placement group.
-
Launching an Instance with an IAM Role Using AWS CLI
After watching this video; you will be able to launch an Elastic Compute Cloud instance with an Identity and Access Management role using the Amazon Web Services command line interface.
-
Launching an RDS DB Instance
After watching this video; you will be able to launch a DB Instance in Amazon Web Services Relational Database Services.
-
Linking an Instance to a VPC
After watching this video; you will be able to link an Elastic Compute Cloud instance to a virtual private cloud.
-
Load Balancing an Auto Scaling Group
After watching this video; you will be able to load balance an Auto Scaling group on Elastic Compute Cloud.
-
Manage Access to EC2
After watching this video; you will be able to describe how key pairs are used to manage access to EC2 instances.
-
Manage Accounts
After watching this video; you will be able to manage AWS and IAM accounts for security best practices on Amazon Web Services.
-
Managing IAM Users
After watching this video; you will be able to manage Identity and Access Management users in Amazon Web Services.
-
Managing RDS DB Access with IAM
After watching this video; you will be able to manage access to a DB Instance in Amazon Web Services Relational Database Services with Identity and Access Management.
-
Monitoring AWS with CloudWatch
After watching this video; you will be able to use Amazon Web Services CloudWatch to monitor billing and costs for AWS services.
-
Monitoring EC2 Instances with CloudWatch
After watching this video; you will be able to monitor Elastic Compute Cloud instances using CloudWatch.
-
Networking Components
After watching this video; you will be able to describe the Amazon Web Services networking components.
-
Object Storage Overview
After watching this video; you will be able to describe object storage in Amazon Web Services.
-
Overview of AWS ElastiCache
After watching this video; you will be able to describe the architecture of Amazon Web Services ElastiCache.
-
Overview of AWS RedShift
After watching this video; you will be able to describe the Amazon Web Services Redshift data warehouse service.
-
Overview of Placement Groups
After watching this video; you will be able to describe placement groups on Elastic Compute Cloud.
-
Parallelize
After watching this video; you will be able to describe best practice for parallelization in Amazon Web Services applications.
-
Performing EC2 Health Checks
After watching this video; you will be able to perform health checks on the Elastic Compute Cloud platform.
-
Planning EC2 Auto Scaling
After watching this video; you will be able to plan auto scaling on Elastic Compute Cloud.
-
Platform Overview
After watching this video; you will be able to describe the Amazon Web Services platform and recognize the global infrastructure components.
-
RDS Data at Rest
After watching this video; you will be able to describe RDS best practice for mitigating risk to data at rest.
-
RDS Security Groups
After watching this video; you will be able to contrast DB security groups and VPC security groups on Amazon Web Services Relational Database Services.
-
Registering a Domain through Route 53
After watching this video; you will be able to register a DNS domain through the Route 53 DNS service on Amazon Web Services.
-
Relational Database Service Overview
After watching this video; you will be able to describe the Amazon Web Services Relational Database Service.
-
S3 Data at Rest
After watching this video; you will be able to describe concerns for data at rest and S3 best practice for mitigating risks.
-
Sending E-mail with Simple E-mail Service
After watching this video; you will be able to send e-mail using Amazon Web Services Simple E-mail Service.
-
Shutting Down an Auto Scaling Group
After watching this video; you will be able to shut down an Auto Scaling group on Elastic Compute Cloud.
-
Simple Notification Service Overview
After watching this video; you will be able to describe the operation of Amazon Web Services Simple Notification Service.
-
Simple Queue Service Overview
After watching this video; you will be able to describe the operation of Amazon Web Services Simple Queue Service.
-
Simple Workflow Service Overview
After watching this video; you will be able to describe the operation of Amazon Web Services Simple Workflow Service.
-
Storage Components
After watching this video; you will be able to describe the Amazon Web Services storage components.
-
Suspending and Resuming an Auto Scaling Group
After watching this video; you will be able to suspend and resume an Auto Scaling group on Elastic Compute Cloud.
-
Tagging Auto Scaling Groups
After watching this video; you will be able to tag an Auto Scaling group on Elastic Compute Cloud.
-
The History of Amazon Web Services
After watching this video; you will be able to describe the history of the Amazon Web Services platform.
-
Transcoding Media Files with Elastic Transcoder
After watching this video; you will be able to transcode a media file with Amazon Web Services Elastic Transcoder.
-
Uploading Files to S3
After watching this video; you will be able to upload files to an S3 bucket in Amazon Web Services.
-
Using the IAM Console
After watching this video; you will be able to navigate the Identity and Access Management console in Amazon Web Services.
-
Working with DynamoDB Local
After watching this video; you will be able to perform DynamoDB database operations using DynamoDB Local.
-
Working with Virtual Interfaces
After watching this video; you will be able to view and delete a virtual interface in Amazon Web Services Direct Connect.
-
Writing Shell Scripts
After watching this video; you will be able to write a Linux shell script to run at boot up on Amazon Web Services.
-
Monitoring and Auditing a DB Instance
After watching this video; you will be able to create and monitor a DB instance on Amazon Web Services.
-
Working with Elastic Compute Cloud
After watching this video; you will be able to create a VPC; a security group; and a mirror set using EBS volumes using Elastic Compute Cloud on Amazon Web Services.
-
Amazon Automation
After watching this video; you will be able to describe Amazon services to help with task automation.
-
Amazon CloudTrail
After watching this video; you will be able to monitor AWS API calls.
-
Amazon CloudWatch
After watching this video; you will be able to monitor AWS log files.
-
Amazon Compute (EC2 & Lambda)
After watching this video; you will be able to describe the features of Amazon Compute services.
-
Amazon Databases
After watching this video; you will be able to identify Amazon database services.
-
Amazon Event-Driven Programming (SNS/SQS/SWF)
After watching this video; you will be able to use Amazon event services in your application.
-
Amazon Identity and Access Management
After watching this video; you will be able to administer AWS users and accounts.
-
Amazon Monitoring CloudWatch & CloudTrail
After watching this video; you will be able to use the CloudWatch and CloudTrail features of Amazon Monitoring.
-
Amazon Storage (S3)
After watching this video; you will be able to describe the features of Amazon S3.
-
Auto-scaling
After watching this video; you will be able to describe how AWS can scale server numbers to meet application load.
-
Bound Parameters and Callbacks
After watching this video; you will be able to prepare your environment to use the AWS SDK.
-
Bucket and Object Operations
After watching this video; you will be able to perform operations on S3 buckets and the objects in it.
-
Configuring Auto-scaling
After watching this video; you will be able to configure AWS to adjust server resources to meet application load.
-
Creating a CloudFront Streaming Distribution
After watching this video; you will be able to use CloudFront to distribute media streams efficiently.
-
Creating a CloudFront Web Distribution
After watching this video; you will be able to create a Cloudfront web distribution.
-
Creating a Custom VPC; Public and Private Subnets
After watching this video; you will be able to create an AWS Virtual Private Cloud and define its network.
-
Creating a NAT Instance
After watching this video; you will be able to secure your network services.
-
Creating and Configuring S3 Buckets
After watching this video; you will be able to create S3 buckets for data storage.
-
EC2 Snapshots
After watching this video; you will be able to work with Amazon EC2 snapshots.
-
Elastic Block Store/Snapshots
After watching this video; you will be able to use Amazon EBS in your project.
-
Express.JS Application Structure
After watching this video; you will be able to describe the file structure of an Express.JS application.
-
Hosting a CORS enabled website on S3
After watching this video; you will be able to host a website on Amazon S3.
-
IAM Permissions and Policies
After watching this video; you will be able to identify AWS access control mechanisms.
-
IAM Roles (EC2)
After watching this video; you will be able to describe IAM roles as they relate to EC2.
-
Installing Express.JS and Generator
After watching this video; you will be able to install Express.JS in your environment.
-
Installing Node.js & AWS SDK
After watching this video; you will be able to install Node.js and the Node Package Manager in AWS.
-
Introduction to Cloud Computing
After watching this video; you will be able to identify the features and benefits of cloud computing.
-
Introduction to Identity and Access Management
After watching this video; you will be able to identify features of Amazon IAM.
-
Introduction to JSON and JMESPATH
After watching this video; you will be able to make use of the JSON data description language.
-
Introduction to the Default VPC
After watching this video; you will be able to describe the features of the default VPC.
-
Introduction to the Documentation
After watching this video; you will be able to make use of AWS documentation.
-
Introduction to the Management Console
After watching this video; you will be able to describe the features of the AWS Management Console.
-
Launching an EC2 Instance (AMI )
After watching this video; you will be able to launch an EC2 instance from an AMI.
-
Security Groups and Network ACLs
After watching this video; you will be able to control access to your services.
-
Setting up your first VPC
After watching this video; you will be able to create and configure a VPC.
-
Simple Notification Service
After watching this video; you will be able to use Amazon SNS in your project.
-
Simple Queue Service
After watching this video; you will be able to use Amazon SQS with your project.
-
User Credentials and Multi-Factor Authentication
After watching this video; you will be able to describe AWS account credentials and security features.
-
Users; Key Pairs; and Passwords
After watching this video; you will be able to describe Amazon access credentials.
-
Versioning and Lifecycle Management
After watching this video; you will be able to track object versions and replicate objects across regions.
-
Web Identity Federation
After watching this video; you will be able to utilize access credentials from other services.
-
Accessing and Searching Auditing Information
After watching this video; you will be able to access and search Provisioning Services auditing information.
-
Adding Storage to a Target Device
After watching this video; you will be able to add storage to a target device in a Citrix environment.
-
Applying an AppFlow Policy
After watching this video; you will be able to apply an AppFlow policy.
-
Archiving an Audit Trail
After watching this video; you will be able to archive audit information so it can no longer be accessed by Provisioning Services.
-
Backing up the XenDesktop Database
After watching this video; you will be able to back up the XenDesktop database.
-
Backup and Restore of XenServer Metadata
After watching this video; you will be able to backup and restore XenDesktop metadata.
-
Citrix Licensing
In this video; Irving Simms discusses Citrix XenDesktop licensing options and key system requirements.
-
Citrix Receiver for MAC
After watching this video; you will be able to identify the factors and uses for implementing Citrix Receiver on a Mac.
-
Configure an AppFlow Policy
After watching this video; you will be able to configure an AppFlow policy by using the command line and configuration tool.
-
Configure and Access the Netscaler Audit Log
After watching this video; you will be able to configure and access the Netscaler audit log.
-
Configure Printing for Clients
After watching this video; you will be able to configure client printer creation behavior and configuration.
-
Configure Remote Access for StoreFront
After watching this video; you will be able to configure remote access capabilities for a StoreFront implementation.
-
Configure Settings for Print Drivers Policy
After watching this video; you will be able to configure Print Drivers policy settings.
-
Configure Universal Print Server Policy
After watching this video; you will be able to set Citrix Universal Print Server policies.
-
Configuring AppFlow Actions
After watching this video; you will be able to configure AppFlow actions.
-
Configuring Delivery Controllers
In this video; Irving Simms demonstrates how to configure delivery controllers for StoreFront.
-
Configuring Diagnostic Logging for Profile Management
After watching this video; you will be able to configure diagnostic logging for Profile Management.
-
Configuring NetScaler Policies
After watching this video; you will be able to configure Citrix NetScaler Policies.
-
Configuring Profile Management Policy
After watching this video; you will be able to locate and configure the Profile Management Policy.
-
Configuring Receiver
In this video; Irving Simms demonstrates how to configure and manage a Receiver for Web in the Citrix desktop environment.
-
Configuring Receiver Policy Settings
After watching this video; you will be able to locate and configure the Receiver Policy Settings.
-
Configuring Remote Assistance using Group Policy
After watching this video; you will be able to configure Remote Assistance using Group Policy settings.
-
Configuring Resources
In this video; Irving Simms demonstrates how to configure resources with Citrix Studio in Citrix XenDesktop 7.5.
-
Configuring StoreFront Access
In this video; Irving Simms demonstrates how to configure the access and authentication methods in Citrix StoreFront.
-
Configuring StoreFront Log Throttling
After watching this video; you will be able to configure StoreFront log throttling.
-
Configuring the Virtual Delivery Agent
In this video; Irving Simms describes how to install and configure the Virtual Delivery Agent (VDA) in Citrix XenDesktop 7.
-
Configuring Virtual Delivery Agent Settings
After watching this video; you will be able to configure Virtual Delivery Agent Settings.
-
Configuring XenServer Disaster Recovery
After watching this video; you will be able to configure XenServer Disaster Recovery.
-
Create and Apply Policies Using Group Policy
After watching this video; you will be able to create and apply Citrix policies using Group Policy.
-
Create and Apply Policies Using Studio
After watching this video; you will be able to create and apply Citrix policies using Studio.
-
Creating a Machine Catalog
In this video; Irving Simms demonstrates how to create a machine catalog.
-
Creating a vDisk
In this video; Irving Simms outlines the steps involved in creating a Virtual Disk (vDisk) using Provisioning Services in Citrix XenDesktop.
-
Creating Gateway Vserver
After watching this video; you will be able to create and configure the Citrix Gateway Vserver.
-
Creating Images
In this video; Irving Simms demonstrates the basic steps taken to create images for Provisioning Services for Citrix XenDesktop.
-
Delegating Administration
In this video; Irving Simms discusses delegated administration or role-based access control in Citrix XenDesktop.
-
Deploying Applications Using App-V
After watching this video; you will be able to deploying server or desktop applications using App-V.
-
Deploying Applications Using System Center
After watching this video; you will be able to deploying server or desktop applications using System Center.
-
Enabling Remote Assistance for Director Using VDA
After watching this video; you will be able to configure Remote Assistance for Citrix Director using the XenDesktop VDA installer.
-
Enabling StoreFront Log Tracing
After watching this video; you will be able to enable StoreFront log tracing.
-
Enabling the AppFlow Feature
After watching this video; you will be able to describe AppFlow; enable AppFlow; and specify a collector.
-
Enabling XenDesktop IntelliCache
After watching this video; you will be able to provide an overview of the XenDesktop IntelliCache and enabling IntelliCache for XenServer and XenDesktop.
-
Exploring the Director Dashboard
The Citrix Director is a web-based application installed with Citrix Studio. In this video; Irving Simms describes how to monitor and troubleshoot using Citrix Director in XenDesktop 7.
-
Generate a Configuration Logging Report
After watching this video; you will be able to generate a configuration logging report.
-
Implement Receiver Using Merchandising Server
After watching this video; you will be able to use Merchandising Server to implement Citrix Receiver in the XenDesktop environment.
-
Importance of Remote Assistance
After watching this video; you will be able to identify the impact of keeping remote assistance disabled.
-
Installing Citrix XenDesktop Director
After watching this video; you will be able to install and configure Citrix XenDesktop Director.
-
Interpreting Failures Using Director
After watching this video; you will be able to interpret failures in the Director Dashboard.
-
Interpreting Usage Data in Director
After watching this video; you will be able to interpret Usage Tables and Graphs in Director.
-
Introducing Citrix Profile Management Logging
After watching this video; you will be able to provide an overview of Citrix Profile Management logging and common events logged.
-
Introducing Configuration Logging
After watching this video; you will be able to identify the purpose of configuration logging and specify the database location.
-
Introducing Provisioning Services Auditing
After watching this video; you will be able to identify the use of Provisioning Services auditing in monitoring and demonstrate how to enable or disable Provisioning Services auditing.
-
Introducing Storefront Logs
After watching this video; you will be able to provide an overview of how Storefront logs are used in monitoring the Citrix environment.
-
Manage Access to Remote Stores
After watching this video; you will be able to using NetScaler Gateway to manage remote access to Stores.
-
Manage Printer Drivers
After watching this video; you will be able to manage universal printer drivers; automatic installation; printer driver mapping; and driver compatibility.
-
Managing a Store
In this video; Irving Simms demonstrates how to manage a store using Citrix StoreFront.
-
Managing Administrative Roles
In this video; Irving Simms demonstrates how to add an administrator and modify administrator permissions in Citrix XenDesktop.
-
Managing Delivery Groups
In this video; Irving Simms demonstrates how to create delivery groups in Citrix XenDesktop 7.5.
-
Managing Machine Catalogs
In this video; Irving Simms demonstrates how to perform some management tasks with machine catalogs.
-
Managing OS Images
In this video; Irving Simms discusses and demonstrates management of server and desktop OS images in Citrix XenDesktop 7.
-
Managing Personal vDisks
In this video; Irving Simms explores the various administration tasks that can be performed with vDisk in Provisioning Services.
-
Modify XenServer Virtual Machine Storage
After watching this video; you will be able to modify Citrix XenServer Virtual Machine storage settings.
-
Monitoring End-User Machines
In this video; Irving Simms demonstrates how to use the Citrix Director to monitor end-user machines.
-
Monitoring End-User Sessions
In this video; Irving Simms describes how to use the Citrix Director for monitoring end-user sessions.
-
Monitoring Intellicache with Director
After watching this video; you will be able to monitor Intellicache with Director.
-
Monitoring StoreFront Logs
In this video; Irving Simms demonstrates how to monitor StoreFront logs.
-
Monitoring Using the Host and Controller Tables
After watching this video; you will be able to monitor the Infrastructure using Director using Host table and Controller table.
-
Moving a XenDesktop Database
After watching this video; you will be able to move a XenDesktop database.
-
NetScaler Infrastructure
After watching this video; you will be able to outline deployment method; how users connect to NetScaler; firewall setup; IP address needs; ports used; and the authentication strategy.
-
Optimize Print Performance
After watching this video; you will be able to optimize printing performance in a Citrix environment.
-
Overview of Citrix Policies
After watching this video; you will be able to identify key features and implementation considerations for Citrix Policies.
-
Overview of Citrix Receiver
After watching this video; you will be able to identify the use and functionality of Citrix Receiver in providing access to your XenDesktop applications.
-
Overview of Desktop and App Architecture
In this video; Irving Simms describes the Citrix XenDesktop and XenApp architecture.
-
Overview of Director
In this video; Irving Simms describes the Citrix XenDesktop7 Solution Director and its use in monitoring user sessions.
-
Overview of Monitoring with Citrix Director
After watching this video; you will be able to provide an overview of monitoring functionality with Citrix Director.
-
Overview of NetScaler
After watching this video; you will be able to understand NetScaler Terminology and how to give users access to apps and data; how to optimize and secure cloud services; and app delivery with performance and reliability.
-
Overview of NetScaler Policies
After watching this video; you will be able to identify the role and characteristics of Citrix NetScaler Policies.
-
Overview of Policies
XenDesktop's very rich policy management feature can help you manage every aspect of the user's XenDesktop experience. In this video; Irving Simms describes Citrix policies and when to use them; including policy precedence; Studio policies; and Group Policy objects.
-
Overview of Provisioning Services
In this video; Irving Simms describes the purpose and use of Provisioning Services in Citrix XenDesktop.
-
Overview of XenDesktop Database
After watching this video; you will be able to identify features of the XenDesktop database.
-
Overview of XenServer Disaster Recovery
After watching this video; you will be able to identify the capabilities of the XenServer Disaster Recovery feature.
-
Perform a Catalog Upgrade
After watching this video; you will be able to perform a XenDesktop Catalog upgrade.
-
Prepare for a Catalog Upgrade
After watching this video; you will be able to identify the prerequisites for upgrading a XenDesktop Catalog.
-
Prerequisites for Creating a vDisk
After watching this video; you will be able to identify the prerequisites for creating a vDisk.
-
Processing User Profiles
After watching this video; you will be able to process Citrix user profiles.
-
Provisioning Services Console
In this video; Irving Simms discusses the Provisioning Services Console and explores how to configure a master image to be used for Provisioning Services.
-
Publishing Applications Using a VM
After watching this video; you will be able to Publish server or desktop applications using a VM.
-
Publishing Applications Using AppCenter
After watching this video; you will be able to publish server or desktop applications using AppCenter.
-
Removing Configuration Logs
After watching this video; you will be able to remove the contents of a configuration logging database.
-
Resetting User Profiles
After watching this video; you will be able to reset Citrix user profiles.
-
Resolve XenDesktop Configuration Issues
After watching this video; you will be able to review and resolve common XenDesktop issues.
-
Restoring the XenDesktop Database
After watching this video; you will be able to restore the XenDesktop database.
-
Restoring User Profiles
After watching this video; you will be able to restore Citrix user profiles.
-
Review Client Printer Policy Settings
After watching this video; you will be able to review the clients' printer policy settings.
-
Review the ICA Keep-Alive Settings
After watching this video; you will be able to review ICA Keep-Alive settings.
-
Reviewing Auto Client Reconnect Settings
After watching this video; you will be able to review and adjust the Auto Client Reconnect settings.
-
Reviewing Netscaler Load Balancing
After watching this video; you will be able to review the configuration for Netscaler load balancing for StoreFront servers.
-
Reviewing Session Reliability
After watching this video; you will be able to review and adjust Session Reliability policy settings.
-
Set Up the Print Server
After watching this video; you will be able to manage and configure the universal print server.
-
Setting Up NetScaler
After watching this video; you will be able to install NetScaler and perform initial configuration.
-
Troubleshoot Citrix Licensing Issues
After watching this video; you will be able to troubleshoot common licensing issues in the XenDesktop/XenApp environment.
-
Troubleshoot Citrix Receiver
After watching this video; you will be able to perform common troubleshooting tasks for the Citrix Receiver .
-
Troubleshoot Common Installation Issues
After watching this video; you will be able to troubleshoot common installation issues.
-
Troubleshooting Delivery Agent Issues
Citrix XenDesktop 7 is an advanced platform that provides various options for troubleshooting. In this video; Irving Simms demonstrates how to troubleshoot issues with the delivery agent.
-
Troubleshooting Licensing Issues
In this video; Irving Simms demonstrates how to troubleshoot licensing issues in Citrix XenDesktop 7.
-
Troubleshooting NIC Bond Configuration
After watching this video; you will be able to review the NIC Bonds in EServer and Active/Active and Active/Passive Bond type.
-
Troubleshooting Personal vDisks
In this video; Irving Simms describes troubleshooting approaches for resolving issues with Personal vDisks in Citrix XenDesktop.
-
Troubleshooting Provisioning Services
In this video; Irving Simms describes how to troubleshoot provisioning services in Citrix XenDesktop 7.5.
-
Troubleshooting the VDA Registration Process
After watching this video; you will be able to use the XDPing tool to troubleshoot the virtual desktop agent (VDA) registration process.
-
Troubleshooting the VDA using Event Log Entries
After watching this video; you will be able to identify event log entries to look for when troubleshooting the virtual desktop agent (VDA).
-
Troubleshooting User Issues
In this video; Irving Simms demonstrates how to use Citrix Director to troubleshoot user and workstation-related issues.
-
Troubleshooting User Profile Issues
After watching this video; you will be able to troubleshoot user profile issues using Gpupdate.
-
Troubleshooting using Ports
After watching this video; you will be able to identify the ports used by Citrix XenDesktop.
-
Updating Citrix Receiver
After watching this video; you will be able to update Citrix Receiver.
-
User Profile Considerations
XenDesktop offers the ability to personalize the user experience through user profiles. In this video; Irving Simms discusses user profiles; types of management; persistence of settings; platform considerations; and profile performance.
-
Using Director as Administrator
After watching this video; you will be able to demonstrate the use of XenDesktop Director as an Administrator.
-
Using Director as Technician
After watching this video; you will be able to demonstrate the use of XenDesktop Director as a Technician.
-
Using the AppFlow Command Line
After watching this video; you will be able to set parameters for the AppFlow command and enabling AppFlow for specific services or virtual servers.
-
Verifying Virtual Desktop Farm Membership
After watching this video; you will be able to verify the virtual desktop has been added to the correct farm.
-
Viewing Configuration Log Reports
After watching this video; you will be able to view a configuration logging report.
-
Managing Configuration Logging
After watching this video; you will be able to manage configuration logging including enabling/disabling logging.
-
Monitoring System Performance Through User Logon
After watching this video; you will be able to monitor your system performance through auditing of user logons.
-
Resolve NetScaler and ICA Proxy Issues
After watching this video; you will be able to identify and resolve the common known issues with NetScaler and ICA Proxy.
-
Resolve Storage Performance Bottlenecks with MCS
After watching this video; you will be able to identify and troubleshoot storage performance bottlenecks with Machine Creation Services (MCS).
-
Resolving Application Failures Using Director
After watching this video; you will be able to resolve application failures with Director.
-
Review the Settings for Workspace Control
After watching this video; you will be able to review the settings for workspace control.
-
Troubleshoot Causes of Personal vDisk Failures
After watching this video; you will be able to review the common causes of personal vDisk failures.
-
Troubleshooting App Performance and Failure
After watching this video; you will be able to review and troubleshoot common issues with application performance and failure.
-
Troubleshooting Citrix Receiver Issues
After watching this video; you will be able to troubleshoot common issues with Citrix Receiver.
-
Troubleshooting Citrix Studio Issues
After watching this video; you will be able to identify and troubleshoot common issues with Citrix Studio.
-
Troubleshooting Common User Access Issues
After watching this video; you will be able to troubleshoot common user access issues.
-
Troubleshooting Desktop Pass-through
After watching this video; you will be able to troubleshoot desktop pass-through events with Storefront and Receiver.
-
Troubleshooting Machine Creation Services
After watching this video; you will be able to troubleshoot common issues with Machine Creation Services.
-
Verifying DNS Configuration
After watching this video; you will be able to verify the Domain Name Services (DNS) are properly configured.
-
Verifying System Time is in Sync
After watching this video; you will be able to verify system time is in sync.
-
Verifying Virtual Desktop Firewall Configuration
After watching this video; you will be able to verify the virtual desktop firewall configuration.
-
Verifying Virtual Desktop SPN Configuration
After watching this video; you will be able to verify virtual desktop Service Principal Names (SPNs) are properly configured.
-
Business Case
Cloud Computing has many advantages in the business environment compared to on-site storage and computing solutions. In this video; Byron Hynes discusses the benefits that Cloud Computing has when used in a commercial or business environment; such as scaling; elasticity; pay-per-use; and 'On Demand' functionality.
-
Elastic Provisioning
Cloud Computing has Elastic Provisioning capabilities ensuring that during periods of high and low workflow; the cloud adjusts accordingly. In this video; Byron Hynes demonstrates how Elastic Provisioning can be beneficial in a business environment by providing variable CPU power and memory processing; and virtual machine provisioning.
-
How to Choose
In Cloud Computing; there are a number of service providers of different sizes and scope of expertise offering their services to individuals or businesses. In this video; Byron Hynes explains how to select a service provider which will suit the individual needs of a person or business; and discusses service agreements in relation to budgets.
-
Manage and Monitor
In Cloud Computing; you have a number of options for managing and monitoring applications and services. In this video; Byron Hynes discusses the various types of cloud platforms and services; and the reasons and processes for managing and monitoring them.
-
Myths and Concerns
Cloud Computing is still not fully understood and many people still hold concerns which are not entirely valid. In this video; Byron Hynes discusses some of the common myths and concerns surrounding Cloud Computing.
-
Service Models
In Cloud Computing; the relationship an individual or business builds with a service provider depends on the needs of that person or business. In this video; Byron Hynes explains the three main Service Models used most frequently and the ways each can be used depending on your business requirements.
-
Terminology
Cloud Computing contains a range of terms; definitions; and acronyms which are important to understand. In this video; Byron Hynes presents a selection of the new terminology which you may encounter when dealing with Cloud Computing services.
-
Virtualization and the Cloud
After watching this video; you will be able to describe how virtualization enables key characteristics of cloud computing.
-
Benefits of Cloud Computing
After watching this video; you will be able to describe the business; operational; and strategic benefits of cloud computing for organizations.
-
Calculating the Cost of the Cloud
After watching this video; you will be able to identify factors to consider when implementing a cloud solution.
-
Cloud Characteristics
After watching this video; you will be able to describe the cloud characteristics.
-
Cloud Service Providers
After watching this video; you will be able to identify key considerations for choosing a cloud provider.
-
Cloud Terminologies
After watching this video; you will be able to identify the cloud terminologies.
-
Common Implementation Obstacles
After watching this video; you will be able to identify common cloud implementation obstacles for a business.
-
Deciding to Move to the Cloud
After watching this video; you will be able to determine if cloud computing should be implemented in your business.
-
Development of Cloud Computing
After watching this video; you will be able to describe the technological developments that facilitated the deployment of cloud computing.
-
Disadvantages to Using Cloud Computing
After watching this video; you will be able to identify the key cloud computing implementation considerations.
-
How Cloud Computing Adds Value to a Business
After watching this video; you will be able to identify how the cloud can add value to a business.
-
Other Cloud Computing Service Models
After watching this video; you will be able to recognize STaaS; CaaS; BPaaS; and other cloud service models.
-
Regulatory and Compliance Issues with Cloud Computing
After watching this video; you will be able to describe the compliance and regulatory issues with adopting cloud computing in a business.
-
Security in Cloud Computing
After watching this video; you will be able to identify how security is controlled and describe issues that may arise in cloud computing.
-
The Community Cloud Deployment Model
After watching this video; you will be able to describe the community cloud deployment model including its benefits; drawbacks; and security considerations.
-
The Hybrid Cloud Deployment Model
After watching this video; you will be able to describe the hybrid cloud deployment model including its benefits; drawbacks; and security considerations.
-
The IaaS Service Model
After watching this video; you will be able to describe the IaaS service model.
-
The PaaS Service Model
After watching this video; you will be able to describe the PaaS service model.
-
The Private Cloud Deployment Model
After watching this video; you will be able to describe the private cloud deployment model including its benefits; drawbacks; and security considerations.
-
The Public Cloud Deployment Model
After watching this video; you will be able to describe the public cloud deployment model including its benefits; drawbacks; and security considerations.
-
The SaaS Service Model
After watching this video; you will be able to describe the SaaS service model.
-
The Two Types of Business Cloud Models
After watching this video; you will be able to describe the cloud-based and cloud-enabled business models.
-
Transitioning from SOA to Cloud
After watching this video; you will be able to describe the function of service level agreements in cloud services and transitioning from SOA to SLA.
-
Usage Scenarios for Cloud Computing
After watching this video; you will be able to describe the different usage scenarios where cloud computing would be beneficial.
-
What is Cloud Computing?
After watching this video; you will be able to describe cloud computing.
-
Application-level Security
After watching this video; you will be able to describe application-level security in cloud computing.
-
Assessing Applications for the Cloud
After watching this video; you will be able to assess an application's suitability to move to the cloud.
-
Assessing Candidate Cloud Platforms
After watching this video; you will be able to assess cloud platforms for a migration to the cloud.
-
Assessing Cloud Service Security Offerings
After watching this video; you will be able to describe how to assess security offerings for cloud services.
-
Barriers to Cloud Adoption
After watching this video; you will be able to describe barriers to cloud adoption and changing attitudes to cloud.
-
Benefits and Risks of Single Sign-On
After watching this video; you will be able to list benefits and risks of single sign-on.
-
Business and Consumer Cloud Services
After watching this video; you will be able to describe use cases for the cloud from the perspective of users and different types of business.
-
Business Factors Affecting Cloud Migration
After watching this video; you will be able to describe business factors affecting a migration to the cloud.
-
Business Trends in Cloud Computing
After watching this video; you will be able to describe business trends in cloud computing .
-
Choosing a Cloud Service
After watching this video; you will be able to determine suitability for given IT services to be moved to the cloud.
-
Cloud APIs
After watching this video; you will be able to list common cloud application programming interfaces.
-
Cloud Compliance and Regulatory Issues
After watching this video; you will be able to describe compliance and regulatory issues as they pertain to the cloud.
-
Cloud Computing Core Attributes
After watching this video; you will be able to define the core attributes of a cloud computing service.
-
Cloud Computing Key Enabling Technologies
After watching this video; you will be able to list the key technologies that enable cloud computing.
-
Cloud Costing Models
After watching this video; you will be able to describe costing considerations for different cloud deployment models.
-
Cloud Data Center Components
After watching this video; you will be able to describe the functional components of a cloud data center including storage; networking; computing; management; and services.
-
Cloud Data Centers
After watching this video; you will be able to describe how data centers relate to and enable cloud computing.
-
Cloud Federation Considerations
After watching this video; you will be able to describe considerations for implementing identity federation in cloud services.
-
Cloud Network Infrastructure Security
After watching this video; you will be able to describe considerations for infrastructure security in cloud computing.
-
Cloud Privacy Concerns
After watching this video; you will be able to describe privacy concerns for cloud systems.
-
Cloud Protocols and Standards
After watching this video; you will be able to list common protocols and standards in use in cloud computing.
-
Cloud Security Challenges
After watching this video; you will be able to describe the challenges associated with cloud security.
-
Cloud Security Models
After watching this video; you will be able to describe three models for public cloud security responsibilities.
-
Cloud Security Protocols
After watching this video; you will be able to list common cloud security protocols.
-
Cloud Security Recommendations
After watching this video; you will be able to describe the Cloud Standards Customer Council recommendations for cloud security.
-
Cloud Security Risk Areas
After watching this video; you will be able to describe security risk areas for cloud computing.
-
Cloud Security Risk Assessment
After watching this video; you will be able to describe how to perform risk assessment in a cloud environment.
-
Cloud Security SLAs
After watching this video; you will be able to describe service-level agreements for cloud security.
-
Cloud Service Directory
After watching this video; you will be able to describe the function of a service directory in deploying cloud services.
-
Cloud Service Evaluation
After watching this video; you will be able to evaluate cloud services in a number of areas including levels of control and interoperability.
-
Cloud Service Level Agreements
After watching this video; you will be able to describe the function of service level agreements in cloud services.
-
Cloud Service Providers and IAM
After watching this video; you will be able to describe how cloud service providers can provide identity and access management.
-
Cloud Service Stacks
After watching this video; you will be able to describe how cloud services can be stacked to form complete solutions.
-
Cloud Standards
After watching this video; you will be able to describe emerging standards for cloud computing.
-
Cloud Standards Groups
After watching this video; you will be able to list the groups working on cloud computing standards.
-
Cloud Storage and Data Security
After watching this video; you will be able to describe data security considerations in cloud storage systems.
-
Cloud Storage and Privacy Concerns
After watching this video; you will be able to describe privacy concerns for personally identifiable information stored on public cloud services.
-
Cloud Storage Data Classification
After watching this video; you will be able to describe the function of data classification in cloud storage governance.
-
Cloud Storage Governance Domains
After watching this video; you will be able to describe the Cloud Security Alliance cloud governance domains as they pertain to data stored on cloud services.
-
Cloud Storage Governance Issues
After watching this video; you will be able to describe cloud storage governance issues .
-
Controlling Access to Cloud Data
After watching this video; you will be able to describe methods of controlling access to data stored in the cloud.
-
Core Cloud Computing Service Models
After watching this video; you will be able to list the three main cloud service models.
-
Costing the Cloud
After watching this video; you will be able to describe the cost of cloud computing compared to traditional IT in terms of CAPEX and OPEX.
-
Data Center Applications
After watching this video; you will be able to describe how cloud data centers are designed to support applications.
-
Data Center Function
After watching this video; you will be able to describe the functions provided by a modern data center.
-
Data Center Overview
After watching this video; you will be able to describe the components of a modern data center.
-
Data Life Cycle
After watching this video; you will be able to describe the data life cycle in the context of cloud computing.
-
Data Security Challenges
After watching this video; you will be able to describe data security challenges in cloud computing.
-
Definition of Cloud Computing
After watching this video; you will be able to define cloud computing according to relevant standards.
-
Desktop Virtualization
After watching this video; you will be able to describe virtual desktop infrastructure and application virtualization as components of desktop virtualization.
-
Evaluating Cloud Security
After watching this video; you will be able to evaluate security issues in cloud services against traditional IT.
-
Federation Overview
After watching this video; you will be able to describe the concepts associated with identity federation.
-
Grid Computing vs Cloud Computing
After watching this video; you will be able to contrast grid computing and cloud computing.
-
Hardware Virtualization
After watching this video; you will be able to describe the processes and components of hardware virtualization.
-
History of Cloud Computing
After watching this video; you will be able to describe the development of computing from mainframes to the cloud.
-
Host-level Security
After watching this video; you will be able to describe host-level security considerations in cloud computing.
-
Hypervisors
After watching this video; you will be able to describe Type I and Type II virtualization hypervisors.
-
IDaaS Pros and Cons
After watching this video; you will be able to list pros and cons of identity as a service.
-
Identity and Access Management Basic Concepts
After watching this video; you will be able to describe the basic concepts of identity and access management.
-
Identity and Access Management Operational Areas
After watching this video; you will be able to describe the operational areas of identity and access management.
-
Identity as a Service Challenges
After watching this video; you will be able to describe challenges to implementing identity as a service.
-
Identity as a Service Overview
After watching this video; you will be able to describe the identity as a service authentication infrastructure.
-
Information Security Objectives
After watching this video; you will be able to describe the objectives of information security and how they relate to the cloud.
-
Information Security Standards
After watching this video; you will be able to describe relevant ISO standards for information security.
-
Infrastructure as a Service
After watching this video; you will be able to describe the infrastructure as a Service cloud service model.
-
Integrating IDaaS and Other Service Models
After watching this video; you will be able to describe methods for integrating identity as a service with other service models.
-
Issues with Public Clouds
After watching this video; you will be able to describe potential privacy; regulatory; and security issues with public clouds.
-
Loosely and Tightly Coupled Services
After watching this video; you will be able to contrast loosely and tightly coupled processes when considering a cloud migration.
-
Managing Cloud Data Security
After watching this video; you will be able to describe measures to secure data and connection in a cloud environment.
-
Managing Storage; Governance; and Standards
After watching this video; you will be able to given a scenario; describe best practice for working with cloud storage in terms of governance and standards.
-
Mapping Security Measures to the Data Life Cycle
After watching this video; you will be able to map cloud security measures to the data life cycle stage to which they apply.
-
Migrating Processes and Services
After watching this video; you will be able to describe the process of migrating IT services and business processes to the cloud.
-
Migrating to the Cloud
After watching this video; you will be able to assess a service for migration to public or private clouds; and determine which cloud type to select.
-
Mitigating Public Cloud Concerns
After watching this video; you will be able to describe strategies to mitigate potential privacy; regulatory; and security issues with public clouds.
-
Mobile Cloud Clients
After watching this video; you will be able to describe the characteristic of mobile devices connecting to cloud services.
-
Network Functions Virtualization
After watching this video; you will be able to describe network functions virtualization.
-
Open Source Cloud and N-Tier Architecture
After watching this video; you will be able to describe open source cloud software for n-tier applications.
-
Open Source Overview
After watching this video; you will be able to describe open source and how it pertains to the cloud.
-
OpenStack Overview
After watching this video; you will be able to describe OpenStack open source cloud software.
-
Oracle and IBM Server Virtualization Products
After watching this video; you will be able to Describe Oracle and IBM server virtualization products.
-
Planning Cloud Deployment
After watching this video; you will be able to plan deployment of services to the cloud.
-
Platform as a Service
After watching this video; you will be able to describe the platform as a Service cloud service model.
-
Presence Information Overview
After watching this video; you will be able to describe presence information and how it is used in cloud systems.
-
Presence Process and Tools
After watching this video; you will be able to describe the processes and tools associated with a presence system.
-
Presence Security
After watching this video; you will be able to describe security considerations for presence systems.
-
Presence System Components
After watching this video; you will be able to describe the components of a presence system.
-
Privacy Policies
After watching this video; you will be able to describe privacy policies and how they are implemented in cloud systems.
-
Private and Hybrid Clouds
After watching this video; you will be able to describe how private and hybrid clouds can mitigate potential privacy; regulatory; and security issues with public clouds.
-
Reasons for Identity Federation
After watching this video; you will be able to list reasons for using federated identity.
-
SaaS Security Best Practices
After watching this video; you will be able to describe best practices for securing a Software as a Service offering.
-
SaaS Security Challenges
After watching this video; you will be able to describe challenges associated with security in a Software-as-a-Service offering.
-
Secure Software Development
After watching this video; you will be able to describe secure software development practices.
-
Securing Data at Rest and Data in Transit
After watching this video; you will be able to describe measures to secure data at rest and data in transit.
-
Security as a Service
After watching this video; you will be able to describe the Security as a Service model.
-
Service Oriented Architecture
After watching this video; you will be able to describe service oriented architecture.
-
Single Sign-On Overview
After watching this video; you will be able to describe access control systems with single sign-on.
-
SOA and Cloud Computing
After watching this video; you will be able to describe the link between SOA and cloud computing.
-
SOA Architectures
After watching this video; you will be able to describe common application architectures and how they relate to SOA and the cloud.
-
SOA Benefits
After watching this video; you will be able to list the benefits of SOA compared to traditional IT solutions.
-
Software as a Service
After watching this video; you will be able to describe the software as a Service cloud service model.
-
STaaS Model Advantages
After watching this video; you will be able to list the advantages of the Storage as a Service model.
-
STaaS Model Risks
After watching this video; you will be able to list the risks associated with Storage as a Service model.
-
Standards-based Federation
After watching this video; you will be able to describe standards for identity federation.
-
Storage as a Service
After watching this video; you will be able to Describe the Storage as a Service model as it relates to cloud computing.
-
Storage Virtualization
After watching this video; you will be able to describe storage types and storage virtualization technologies.
-
Technical Factors Affecting Cloud Migration
After watching this video; you will be able to describe technical factors affecting a migration to the cloud.
-
Technical Trends in Cloud Computing
After watching this video; you will be able to describe technical trends in cloud computing.
-
The Cloud Cube Model
After watching this video; you will be able to describe the Jericho Forum Cloud Cube Model for defining cloud characteristics.
-
Virtualization and the Cloud Data Center
After watching this video; you will be able to describe the functions of the cloud data center and how they utilize virtualization technologies.
-
Virtualization Host Security
After watching this video; you will be able to describe considerations for security virtualization hosts in a cloud environment.
-
Virtualization Overview
After watching this video; you will be able to describe the key terms associated with virtualization.
-
Web Standards
After watching this video; you will be able to list web standards relevant to cloud computing.
-
x86 Server Virtualization Products
After watching this video; you will be able to describe Microsoft Hyper-V; VMware vSphere; and Citrix XenServer.
-
XaaS Cloud Computing Service Models
After watching this video; you will be able to recognize STaaS; CaaS; BPaaS; and other cloud service models.
-
Sharing Your Prezi
Prezis allow you to create a custom web address and send out your presentation to participants. In this video; Josh Penzell demonstrates how to edit your public profiling and broadcast your Prezi.
-
Using Notebooks in Evernote
The Evernote notebook feature allows you to capture all your thoughts and access them on any of your devices. In this video; Josh Penzell demonstrates how to create notebooks and organize your notes.
-
Using Tags in Evernote
Tags in Evernote allow you to organize your notes without having to sort them into folders. In this video; Josh Penzell demonstrates how to use multiple tags for your notes and synchronize them to all your devices.
-
Adding Content to Evernote
Evernote allows you to add content in myriad ways. In this video; Josh Penzell demonstrates how to create notes and sync up and also import text and images from web pages into your notes.
-
Importing PowerPoint Files into Prezi
Prezi allows you to import your PowerPoint files. In this video; Josh Penzell demonstrates how to upload your PowerPoint presentations and convert them automatically to a Prezi.
-
Installing and Setting Up Dropbox
Installing; setting up; and getting started with a Dropbox account is easy. In this video; Josh Penzell walks you through setting up an account using the web interface and installing the Dropbox software onto your Windows computer.
-
Installing and Setting Up Evernote
Starting an Evernote account is easy. In this video; Josh Penzell walks you through setting up an account using the web interface and installing Evernote software onto your Windows computer.
-
Introduction to Dropbox
Dropbox saves you the effort of emailing or using a flash drive to stay up-to-date by syncing instantaneously across multiple devices. In this video; Josh Penzell demonstrates the value in using Dropbox to add; delete; and edit notes.
-
Introduction to Evernote
Evernote allows you to edit and sync notes on the web-based and desktop applications. In this video; Josh Penzell demonstrates how to sync; autosave; and share notes and select an Evernote version appropriate to your needs.
-
Introduction to Prezi
Prezi; a cloud-based service; allows you to present your ideas as one big image that you navigate around instead of many different slides. In this video; Josh Penzell explains what are Prezis and the pros and cons of a private Prezi account over a public account.
-
Introduction to SkyDrive
Microsoft SkyDrive allows you to upload documents to the cloud and integrate well with Windows 8 and Office 2013. In this video; Josh Penzell demonstrates how to save a PowerPoint presentation on SkyDrive.
-
Restoring Files
Dropbox’s Packrat feature allows you to restore files that you might have accidentally deleted. In this video; Josh Penzell demonstrates how to retrieve different versions of a file that has been deleted permanently.
-
Sharing Folders with Others
Dropbox allows you to share folders and makes collaboration as easy as saving a file to a folder. In this video; Josh Penzell demonstrates how to invite your contacts to view and share folders.
-
Sharing Individual Files
Dropbox allows you to share just about any file of any size. In this video; Josh Penzell demonstrates how to give a large file its own URL and share it with your colleagues.
-
Characteristics of Private Clouds
The private cloud services are available to users within an organization only. In this video; Dan LaChance demonstrates the characteristics of private cloud services.
-
Accountability in the Cloud
Cloud accountability specifies who is responsible for specific portions of delivery of IT services over a network. In this video; Dan LaChance discusses accountability in the cloud.
-
Anti-malware Solutions
In this video; Dan LaChance; discusses anti-malware solutions and why it's important to mitigate its effect when hardening a host.
-
Application Testing
In this video; Dan LaChance discusses application testing in CompTIA Cloud+.
-
Assessing Requirements for Mission Critical Systems
When preparing for the CompTIA Cloud+ certification; you need to know about the assessment requirements for Mission Critical systems. It is important that cloud customers have confidence in the cloud service’s ability to run Mission Critical services. In this video; Dan LaChance discusses the considerations to be undertaken before hosting these systems on the cloud.
-
Automated Remediation
The CompTIA Cloud+ certification covers automated remediation; which is the process of an action being automatically generated once a certain threshold is exceeded. Examples of automated actions include the provision of extra resources or the shut-down of a virtual machine. In this video; Dan LaChance discusses automated remediation and its importance in cloud services.
-
Backup and Recovery
In preparing for the CompTIA Cloud+ certification; you need to know about disaster recovery methods and concepts; including backup and recovery. When examining backup and recovery it's important to consider the perspective of both the cloud tenant and the cloud provider. In this video; Dan LaChance discusses the three types of backup and some of the key configuration issues to consider.
-
Bandwidth and Latency
Network bandwidth and network latency relate to the quality of service on a network. In this video; Dan LaChance discusses network bandwidth and sources of network latency.
-
Baselines and Thresholds
The CompTIA Cloud+ certification covers baselines and thresholds. Baselines are established over time so that abnormal activity can be distinguished from normal activity; and thresholds alert users when abnormal activities occur. In this video; Dan LaChance explains baselines and thresholds in greater detail
-
Capacity Management
The CompTIA Cloud+ certification covers capacity management which allows you to ensure that there is sufficient IT capacity to meet user requirements. In this video; Dan LaChance discusses capacity management; and how it is essential in the cloud due to rapid provisioning of compute resources.
-
Physical Quotas and Limits
The CompTIA Cloud+ certification covers the role of physical quotas and limits play in cloud service provision. Physical computer resources; such as storage space and CPU processing in the cloud are not infinite; and must be handled efficiently. In this video; Dan LaChance discusses the issues around physical quotas and limits; and describes some methods for managing these.
-
Physical Resource Pooling
Part of the CompTIA Cloud+ exam covers physical resource pooling; which involves putting together processing power; network bandwidth; and other resources into a single unit to be consumed by cloud tenants as required. Resources from the resource pool can be allocated manually as required or dynamically. In this video; Dan LaChance discusses physical resource pooling in greater detail.
-
Ping and Traceroute
In CompTIA Cloud+; you can use the ping and traceroute commands to troubleshoot connectivity issues. In this video; Dan LaChance demonstrates how to use the ping and traceroute commands to troubleshoot connectivity issues in Windows 7.
-
Public Key Infrastructure
The CompTIA Cloud+ certification covers the cloud infrastructures; particularly the security mechanisms used within them. In this video; Dan LaChance demonstrates how to use Public Key Infrastructure (PKI) certificates for encryption to protect information within a cloud infrastructure.
-
Quality of Service
In this video; Dan LaChance provides an overview of CompTIA Cloud+ quality of service.
-
RAID 5 and 6
RAID stands for Redundant Array of Inexpensive Disks; and much like RAID 0; with RAID levels 5 and 6; data is broken down into small stripes and those stripes are written evenly to all disks in the array. In this video; Dan LaChance discusses RAID 5 and RAID 6.
-
RAID Mirroring and Striping
You can use RAID that is group of disks working as one disk for fault tolerance and better performance. In this video; Dan LaChance discusses the concept of RAID.
-
Redirection of Physical Resources
When preparing for the CompTIA Cloud+ exam; you'll learn that physical resources can be redirected to virtual machines (VMs) by linking a piece of virtual hardware in the VM to a piece of physical hardware in the VM host. In this video; Dan LaChance discusses the redirection of physical devices to virtual hardware within a VM and provides examples.
-
Redundancy; Failover; and Failback
The CompTIA Cloud+ certification assesses the knowledge and skills of IT practitioners in the field of cloud computing; cloud creation; and maintenance. In this video; Dan LaChance discusses cloud disaster recovery methods in terms of redundancy; failover; and failback.
-
Remediating Common Host Issues
In this video; Dan LaChance discusses remediating common host issues in CompTIA Cloud+.
-
Remote Desktop Protocol
In preparing for the CompTIA Cloud+ exam; you need to know how the Remote Desktop Protocol (RDP) is used to remotely manage hosts through remote connections to a Windows desktop. In this video; Dan LaChance demonstrates how you can connect to a remote host using RDP.
-
Remote Hypervisor Access
When preparing for the CompTIA Cloud+ certification; you need to understand how to control and maintain the hypervisor operating systems. In this video; Dan LaChance discusses remote hypervisor access and demonstrates how to connect to a Microsoft Hyper-V server using both graphical and command line interfaces.
-
Replication
The CompTIA Cloud+ exam covers replication in cloud services. There are two types of replication – synchronous and asynchronous. Synchronous replication involves data being written to multiple sites concurrently; while there is a delay with asynchronous replication. In this video; Dan LaChance discusses the concepts of synchronous and asynchronous replication.
-
Resource Migration Overview
When preparing for the CompTIA Cloud+ certification; you need to know how to perform resource migration in a virtual environment. This allows you to migrate resources if you need to perform maintenance on a virtual host; for instance. In this video; Dan LaChance discusses migrating virtual resources in a virtualization environment.
-
Resource Monitoring Overview
In preparing for the CompTIA + certification; you need to resource monitoring and how it helps ensure resource availability. In this video; Dan LaChance discusses the purposes of resource monitoring and how it can be applied within a cloud environment.
-
Role-based Access Control
When preparing for the CompTIA Cloud+ certification; you need to understand how to use Role-based Access Control to restrict resource access. In this video; Dan LaChance discusses how to restrict access to peer resources using Role-based Access Control.
-
route and arp
The CompTIA Cloud+ certification covers the route; and ARP commands. These commands are used for checking connectivity. In this video; Dan LaChance demonstrates the ARP and route commands to verify connectivity within a network.
-
SAN Security
In preparing for the CompTIA Cloud+ exam; you need to understand storage security concepts; methods; and best practices; including Storage Area Network (SAN) security. The SAN is an attractive target for malicious users as it contains sensitive data stored in one place. In this video; Dan LaChance discusses issues around SAN security and how it can be improved.
-
Sandboxing and Isolation
In CompTIA Cloud+; you can use Sandboxing to test an IT workload without it affecting a production network. You can also use network isolation to separate cloud tenants to keep their network traffic separated from each other. In this video; Dan LaChance discusses Sandboxing in the cloud and network isolation; as well as the advantages of each.
-
Scalability in a Virtual Environment
In CompTIA Cloud+; cloud computing depends on virtualization. With cloud computing scalability; there is less capital expenditure on the cloud customer side. In this video; Dan LaChance discusses how to assess the scalability of a virtual environment.
-
Scaling Concepts
In this video; Dan LaChance demonstrates scaling concepts in CompTIA Cloud+.
-
Secure Shell and Console Connections
When preparing for the CompTIA Cloud+ certification; you need to understand Secure Shell (SSH) remote connectivity and how you can create a direct console connection from a client system plugged into a console port on a network device. In this video; Dan LaChance demonstrates SSH remote connectivity and how to remotely and securely manage or host over a network.
-
Secure Sockets Layer
In this video; Dan LaChance; explains how to use Secure Sockets Layer or SSL.
-
Security in Cloud Delivery Models
In cloud services; you need to make sure of the security aspect of the various cloud delivery models. In this video; Dan LaChance demonstrates the security characteristics of various cloud services.
-
Site Mirroring
The CompTIA Cloud+ certification covers disaster recovery methods and concepts; including geographical redundancy and site mirroring. Site mirroring allows cloud operations to continue running if one location fails. In this video; Dan LaChance discusses the three types of sites used in site mirroring.
-
Storage Migration
In CompTIA Cloud+; you can use Microsoft Hyper-V for the process of virtual machine storage migration. In this video; Dan LaChance demonstrates the storage migration process and discusses the challenges which arise through the use of an example.
-
Storage Testing
In this video; Dan LaChance provides an overview of CompTIA Cloud+ storage testing.
-
Subnetting and Supernetting
The CompTIA Cloud+ introduces you to subnetting and supernetting to implement network configurations. In this video; Dan LaChance discusses subnetting and supernetting.
-
Switching and Routing
In CompTIA Cloud+; you can use network switching and network routing to transmit traffic to a LAN and between remote networks. In this video; Dan LaChance discusses using network switching and network routing to transmit traffic to a LAN and between remote networks.
-
System Lifecycle Management
Part of the CompTIA Cloud+ exam covers system life cycle management; which is a phased approach to working with IT systems. In this video; Dan LaChance discusses the phases of life cycle management and how it relates to cloud environments.
-
System Maintenance
The CompTIA Cloud+ certification covers maintenance windows. This window is a scheduled time period where maintenance can be performed on an IT system. In this video; Dan LaChance discusses how to schedule maintenance windows and the use of maintenance mode.
-
Telnet and Nslookup
The telnet and nslookup commands can be used to communicate with other hosts and troubleshoot DNS servers. In this video; Dan LaChance demonstrates how to use these commands to test connectivity to a network service and test DNS server connectivity.
-
Testing Methodology
In this video; Dan LaChance provides an overview of CompTIA Cloud+ testing methodologies.
-
Tiered Storage
You can use tiered storage that is the hierarchy of storage category for storing different types of data in different storage. In this video; Dan LaChance discusses the concept of tiered storage.
-
Traditional Server Storage
In preparing for the CompTIA Cloud+ exam; you need to understand traditional server storage; or Direct Attached Storage (DAS). Using traditional DAS means that disk devices with capacity are available to a single host only. In this video; Dan LaChance discusses DAS storage in servers and its limitations.
-
Troubleshooting Overview
Network bandwidth and network latency relate to the quality of service on a network. In this video; Dan LaChance discusses network bandwidth and sources of network latency.
-
Trunk Ports
The CompTIA Cloud+ exam covers VLAN trunk ports and how they are used to physically interconnect switches on a VLAN. In this video; Dan LaChance demonstrates how VLAN trunk ports are used.
-
Types of Disks
In preparing for the CompTIA Cloud+ exam; you need to understand traditional server storage; or Direct Attached Storage (DAS). Using traditional DAS means that disk devices with capacity are available to a single host only. In this video; Dan LaChance discusses DAS storage in servers and its limitations.
-
Utilization in a Virtual Environment
The CompTIA Cloud+ certification covers how you can use compute resource utilization to utilize resources in a virtual environment effectively and efficiently. In this video; Dan LaChance discusses utilization in a cloud computing environment of pooled computing resources.
-
Virtual Data Centers
CompTIA Cloud+ provides access to the cloud; consisting of virtual data centers that offer numerous benefits over physical data centers. In this video; Dan LaChance discusses virtual data centers and how they differ from physical data centers; as well as the benefits of virtual data centers.
-
Virtual Networking
In CompTIA Cloud+; you can create a virtual network switch; connecting a virtual machine's (VM's) virtual network card to that virtual network switch. In this video; Dan LaChance demonstrates how to create a virtual network switch on a virtualization host.
-
Virtual Quotas and Limits
In this video; Dan LaChance explains Virtual quotas and limits.
-
Virtual Resource Pooling
The CompTIA Cloud+ certification covers virtual resource pooling; which may involve storage; networking; and CPUs. CPU affinity is related to a virtual machine being configured to be linked to a specific physical CPU in the underlying virtual machine host. In this video; Dan LaChance discusses virtual resource pooling with an emphasis on virtual CPUs being tied to physical CPUs.
-
Virtual Resources
The CompTIA Cloud+ certification covers the management of a cloud-provided datacenter; including the allocation and monitoring of virtual resources. In this video; Dan LaChance demonstrates how resources can be allocated dynamically to be available when and as they are needed within a cloud based environment.
-
Virtual Storage
CompTIA Cloud+ provides you with various options for virtual machine (VM) disk storage. In this video; Dan LaChance demonstrates various methods available to control storage space; including virtual hard disks; pass through disk partitions; storage area networks (SANs); clustered storage; and zoning or logical unit number (LUN) masking.
-
Virtual Storage Networks
In CompTIA Cloud+; you can create an infrastructure that allows virtualization hosts and virtual machines (VMs) to access storage on a network. In this video; Dan LaChance demonstrates how to create an infrastructure that uses a virtual local area network (VLAN) to separate regular network traffic and virtual storage area network (vSAN) to isolate storage traffic.
-
VLANs
Virtual local area networks or VLANs break a larger network in smaller networks. In this video; Dan LaChance discusses the use of VLANs.
-
VM Backup
In CompTIA Cloud+; you can back up your data via virtual machine (VM) to ensure there is no or minimal loss or failure. In this video; Dan LaChance demonstrates backup strategies and procedures for VMs.
-
VM Host Main System Components
In CompTIA Cloud+; the virtual machine (VM) host is the physical computer on which hypervisors are installed to manage the virtual machines. When using a VM Host; it is important to be aware of the physical hardware requirements. In this video; Dan LaChance discusses the VM Host's main system components.
-
VM Host Monitoring Tools
The CompTIA Cloud+ examination covers how to diagnose; remediate; and optimize physical host performance; and virtual machine (VM) host monitoring is an important aspect of this. A VM host is a physical computer running multiple VMs at once; and its performance is affected by each VM. In this video; Dan LaChance discusses monitoring of VM hosts in greater detail.
-
VM Host Performance Baselining
In preparing for the CompTIA Cloud+ exam; you need to understand how to analyze physical host performance; and virtual machine (VM) host performance baselining is an important part of this. When monitoring performance statistics; a baseline allows you to identify abnormal behaviour. In this video; Dan LaChance discusses VM host baselines as related to cloud services.
-
VM Host Resources
The CompTIA Cloud+ exam covers the allocation and monitoring of physical resources. In this video; Dan LaChance demonstrates how to select appropriate CPU; memory; and network resources from virtual machine (VM) hosts.
-
VMs and Components
In preparing for the CompTIA Cloud+ exam; you need to understand the role of the components of a virtual machine (VM). This will allow you to maintain a VM effectively. In this video; Dan LaChance discusses the components of a VM.
-
WAN; MAN; and LAN Optimization
The CompTIA Cloud+ certification covers various network models: Local area networks (LANs); metropolitan area networks (MANs); and wide area networks (WANs). In this video; Dan LaChance demonstrates; by means of an example; how to implement various network models to help improve network reliability.
-
Zoning and LUN Masking
Logical Unit Number or LUN is a portion of disk space available over a storage area network used by various hosts. In this video; Dan LaChance discusses LUN masking and zoning.
-
Changing the Attack Surface
The CompTIA Cloud+ examination covers how to reduce a network's surface vulnerability in order to improve the security of cloud infrastructures. In this video; Dan LaChance discusses the implications of disabling ports and services in the context of improving security by reducing the attack surface.
-
Characteristics of Public Clouds
Public cloud services are available to all subscribers on the Internet. In this video; Dan LaChance explains the characteristics of public cloud services.
-
Cloud Delivery Overview
When preparing for the CompTIA Cloud+ certification; you need to understand how cloud services are delivered from the cloud provider to the cloud consumer. In this video; Dan LaChance discusses the basic cloud delivery models that are available.
-
Cloud Deployment and Automation
When using cloud services in CompTIA Cloud+; services may be deployed either manually or automatically. Actions such as increasing cloud storage space can be carried out manually via a web self-service portal or automatically by having the cloud service add more storage as it is required. In this video; Dan LaChance explains cloud service deployment and automation processes.
-
Cloud Management Platforms
When managing the cloud platform in CompTIA Cloud+; you need to consider two key perspectives – the cloud customer and the provider managing the cloud infrastructure. In this video; Dan LaChance discusses several of the platforms available to users and providers for cloud management and describes their function.
-
Cloud Multitenancy
In CompTIA Cloud+; cloud multitenancy refers to the sharing of the IT resource pool allocated by the cloud provider among multiple tenants or cloud customers. These resources may include physical hardware; application instance; virtual machines; network bandwidth; and storage. In this video; Dan LaChance discusses cloud multitenancy and its internal and external security implications.
-
Cloud Payment Models
In CompTIA Cloud+; there are a number of different payment models relating to cloud services. Private cloud services are usually metered and may charge a subscription on top of the metered usage while others are free of charge. In this video; Dan LaChance discusses the different payment models and the advantages and disadvantages of each.
-
Cloud Scalability
The CompTIA Cloud+ certification covers cloud scalability and how it allows you to plan for cloud capacity and be able to provision resources as needed. In this video; Dan LaChance discusses cloud scalability and you can plan for greater capacity in the cloud.
-
Common Network Attacks
The CompTIA Cloud+ certification covers security concepts; including common network attacks such as distributed-denial-of service (DDoS) attacks; ping of death; and ping flooding. Many of these attacks can be carried out using freely available online tools. In this video; Dan LaChance discusses the features and impact of these network attacks.
-
Common TCP/IP Ports and Protocols
TCP/IP port numbers identify a network service running on a network device. In this video; Dan LaChance discusses TCP/IP port numbers.
-
Community and Hybrid Clouds
The community and hybrid cloud services can be used for various different requirements of cloud service. In this video; Dan LaChance demonstrates the characteristics of community and hybrid cloud services.
-
Configuration Standardization
When preparing for the CompTIA Cloud+ certification; you need to understand how using Configuration Standardization can increase network efficiency. In this video; Dan LaChance demonstrates the process of Configuration Standardization and its potential benefits in helping to manage a network more effectively.
-
Consolidating Infrastructure
CompTIA Cloud+ allows you to consolidate your IT computing infrastructure within the cloud computing environment. Consolidation and virtualization in a cloud environment provides various benefits; including reduced costs; more efficient resource utilization; and better IT service delivery. In this video; Dan LaChance discusses consolidating the IT computing infrastructure.
-
Creating and Managing VMs
The CompTIA Cloud+ certification covers how to create and manage a virtual machine (VM) using proper planning. This allows you to build and provision VMs. In this video; Dan LaChance demonstrates how to create and manage a VM.
-
Creating Shares
You can use shared folder storage method that can be used by another host in the network. In this video; Dan LaChance discusses using shared folders to provide storage over a network.
-
Data as a Service
Data as a Service is a cloud service model where data stored in the cloud is available over the network remotely on demand. In this video; Dan LaChance discusses about Data as a Service.
-
Demilitarized Zones
The CompTIA Cloud+ examination covers demilitarized zones (DMZs); which are locations where public-facing network services are placed to prevent direct access to a private network from the Internet. In this video; Dan LaChance discusses the features and types of DMZs and demonstrates the variations of how a DMZ can be configured.
-
Discretionary and Mandatory Access Control
In this video; Dan LaChance; explains discretionary and mandatory access control.
-
Encryption Protocols and Processes
In this video; Dan LaChance; discusses encryption and some common symmetric and asymmetric encryption protocols.
-
Expanding SAN and NAS Systems
In CompTIA Cloud+; you can Storage Area Network; or SAN; and Network Attached Storage; or NAS; systems to expand the storage capacity. In this video; Dan LaChance discusses the impact of adding disk capacity to SAN and NAS systems.
-
Failure and Recovery Metrics
In preparing for the CompTIA Cloud+ certification; you need to know about failure and recovery metrics. These include Mean Time Between Failures (MTBF); Mean Time To Recovery (MTTR); Recovery Time Objective (RTO); and Recovery Point Objective (RPO). In this video; Dan LaChance discusses these failure and recovery metrics as they apply to cloud computing.
-
Fault Tolerance
The CompTIA Cloud+ certification covers the skills and knowledge of IT practitioners in relation to cloud computing; and cloud maintenance. In this video; Dan LaChance demonstrates high availability of cloud services in relation to fault tolerance.
-
Federation and SSO
In this video; Dan LaChance; discusses identity federation and where it can be used.
-
File System Access Control Lists
The CompTIA Cloud+ exam covers storage security concepts; methods; and best practices; such as file system access control lists (ACLs). File system ACLs are used to control access to files on file servers. In this video; Dan LaChance demonstrates an example of file system ACL configuration and explains their use.
-
File System Audit Logs
The CompTIA Cloud+ exam covers file system audit logs which are used to track various types of file system access for a given user or group. In this video; Dan LaChance discusses file system auditing and demonstrates these logs on a Windows server.
-
File System Performance
In preparing for the CompTIA Cloud+ exam; you need to understand file system performance and how it relates to the host and the guest. Factors; such as IOPS and read vs write performance; influence file system performance. In this video; Dan LaChance discusses these and other factors relating to file system performance in virtualized environments.
-
File Systems
File systems accommodate file storage on a disk subsystem. In this video; Dan LaChance discusses file system creation.
-
Geographical Redundancy
The CompTIA Cloud+ exam covers geographical redundancy as a way to mitigate against data center vulnerabilities; such as a power failure; temperature regulation of computer equipment as well as disasters; such as explosions. Geographical redundancy needs to be included in your disaster recovery strategy. In this video; Dan LaChance discusses data center vulnerabilities and geographical redundancy.
-
Hard Disk Performance
In preparing for the CompTIA Cloud+ exam; you need be able to diagnose; remediate; and optimize performance; including hard disk performance. Disks may encounter issues with latency; swap space; and disk I/O tuning and they must be monitored closely. In this video; Dan LaChance discusses the performance characteristics of hard disks and influence of VM host performance.
-
Host Hardening
In this video; Dan LaChance; explains how to harden a system to make it less vulnerable.
-
Host Networking and Storage Connectivity
In CompTIA Cloud+; the virtual machine (VM) host has several physical network and physical disk storage requirements. In this video; Dan LaChance explains these requirements and considerations; including the network interface card (NIC); physical network switch configuration; and storage considerations such as direct-attached storage (DAS); network-attached storage (NAS); and storage area networks (SANs).
-
Host-based Firewalls
In this video; Dan LaChance; explains host-based firewalls and how they might be configured.
-
How Encryption Is Used
In this video; Dan LaChance; explains how to use symmetric and asymmetric encryption.
-
HTTP Remote Management
The CompTIA Cloud+ exam covers Hypertext Transfer Protocol (HTTP) remote management and how it's used to transmit data between a web server and a web browser. In this video; Dan LA Chance demonstrates how HTTP remote management is used using a browser interface or at the command line.
-
Hypervisor Performance Configuration
The CompTIA Cloud+ certification covers how to optimize physical host performance; and configuring hypervisor performance is one way of doing this. Hypervisors allow multiple virtual machines (VMs) to run concurrently on a single set of hardware; and they manage hardware access between the running VMs. In this video; Dan LaChance demonstrates how to optimize hypervisor configuration.
-
Introduction to Service Models
In preparing for the CompTIA Cloud+ certification; you need to know about cloud service models. Cloud computing allows you to host storage facilities and services over a network; typically the Internet. In this video; Dan LaChance discusses service delivery and cloud service models and highlights some common cloud services.
-
Intrusion Detection and Prevention
In preparing for the CompTIA Cloud+ exam; you need to understand network security concepts; such as intrusion detection and prevention which detects suspicious network or host activity. In this video; Dan LaChance discusses intrusion detection and prevention as it applies to both networks and hosts.
-
Ipconfig and Netstat
In CompTIA Cloud+; you can use ipconfig and netstat command to get host computer configuration information and display connection statistics. In this video; Dan LaChance demonstrates how to use the ipconfig and netstat commands to get host computer configuration information and display connection statistics in Windows 7.
-
IPsec Framework
When preparing for the CompTIA Cloud+ certification; you need to understand the various encryption technologies and methods; including IP Security (IPsec). IPsec is a TCP/IP protocol standard used on a TCP/IP network to authenticate network communications; as well as encrypting packet payloads. In this video; Dan LaChance discusses IPsec authentication and encryption in greater detail.
-
Licensing
When preparing for the CompTIA Cloud+ certification; it's important to understand how software licensing works; particularly in relation to virtual machines and the licensing of software within them. The End User License Agreement (EULA) contains the rules to be followed to ensure compliance with the vendor. In this video; Dan LaChance discusses software licensing in a virtualized environment.
-
Load Balancing
The CompTIA Cloud+ certification covers Network Load Balancing (NLB) and how you can use it to ensure the redirection of a client to the remaining servers if a NLB cluster fails. In this video; Dan LaChance discusses how to use NLB to improve the performance of a busy network and then demonstrates how to configure a NLB cluster.
-
Logical Unit Numbers
In preparing for the CompTIA + certification; you need to know how to evaluate hosts on a Storage Area Network (SAN) by means of their logical unit numbers (LUNs). In this video; Dan LaChance demonstrates what a LUN is; how it is provisioned; and how to prevent failures between a host and its LUNs.
-
Managing Network Storage
In this video; Dan LaChance explains how to manage network storage.
-
Managing VM Images
CompTIA Cloud+ allows you to manage virtual machine (VM) images. You can take snapshots and clone VMs. In this video; Dan LaChance demonstrates several VM disk types and discusses VM storage and how to back up VMs.
-
Monitoring Protocols and Alerts
In preparing for the CompTIA Cloud+ exam; you need to know how monitoring protocols allow users to track the performance of a networked device. You can also configure thresholds to generate alerts when issues arise. In this video; Dan LaChance discusses monitoring protocols; including Simple Network Management Protocol (SNMP); Windows Management Instrumentation (WMI); and Intelligent Platform Management Interface (IPMI).
-
Multipathing
The CompTIA Cloud+ exam covers the requirements for mission critical systems that will be hosted in the cloud. Multipathing means having more than one path between a computing device and its storage; and can improve performance and provide redundancy. In this video; Dan LaChance discusses the concept of multipathing as it relates to cloud services.
-
Multipathing and Load Balancing
In this video; Dan LaChance discusses CompTIA Cloud+ multipathing and load balancing.
-
Network Access Control Lists
The CompTIA Cloud+ examination covers the security mechanisms that you can implement in the cloud infrastructure. In this video; Dan LaChance discusses network access control lists (ACLs) and demonstrates how they provide secure access to networks by means of an example.
-
Network Audit Logs
When preparing for the CompTIA Cloud+ certification; you need to know about network audit logs. Network auditing is important with on-premises private networks as well as with cloud services; and there a number of events that may be audited. In this video; Dan LaChance discusses the importance of network auditing and demonstrates an example audit log.
-
Network Load Balancing
Network load balancing is used to make sure a network service is available in a timely fashion. In this video; Dan LaChance discusses network load balancing.
-
Network Performance
In this video; Dan LaChance discusses CompTIA Cloud+ network performance.
-
Network Planning and Documentation
In preparing for the CompTIA + certification; you need to understand how to plan and document networks. In this video; Dan LaChance demonstrates how proper planning and documentation of networks can help ensure optimal performance for network applications.
-
Network Scopes
Network scopes can be applied between organizations; within an organization; and over Internet. In this video; Dan LaChance discusses various network scopes.
-
Network Storage
In this video; Dan LaChance discusses network storage and its advantages compared to direct attached storage.
-
Network Storage Protocols
In this video; Dan LaChance explains the use of network storage protocols in the cloud or in larger enterprise; giving emphasis to Fibre Channel storage networks.
-
Obfuscation of Sensitive Information
In preparing for the CompTIA + certification; you need to understand the cloud infrastructures; including the security mechanisms used within them. In this video; Dan LaChance demonstrates the process of obfuscating sensitive information in order to protect a cloud infrastructure.
-
Object Storage Policies
In CompTIA Cloud+; there are a number of ways of governing object storage policies; depending on the specific policies of the organization. There may be certain requirements around data retention; data backup; and data replication. In this video; Dan LaChance demonstrates how object storage policies can be used with cloud services to ensure these requirements are met.
-
Object Storage Replication and Access Control
In CompTIA Cloud+; object storage policies control object replication in the cloud; and these same policies control data access to store data in the cloud service. In this video; Dan LaChance demonstrates how replication can be configured by object storage policies according to the geographical region; by using data center caching; and how to configure security settings using access control lists.
-
Online and Offline Migrations
CompTIA Cloud+ allows you to use various types of migrations for virtual machines and their virtual storage. In this video; Dan LaChance demonstrates between online and offline virtual resource migrations involving virtual machines and their virtual storage.
-
Other Cloud Service Models
There are numerous cloud service models and each one offers a different benefit. In this video; Dan LaChance discusses the benefits and examples of different cloud service models.
-
P2V; V2V; and V2P Migrations
CompTIA Cloud+ provides you with several options for migrating virtual machines: physical to virtual (P2V) conversions; virtual to virtual (V2V) conversions; and virtual to physical (V2P) conversions. In this video; Dan LaChance demonstrates how to migrate virtual machines using these three options.
-
Penetration Testing and Vulnerability Assessment
In this video; Dan LaChance discusses CompTIA Cloud+ penetration testing and vulnerability assessment.
-
Performance and Functionality Validation
In CompTIA Cloud+; there are several factors that may affect the performance and functionality of the IT services running in the cloud. These factors need to be considered before you move services to the cloud. In this video; Dan LaChance discusses several key areas to examine when validating cloud performance.
-
Performance Testing
The CompTIA Cloud+ certification covers testing techniques; and performance testing is one such technique. There are several performance aspects that may be tested; including latency; bandwidth; replication; and load balancing. In this video; Dan LaChance discusses the features of performance testing and the importance of accuracy when conducting this testing.
-
What is Autowiring?
In Java-Spring; the Autowiring feature acts as a framework in which to configure dependencies and references. In this video; Andy Alfred discusses what Autowiring is and how it can reduce the need for manual configuration.
-
Configuring Roles and Scopes
In this video; Irving Simms describes how to work with Roles and Scopes using Citrix XenDesktop 7 Solution.
-
Copying Virtual Machines
In this video; Irving Simms describes how to create a copy of a virtual machine using Citrix XenDesktop 7 Solution.
-
Creating Virtual Machine Templates
In this video; Irving Simms describes how to create a template from an existing virtual machine using Citrix XenDesktop 7 Solution.
-
Creating Virtual Machines in XenCenter
In this video; Irving Simms describes how to create a virtual machine using XenCenter and XenServer within Citrix XenDesktop 7 Solution.
-
Creating Virtual Machines Using ISO
In this video; Irving Simms describes how to create a virtual machine using an ISO within Citrix XenDesktop 7 Solution.
-
Installing OS on a Virtual Machine
In this video; Irving Simms describes how to install a Windows OS on the virtual machine using Citrix XenDesktop 7 Solution.
-
Installing XenServer Tools
In this video; Irving Simms describes how to install XenXerver Tools on a virtual machine using Citrix XenDesktop 7 Solution.
-
Managing Licensing
In this video; Irving Simms describes obtaining; installing; and allocating licenses and the configuration of the license administrator for Citrix XenDesktop 7 Solution.
-
Managing Policy Templates
In this video; Irving Simms describes how to manage Policy templates for Citrix XenDesktop 7 Solution using Citrix Studio.
-
Modifying Policies
In this video; Irving Simms describes how to apply a policy; make changes to it; and prioritize it in Citrix XenDesktop 7 Solution using Citrix Studio.
-
Modifying Virtual Machine Settings
In this video; Irving Simms describes how to modify virtual machine settings using Citrix XenDesktop 7 Solution.
-
Performing Virtual Machines Snapshots
In this video; Irving Simms describes how to create and manage Virtual Machine Snapshots using Citrix XenDesktop 7 Solution.
-
Reverting Virtual Machines
In this video; Irving Simms describes how to revert a virtual machine to a previous snapshot using Citrix XenDesktop 7 Solution.
-
Using Policies with Profiles
In this video; Irving Simms describes how to use Citrix Polcies to manage User Profiles for Citrix XenDesktop 7 Solution using Citrix Studio.
-
Comparison of SAN and NAS
Storage Area Networks (SANs) and Network Attached Storage (SANs) are both used to provide a centralized storage solutions to multiple computer systems. Although similar; they do possess major differences that need to be considered when implementing one over the other. In this video; Greg Brewer discusses the similarities and differences between SAN and NAS.
-
Creating a RAID Group
A RAID Group is created by using a RAID Controller and its software to connect multiple disk drives together into RAID arrays. In this video; Greg Brewer uses the RAID Controller Card software to demonstrate how to create a RAID array.
-
Direct Attached (DAS)
Direct Attached Storage (DAS) refers to storage devices that are connected directly to computers without any networking components in between. In this video; Greg Brewer provides an overview of DAS.
-
Disk Arrays
Disk arrays are an essential part of high performance storage systems where they increase performance and provide added data protection; making them increasingly important in the daily operation of a modern business. In this video; Greg Brewer provides an overview of disk arrays and the advantages they offer over single disk drives.
-
Disk Drive Types; Performance & Costs
There are different types of disk drive available; each with its own performance specifications and costs that need to be considered when deciding on your storage needs. In this video; Greg Brewer discusses the common disk drive types; their performance; and their cost.
-
Disk Basics
As storage becomes an increasingly important factor in a system’s performance; an understanding of disk storage basics allows you to recognize where performance bottlenecks can occur. In this video; Greg Brewer explains the main components and performance characteristics of a hard disk drive.
-
Network Attached (NAS)
Network Attached Storage (NAS) offers a convenient method of file sharing among multiple computers by providing a central storage location for user data. Compared to file servers; NAS devices typically provide noticeable advantages. In this video; Greg Brewer gives an overview of NAS.
-
RAID Levels
The different RAID levels determine how disk array configurations are implemented using RAID to achieve certain goals when delivering storage to a computer system. In this video; Greg Brewer provides an overview of some of the most popular RAID levels.
-
SAN Attached Hosts
SAN storage that deploys a SAN-attached host provides greater performance; up time; and flexibility than a typical host server utilizing local storage. In this video; Greg Brewer discusses SAN hosts and some of the benefits they offer.
-
SAN Based Array Tools
An advantage of using a storage area network (SAN) is the ability to leverage SAN-based array tools; which allow you to manipulate the logical units of storage (LUNs) thereby adding benefits to your business needs. In this video; Greg Brewer discusses some of the most commonly used SAN-based array tools.
-
SAN Components & Interconnections
The hardware connecting computers and servers to storage devices in a Storage Area Network (SAN) enables fast and reliable access to storage through Fibre Channel switching technology. In this video; Greg Brewer discusses SAN components and the interconnection technologies they utilize.
-
SAN Fabric
Storage Area Network or SAN fabric is the Fibre Channel networking portion of a SAN where switches are connected to create a fabric that provides redundancy and protection from component failure. In this video; Greg Brewer provides an overview of SAN fabric.
-
SAN Fabric Zoning
SAN fabric zoning is the partitioning of the Fibre Channel switching infrastructure. It enables a simplification of management and an implementation of compartmentalized data for security purposes. In this video; Greg Brewer discusses SAN fabric zoning and how data security is managed.
-
Area Network (SAN)
A Storage Area Network (SAN) is a high performance dedicated network used primarily to provide fast and reliable communication between computers and storage devices in a shared storage networking environment. In this video; Greg Brewer provides an overview of a SAN and its main properties.
-
Virtualization
Storage virtualization is the abstraction layer that resides between physical storage and host computers accessing the storage. Commonly used in SANs; storage virtualization provides the appearance of a single storage device and is managed from a central console. In this video; Greg Brewer explains storage virtualization and how it works.
-
Deploy an Orchestrator Runbook Server
In this video; Aaron Sampson demonstrates how to deploy an Orchestrator Runbook Server.
-
DPM Self-service Recovery for End-users
In this video; Aaron Sampson demonstrates how to configure DPM self-service recovery for end-users.
-
Recovering Virtual Machine Data Using DPM
In this video; Aaron Sampson explains how to recover virtual machines and virtual machine files using DPM.
-
Creating a Virtual Machine
You can use the Create New Virtual Machine Wizard on vSphere Client to create and connect to a virtual machine (VM). The wizard allows a Custom or Typical install; and your VM can run on one of multiple operating systems. In this video; Greg Brewer uses vSphere Client to create a VM on a server running VMware ESX.
-
Desktop (VDI)
Client virtualization; or Virtual Desktop Infrastructure (VDI); lets you decouple your client operating systems and applications to create a network of virtual machines (VMs). This allows centralized desktop management; frees resources; and enables mobility. You can create persistent or non-persistent connections; depending on your available server space. In this video; Greg Brewer gives a detailed overview of client virtualization.
-
High Availability
In a traditional environment; physical machines are not designed to manage the high availability (HA) of resources. Until the advent of virtual machines (VMs); its implementation was costly and complex – typically requiring twice the resources. In this video; Greg Brewer provides an overview of virtual HA; VM host migration while retaining connectivity; and fast-recovery failure-protection options.
-
How Server Works
Reduced costs and high availability to server workloads offer businesses and IT departments compelling reasons to leverage server virtualization technology. In this video; Greg Brewer explains how to implement optimal server virtualization using a hypervisor to allocate resources to multiple isolated virtual machines (VMs) on a host server.
-
Installing an Operating System on a Virtual Machine
You can use vSphere Client to install an operating system on a virtual machine (VM) in the same way as you would on a physical machine. All you need do is ensure that the CD DVD device is pointed to an appropriate ISO file. In this video; Greg Brewer uses vSphere Client to install an operating system on a VM.
-
Server; Application; and Client
Virtual machine (VM) software enables optimal resource allocation at the server; application; and client levels. It does this by decoupling operating systems and applications from their hardware to create multiple separate VMs. In this video; Greg Brewer describes server; application; and client virtualization.
-
Virtual CPU
You can use vSphere Client to grant CPU access to a virtual machine (VM). The amount of CPU access and processing time is managed by a hypervisor; such as VMware ESX. In this video; Greg Brewer uses vSphere Client to assign CPU access to a VM and demonstrates how to configure the virtual CPU settings.
-
Virtual Disk
You can create virtual disks on a virtual machine (VM) by accessing the physical machine resources through a hypervisor. In this video; Greg Brewer uses vSphere client to create virtual disks on a VM.
-
Virtual Machine Backup and Restore
Data backup and restore are essential to server and data center management. Virtualization allows you to integrate virtual machine (VM) backup and restore into existing procedures or redesign the procedures to incorporate added capabilities. In this video; Greg Brewer explains virtual machine backup and restore solutions and uses vSphere Client to create a backup data store.
-
Virtual Machine Snapshots
A snapshot is a point-in-time capture of a virtual machine (VM); its data; and its configuration settings. Should you need to; you can revert to the snapshot state - or you can delete it. In this video; Greg Brewer uses the vSphere Client Snapshot Manager to create a VM snapshot; implement changes; and return the machine to its original state.
-
Virtual Machines/Physical Machines Comparisons
Virtual machines (VMs) operate similarly to their physical hosts. They are able to use the same operating systems; installation media; and applications. They access their virtual CPUs; RAM; and disk space similarly. In this video; Greg Brewer details the similarities and differences distinguishing traditional machines from their virtual counterparts; explaining how VMs access and use resources provided by their hosts.
-
Virtual Networks
Virtual networks allow virtual machines (VM) to connect to the host machine and to each other without traversing the physical network. In this video; Greg Brewer discusses the default network configurations and explains some of the different types of virtual networks.
-
Virtual RAM
The amount of RAM accessible to a virtual machine (VM) is dynamically managed by the hypervisor. However; the memory can be configured in different ways to optimize a VMs performance. In this video; Greg Brewer explains how to optimally configure memory settings on a VM.
-
What is
Virtualization is the decoupling of the operating system and its associated applications from the physical hardware. In this video; Greg Brewer explains the concept of virtualization and the benefits it provides.
-
What Makes Up a Virtual Machine
A virtual machine (VM) is a software implementation of a physical computer. It contains similar configurable components; settings; and resource-access capabilities; and can execute programs in the same way. However; a VM's components consist of files rather than hardware. In this video; Greg Brewer uses the vSphere Client from VMware to access and identify the components of a VM.
-
Creating a Build Profile
After watching this video; you will be able to create a build profile.
-
Identifying vCenter Server Deployment Models
After watching this video; you will be able to recognize the vCenter Server deployment model types.
-
Identifying VMware vSphere Requirements
After watching this video; you will be able to identify vSphere prerequisites and system requirements.
-
Identifying vSphere Replication Features
After watching this video; you will be able to identify features and usage scenarios of VMware vSphere Replication.
-
Using vSphere with Operations Management
After watching this video; you will be able to identify the capabilities of VMware vSphere with Operations Management.
-
VMware Disaster Recovery Products
After watching this video; you will be able to protect the data center infrastructure with disaster recovery products.
-
Configuring Server App-V Agent
In this video; Aaron Sampson uses Microsoft System Center 2012 R2 Virtual Machine Manager to install and configure the Server App-V Agent.
-
AWS Availability Levels
After watching this video; you will be able to describe availability levels in Amazon Web Services.
-
AWS Components for High Availability
After watching this video; you will be able to describe the components of high availability in Amazon Web Services.
-
AWS DR and Synchronization
After watching this video; you will be able to describe the impact of synchronous and asynchronous replication in Amazon Web Services.
-
AWS Pilot Light
After watching this video; you will be able to describe the pilot light method of Disaster Recovery using Amazon Web Services.
-
Backup and Restore with AWS
After watching this video; you will be able to describe backup and restore services on Amazon Web Services.
-
Multi-Site DR Solutions
After watching this video; you will be able to describe multi-site disaster recovery solutions using Amazon Web Services.
-
Recovery Point Objective
After watching this video; you will be able to describe recovery point objective metrics for a disaster recovery system.
-
Recovery Time Objective
After watching this video; you will be able to describe recovery time objective metrics for a disaster recovery system.
-
RTO and RPO Examples
After watching this video; you will be able to calculate recovery point objective and recovery time objective metrics for a disaster recovery system.
-
Traditional DR
After watching this video; you will be able to describe a traditional; pre-cloud; disaster recovery solution with different levels of off-site duplication of data and services.
-
Warm Standby DR Solutions
After watching this video; you will be able to describe warm standby DR solutions using Amazon Web Services.
-
Asset Security
After watching this video; you will be able to describe the encryption of cloud-hosted assets.
-
Access Control – Physical and Virtual
After watching this video; you will be able to define local machine access controls; and deployment of secure KMV switches.
-
APIs
After watching this video; you will be able to outline the deployment of verified and approved APIs.
-
Application Management
After watching this video; you will be able to describe requirements and best practices for application configuration; and version management.
-
Architectural Security
After watching this video; you will be able to define Cloud Service roles; categories and services. Describe data state and data asset classification with reference to security. Outline the purpose of Common Criteria.
-
Asset Access Control
After watching this video; you will be able to define access and access control to cloud-hosted assets (data; files; and resources).
-
Asset Removal and Storage Media Sanitization
After watching this video; you will be able to outline asset and media management with respect to deletion/removal/overwrite on a cloud platform.
-
Audit Controls - Internal and External
After watching this video; you will be able to define audit operations and auditor tasks with reference to cloud computing services. Outline distributed service issues with respect to auditing.
-
Audit Reporting and Standards
After watching this video; you will be able to define audit reporting against a background of prevailing standards. Outline audit scope and audit regulation requirements with respect to highly regulated industries.
-
Audit Requirements; Scope; and Reporting
After watching this video; you will be able to describe audit requirements; scope; and reporting as they apply to cloud services.
-
Auditing
After watching this video; you will be able to define auditing techniques and responsibilities within key areas of focus; including asset access; asset status; deletions; archiving; and reporting.
-
Business Requirements
After watching this video; you will be able to describe business requirements with reference to the Service Level Agreement; GAAP guidelines; and standards.
-
Business Requirements and Risk
After watching this video; you will be able to describe and deploy DR and BC with respect to operations and business requirements.
-
Chain of Custody and Non-repudiation
After watching this video; you will be able to describe COC as it applied to data hosted on the cloud and understand how non-repudiation is handled within a cloud hosting environment.
-
Cloud - Data Life Cycle
After watching this video; you will be able to detail the security-based Data Lifecycle of Cloud-hosted assets (data; files; features).
-
Cloud - Risk Assessment
After watching this video; you will be able to define key areas of focus for risk assessment; including supplier; vendors; services; etc..
-
Cloud Application Development
After watching this video; you will be able to describe the application development life cycle with reference to cloud security.
-
Cloud Application Security Testing
After watching this video; you will be able to describe application testing with reference to cloud security. Describe SAST; DAST; and Penetrative Testing methodologies.
-
Cloud Computing Activities
After watching this video; you will be able to detail Cloud Computing Activities with reference to ISO/IEC 17789; Clause 9.
-
Cloud Computing Definitions
After watching this video; you will be able to define and describe cloud components.
-
Cloud Computing Infrastructure
After watching this video; you will be able to outline the supporting architectural components and infrastructure of cloud computing.
-
Cloud Computing Participants
After watching this video; you will be able to identify cloud system participants: consumers; providers; partners; auditors; regulators.
-
Cloud Computing Service Capabilities
After watching this video; you will be able to describe how cloud services are categorized based on supported services and capabilities.
-
Cloud Cross-cutting Aspects
After watching this video; you will be able to describe the additional operational aspects of the cloud service environment.
-
Cloud Environment BC and DR
After watching this video; you will be able to describe and deploy DR and BC with respect to the cloud environment.
-
Cloud Functional Security
After watching this video; you will be able to define and describe focus areas relating to the functional security of the cloud service – vendor lock-in; interoperability; portability; migration; etc..
-
Cloud Network Security
After watching this video; you will be able to define issues and solutions relating to cloud network structures.
-
Cloud Server Provider (CSP) Risk Management
After watching this video; you will be able to describe issues with obtaining details of a CSP's risk management data.
-
Cloud Service Certification Assessment
After watching this video; you will be able to describe methodologies for mapping cloud service requirements to service provider certification and product certifications.
-
Cloud Service Continuity
After watching this video; you will be able to describe Business Continuity and Disaster Recovery as it applies to a Cloud Service.
-
Cloud Service Investment
After watching this video; you will be able to define how a Cloud Deployment might be analysed on a cost basis.
-
Cloud Service Types (the Cloud Stack)
After watching this video; you will be able to describe the industry-defined standard categories of cloud computing.
-
Common Dangers and Potential Pitfalls
After watching this video; you will be able to describe common issues relating to the development of Cloud-based applications.
-
Communications Management
After watching this video; you will be able to describe and deploy best practice systems that guarantee essential and open contact and communications with cloud system providers; vendors; cloud system consumers and users; partners; auditors; regulators.
-
Compliance Assurance
After watching this video; you will be able to detail current legislation relating to PII and define a number of widely adopted auditing compliance frameworks and report types. Outline available auditing standards and frameworks; describe ISMS and applicable standards and guidance; and detail a number of cloud service adoption risks. Finally; outline some detail on available cloud service-related risk management frameworks..
-
Compute Service
After watching this video; you will be able to define the compute service as it applies to the cloud platform.
-
Contract and Vendor Management and Assessment
After watching this video; you will be able to describe the vendor and provider vetting process with reference to certifications; audit and event reporting; accreditations; etc.
-
Cryptography
After watching this video; you will be able to define security protocols and measures associated with application data and data packet protection.
-
Data Archiving
After watching this video; you will be able to outline principles; and how to define and manage data archiving procedures and methodologies.
-
Data Asset Security
After watching this video; you will be able to describe common storage media threats; data protection techniques and failover archtectures. The learner should describe event and perfornace data options available for the Cloud Service Consumer.
-
Data Asset Security and Associated Technologies
After watching this video; you will be able to define the various technologies associated with data asset security and protection.
-
Data Controls and Application
After watching this video; you will be able to detail data asset mapping to data controls types and outline the application of data control on PPI; against a backdrop of relevant legislation.
-
Data Deletion
After watching this video; you will be able to outline principles; and how to define and manage data deletion procedures and methodologies.
-
Data Discovery Implementation
After watching this video; you will be able to describe Data Discovery and its implementation methodologies.
-
Data Lifecycle Stages
After watching this video; you will be able to define the various life stages of cloud-hosted data assets.
-
Data Ownership and Responsibility
After watching this video; you will be able to describe issues surrounding the importance of data ownership and define interrelationships between owner and custodian regarding responsibility.
-
Data Retention Policy
After watching this video; you will be able to define Data Retention policy principles and how to develop appropriate practices.
-
Data Rights Objects and Management
After watching this video; you will be able to define Data Rights objects in terms of user access control; managing roles; role-based access options and describe the appropriate tools to implement and secure DRM.
-
DataCenter Protection – Physical
After watching this video; you will be able to design and deploy physical and environmental security mechanisms.
-
Defence
After watching this video; you will be able to define and describe threat mitigation and attack handling techniques including ACL; designing in security; and adopting security measures.
-
Defining and Categorizing PII
After watching this video; you will be able to define PII; outline the difference between contractual and regulated PII; and describe the differences between confidentiality; integrity; availability; and privacy.
-
Emerging Data Protection Technologies
After watching this video; you will be able to describe technology selection with respect to criteria and define current and developing data protection techniques.
-
Encryption of Data Assets
After watching this video; you will be able to define encryption as it applies to cloud-hosted data.
-
Event Logging – Management and Reporting
After watching this video; you will be able to define requirement for hardware event logging and reporting.
-
Event Logging; Storage; and Analysis
After watching this video; you will be able to detail event recording; analyzing event data; and aspects of storage and protection of event data. Define the cyclical nature of event handling and event dynamics such as optimization; managing and reacting to change; and minimizing false positive objects.
-
Event Sources
After watching this video; you will be able to list event sources and the associated identity.
-
Federation and Identity Provision
After watching this video; you will be able to describe Federated Identity and its deployment for cloud-hosted application authorization and access.
-
Forensic Data Collection and Management
After watching this video; you will be able to describe best practice approach to the deployment of proactive and reactive forensic data collection methods.
-
Forensic Requirement
After watching this video; you will be able to define the legislative requirement related to forensic data management.
-
Functional Testing
After watching this video; you will be able to define functional testing as it relates to cloud-based application software.
-
Gap Analysis and Planning
After watching this video; you will be able to define gap analysis and audit planning with reference to cloud service auditing.
-
Guest Operating System Installation
After watching this video; you will be able to describe the tolls associated with VM OS installation on the physical host.
-
Hardware and Virtualization Configuration
After watching this video; you will be able to describe the deployment and configuration of secured hardware with reference to storage controllers; network controllers; and virtualized environment.
-
Hardware Configuration and Security
After watching this video; you will be able to describe the deployment and configuration of secured hardware with reference to BIOS; TMP; and the host preboot environment.
-
Hardware Monitoring
After watching this video; you will be able to describe requirement to continuously monitor and report on host component performance.
-
Host Configuration – Backup and Restore
After watching this video; you will be able to describe the implementation of back and restore policy with reference to cloud components; including data; configurations; etc.
-
Host Management
After watching this video; you will be able to describe standalone and cluster host availability; backup; and failover; in addition to load balancing; dynamic optimization (DO); maintenance mode; and general high availability best practice adoption.
-
Implementation
After watching this video; you will be able to deploy DR and BC mechanisms.
-
Information Management Controls
After watching this video; you will be able to describe the Certified Cloud Security Professional (CCSP): Information Management Systems and Control #2
-
Information Management Systems and Control #1
After watching this video; you will be able to describe the Certified Cloud Security Professional (CCSP): Information Management Systems and Control #1
-
Infrastructure and Data Threats
After watching this video; you will be able to list and describe known and common threats to cloud infrastructure and data assets.
-
International Legislation Conflict
After watching this video; you will be able to describe areas of legislative conflict with respect to cloud-hosted services.
-
International Regulation variations
After watching this video; you will be able to describe the international variations that apply to PII and data privacy.
-
Isolation
After watching this video; you will be able to describe isolation and sandboxing as it applies to cloud-hosted applications.
-
Key Management
After watching this video; you will be able to describe key-pair management as it applies to cloud-hosted data.
-
Known Common Vulnerabilities
After watching this video; you will be able to define known threats and security issues that must be considered when developing cloud-hosted applications.
-
Legal Control
After watching this video; you will be able to describe how to apply control policy with respect to legal requirements.
-
Legal Risks
After watching this video; you will be able to appraise legal risks associated with the provision of cloud services.
-
Logical Aspect Design and Risk Assessment
After watching this video; you will be able to define the design and implementation of logical elements of a proposed cloud service; including tenant isolation; access control; etc.
-
Management Plane
After watching this video; you will be able to discuss Management Plane options and techniques.
-
Masking of Data
After watching this video; you will be able to describe Data Masking and masking methodologies.
-
Network and Communications Service
After watching this video; you will be able to define the networking and communication architecture of a cloud platform.
-
Network Configuration
After watching this video; you will be able to define techniques to secure network configuration and network support tools; including VLAN; TLS; DHPC and Authorized DHCP; DNS and Secure; and IPSec.
-
Network Security Management
After watching this video; you will be able to define the deployment of network security-related controls; including firewalls; IDS; IPS; honeypot deployment; and vulnerability assessment/threat mitigation.
-
Operating System – Update and Patching
After watching this video; you will be able to describe requirements and best practices with reference to fixes; patches; and updates.
-
Operating System Baseline
After watching this video; you will be able to define the preservation of OS compliance with reference to monitoring and remediation.
-
Operating System Security
After watching this video; you will be able to define operating system hardening techniques with reference to OS: Windows; Linux; Vmware; etc..
-
Operations Security
After watching this video; you will be able to detail datacenter operational design factors and define network component security control. Define four system management categories and the NIST Forensic Evidence process. Describe Cloud Service Actor .
-
Personally Identifiable Information (PII) Law
After watching this video; you will be able to list active data privacy protection legislation by jurisdiction – Data Privacy Acts/Law.
-
Physical and Environmental Design
After watching this video; you will be able to define the design and implementation of physical aspects of a proposed cloud service; including build or rent; location; management.
-
Physical and Logical Risk Management
After watching this video; you will be able to describe and implement risk management.
-
Physical Architecture
After watching this video; you will be able to recognize the physical and virtual components within a cloud platform.
-
Platform-specific Security
After watching this video; you will be able to define security consideration and responsibilities on a per cloud model (Category basis - IaaS; PaaS; and SaaS plus its various derivatives: NaaS; SeCaaS; et cetera).
-
Product Certification
After watching this video; you will be able to outline methodologies for mapping cloud components to appropriate or required industry certifications or industry standards.
-
Protecting Access – System and Data
After watching this video; you will be able to describe and manage identification; system; and data access in addition to authentication and authority within the Cloud Service.
-
Protection – Systems (Physical and Virtualized)
After watching this video; you will be able to design and deploy security mechanisms to mitigate failure and threats; and avoid attacks to the systems and communication hardware within a cloud platform.
-
Published Security Issues
After watching this video; you will be able to describe common security issues relating to Cloud-hosted applications. Define the importance of foreknowledge regarding cloud application vulnerabilities and OWASP research.
-
Regulatory Control and Standards Adoption
After watching this video; you will be able to describe and implement the various management tasks to ensure compliance and control with reference to industry standard regulations; including ITIL; ISO/EIC 20000-1.
-
Remote Access
After watching this video; you will be able to describe the mechanisms for deploying Remote Access; including RDP; Secure Terminal Access.
-
Risk
After watching this video; you will be able to describe and define risk as it applies to cloud services and underlying infrastructure; and adopt a risk analysis and management posture regarding cloud computing.
-
Risk Frameworks
After watching this video; you will be able to outline the integration of information security and risk management activities into a formal framework.
-
Risk Management Metrics
After watching this video; you will be able to outline the metrics that quantify and measure the extent of a risk associated with cloud service elements and components.
-
Risks
After watching this video; you will be able to define cloud-specific risks; and assimilate to mitigate threat within the design and during the operational phases of cloud-hosted applications.
-
Securing the Virtualized Environment
After watching this video; you will be able to define issues and solutions relating to cloud virtualization infrastructures.
-
Security Devices
After watching this video; you will be able to describe associated hardware/software components related to the security of cloud applications.
-
Sensitive Data Classification
After watching this video; you will be able to outline data classification and the classification of discovered sensitive data.
-
Single Sign-On/Off (SSO)
After watching this video; you will be able to Define Single Sign-ON/Off and its place within the Cloud service security framework.
-
Specify Application Security
After watching this video; you will be able to describe the phase of NIST’s SDLC and define the difference between SDLF and S-SDLC. List the top five OWASP 2013 attack vectors and define security concerns with respect to RESTful APIs. Outline the difference.
-
Specify infrastructural security
After watching this video; you will be able to describe Cloud Service platforms and associated risks. Discuss vulnerabilities within the virtualized infrastructure and attck vectors in general. Finally; discuss available Disaster Recover architectures.
-
Storage Service
After watching this video; you will be able to define storage and Storage as a Service (STaaS) within a cloud platform.
-
Storage Type Threat
After watching this video; you will be able to define and describe potential threats associated with storage types.
-
Storage Type Threat Mitigation
After watching this video; you will be able to define threat mitigation technology and techniques.
-
Storage Types
After watching this video; you will be able to define storage modes in a cloud computing environment; and be able to map data assets to appropriate storage mode.
-
Strategy and Planning
After watching this video; you will be able to define and describe relevant DR and BC strategies.
-
Supply-Chain & Community
After watching this video; you will be able to describe the significance of surfacing the Supply-Chain with reference to cloud-hosted application software.
-
Supply-chain Management
After watching this video; you will be able to describe the deployment of supply-chain management in the context of cloud services.
-
Threat and Attack
After watching this video; you will be able to describe and define known threats and attack vectors associated with Cloud Services and infrastructure.
-
Threat Modeling and QoS
After watching this video; you will be able to define how to analyze security threats and risks to an application.
-
Tokenization of Data
After watching this video; you will be able to describe Data Tokenization technologies.
-
Virtualization - Auditing Challenges
After watching this video; you will be able to outline challenges associated with auditing the virtualized infrastructure of a cloud-based service.
-
Virtualization Vulnerabilities
After watching this video; you will be able to define virtualization-specific areas of focus with reference to security such as hypervisor; VM files and VM deletion.
-
Virtualized Infrastructure
After watching this video; you will be able to define the available virtualization options within a cloud platform.
-
Virtualized Infrastructure Construction
After watching this video; you will be able to define the secure configuration of the virtual hardware; including network; storage and elastic expansion; memory; and external devices.
-
Access Control Lists
After watching this video; you will be able to configure an access control list in Azure.
-
Accessing a DocumentDB Database
After watching this video; you will be able to configure an application to access a DocumentDB database.
-
ACLs and Network Security Groups
After watching this video; you will be able to recognize the features of ACLs and Security Groups.
-
Active Directory Federated Services (ADFS)
After watching this video; you will be able to recognize the features of Active Directory Federated Services (ADFS).
-
Active Directory: On-premises vs. Azure AD
After watching this video; you will be able to recognize the differences between an on-premises active directory implementation and an Azure Active Directory implementation.
-
Alerts and Notifications in Azure
After watching this video; you will be able to recognize the features of alerts and notifications in Azure.
-
Availability Groups and Update Domains
After watching this video; you will be able to recognize the features of availability groups and update domains in Azure.
-
Availability Sets
After watching this video; you will be able to recognize Availability Sets and describe how they are used.
-
Azure Access Control Services (ACS)
After watching this video; you will be able to recognize the features of Azure Access Control Service (ACS) to support hybrid identities in Azure.
-
Azure Backup Overview
After watching this video; you will be able to recognize the features of Azure Backup.
-
Azure Cache
After watching this video; you will be able to recognize the options to implement the Azure cache service.
-
Azure Files
After watching this video; you will be able to configure Azure Files.
-
Azure Machine Learning
After watching this video; you will be able to recognize the features of Azure Machine Learning.
-
Azure Media Services
After watching this video; you will be able to recognize the features of an Azure Media Service.
-
Azure Networking Overview
After watching this video; you will be able to recognize how Microsoft Azure supports network services.
-
Azure PowerShell for Managing Azure Active Directory
After watching this video; you will be able to use Azure PowerShell to manage Azure Active Directory.
-
Azure PowerShell for Managing Storage
After watching this video; you will be able to use Azure PowerShell to manage Azure Storage.
-
Azure PowerShell for Managing the Azure Service
After watching this video; you will be able to use Azure PowerShell to manage the Azure service.
-
Azure Recovery Options for Azure Virtual Machines
After watching this video; you will be able to configure the Azure Recovery Options for an Azure virtual machine.
-
Azure RMS
After watching this video; you will be able to recognize the features of Azure Rights Management Services (RMS).
-
Azure Search
After watching this video; you will be able to recognize the features of Azure Search.
-
Azure Service Bus Queue
After watching this video; you will be able to create and use an Azure Service Bus queue.
-
Azure Service Bus Topic and Subscription
After watching this video; you will be able to create and use an Azure Service Bus Topic and Subscription.
-
Azure Site Recovery (ASR)
After watching this video; you will be able to recognize the features of Azure Site Recovery (ASR).
-
Azure SQL Database Business Continuity Overview
After watching this video; you will be able to recognize how Azure SQL Database supports business continuity.
-
Azure SQL Database Dynamic Management Views
After watching this video; you will be able to use Azure SQL Database Dynamic Management Views to monitor an Azure SQL Database.
-
Azure SQL Database Elastic Scale
After watching this video; you will be able to configure Elastic Scale for an Azure SQL Database.
-
Azure SQL Database Performance Guidance
After watching this video; you will be able to identify best practices for performance for Azure SQL Databases.
-
Azure SQL Database Resource Limits
After watching this video; you will be able to recognize the resource limits of Azure SQL Databases.
-
Azure SQL Database V12
After watching this video; you will be able to recognize the features of implementing Azure SQL Database V12.
-
Azure SQL Service Tiers
After watching this video; you will be able to recognize the different service tiers in Azure and their features.
-
Azure Storage Replication
After watching this video; you will be able to recognize the different methods of replication for Azure storage.
-
Azure Virtual Machines
After watching this video; you will be able to recognize how Azure supports virtual machines.
-
Back Up and Restore Data
After watching this video; you will be able to configure backup and recovery for an Azure web site.
-
Backup Azure VMs
After watching this video; you will be able to configure Azure Backup for Azure VMs.
-
Backup Windows Server
After watching this video; you will be able to configure Azure Backup within a Windows Server.
-
Big Compute
After watching this video; you will be able to recognize the features of Big Compute.
-
BizTalk Hybrid Connections
After watching this video; you will be able to recognize the features of a BizTalk Hybrid Connection.
-
Blob Storage
After watching this video; you will be able to configure Blob Storage in Azure.
-
Capabilities of Monitoring with System Center
After watching this video; you will be able to recognize the capabilities of monitoring an Azure solution with System Center.
-
CDN
After watching this video; you will be able to recognize the options to implement a Content Delivery Network (CDN).
-
Comparing Cloud Services and VMs
After watching this video; you will be able to identify features and benefits between deploying Storage Services and SQL Databases within Cloud Services and Virtual Machines.
-
Component Support in Azure
After watching this video; you will be able to identify which Microsoft server software is supported in Azure.
-
Configure Azure Active Directory
After watching this video; you will be able to configure Microsoft Azure Active Directory.
-
Configure Azure Diagnostics for an Azure VM
After watching this video; you will be able to configure Azure Diagnostics for Azure virtual machines.
-
Configure Azure Diagnostics for Azure Cloud Services
After watching this video; you will be able to configure Azure Diagnostics for Azure Cloud Services.
-
Configure Local Storage Resource for Cloud Services
After watching this video; you will be able to configure a local storage resource for cloud services.
-
Configure Web Endpoint Status Monitoring
After watching this video; you will be able to configure Web Endpoint Status monitoring.
-
Configuring Azure RMS
After watching this video; you will be able to configure Azure Rights Management services.
-
Configuring Continuous Delivery
After watching this video; you will be able to configure Continuous Delivery for an Azure web site.
-
Configuring MongoDB
After watching this video; you will be able to configure a MongoDB database.
-
Configuring MySQL in Azure
After watching this video; you will be able to configure MySQL in Azure.
-
Configuring RBAC
After watching this video; you will be able to configure Azure role-based access control.
-
Configuring Xplat CLI for Azure
After watching this video; you will be able to configure Xplat CLI for Azure.
-
Consume Mobile Services from Cross-platform Clients
After watching this video; you will be able to configure a third-party application to consume an Azure Mobile Service.
-
Create a BizTalk Hybrid Connection
After watching this video; you will be able to create a BizTalk Hybrid Connection.
-
Create a Media Service
After watching this video; you will be able to create a Media Service.
-
Create a Web Deployment Package
After watching this video; you will be able to create a Web Deployment Package to deploy an Azure web site.
-
Create an Azure Batch Account
After watching this video; you will be able to create an Azure Batch account.
-
Create an Azure Mobile Service
After watching this video; you will be able to create an Azure Mobile Service.
-
Create an Azure Worker Role
After watching this video; you will be able to create an Azure Worker Role.
-
Create and Deploy an Azure Web Site
After watching this video; you will be able to create and deploy an Azure web site.
-
Create Web Sites Using Visual Studio
After watching this video; you will be able to create and deploy an Azure web site using Visual Studio.
-
Creating a DocumentDB Database
After watching this video; you will be able to create an Azure DocumentDB database.
-
Creating an Azure SQL Database
After watching this video; you will be able to create an Azure SQL Database.
-
Creating an Azure VM with Premium Storage
After watching this video; you will be able to create an Azure VM with Premium Storage.
-
Data Replication Patterns
After watching this video; you will be able to identify the different patterns in which data is replicated in Azure.
-
Datacenter Architecture
After watching this video; you will be able to recognize how Microsoft Azure uses Global Foundation Services (FDS) datacenters and their basic architecture.
-
Debug Web Sites
After watching this video; you will be able to configure an Azure web site for debugging.
-
Delivering Content
After watching this video; you will be able to configure Azure Media Services for content delivery.
-
Deploying an Azure WebJob
After watching this video; you will be able to create and deploy an Azure WebJob.
-
Design a Plan to Implement Azure Services
After watching this video; you will be able to design a plan to implement Azure Services based on a set of requirements.
-
Design Hybrid Storage
After watching this video; you will be able to design a hybrid solution using Compute On-premises and Storage on Azure.
-
Designing a Data Storage Plan for Azure
After watching this video; you will be able to design a plan for data storage in Azure given a set of requirements.
-
Designing Business Continuity for Azure SQL Database
After watching this video; you will be able to configure an Azure SQL Database for business continuity.
-
Designing the Data Tier
After watching this video; you will be able to configure an Azure web site to access the data tier.
-
DirSync
After watching this video; you will be able to recognize the features of DirSync.
-
DocumentDB Resource Model and Concepts
After watching this video; you will be able to describe resource models and other concepts used in DocumentDB in Azure.
-
Durability Options
After watching this video; you will be able to recognize how Azure manages the durability of data.
-
Encoding Content
After watching this video; you will be able to configure the encoding of content in Azure Media Services.
-
ExpressRoute
After watching this video; you will be able to recognize what ExpressRoute is and describe its benefits.
-
Extending Mobile Services
After watching this video; you will be able to create an extension to Azure Mobile Services.
-
Fault and Update Domains
After watching this video; you will be able to recognize what Fault and Update Domains are within Azure.
-
Getting Started with ACS 2.0
After watching this video; you will be able to configure Azure Access Control Service (ACS) 2.0 as an identity provider.
-
Getting Started with Azure Audit Log
After watching this video; you will be able to configure an Azure Audit log.
-
Getting Started with Azure Automation
After watching this video; you will be able to configure Azure Automation.
-
Getting Started with Azure Batch
After watching this video; you will be able to create an Azure Batch.
-
Getting Started with Azure Machine Learning
After watching this video; you will be able to configure an Azure Machine Learning service.
-
Getting Started with Azure Web Sites and ASP.NET
After watching this video; you will be able to create an Azure web site using ASP.NET.
-
Getting Started with Azure Web Sites and Java
After watching this video; you will be able to create an Azure web site using Java.
-
Getting Started with Azure Web Sites and Node.js
After watching this video; you will be able to create an Azure web site using Node.js.
-
Getting Started with Azure Web Sites and PHP
After watching this video; you will be able to create an Azure web site using PHP.
-
Getting Started with Azure Web Sites and Python
After watching this video; you will be able to create an Azure web site using Python.
-
Getting Started with Big Data
After watching this video; you will be able to configure Big Data in Azure.
-
Globally Scale Web Sites
After watching this video; you will be able to configure an Azure web site to scale globally.
-
Graph API
After watching this video; you will be able to describe the Graph API and how it is used with Managed Identities in Azure.
-
Graph Explorer
After watching this video; you will be able to use the Graph Explorer with Managed Identities in Azure.
-
High Availability and Disaster Recovery
After watching this video; you will be able to identify different options for high availability and disaster recovery for Azure web sites.
-
Hosting Plans and Resource Groups
After watching this video; you will be able to identify the different hosting plans and recognize the features of Resource Groups.
-
Hybrid Solution Scenarios
After watching this video; you will be able to identify scenarios for implementing a Hybrid Azure solution.
-
Identify Third-party Monitoring Tools
After watching this video; you will be able to identify third-party monitoring tools for Azure.
-
Identifying Storage Options for Cloud Services
After watching this video; you will be able to identify the different storage options for cloud services in Azure.
-
Implement Active Directory Federated Services (ADFS)
After watching this video; you will be able to configure Active Directory Federated Services to support a hybrid identity solution in Azure.
-
Implement Azure Site Extensions
After watching this video; you will be able to describe what an Azure Site Extension is and outline its benefits.
-
Implement Azure Traffic Manager
After watching this video; you will be able to configure Azure Traffic Manager.
-
Implement DirSync
After watching this video; you will be able to configure directory synchronization using DirSync.
-
Implementing a Custom Web API
After watching this video; you will be able to create a custom Web API.
-
Implementing Facebook with ACS
After watching this video; you will be able to configure Azure Access Control Services to support Facebook authentication.
-
Implementing Push Notifications
After watching this video; you will be able to create an Azure Push Notification Service.
-
Implementing Yahoo! with ACS
After watching this video; you will be able to configure Azure Access Control Service to support Yahoo! authentication.
-
Install and Configure Azure PowerShell
After watching this video; you will be able to configure Azure PowerShell.
-
Integrating Offline Sync
After watching this video; you will be able to configure an application for Offline Sync with Azure Mobile Services.
-
Introduction to Azure Active Directory
After watching this video; you will be able to recognize the features of Azure Active Directory.
-
Introduction to Azure AD; OAuth; and OpenID Connect
After watching this video; you will be able to recognize the features and differences between Azure Active Directory; OAuth; and OpenID Connect.
-
Introduction to Azure Automation
After watching this video; you will be able to recognize the features of Azure Automation.
-
Introduction to Azure Batch
After watching this video; you will be able to recognize the features of Azure Batch.
-
Introduction to Azure DocumentDB
After watching this video; you will be able to recognize the features of Azure DocumentDB.
-
Introduction to Azure Mobile Services
After watching this video; you will be able to recognize the features of Azure Mobile Services.
-
Introduction to Azure Storage Options
After watching this video; you will be able to recognize the different options for storage in Azure.
-
Introduction to Azure Traffic Manager
After watching this video; you will be able to recognize the features of the Azure Traffic Manager.
-
Introduction to Azure Worker Roles
After watching this video; you will be able to recognize the features of Azure Worker Roles.
-
Introduction to Media Services
After watching this video; you will be able to recognize the features of Media Services.
-
Introduction to MongoDB
After watching this video; you will be able to recognize the features of MongoDB.
-
Introduction to MySQL in Azure
After watching this video; you will be able to recognize the features of MySQL.
-
Introduction to Push Notifications
After watching this video; you will be able to recognize the features of Azure Push Notification Services.
-
Introduction to Web API
After watching this video; you will be able to recognize the features of Web API.
-
Joining VMs to Domains or Cloud Services
After watching this video; you will be able to configure Azure Virtual Machines to connect to a domain or cloud services.
-
Manage Access to Azure Storage Resources
After watching this video; you will be able to configure access to Azure Storage Resources.
-
Managing Azure Resources with System Center
After watching this video; you will be able to identify design considerations when integrating Azure with Microsoft System Center.
-
Managing Deployment Slots
After watching this video; you will be able to configure and use a deployment slot.
-
Monitoring Azure Web Sites
After watching this video; you will be able to configure monitoring for an Azure web site.
-
Monitoring Cloud Services
After watching this video; you will be able to configure monitoring for an Azure Cloud Service.
-
Monitoring Storage Accounts
After watching this video; you will be able to configure monitoring for an Azure Storage Account.
-
Multi-factor Authentication Configuration
After watching this video; you will be able to configure Multi-factor Authentication in Azure.
-
Multi-factor Authentication Overview
After watching this video; you will be able to recognize the options to implement multi-factor authentication in Azure.
-
Overview of Azure PowerShell
After watching this video; you will be able to recognize the features of Azure PowerShell.
-
Overview of Managing Azure Security and Audit Logs
After watching this video; you will be able to identify features and information provided by Azure Security and Audit logs.
-
Overview of System Center Data Protection Manager
After watching this video; you will be able to recognize the features of System Center Data Protection.
-
Partitioning Strategies
After watching this video; you will be able to recognize strategies to implement data partitioning in Azure.
-
Point-to-Site (P2S) VPN
After watching this video; you will be able to recognize what a point-to-site (P2S) VPN is.
-
PowerShell Desired State Configuration (DSC)
After watching this video; you will be able to recognize the features of using PowerShell Desired State Configuration.
-
Premium Storage for Azure
After watching this video; you will be able to recognize the features of Premium Storage in Azure.
-
Products and Services for Monitoring
After watching this video; you will be able to identify the products and services that are used for monitoring an Azure solution.
-
Publishing Azure Web Sites with Git
After watching this video; you will be able to publish an Azure web site using Git.
-
Publishing Azure Web Sites with WebDeploy and FTP
After watching this video; you will be able to publish an Azure web site using WebDeploy and with FTP.
-
Puppet and Azure
After watching this video; you will be able to recognize the features of using Puppet with Azure.
-
Regional Availability
After watching this video; you will be able to recognize how Microsoft Azure supports regional availability.
-
Role-based Access Control in Azure
After watching this video; you will be able to recognize the features of Role-based Access Control (RBAC) in Azure.
-
SAML Claims
After watching this video; you will be able to recognize the features of SAML Claims.
-
Scaling Azure Web Sites
After watching this video; you will be able to identify the different options to scale an Azure web site.
-
Scaling with Azure Web Sites
After watching this video; you will be able to configure the scaling options for an Azure web site.
-
Secure Access Using Azure AD: OAuth
After watching this video; you will be able to configure OAuth to secure access to a resource.
-
Secure Access Using Azure AD: OpenID Connect
After watching this video; you will be able to configure OpenID Connect to secure access to a resource.
-
Securing Mobile Services
After watching this video; you will be able to configure security for Azure Mobile Services.
-
Securing Web API
After watching this video; you will be able to configure security for a Web API.
-
Security Guidelines
After watching this video; you will be able to describe the guidelines for implementing security for storage in Azure.
-
Select the Appropriate Storage for Performance
After watching this video; you will be able to identify the appropriate storage for performance.
-
Sending Push Notifications
After watching this video; you will be able to configure an application to send Push Notifications.
-
Service Bus
After watching this video; you will be able to recognize the features of an Azure Service Bus.
-
Site-to-Site (S2S) VPN
After watching this video; you will be able to recognize what a site-to-site (S2S) VPN is.
-
Software RAID on Linux VMs
After watching this video; you will be able to configure software raid within a Linux virtual machine for high availability.
-
SQL Server in Azure Virtual Machine Best Practices
After watching this video; you will be able to identify best practices for performance for SQL Databases in a VM.
-
Storage Spaces on Windows VMs
After watching this video; you will be able to configure storage spaces within a Windows virtual machine for high availability.
-
StorSimple
After watching this video; you will be able to recognize the features of StorSimple.
-
Supported Programming Languages
After watching this video; you will be able to identify the different languages that are supported by Azure web sites.
-
Table Storage
After watching this video; you will be able to configure Table Storage in Azure.
-
Tracking Changes to Role Assignments
After watching this video; you will be able to identify changes to Role Assignments when using Azure role-based access control.
-
Traffic Manager
After watching this video; you will be able to recognize the options to implement the Traffic Manager in Azure.
-
Understanding Data Security
After watching this video; you will be able to recognize approaches to data security in Azure.
-
Update an Azure Web Site with Staged Deployments
After watching this video; you will be able to configure Azure web sites to be deployed through a staged environment.
-
Uploading Content
After watching this video; you will be able to upload content to Azure Media Services.
-
Using a Queue-centric Pattern for Development
After watching this video; you will be able to recognize the benefits of using a Queue-centric Pattern for development.
-
Using Azure Operation Insights
After watching this video; you will be able to recognize the features of using Azure Operational Insights.
-
Using Azure PowerShell with Azure Resource Manager
After watching this video; you will be able to use Azure PowerShell to manage the Azure Resource Manager.
-
Using Global Service Monitor with Azure
After watching this video; you will be able to recognize the features of the Global Service Monitor in Azure.
-
Using PowerShell DSC
After watching this video; you will be able to use PowerShell DSC to manage configuration.
-
Using PowerShell with the REST API
After watching this video; you will be able to use Azure PowerShell to work with the Azure Service Management REST API.
-
Using Visual Studio Application Insights with Azure
After watching this video; you will be able to recognize the features of using Visual Studio Application Insights with Azure.
-
Virtual Machine Architecture for IaaS and PaaS
After watching this video; you will be able to recognize the virtual machine architecture to support IaaS and PaaS.
-
Virtual Machine Classifications
After watching this video; you will be able to recognize the different levels of virtual machines that Azure supports.
-
VPN Capability of Web Sites
After watching this video; you will be able to configure a VPN connection to Azure.
-
VPN Connectivity Requirements
After watching this video; you will be able to recognize the requirements to support a VPN connection to Azure.
-
Web Site Publishing Options
After watching this video; you will be able to compare different options to deploy Azure web sites.
-
Web Sites in VMs vs. Cloud Services
After watching this video; you will be able to recognize the differences between hosting an Azure web site in a virtual machine and in a cloud service.
-
WSUS; Config Manager; and Third-party Solutions
After watching this video; you will be able to identify the features and benefits of using Windows Software Update Services (WSUS); System Center Configuration Manager; and third-party solutions to maintain Azure.
-
Design a Business Continuity Strategy
After watching this video; you will be able to design a business continuity strategy for an Azure solution given a set of requirements.
-
Design a Management Strategy for Azure
After watching this video; you will be able to design a management strategy to support an Azure solution given a set of requirements.
-
Design a Security Plan for Azure
After watching this video; you will be able to design a plan to implement security for an Azure solution based on a set of requirements.
-
Designing an Azure Infrastructure
After watching this video; you will be able to design an Azure infrastructure based on a set of requirements.
-
Access and Monitor Storage – SQL Databases
After watching this video; you will be able to configure Azure storage access; monitor storage; and implement Azure SQL databases.
-
Access Control Lists (ACLs)
After watching this video; you will be able to describe ACLs with respect to VM access.
-
Analyze Storage Logs; Storage Logging; and Retention
After watching this video; you will be able to view Azure storage logs.
-
Azure File Services
After watching this video; you will be able to describe sharing and share access with Azure File Sharing.
-
Azure Load Balancing (LB)
After watching this video; you will be able to describe Azure VM Load Balancing.
-
Azure SQL Database Service
After watching this video; you will be able to describe the Azure SQL database service.
-
Azure VM Configuration
After watching this video; you will be able to describe Azure VM configuration.
-
Business Continuity and Disaster Recovery
After watching this video; you will be able to configure point-in-time recovery.
-
Choosing the Appropriate SQL Database Service Option
After watching this video; you will be able to choose the appropriate Azure SQL service.
-
Configure Availability Sets
After watching this video; you will be able to configure Availability Sets.
-
Configure Azure VM Autoscale
After watching this video; you will be able to describe and configure VM Autoscale.
-
Configure Direct Server Return
After watching this video; you will be able to configure DSR.
-
Configure Disk Caching
After watching this video; you will be able to configure disk caching.
-
Configure Firewall Rules
After watching this video; you will be able to describe VM firewall configuration.
-
Configure Point-In-Time Recovery (PITR)
After watching this video; you will be able to describe Azure SQL database Business Continuity and Disaster Recovery options.
-
Configure Storage Logging and Retention
After watching this video; you will be able to configure storage logging and retention.
-
Configure Storage Metrics and Retention
After watching this video; you will be able to configure storage metrics and retention.
-
Configure Storage Pools
After watching this video; you will be able to configure storage pools.
-
Configuring Azure Load Balancing (LB)
After watching this video; you will be able to configure LB for public endpoints.
-
Configuring Custom Domains
After watching this video; you will be able to configure a custom domain.
-
Configuring Database Geo-replication
After watching this video; you will be able to configure secondary replicated databases.
-
Configuring Storage Replication
After watching this video; you will be able to describe storage replication.
-
Configuring Virtual Machine Public DNS
After watching this video; you will be able to configure a VM to permit public access.
-
Configuring VM ACLs
After watching this video; you will be able to configure VM ACLs.
-
Configuring VMs with PowerShell DSC
After watching this video; you will be able to automate Azure VM configuration using PowerShell DSC.
-
Convert an Existing VHD to an Azure Disk
After watching this video; you will be able to convert a VHD to an Azure Disk.
-
Copy Images to Storage Accounts and Subscriptions
After watching this video; you will be able to copy images between storage accounts and subscriptions using AZCopy.
-
Create and Manage Azure Virtual Machines
After watching this video; you will be able to create and manage Azure virtual machines.
-
Creating a VM from an Existing Disk
After watching this video; you will be able to create a VM from an existing disk.
-
Creating VMs and Workloads — Linux Workload
After watching this video; you will be able to create a Linux Virtual Machine.
-
Creating VMs and Workloads – Windows Server
After watching this video; you will be able to create a Windows Server Virtual Machine.
-
Creating VMs and Workloads — Windows SQL Server
After watching this video; you will be able to create a Windows SQL Server Virtual Machine.
-
Deploying Cross-Origin Resource Sharing
After watching this video; you will be able to describe CORS.
-
Direct Server Return and Keep-Alive
After watching this video; you will be able to describe DSR and Keep-Alive.
-
File Share Creation
After watching this video; you will be able to create a file/folder share.
-
Generalizing a VM Image
After watching this video; you will be able to generalize Windows VM and Linux VM images.
-
Identifying VM Workloads
After watching this video; you will be able to describe workload identification and selection.
-
Import and Export Data and Schema
After watching this video; you will be able to export and import an SQL database.
-
Install SDKs and Emulators
After watching this video; you will be able to install the Azure SDK.
-
Monitor and Scale SQL Databases
After watching this video; you will be able to describe SQL database monitoring and scaling in Azure.
-
Regenerating Storage Account Keys
After watching this video; you will be able to describe storage account keys and regenerate account keys.
-
Regions and Affinity Groups
After watching this video; you will be able to describe Regions and Affinity Groups.
-
Remote Debugging
After watching this video; you will be able to enable remote VM debugging.
-
Reserved IP Address
After watching this video; you will be able to configure a VM with a reserved IP address.
-
Scale and Monitor VMs; and Configure Storage
After watching this video; you will be able to scale and monitor Azure VMs; and design and implement Azure storage.
-
Scaling Azure VMs
After watching this video; you will be able to manually configure Azure VM scaling.
-
Scaling VMs
After watching this video; you will be able to describe VM scaling and VM sizes.
-
Shared Access Signatures
After watching this video; you will be able to describe Shared Access Signatures (SAG).
-
Storage Capacity Planning
After watching this video; you will be able to plan storage capacity.
-
Storage Metrics
After watching this video; you will be able to describe metrics associated with Azure storage.
-
Stored Access Policies
After watching this video; you will be able to describe storage access policies.
-
Upgrading a Deployment
After watching this video; you will be able to describe upgrade deployment options.
-
Uploading a VM to Azure
After watching this video; you will be able to upload an existing VM to Azure.
-
VM Agent (and Custom Script Extensions)
After watching this video; you will be able to automate Azure VM configuration using VM Agent (custom PowerShell script extensions).
-
VM Images and Virtual Hard Disks (VHDs)
After watching this video; you will be able to describe VM Images and VHDs.
-
Website Resiliency
After watching this video; you will be able to describe the design and implementation of website resiliency techniques.
-
Accessing Storage
After watching this video; you will be able to access storage on Microsoft Azure.
-
AD Synchronization - Configuring Password Synchronization
In Microsoft Azure; you can keep the directories in sync by performing password synchronization. In this video; Aaron Sampson demonstrates how to configure password synchronization in Microsoft Azure.
-
AD Synchronization - Creating an Azure Active Directory Administrative Account
In Microsoft Azure; you can use an administrative account to implement a Microsoft Azure-based active directory. In this video; Aaron Sampson demonstrates how to create an adminstrative account.
-
AD Synchronization - Getting Started with Applications
In Microsoft Azure; you can add applications and access them by using a pre-existing user account. In this video; Aaron Sampson demonstrates how to integrate Windows Azure applications with active directory synchronization.
-
AD Synchronization - User and Group Administration
Microsoft Azure allows your directory service to add users into the groups. In this video; Aaron Sampson demonstrates the basics of user and group management.
-
Adding a Custom Domain to Azure AD
After watching this video; you will be able to add a custom domain to Microsoft Azure Active Directory.
-
Adding Custom Web Apps to Azure AD
After watching this video; you will be able to add a custom web app to Microsoft Azure Active Directory.
-
Adding Gallery Applications to Azure AD
After watching this video; you will be able to add a gallery application to Microsoft Azure Active Directory.
-
Adding Virtual Machines to Virtual Networks
In Microsoft Azure; you can place multiple virtual machines in the same virtual network. In this video; Aaron Sampson demonstrates how to assign a virtual machine to a virtual network.
-
Authoring a Runbook
After watching this video; you will be able to author a runbook in Microsoft Azure.
-
Azure AD Premium Overview
After watching this video; you will be able to describe Microsoft Azure Active Directory Premium.
-
Azure Automation Overview
After watching this video; you will be able to describe how Microsoft Azure automation can be used to automate cloud tasks.
-
Azure Data Centers
After watching this video; you will be able to describe the features of Microsoft Azure data centers.
-
Azure Media Services Overview
After watching this video; you will be able to describe Microsoft Azure Media Services.
-
Azure Overview
After watching this video; you will be able to identify the main features of Microsoft Azure.
-
Azure PowerShell Modules
After watching this video; you will be able to manage Microsoft Azure using Azure PowerShell Modules.
-
Azure Services
After watching this video; you will be able to identify Azure services and how they are grouped.
-
Azure SQL Architecture
After watching this video; you will be able to describe the architecture and tools for managing Azure SQL Database; and the processes for provisioning and migrating from Microsoft SQL Server on-premises.
-
Azure SQL Database Security Overview
After watching this video; you will be able to describe Microsoft Azure SQL Database levels and firewall rules.
-
Basic Configuration of Virtual Machines
In Microsoft Azure; you can configure a virtual machine easily. In this video; Aaron Sampson explains the basic configuration of a new virtual machine and demonstrates how to enable remote access to the system to set it up.
-
Caching Content with Azure CDN
After watching this video; you will be able to describe options for caching blobs and cloud services on Microsoft Azure CDN.
-
Claims-based Authentication and Federated Trusts
After watching this video; you will be able to describe the function of claims-based authentication and federated trusts in Microsoft Azure Active Directory.
-
Comparing Azure SQL Database and SQL Server
After watching this video; you will be able to compare Microsoft SQL Server on-premises to Microsoft Azure SQL Database.
-
Configure a CDN and Automation
After watching this video; you will be able to create a CDN; add content; and configure automation tasks in Microsoft Azure.
-
Configure Azure SQL Database Alerts
After watching this video; you will be able to configure Microsoft Azure SQL Database alerts.
-
Configure Azure SQL Database Auditing
After watching this video; you will be able to configure Microsoft Azure SQL Database auditing.
-
Configure Secure VM Management
After watching this video; you will be able to configure secure management of Microsoft Azure virtual machines.
-
Configuring a Connection String for Azure SQL Database
After watching this video; you will be able to configure a connection string for a Microsoft Azure SQL Database.
-
Configuring a Point-to-Site VPN
After watching this video; you will be able to configure a point-to-site VPN in the Microsoft Azure management portal.
-
Configuring a Site-to-Site VPN
After watching this video; you will be able to configure a site-to-site VPN in the Microsoft Azure management portal.
-
Configuring a VNet-to-VNet Connection — Configure VNets
After watching this video; you will be able to configure a VNet in the Microsoft Azure management portal.
-
Configuring a VNet-to-VNet Connection — Gateways
After watching this video; you will be able to create dynamic routing gateways in the Microsoft Azure management portal.
-
Configuring an Azure CDN
After watching this video; you will be able to configure a CDN on Microsoft Azure.
-
Configuring Azure Active Directory
After watching this video; you will be able to configure Microsoft Azure Active Directory users and applications.
-
Configuring Azure AD Application Proxy
After watching this video; you will be able to configure Microsoft Azure Active Directory Application Proxy.
-
Configuring Azure AD Premium Multi-Factor Authentication
After watching this video; you will be able to configure multi-factor authentication in Microsoft Azure Active Directory Premium.
-
Configuring Azure Backup
After watching this video; you will be able to configure Azure backup.
-
Configuring Azure SQL Database
After watching this video; you will be able to create and configure an Azure SQL Database.
-
Configuring Azure SQL Database Copy and Export
After watching this video; you will be able to configure Microsoft Azure SQL Database copy and export.
-
Configuring Azure SQL Database Geo-Replication
After watching this video; you will be able to configure Microsoft Azure SQL Database geo-replication.
-
Configuring Cache Options
Microsoft Azure provides the ability to configure cache options that best support the performance of your applications. In this video; Aaron Sampson examines the configuration options.
-
Configuring Custom Script Extensions
After watching this video; you will be able to configure custom script extensions to automate virtual machine management.
-
Configuring Database Sync Groups
Microsoft Azure allows users to configure databases that have been placed in sync groups. In this video; Aaron Sampson explains how to how to set up and configure replication amongst the sync group members.
-
Configuring Disks in Virtual Machines
In Microsoft Azure; all virtual machines rely on Virtual Hard Disks for support. In this video; Aaron Sampson demonstrates how to configure the VHD files and create and attach new storage drives.
-
Configuring IaaS Availability
After watching this video; you will be able to configure virtual machine availability in Microsoft Azure.
-
Configuring IaaS Scalability
After watching this video; you will be able to configure virtual machine scalability in Microsoft Azure.
-
Configuring Metrics and Alerts
After watching this video; you will be able to add metrics to a monitoring table and add an alert to a metric in Azure.
-
Configuring PowerShell
In Microsoft Azure subscription; you can manage many features by using PowerShell but you need to complete some configuration tasks. In this video; Aaron Sampson demonstrates how to configure the Azure environment to support PowerShell management.
-
Configuring Mobile Service Database Settings
After watching this video; you will be able to configure mobile service database settings in Azure.
-
Configuring Mobile Service Push Settings
After watching this video; you will be able to configure mobile service Push Notification settings in Azure.
-
Configuring Monitoring
After watching this video; you will be able to enable and configure basic monitoring.
-
Configuring Multi-Factor Authentication with Azure AD
After watching this video; you will be able to configure multifactor authentication in Microsoft Azure Active Directory.
-
Configuring Point-to-Site VPN Access to Virtual Networks
In Microsoft Azure; you can design Virtual Networks that fully support connecting in via a VPN. In this video; Aaron Sampson demonstrates how to configure client systems to connect to a virtual network via a Point-to-Site VPN.
-
Configuring Private BLOB File Access
In Microsoft Azure; you can use the BLOB Storage to configure various types of files for varying purposes. In this video; Aaron Sampson demonstrates how to set up private access to BLOB files.
-
Configuring Public BLOB File Access
In Microsoft Azure; you can set public access for your BLOB files. In this video; Aaron Sampson demonstrates how to create public access BLOB files.
-
Configuring Remote PowerShell Access
PowerShell is a very popular tool in many environments including Microsoft Azure. In this video; Aaron Sampson demonstrates how to access systems residing in the cloud by using PowerShell on a local system.
-
Configuring Single Sign-on for Azure AD Gallery Apps
After watching this video; you will be able to configure single sign-on for a gallery app in Microsoft Azure Active Directory.
-
Configuring Site-to-Site VPN Access to Virtual Networks
In Microsoft Azure; when you configure site-to-site VPN access; you need to complete some post-creation configuration tasks. In this video; Aaron Sampson explains some of the common configuration options for site-to-site VPNs.
-
Configuring the Firewall for Azure SQL Database
After watching this video; you will be able to configure the firewall for Azure SQL Database on Microsoft Azure.
-
Configuring Traffic Manager
After watching this video; you will be able to configure Traffic Manager in Microsoft Azure.
-
Configuring Virtual Machine Networking
After watching this video; you will be able to configure virtual machine networking in Microsoft Azure.
-
Configuring Virtual Machine Storage
After watching this video; you will be able to configure virtual machine storage in Microsoft Azure.
-
Configuring VM Agent and VM Extensions
After watching this video; you will be able to install and configure VM Agent and VM Extensions in a Microsoft Azure virtual machines.
-
Configuring VM Security
After watching this video; you will be able to configure virtual machine security in Microsoft Azure.
-
Configuring Web Site Monitoring
Microsoft Azure provides the ability monitor your web site to determine if the site should be scaled out or scaled back. In this video; Aaron Sampson explains how to monitor your Microsoft Azure web site.
-
Configuring Web Site Scaling
Microsoft Azure provides the ability to scale sites depending on resource availability. In this video; Aaron Sampson explains how to how to configure web site scaling to upgrade or downgrade your sites.
-
Configuring Website Settings
After watching this video; you will be able to configure Microsoft Azure website settings.
-
Connecting Automation to an Azure Subscription
After watching this video; you will be able to connect Microsoft Azure Automation to an Azure subscription.
-
Connecting to Azure SQL Database with SQL 2014 Management Studio
After watching this video; you will be able to connect to Microsoft Azure SQL Database from Microsoft SQL 2014 Management Studio.
-
Content Delivery Networks Overview
After watching this video; you will be able to describe Microsoft Azure CDN operation.
-
Creating a Media Services Account
After watching this video; you will be able to create a Microsoft Azure Media Services account .
-
Creating a Mobile Service
After watching this video; you will be able to create a new mobile service in Azure.
-
Creating a New Website
After watching this video; you will be able to create a new website in Microsoft Azure.
-
Creating a PaaS Cloud Service
After watching this video; you will be able to create a PaaS cloud service in Azure.
-
Creating a Root Certificate for VPN Access to Virtual Networks
For Microsoft Azure VPN access to virtual networks; you need to assure your clients that they are connecting through to the correct server; by implementing a root certificate. In this video; Aaron Sampson demonstrates the steps for creating and implementing root certificates to validate the identity of the server.
-
Creating a Storage Account
After watching this video; you will be able to create a storage account for Microsoft Azure.
-
Creating a Virtual Network Using Configuration Files
After watching this video; you will be able to create a virtual network in Microsoft Azure using configuration files.
-
Creating a Virtual Network with the Portal
After watching this video; you will be able to create a virtual network using the Microsoft Azure management portal.
-
Creating and Managing VM Disks
After watching this video; you will be able to create and manage virtual machine disks in Microsoft Azure.
-
Creating and Managing VM Images
After watching this video; you will be able to create and manage virtual machine images in Microsoft Azure.
-
Creating Automation Assets
After watching this video; you will be able to create automation assets in Microsoft Azure.
-
Creating Availability Sets
Microsoft Azure provides users the ability to create availability sets that further help in providing uninterrupted services to clients. In this video; Aaron Sampson explains how to create availability sets by using the Microsoft Azure virtual machines.
-
Creating Client Certificates for VPN Access to Virtual Networks
In a Microsoft Azure virtual network; when you establish a VPN connection; the server into which you are connecting needs to verify the identity of the client system. In this video; Aaron Sampson demonstrates how to implement client certificates for authenticating client connections when establishing VPN connectivity.
-
Creating Load Balancing Sets
Microsoft Azure provides users the ability to create virtual machines to balance load across multiple servers. In this video; Aaron Sampson explains how to configure virtual machines in load-balancing sets using Microsoft Azure.
-
Creating PowerShell Workflows
After watching this video; you will be able to use PowerShell workflows to automate functions in Microsoft Azure.
-
Creating Site-to-Site VPN Access to Virtual Networks
In Microsoft Azure; you can create site-to-site VPNs for regular and constant access to resources that reside within a virtual network. In this video; Aaron Sampson demonstrates how to create site-to-site VPN access to virtual networks.
-
Data Services in Azure
After watching this video; you will be able to describe the options in Data Services in Microsoft Azure.
-
Deleting an Azure VM
After watching this video; you will be able to delete a virtual machine in Microsoft Azure.
-
Deploying a Linux VM
After watching this video; you will be able to deploy a Linux virtual machine in Microsoft Azure.
-
Deploying a PaaS Cloud Service
After watching this video; you will be able to deploy a PaaS cloud service.
-
Deploying a VM into a Virtual Network
After watching this video; you will be able to deploy a VM into a virtual network using the Microsoft Azure management portal.
-
Deploying a Website Using an FTP Client
After watching this video; you will be able to deploy a website to Microsoft Azure using an FTP client.
-
Deploying a Website with Visual Studio 2013
After watching this video; you will be able to deploy a website to Microsoft Azure using Visual Studio 2013.
-
Deploying a Website with Visual Studio 2013 and Web Deploy
After watching this video; you will be able to deploy a website to Microsoft Azure using Visual Studio 2013 and Web Deploy.
-
Deploying an Azure VM
After watching this video; you will be able to deploy a virtual machine in Microsoft Azure.
-
Deploying Azure AD Federation Services
After watching this video; you will be able to deploy Microsoft Azure Active Directory Federation Services.
-
Designing an IP Space
After watching this video; you will be able to describe considerations for IP address space design in Microsoft Azure.
-
Directory Sync Options
After watching this video; you will be able to describe options for syncing between on-premises Active Directory and Microsoft Azure Active Directory with DirSync.
-
Encoding and Uploading Media
After watching this video; you will be able to encode and upload media to Microsoft Azure.
-
Encrypting and Scaling Media
After watching this video; you will be able to encrypt media and scale media delivery with Microsoft Azure.
-
Exporting and Importing Virtual Network Configuration
Microsoft Azure provides the ability to create new virtual networks based on the configuration of existing networks. In this video; Aaron Sampson explains how to export and import virtual network configuration.
-
Extending an On-premises Domain to Azure AD
After watching this video; you will be able to extend an on-premises Active Directory domain to Microsoft Azure Active Directory.
-
Getting Started with Alerts
Microsoft Azure provides the ability to create alerts; so that you can be informed when particular thresholds are met or exceeded. In this video; Aaron Sampson explains how to get started with alerts.
-
Getting Started with Azure Active Directory
You can use theMicrosoft Azure active directory. In this video; Aaron Sampson demonstrates how to set up an Azure active directory.
-
Getting Started with Backup Vaults - Creating a Certificate
In Microsoft Azure; you can create certificates for accessing your backup vaults. In this video; Aaron Sampson demonstrates how create and upload a custom certificate for secure access.
-
Getting Started with Backup Vaults - Installing the Backup Agent
In Microsoft Azure; you need to install a backup agent to allow your local system to communicate with the backup vaults. In this video; Aaron Sampson demonstrates how to; download; install; and configure backup agents.
-
Getting Started with Caches
In Microsoft Azure; you can implement a cache to support and enhance the performance of your applications. In this video; Aaron Sampson demonstrates how to create a cache in Microsoft Azure.
-
Getting Started with Database Sync Groups
In Microsoft Azure; you can replicate databases to distribute data to multiple servers or locations. In this video; Aaron Sampson explains how to get started with database sync groups.
-
Getting Started with FTP Publishing
Microsoft Azure provides the facility for FTP publishing. In this video; Aaron Sampson explains how to get started with standard FTP Publishing for Microsoft Azure web sites.
-
Getting Started with PowerShell
Microsoft Azure allows users to use PowerShell to manage applications. In this video; Aaron Sampson explains how to get started with Microsoft Azure PowerShell.
-
Getting Started with Storage Accounts
In Microsoft Azure; you can set up and configure a storage account for your data storage concerns. In this video; Aaron Sampson demonstrates how to create storage account and shows some options for your storage requirements
-
Getting Started with Storage Explorer
In Microsoft Azure; you need to use local application for accessing the stored data. In this video; Aaron Sampson demonstrates how to use the Storage Explorer utility to access and manage your Storage account.
-
Getting Started with Storage Using Visual Studio
In Microsoft Azure; you can access cloud-based data structures using your preferred tools. In this video; Aaron Sampson demonstrates how to access cloud storage from a local installation of Visual Studio.
-
Getting Started with Traffic Manager
Microsoft Azure offers many features for better client management and user experience. In this video; Aaron Sampson explains the initial configuration tasks for creating a distributed cloud service or web site by using the Traffic Manager feature.
-
Getting Started with Virtual Networks
Microsoft Azure provides the ability to create a virtual network and place multiple virtual machines in that network. In this video; Aaron Sampson explains some of the initial creation options and configuration tasks for virtual networks.
-
Getting Started with Web Sites
In Microsoft Azure; you can provision and set up a live site in minutes. In this video; Aaron Sampson demonstrates how to get a new web site set-up and running.
-
Getting Started with WebMatrix Publishing
Microsoft Azure provides the WebMatrix facility; which allows web site developers to to edit and publish content directly to a live site. In this video; Aaron Sampson explains how to configure sites to support WebMatrix publishing.
-
How to Set Up a Cloud Test Environment
Using Microsoft Azure; developers can build their applications locally or on-site and deploy to the cloud. In this video; Aaron Sampson demonstrates how to use Windows Azure and Microsoft Visual Studio to set up a test environment so that features; such as accessing local storage; can be simulated in a cloud-like manner.
-
How to Set Up Visual Studio and Azure SDK Tools
In Microsoft Azure; you can access the SDK that integrates into Visual Studio. In this video; Aaron Sampson demonstrates how to access the Software Developer Kit from Microsoft Azure.
-
How to Sign Up for an Azure Account
You can subscribe for Microsoft Azure by using a Microsoft account. In this video; Aaron Sampson demonstrates how to sign up for an Azure account.
-
Implementing a Website
After watching this video; you will be able to plan and implement a website in Microsoft Azure.
-
Implementing Azure Backup
After watching this video; you will be able to implement Azure backup.
-
Implementing Azure Files
After watching this video; you will be able to implement file storage in Microsoft Azure.
-
Implementing Blobs
After watching this video; you will be able to implement binary large object storage in Microsoft Azure.
-
Implementing Tables and Queues
After watching this video; you will be able to implement table and queue storage in Microsoft Azure.
-
Implementing WebJobs
After watching this video; you will be able to implement WebJobs on a Microsoft Azure website.
-
Importing a Runbook
After watching this video; you will be able to import a runbook into Microsoft Azure.
-
Installing and Configuring Azure AD Directory Sync
After watching this video; you will be able to install and configure Microsoft Azure AD Synchronization.
-
Installing Xplat-cli
After watching this video; you will be able to install the Microsoft Azure Cross-Platform Command-Line Interface for configuration management.
-
Introduction to Azure AppFabric
In Microsoft Azure; you and your partner organization can access a wide array of services; applications; and storage mechanisms. As a cloud-based environment; worldwide connectivity is one of its core advantages; but maintaining such connectivity can be complex. In this video; Aaron Sampson introduces Windows Azure AppFabric; which is designed to reduce connectivity challenges.
-
Introduction to SQL Azure
Microsoft Azure helps to maintain databases along with the servers on which they reside. In this video; Aaron Sampson introduces SQL Azure.
-
Introduction to the Azure Platform
Microsoft Azure is the basis for the cloud-computing model. In this video; Aaron Sampson discuses about the Microsoft Azure environment and its basic features.
-
Introduction to the Azure Portal
In Microsoft Azure; you can access and manage the services from anywhere in the world through a single; centralized management portal. In this video; Aaron Sampson discusses the basic configuration options within the Azure portal.
-
Introduction to the Azure Store
In Microsoft Azure; you can use the Store option to check the available applications and features. In this video; Aaron Sampson demonstrates discusses the Azure Store.
-
Kudu
After watching this video; you will be able to describe the features of Kudu for Azure.
-
Linking a Database and Storage to a Website
After watching this video; you will be able to link a database and storage to a Microsoft Azure Website.
-
Managing a Virtual Network with the Portal
After watching this video; you will be able to manage a virtual network using the Microsoft Azure management portal.
-
Managing AD Users with Azure Management Portal
After watching this video; you will be able to manage users in Microsoft Azure Active Directory with the management portal.
-
Managing Azure Accounts with PowerShell
After watching this video; you will be able to manage Microsoft Azure accounts using PowerShell.
-
Managing Azure Linux VMs
After watching this video; you will be able to manage Microsoft Azure Linux virtual machines.
-
Managing Azure SQL Database Firewall Rules
After watching this video; you will be able to manage Microsoft Azure SQL Database firewall rules.
-
Managing Azure SQL Database Logins and Users
After watching this video; you will be able to manage logins and users in Microsoft Azure SQL Database.
-
Managing Azure SQL Database Roles and Permissions
After watching this video; you will be able to manage Microsoft Azure SQL Database roles and permissions.
-
Managing Azure Windows VMs
After watching this video; you will be able to manage Microsoft Azure Windows virtual machines.
-
Managing Azure with PowerShell
After watching this video; you will be able to manage Microsoft Azure using PowerShell.
-
Managing Azure with the Azure Management Portal
After watching this video; you will be able to manage a Microsoft Azure account using the Azure Management Portal.
-
Managing Azure with the New Azure Portal
After watching this video; you will be able to manage a Microsoft Azure account using the new Azure Management Portal.
-
Managing Storage and Cloud Services
After watching this video; you will be able to create and manage storage and cloud service objects on Microsoft Azure.
-
Managing VMs with Xplat-cli
After watching this video; you will be able to manage virtual machine configuration with the Microsoft Azure Cross-Platform Command-Line Interface.
-
Mobile Apps and Services
After watching this video; you will be able to describe mobile apps and Azure mobile services.
-
Modifying a Virtual Network Using Configuration Files
After watching this video; you will be able to modify a virtual network in Microsoft Azure using configuration files.
-
Monitoring an Azure VM
After watching this video; you will be able to monitor a Microsoft Azure virtual machine.
-
Monitoring Azure AD Directory Sync
After watching this video; you will be able to monitor Microsoft Azure AD synchronization.
-
Monitoring Azure SQL Database Metrics
After watching this video; you will be able to monitor Microsoft Azure SQL Database metrics.
-
Monitoring Cache Values
Microsoft Azure allows user to monitor cache values. In this video; Aaron Sampson explains how to monitor cache values to help configure caches effectively.
-
Monitoring Storage
After watching this video; you will be able to monitor storage in Microsoft Azure.
-
PaaS Cloud Deployment
After watching this video; you will be able to describe PaaS cloud service deployment options.
-
PaaS Cloud Overview
After watching this video; you will be able to describe PaaS cloud services in Azure.
-
Placing Domain Controllers in Azure
After watching this video; you will be able to identify considerations when placing Active Directory domain controllers on Microsoft Azure Active Directory.
-
Planning AD Azure Integration
After watching this video; you will be able to describe Microsoft Azure Active Directory integration with on-premises Active Directory.
-
Planning and Configuring a Virtual Network
After watching this video; you will be able to plan and configure a virtual network in Microsoft Azure.
-
Planning and Deploying a Virtual Machine
After watching this video; you will be able to plan and deploy a virtual machine in Microsoft Azure.
-
Planning Azure VM Deployment
After watching this video; you will be able to plan a deployment of Azure virtual machines.
-
Planning Name Resolution
After watching this video; you will be able to plan name resolution in Microsoft Azure.
-
Planning Website Deployment Methods
After watching this video; you will be able to plan deployment methods for Microsoft Azure websites.
-
Populating Tables
In Microsoft Azure; if you use table storage; you need to define those tables and populate them with data. In this video; Aaron Sampson explains some ways to get data into tables.
-
Preparing On-premises AD for Azure AD Sync
After watching this video; you will be able to prepare on-premises Active Directory for synchronization with Azure AD Sync.
-
Publishing a Runbook
After watching this video; you will be able to publish a runbook in Microsoft Azure.
-
Publishing Media
After watching this video; you will be able to publish media on Microsoft Azure.
-
Regional Virtual Networks
After watching this video; you will be able to identify features supported by regional Virtual Networks in Microsoft Azure.
-
Restoring an Azure SQL Database
After watching this video; you will be able to restore Microsoft Azure SQL Databases.
-
Scaling a PaaS Cloud Service
After watching this video; you will be able to schedule a larger instance count for a PaaS cloud service in expectation of a load peak.
-
Scaling Out a Website
After watching this video; you will be able to scale out a Microsoft Azure Website.
-
Scaling Up a Website
After watching this video; you will be able to scale up a Microsoft Azure website.
-
Scenarios for Virtual Networking
After watching this video; you will be able to identify scenarios for virtual networking in Microsoft Azure.
-
Services for Website Hosting
After watching this video; you will be able to contrast methods for hosting websites in Microsoft Azure.
-
Sizing VMs
After watching this video; you will be able to describe considerations for sizing Microsoft Azure IaaS virtual machines.
-
SQL Azure Feature Comparison
Microsoft Azure provides you options for creating a database without setting up a virtual machine to host that database. However; all the features of an SQL Server are not available in SQL Azure. In this video; Aaron Sampson compares the features of SQL Server and SQL Azure.
-
Storage - Creating Basic BLOBs
In Microsoft Azure; if you need Blob storage; you have to create a storage account to hold your objects. In this video; Aaron Sampson demonstrates how to store Blobs.
-
Storage - Creating Basic Tables
In Microsoft Azure; you can get tabular storage for your requirements. In this video; Aaron Sampson demonstrates how to get started with creating and configuring tables.
-
Storage - Customizing and Querying Tables
Microsoft Azure tables can store an enormous amount of data. In this video; Aaron Sampson explains some configuration and querying options to organize and locate the required data in tables.
-
Storage Considerations
After watching this video; you will be able to identify considerations for choosing storage for an Azure application.
-
Testing and Troubleshooting a Runbook
After watching this video; you will be able to test and troubleshoot a runbook on Microsoft Azure.
-
Traffic Manager - Configuring Failover Mode
In Microsoft Azure; you can use the Failover mode to set preferred access to an instance of an application so that all client requests are routed to that instance. If that instance becomes unavailable; you can configure an alternate instance to provide uninterrupted access. In this video; Aaron Sampson demonstrates how to set up a Failover mode.
-
Traffic Manager - Configuring Performance Mode
In Microsoft Azure; you can use the traffic manager performance option to locate the closest instance of the application. In this video; Aaron Sampson demonstrates how to use the traffic manager performance option.
-
Traffic Manager - Configuring Round Robin Mode
Microsoft Azure is a cloud-based environment with world-wide connectivity through any Microsoft-managed datacenters. In this video; Aaron Sampson will show you how the Traffic manager Round Robin mode distributes traffic equally but also still tries to maintain the best performing option.
-
Traffic Manager Best Practice
After watching this video; you will be able to describe best practices for using Traffic Manager in Microsoft Azure.
-
Trusts and Single Sign-on in Azure AD-FS
After watching this video; you will be able to describe options for configuring trusts and single sign-on in Microsoft Azure Active Directory Federated Services.
-
Understanding Azure Active Directory
Microsoft Azure allows you to create and define a directory service for the storage of objects. In this video; Aaron Sampson discusses about the concepts and benefits of the cloud-based active directory services.
-
Understanding Azure Security
In Microsoft Azure; you can secure the cloud-based data services and applications. In this video; Aaron Sampson discusses about the security of the cloud-based sevices.
-
Understanding Azure Storage - BLOBs
In Microsoft Azure; you can use BLOBs to store and access large files. In this video; Aaron Sampson discusses about the basics of Binary Large Objects or BLOBs storage.
-
Understanding Azure Storage - Tables
In Microsoft Azure; you can design tables in the storage account and store the data in it. In this video; Aaron Sampson discusses about the tables.
-
Understanding Caches
Microsoft Azure provides the facility of creating caches; which helps to enhance the performance of applications by providing dedicated memory where data can reside. In this video; Aaron Sampson explains some basic concepts about caches.
-
Understanding Database Sync Groups
Microsoft Azure provides the ability to replicate data from one database to another or from one server to another to make client-access much faster and more efficient. In this video; Aaron Sampson explains how to use database sync groups.
-
Understanding Execution Models
In order to determine the type of Microsoft Azure subscription that best suits your needs; you need to first be familiar with the different approaches to supporting applications in the cloud. In this video; Aaron Sampson explains the three kinds of execution models.
-
Understanding Network Models
Microsoft Azure allows you to meet the networking demands of your organization. In this video; Aaron Sampson discusses about the network models available in the Microsoft Azure.
-
Understanding SQL Azure Architecture
In Microsoft Azure; you need to understand the architecture of SQL Azure databases to determine which approach might suit the database requirements. In this video; Aaron Sampson introduces the SQL Azure Architecture.
-
Understanding SQL Azure Security
In Microsoft Azure; you need to understand the SQL Azure security to fully take advantage of its administrative advantages. In this video; Aaron Sampson examines the SQL Azure Security model to determine the security requirements.
-
Understanding Storage Models
In Microsoft Azure; you can use different options to store and access data in the cloud. In this video; Aaron Sampson discusses about the storage models used to access and store data in the cloud.
-
Understanding Traffic Manager
Microsoft Azure provides useful features for large organizations that have clients in different locations around the world; who need access to the same web site. In this video; Aaron Sampson explains how the Traffic Manager feature distributes client access across multiple instances for faster and more reliable access.
-
Understanding Virtual Networks
Microsoft Azure allows users to create a virtual network to host multiple virtual machines. In this video; Aaron Sampson explains how virtual networks serve user needs.
-
Understanding VPN Options within Virtual Networks
Microsoft Azure allows users to access virtual networks both through the Azure portal as well as through a virtual private network. In this video; Aaron Sampson examines which type of VPN best suits the requirements of the organization.
-
Understanding Web Site Content Publishing
Microsoft Azure provides various options for web site developers to design sites according to their requirements by publishing content to sites. In this video; Aaron Sampson explains the options for enabling web site content publishing.
-
Understanding Web Site Models
In Microsoft Azure; you can design a site and its server or just a site. In this video; Aaron Sampson demonstrates the options available for creating and hosting websites in Windows Azure.
-
Understanding Web Site Scaling
Microsoft Azure provides you various options for allotting resources to a web site according to your web site traffic. In this video; Aaron Sampson explains the options for web site scaling to upscale and downscale the resources that have been allocated to a site.
-
Updating a Website
After watching this video; you will be able to update a website on Microsoft Azure.
-
Verifying a VNet-to-VNet Connection
After watching this video; you will be able to verify VNet-to-VNet connection configuration using the Microsoft Azure management portal.
-
Virtual Machine Overview
After watching this video; you will be able to identify workloads for Azure IaaS and contrast on-premises and Azure virtual machines.
-
Virtual Network Features
After watching this video; you will be able to describe features of virtual networks in Microsoft Azure.
-
Virtual Network Overview
After watching this video; you will be able to describe virtual networks in Microsoft Azure.
-
Website Diagnostics
After watching this video; you will be able to describe site diagnostics in Microsoft Azure.
-
Website Monitoring
After watching this video; you will be able to describe website monitoring in Microsoft Azure.
-
Website Planning Scenarios
After watching this video; you will be able to describe some common scenarios for websites to be deployed to Microsoft Azure.
-
32-bit vs. 64-bit
After watching this video; you will be able to choose between a 32-bit and 64-bit platform.
-
Adding Storage
After watching this video; you will be able to purchase additional storage for a subscription.
-
Apply Themes
After watching this video; you will be able to apply themes.
-
Assign and Revoke Licenses
After watching this video; you will be able to work with licenses including assigning and revoking them.
-
Automate Installs
After watching this video; you will be able to configure automated installs.
-
Browser Requirements
After watching this video; you will be able to identify browser requirement to support Office 365 and Intune.
-
Cloud Models
After watching this video; you will be able to describe cloud models and characteristics.
-
Cloud Platforms
After watching this video; you will be able to describe the various types of cloud platforms.
-
Cloud Service – Provider vs. Consumer Access
After watching this video; you will be able to describe cloud services with reference to access levels and responsibility.
-
Cloud Service – Responsibility
After watching this video; you will be able to describe service provider risk and associated guarantees including changing provider; data transfer; etc.
-
Cloud Service – Status and Availability
After watching this video; you will be able to describe business continuity and disaster recovery provisioning in addition to service improvement and maintenance.
-
Cloud Service Characteristics
After watching this video; you will be able to describe cloud service characteristics.
-
Cloud Service Compliance
After watching this video; you will be able to describe compliance with reference to accepted standards and legal imperatives.
-
Cloud Service Health Management
After watching this video; you will be able to describe system health monitoring.
-
Cloud Service Maintenance
After watching this video; you will be able to describe service maintenance and release schedules.
-
Cloud Service Privacy
After watching this video; you will be able to describe security with reference to cloud services including operational and data asset policy and procedures.
-
Cloud Service Security
After watching this video; you will be able to describe data security with reference to applied practices and methodologies.
-
Cloud Service Transparency
After watching this video; you will be able to describe service consumer access to data assets and operational data; and transparency of data.
-
Cloud Services – IaaS
After watching this video; you will be able to describe cloud services – IaaS.
-
Cloud Services – PaaS
After watching this video; you will be able to describe cloud services – PaaS.
-
Cloud Services – SaaS
After watching this video; you will be able to describe cloud services – SaaS.
-
Communications to Skype
After watching this video; you will be able to troubleshoot communications to Skype users and users in other companies using Skype for Business.
-
Configure and Confirm Skype for Business Partners
After watching this video; you will be able to configure Skype for Business partner federation.
-
Configure External Skype Users
After watching this video; you will be able to configure external Skype users.
-
Configure Skype for Business Online DNS
After watching this video; you will be able to configure Skype for Business Online DNS.
-
Configuring Alerts
After watching this video; you will be able to work with the alerting system in Intune.
-
Configuring Dial-in Settings and Invitation Options
After watching this video; you will be able to configure dial-in and invitation option settings.
-
Configuring External Sharing
After watching this video; you will be able to configure external sharing.
-
Configuring Storage and Resource Limits
After watching this video; you will be able to configure storage and resource limits.
-
Connection Issues with Skype for Business Online
After watching this video; you will be able to troubleshoot connection issues with Skype for Business Online.
-
Connection to Skype for Business Online
After watching this video; you will be able to use the Connection Analyzer.
-
Create and Deploy Policies
After watching this video; you will be able to create and deploy Intune policies.
-
Create and Manage Groups
After watching this video; you will be able to create users and user groups and manage users and group memberships.
-
Create and Manage Users and Identities
After watching this video; you will be able to create Office and Intune users and associated identities.
-
Creating SharePoint Team Sites
After watching this video; you will be able to create SharePoint team sites.
-
Delegated Administration
After watching this video; you will be able to manage the administrative roles and the delegation of administration.
-
Deleted Files
After watching this video; you will be able to describe SharePoint deleted files status.
-
Determine User Location
After watching this video; you will be able to determine user locations.
-
Differentiate Between On-premises IT Service Models
After watching this video; you will be able to describe the difference between traditional and cloud-hosted service.
-
Domain Name Configuration
After watching this video; you will be able to configure custom domain name for Microsoft cloud services.
-
Establish Cloud Services – Microsoft Intune
Establish Cloud Services – Microsoft Intune
-
Establish Cloud Services – Office 365
After watching this video; you will be able to manage tenant setup and service administration for Intune.
-
Exam 98-369 – Course Introduction
After watching this video; you will be able to describe the requirements for objects 2 and 3 of the 98-369 certification exam.
-
Hybrid Cloud
After watching this video; you will be able to describe hybrid cloud architecture.
-
Identify Mobile Device Management Policies
After watching this video; you will be able to identify MDM policies.
-
Identify Office Repair Requirement
After watching this video; you will be able to identify when Office 365 requires a repair.
-
Identify Software Requirements
After watching this video; you will be able to identify software requirements.
-
Identify Storage Limits
After watching this video; you will be able to identify storage limits.
-
Identity Management
After watching this video; you will be able to manage tenant setup and service administration for Office 365.
-
Install Microsoft Intune Client Management Software
After watching this video; you will be able to install Intune client management software.
-
Intune Options and Plans
After watching this video; you will be able to describe the available service options for the Intune services.
-
Investigate Issues Receiving and Sending E-mail
After watching this video; you will be able to troubleshoot issues related to sending/receiving e-mail.
-
Issues Accessing a Delegated Mailbox
After watching this video; you will be able to describe delegated mailbox issues.
-
Manage Anti-spam and Anti-virus Settings
After watching this video; you will be able to manage anti-spam and anti-virus settings.
-
Manage Contacts and Contact Groups
After watching this video; you will be able to manage contacts and contact groups.
-
Manage External Communication Settings
After watching this video; you will be able to manage external communication setting.
-
Manage Password Policy
After watching this video; you will be able to manage password policy.
-
Manage Recipient Mailboxes
After watching this video; you will be able to manage recipient mailboxes.
-
Manage Resources
After watching this video; you will be able to manage resources.
-
Manage Roles
After watching this video; you will be able to manage roles and describe administrative roles in Office 365 and Intune.
-
Manage Skype for Business User Options
After watching this video; you will be able to manage Skype for Business user options.
-
Manage Subscriptions and Licenses
After watching this video; you will be able to manage subscriptions and licenses.
-
Managing "Open with Explorer" Issues
"After watching this video; you will be able to handle ""Open with Explorer"" issues."
-
Monitoring the Maintenance Schedule
After watching this video; you will be able to work with the maintenance schedule.
-
Monitoring the Message Center
After watching this video; you will be able to work with the Messaging center.
-
Office 365 Options and Plans
After watching this video; you will be able to describe the available service options for the Office 365 services.
-
Office 365 ProPlus OS Requirements
After watching this video; you will be able to identify OS requirement for Office 365 ProPlus.
-
Recover Deleted Content
After watching this video; you will be able to work with SharePoint file recovery.
-
Repair an Office 365 Installation
After watching this video; you will be able to work with the Office Repair tool.
-
Repairing OneDrive Sync Issues
After watching this video; you will be able to repair OneDrive sync issues.
-
Requirements and Dependencies – Intune
After watching this video; you will be able to describe the requirements and dependencies associated with the Microsoft Intune Service.
-
Requirements and Dependencies – Office 365
After watching this video; you will be able to describe the requirements and dependencies associated with the Office 365 service.
-
Requirements and Dependencies – Office 365 Networks
After watching this video; you will be able to describe the requirements and dependencies associated with the Office 365 service.
-
Resetting an Office 365 Password
After watching this video; you will be able to reset an Office 365 password.
-
Resolving Cloud Service Issues
After watching this video; you will be able to describe and troubleshoot deployment and end user-related issues with Office 365; Intune; SharePoint and OneDrive; and Skype for Business.
-
Resolving Sign-in and Connection Issues
After watching this video; you will be able to resolve issues with sign-in; passwords; and Office application activation.
-
Service Payment Models
After watching this video; you will be able to describe payment models for cloud services.
-
Service Requests
After watching this video; you will be able to work with service request logging.
-
Service-level Agreement
After watching this video; you will be able to describe service-level agreement; Business Continuity; Disaster Recovery; and Backup Restore.
-
Set Up Notifications
After watching this video; you will be able to configure notifications.
-
Setting Up Social Features Using Newsfeeds or Yammer
After watching this video; you will be able to set up social features using newsfeeds or yammer.
-
Skype for Business Sign-in Issues
After watching this video; you will be able to troubleshoot Skype for Business Online sign-in issues.
-
Skype for Business Troubleshoot Wizards
After watching this video; you will be able to use the Skype troubleshoot wizards.
-
Subscribe to RSS Feeds
After watching this video; you will be able to configure Office 365 Service Health RSS Feeds.
-
Troubleshoot "Open with Explorer" Not Working
"After watching this video; you will be able to troubleshoot ""Open with Explorer"" not working."
-
Troubleshoot Access to a Delegated Mailbox
After watching this video; you will be able to troubleshoot delegated mailbox access.
-
Troubleshoot OneDrive Not Syncing
After watching this video; you will be able to troubleshoot OneDrive not syncing.
-
Troubleshooting Mobile Device Connections
After watching this video; you will be able to troubleshoot mobile device connections to Office 365 or Microsoft Intune MDM.
-
Use the E-mail Send/Receive Troubleshoot Utility
After watching this video; you will be able to work with the send/receive Troubleshoot utility.
-
Utilizing the Service Health Tools
After watching this video; you will be able to work with the Service Health Dashboard.
-
Deploy and Administer Cloud Services
After watching this video; you will be able to deploy and administer cloud services.
-
Implementing Cloud Services and Security
After watching this video; you will be able to implement Cloud Services and Security.
-
Using and Configuring Cloud Services
After watching this video; you will be able to use and configure cloud services.
-
Accessing Intune Applications
After watching this video; you will be able to sign in to a managed application.
-
Activating Azure RMS – Azure
After watching this video; you will be able to set up Azure RMS service on the Azure portal.
-
Activating Azure RMS – Office 365
After watching this video; you will be able to set up Azure RMS service on the Office 365 portal.
-
Activating RMS for Individuals
After watching this video; you will be able to set up RMS for Individuals.
-
Altering File Protection
After watching this video; you will be able to modify RM protection on a protected file.
-
Azure Active Directory Management Console
After watching this video; you will be able to navigate the Azure Active Directory management console.
-
Azure Active Directory Premium
After watching this video; you will be able to install the Azure Active Directory Premium options.
-
Azure AD Access Panel
After watching this video; you will be able to work with the Access Panel portal.
-
Azure AD Application Management
After watching this video; you will be able to describe the configuration of Azure AD applications.
-
Azure AD Applications
After watching this video; you will be able to add and delete applications to/from Azure AD.
-
Azure AD Configuration #1
After watching this video; you will be able to describe the configuration of Active Directory Azure.
-
Azure AD Configuration #2
After watching this video; you will be able to describe the configuration of Active Directory Azure.
-
Azure AD Configure SSO
After watching this video; you will be able to configure SSO for a well-known SaaS application.
-
Azure AD Integration (Sync) Configuration
After watching this video; you will be able to configure and test synchronization between Azure AD and on-premises AD.
-
Azure AD Integration (Sync) Setup
After watching this video; you will be able to set up synchronization between Azure AD and on-premises AD.
-
Azure AD Password Management
After watching this video; you will be able to work with Azure password management tools.
-
Azure AD Reports
After watching this video; you will be able to work with the Azure AD report management facility.
-
Azure Password Reset
After watching this video; you will be able to work with Azure self-service password reset.
-
Azure Rights Management
After watching this video; you will be able to describe Azure RMS with respect to supported devices and platforms; role within EMS; and capabilities.
-
Azure RMS – Encryption Key Management
After watching this video; you will be able to describe the management of the Azure RMS tenant (encryption) key.
-
Azure RMS System
After watching this video; you will be able to describe the Azure RMS system; supporting components; required subscriptions; and compliance.
-
Configure AD Azure Branding
After watching this video; you will be able to configure a customized branding for AD Azure.
-
Configuring RMS Management
After watching this video; you will be able to describe the purpose; requirements; and establishment of Azure RMS Super Users.
-
Configuring RMS Templates
After watching this video; you will be able to configure existing custom RMS protection templates.
-
Copy and Remove RMS Templates
After watching this video; you will be able to copy and remove RMS protection templates.
-
Creating RMS Templates
After watching this video; you will be able to create new custom RMS protection templates.
-
Data Access Protection
After watching this video; you will be able to describe file protection within Azure RMS.
-
Deploying an Intune Managed Application
After watching this video; you will be able to deploy an application.
-
Describing the Components of Microsoft EMS
After watching this video; you will be able to outline EMS components: Azure Active Directory; Microsoft Intune; Azure Rights Management; and the costing structure of the EMS.
-
E-mail Protection
After watching this video; you will be able to send protected e-mail to a recipient.
-
E-mail Workflow
After watching this video; you will be able to work with e-mail notifications within Azure RMS workflows.
-
E-mailing Attachments
After watching this video; you will be able to send protected e-mail attachments and configure attachment settings.
-
Getting Started with Microsoft Intune
After watching this video; you will be able to outline the architecture of the Microsoft Intune product and its capabilities.
-
Interapplication Data Control
After watching this video; you will be able to describe copy and paste policy-based restrictions between managed and unmanaged applications.
-
Intune Administration
After watching this video; you will be able to work with the Intune administration settings.
-
Intune Application Access
After watching this video; you will be able to work with Office 365 Exchange Online mail from an Intune-managed device.
-
Intune Application Policy
After watching this video; you will be able to work with application policy settings.
-
Intune Compliance Policy
After watching this video; you will be able to create and deploy Intune device compliance policy.
-
Intune Compliance Policy Options
After watching this video; you will be able to work with the Intune Compliance policy.
-
Intune Conditional Access Policy
After watching this video; you will be able to work with the Intune conditional access policy.
-
Intune Configuration Policy Creation
After watching this video; you will be able to create and deploy Intune device Configuration policy.
-
Intune Configuration Policy Options
After watching this video; you will be able to work with the Intune Configuration policy.
-
Intune Device Enrollment
After watching this video; you will be able to enroll a device with Intune.
-
Intune Management Console Architecture
After watching this video; you will be able to navigate and manage the Intune management console.
-
Managed Intune Applications
After watching this video; you will be able to work with managed applications.
-
Managing Azure AD Groups
After watching this video; you will be able to create AD groups and manage group membership using manual and dynamic techniques.
-
Managing Azure AD Users
After watching this video; you will be able to create and manage AD users.
-
Managing Azure RMS Logging and Analysis
After watching this video; you will be able to describe data asset logging and usage with the Azure RMS service.
-
Mobile Device Management
After watching this video; you will be able to describe MDM capabilities within Office 365 and Intune.
-
Office 365 MDM Configuration
After watching this video; you will be able to navigate the Office 365 MDM console options.
-
Office 365 Security Policy
After watching this video; you will be able to work with the Office 365 MDM management tools.
-
Policy Management
After watching this video; you will be able to describe the device policy management options within Intune and navigate the Intune console.
-
Protecting a Document by Direct Configuration
After watching this video; you will be able to protect a Word document at rest using 'on the spot' configuration settings.
-
Protecting a Document Using an RMS template
After watching this video; you will be able to protect a Word document at rest by applying a template.
-
Protecting Files that are not RMS aware
After watching this video; you will be able to protect a file that is not RMS-aware.
-
Refresh RMS Templates
After watching this video; you will be able to refresh RMS protection templates.
-
Removing File Protection
After watching this video; you will be able to remove RMS protection.
-
Revoking Document Access
After watching this video; you will be able to work with end user document revocation.
-
RMS Default Templates
After watching this video; you will be able to work with the default protection templates.
-
Set Up the Sharing Application
After watching this video; you will be able to set up the RMS sharing application.
-
Sign-in to Office 365
After watching this video; you will be able to sign in and use Azure RMS.
-
Subscribing to Microsoft Azure
After watching this video; you will be able to subscribe to Microsoft Azure and gain access to Azure Active Directory.
-
Subscribing to the Intune Service
After watching this video; you will be able to subscribe to the Microsoft Intune service.
-
Tracking Document Usage
After watching this video; you will be able to work with end user document tracking.
-
User and Group Management
After watching this video; you will be able to define users and groups; and work with Dynamic groups.
-
Using a Managed Browser
After watching this video; you will be able to describe the use of a managed browser.
-
Configuring Standard and Production Checkpoints
After watching this video; you will be able to configure standard and production checkpoints in Hyper-V Manager on Windows Server Technical Preview.
-
Connected Standby
After watching this video; you will be able to describe support for connected standby in Hyper-V Technical Preview.
-
Enable Remote Hyper-V Host Management
After watching this video; you will be able to enable remote management on a Windows Server Technical Preview Hyper-V host .
-
Enabling and Disabling Checkpoints
After watching this video; you will be able to enable and disable checkpoints in Hyper-V Manager on Windows Server Technical Preview.
-
Hot Add and Remove for NIC and Memory
After watching this video; you will be able to describe the hot add functionality for NIC and memory in Hyper-V Technical Preview.
-
Hyper-V Manager
After watching this video; you will be able to describe the Hyper-V Manager GUI in Windows Server Technical Preview.
-
Hyper-V Manager Improvements
After watching this video; you will be able to describe improvements made to Hyper-V Manager in Hyper-V Technical Preview.
-
Hyper-V Technical Preview Overview
After watching this video; you will be able to describe the editions and requirements of Hyper-V Technical Preview.
-
Installing Hyper-V Role with PowerShell
After watching this video; you will be able to add the Hyper-V role on Windows Server Technical Preview using PowerShell.
-
Installing Hyper-V Role with Server Manager
After watching this video; you will be able to add the Hyper-V role on Windows Server Technical Preview using Server Manager.
-
Installing Hyper-V Server
After watching this video; you will be able to install the standalone Hyper-V Server Technical Preview.
-
Integration Services
After watching this video; you will be able to describe integration services and the use of Windows Update in Hyper-V Technical Preview.
-
Linux Secure Boot
After watching this video; you will be able to describe support for Linux secure boot in Hyper-V Technical Preview.
-
Production Checkpoints
After watching this video; you will be able to describe a scenario for using production checkpoints in Hyper-V Technical Preview.
-
Rolling Hyper-V Cluster Upgrade
After watching this video; you will be able to describe the rolling Hyper-V cluster upgrade features to upgrade the functional level of a cluster VM by VM in Hyper-V Technical Preview.
-
Supported Guests
After watching this video; you will be able to list supported guest OS for Hyper-V Technical Preview.
-
Virtual Machine Configuration Version
After watching this video; you will be able to describe new configuration versions in Hyper-V Technical Preview.
-
VM Configuration File Format
After watching this video; you will be able to describe new VM configuration file format in Hyper-V Technical Preview.
-
Windows 10 Client Hyper-V
After watching this video; you will be able to compare features of Hyper-V Technical Preview and client Hyper-V on Windows 10.
-
Add Reporting Services Role
After watching this video; you will be able to implement adding reporting services roles.
-
Adding Operating System Images
After watching this video; you will be able to implement adding operating system images.
-
Alert States in Configuration Manager
After watching this video; you will be able to describe alert states while monitoring alerts in configuration manager.
-
Alerts
After watching this video; you will be able to describe alerts in SCCM configuration manager.
-
Archiving the Backup Snapshot
After watching this video; you will be able to implement archiving the backup snapshot.
-
Assigning Content Locations
After watching this video; you will be able to describe assigning content locations.
-
Assigning Roles for Administration (Part 1)
After watching this video; you will be able to describe assigning roles for administration.
-
Assigning Roles for Administration (Part 2)
After watching this video; you will be able to implement assigning roles for administration.
-
Backup Site Server Maintenance Task
After watching this video; you will be able to discuss Backup Site Server maintenance task.
-
Best Practices
After watching this video; you will be able to describe best practices.
-
Best Practices for Maintenance Windows
After watching this video; you will be able to describe the best practices for maintenance windows.
-
Best Practices for SCCM Client Deployment
After watching this video; you will be able to describe best practices for SCCM Client deployment.
-
Boot Images
After watching this video; you will be able to discuss boot images.
-
Boundaries
After watching this video; you will be able to implement boundaries.
-
Boundary Groups
After watching this video; you will be able to implement boundary groups.
-
Built-in Collections - Collection Types
After watching this video; you will be able to describe built-in collections and collection types.
-
CAS Deploying Site Roles
After watching this video; you will be able to describe CAS deploying site roles.
-
Certificates - Managing Security Features (Part 1)
After watching this video; you will be able to describe certificates.
-
Certificates - Managing Security Features (Part 2)
After watching this video; you will be able to describe managing security features.
-
Client Compliance Assessment
After watching this video; you will be able to describe client compliance assessment.
-
Client Settings Configuration
After watching this video; you will be able to configure custom client settings in System Center Configuration Manager 2012 R2.
-
Collections and Administrative Scopes
After watching this video; you will be able to describe collections and administrative scopes.
-
Complex Query (Part 1)
After watching this video; you will be able to describe complex queries.
-
Complex Query (Part 2)
After watching this video; you will be able to implement complex queries.
-
Compliance Assessment States
After watching this video; you will be able to describe compliance assessment states.
-
Compliance Settings Uses
After watching this video; you will be able to describe the uses of compliance settings.
-
Configuration Baselines
After watching this video; you will be able to implement configuration baselines.
-
Configuration Items
After watching this video; you will be able to describe configuration items.
-
Configure Alerts
After watching this video; you will be able to configure alerts.
-
Configure and Monitor FEP Clients
After watching this video; you will be able to configure and monitor FEP clients.
-
Configure the Firewall
After watching this video; you will be able to configure the firewall.
-
Configuring Boundaries
After watching this video; you will be able to configure boundaries.
-
Configuring Client Settings
After watching this video; you will be able to configure client settings .
-
Configuring Content Management Using SCCM
After watching this video; you will be able to configure content management using SCCM.
-
Create a Configuration Baseline
After watching this video; you will be able to create a configuration baseline.
-
Create a Configuration Item (Part 1)
After watching this video; you will be able to describe creating a configuration item.
-
Create a Configuration Item (Part 2)
After watching this video; you will be able to implement the creation of a configuration item.
-
Create a Configuration Item (Part 3)
After watching this video; you will be able to create a configuration item.
-
Create Applications
After watching this video; you will be able to implement creating applications.
-
Create Applications - APP-V
After watching this video; you will be able to implement creating applications using APP-V.
-
Create Applications - Introduction
After watching this video; you will be able to discuss creating an applications.
-
Create the System Management Container
After watching this video; you will be able to implement the system management container.
-
Create User and Device Collections (Part 1)
After watching this video; you will be able to implement the creation of a user.
-
Create User and Device Collections (Part 2)
After watching this video; you will be able to configure device collections.
-
Creating a Task Sequence
After watching this video; you will be able to implement creating a task sequence.
-
Creating Driver Packages
After watching this video; you will be able to implement creating driver packages.
-
Custom Collections
After watching this video; you will be able to describe custom collections.
-
Daily Tasks – Monitoring Site Health
After watching this video; you will be able to describe daily tasks while monitoring site health.
-
Data Protection Manager
After watching this video; you will be able to implement Data Protection Manager.
-
Deploy an Application
After watching this video; you will be able to deploy an application.
-
Deploy Configuration Baseline Monitor
After watching this video; you will be able to deploy a configuration baseline monitor.
-
Deploying Site Roles
After watching this video; you will be able to describe deploying site roles.
-
Deploying the SCCM Client to Mac and Linux/UNIX
After watching this video; you will be able to deploy SCCM Client to Mac and Linux/UNIX.
-
Deployment Types
After watching this video; you will be able to describe deployment types.
-
Desired Configuration Management
After watching this video; you will be able to describe configuration management.
-
Determining SCCM Client Installation Method (Part 1)
After watching this video; you will be able to describe determining the SCCM Client installation method.
-
Determining SCCM Client Installation Method (Part 2)
After watching this video; you will be able to implement SCCM Client installation method.
-
Determining SCCM Client Installation Method (Part 3)
After watching this video; you will be able to configure SCCM Client installation method.
-
Direct and Query Rules (Part 1)
After watching this video; you will be able to implement Direct and Query Rules.
-
Direct and Query Rules (Part 2)
After watching this video; you will be able to implement Direct and Query Rules.
-
Direct and Query Rules (Part 3)
After watching this video; you will be able to implement Direct and Query Rules.
-
Direct and Query Rules (Part 4)
After watching this video; you will be able to implement Direct and Query Rules.
-
Enable Hardware Inventory on Client Agents
After watching this video; you will be able to implement enabling hardware inventory on client agents.
-
Enable the Reporting Services Role
After watching this video; you will be able to implement enabling the reporting services role.
-
Enabling Discovery
After watching this video; you will be able to implement enabling discovery.
-
Endpoint Protection Client
After watching this video; you will be able to discuss the endpoint protection client.
-
Endpoint Protection Configuration
After watching this video; you will be able to implement endpoint protection configuration.
-
Extend the AD Schema
After watching this video; you will be able to discuss the AD schema.
-
Extending Hardware Inventory using WMI
After watching this video; you will be able to implement extending hardware inventory using WMI.
-
Find all Windows 8 Machines
After watching this video; you will be able to implement finding all Windows 8 machines.
-
Function of Collections (Part 1)
After watching this video; you will be able to describe the function of collections.
-
Function of Collections (Part 2)
After watching this video; you will be able to describe function of collections.
-
HTTPS Client Connections (Part 1)
After watching this video; you will be able to describe HTTPS client connections.
-
HTTPS Client Connections (Part 2)
After watching this video; you will be able to implement HTTPS client connections.
-
Install System Center 2012 R2 Configuration Manager
After watching this video; you will be able to implement installion of system center 2012 R2 configuration manager.
-
Install the Reporting Services Point
After watching this video; you will be able to implement the install the reporting services point.
-
Installing the SCCM Client
After watching this video; you will be able to install the SCCM Client.
-
Installing the SCCM Client (Agent)
After watching this video; you will be able to implement installing the SCCM client agent .
-
Integration Requirements
After watching this video; you will be able to describe integration requirements.
-
Key Security Features MDM
After watching this video; you will be able to describe key security features MDM.
-
Kiosk Mode
After watching this video; you will be able to describe kiosk mode.
-
Maintenance Window Components
After watching this video; you will be able to describe maintenance window components.
-
Maintenance Windows
After watching this video; you will be able to describe maintenance windows.
-
Manage Collection Properties
After watching this video; you will be able to describe managing collection properties.
-
Managing Boundaries
After watching this video; you will be able to describe managing boundaries.
-
Managing Boundary Groups
After watching this video; you will be able to describe managing boundary groups.
-
Managing Collections
After watching this video; you will be able to describe managing collections.
-
Managing Collections Introduction
After watching this video; you will be able to describe managing collections.
-
Managing Device and User Collections
After watching this video; you will be able to describe managing device and user collections.
-
Managing Operating System Images and Installers
After watching this video; you will be able to discuss managing operating system images and installers.
-
Managing Site Communications and Site Health
After watching this video; you will be able to describe managing site communications and site health.
-
MDM-Other Supported Features
After watching this video; you will be able to describe other supported features in MDM.
-
Migrate Users' Files and Settings
After watching this video; you will be able to discuss migrating users' files and settings.
-
Mobile Device Management (MDM)
After watching this video; you will be able to describe mobile device management (MDM).
-
Monitor Alerts in Configuration Manager
After watching this video; you will be able to implement monitoring alerts in configuration manager.
-
Monitoring Applications
After watching this video; you will be able to implement monitoring applications.
-
Monitoring Components of Site Health
After watching this video; you will be able to describe monitoring components of site health.
-
Monitoring Configuration Items and Baselines
After watching this video; you will be able to describe monitoring configuration items and baselines.
-
Monitoring Replication Link Status
After watching this video; you will be able to describe monitoring replication link status.
-
Monitoring System Status
After watching this video; you will be able to describe monitoring system status.
-
Multiple Maintenance Windows
After watching this video; you will be able to describe multiple maintenance windows.
-
Object Types - Security Scopes
After watching this video; you will be able to describe object types within security scopes.
-
Overlapping Boundaries
After watching this video; you will be able to describe overlapping boundaries.
-
Periodic Tasks – Monitoring Site Health
After watching this video; you will be able to describe periodic tasks while monitoring site health.
-
PKI Certificate Revocation
After watching this video; you will be able to describe PKI certificate revocation.
-
Planning for Multicast Deployments
After watching this video; you will be able to discuss planning for multicast deployments.
-
Planning System Roles for OS Deployments
After watching this video; you will be able to discuss planning system roles for OS deployments.
-
Preferred Management Points
After watching this video; you will be able to describe preferred management points.
-
Prerequisite Software Installation
After watching this video; you will be able to discuss prerequisite software installation.
-
Prerequisite Software Installation – WSUS
After watching this video; you will be able to discuss prerequisite software installation with WSUS.
-
Prerequisites for Deploying Operating Systems
After watching this video; you will be able to discuss the prerequisites for deploying operating systems.
-
Recover a Configuration Manager Site
After watching this video; you will be able to implement the recovery of a Configuration Manager site.
-
Recover a Site Database
After watching this video; you will be able to implement the recovery of a site database.
-
Replication Link Analyzer
After watching this video; you will be able to describe replication link analyzer.
-
Replication Link Status
After watching this video; you will be able to describe replication link status.
-
Requirements to Deploy Endpoint Protection
After watching this video; you will be able to describe the requirements to deploy endpoint protection.
-
Role-based Security
After watching this video; you will be able to describe role-based security.
-
SCCM Client in Virtual Desktop Infrastructures
After watching this video; you will be able to implement SCCM Client in virtual desktop infrastructures.
-
SCCM Client Installation Method
After watching this video; you will be able to describe SCCM Client installation method.
-
SCCM Client Installation Methods
After watching this video; you will be able to describe SCCM Client installation methods.
-
SCCM Disaster Recovery & Maintenance
After watching this video; you will be able to implement SCCM disaster recovery & maintenance.
-
SCCM Hardware Inventory
After watching this video; you will be able to describe SCCM hardware inventory.
-
SCCM Hardware Inventory Details
After watching this video; you will be able to describe SCCM hardware inventory details.
-
SCCM Software Inventory
After watching this video; you will be able to describe SCCM software inventory.
-
Security and Privacy for OS Deployment
After watching this video; you will be able to discuss security and privacy for OS deployment.
-
Security and Privacy Information
After watching this video; you will be able to describe security and privacy information.
-
Security Concerns and Best Practices
After watching this video; you will be able to outline and describe security concerns and best practices.
-
Security Roles
After watching this video; you will be able to describe security roles.
-
Security Scopes
After watching this video; you will be able to describe security scopes.
-
Servicing Images
After watching this video; you will be able to discuss servicing images.
-
Setting Up Discovery
After watching this video; you will be able to implement setting up discovery.
-
Software Updates Synchronization
After watching this video; you will be able to implement software updates synchronization.
-
Status Summarizers
After watching this video; you will be able to describe status summarizers.
-
Supported Operating Systems
After watching this video; you will be able to describe supported operating systems .
-
Supported Operating Systems for Deployment
After watching this video; you will be able to discuss supported operating systems for deployment.
-
Synchronization
After watching this video; you will be able to describe synchronization.
-
Synchronization of Internet-based Update Points
After watching this video; you will be able to discuss synchronization of Internet-based update points.
-
Task Sequences
After watching this video; you will be able to discuss task sequences.
-
Task Sequences Groups
After watching this video; you will be able to discuss Task Sequences Groups.
-
Third-party Computer Client Support
After watching this video; you will be able to describe third-party computer client support.
-
Types of Configuration Items
After watching this video; you will be able to describe types of configuration items.
-
Updates and Deployment Process
After watching this video; you will be able to describe updates and deployment process.
-
User Data and Profiles
After watching this video; you will be able to configure user data and profiles.
-
User State Migration Data
After watching this video; you will be able to discuss user state migration data.
-
Verify Reporting Services Point Installation
After watching this video; you will be able to verify reporting services point installation.
-
Viewing Reports
After watching this video; you will be able to describe viewing reports.
-
Viewing Site Service Status (Part 1)
After watching this video; you will be able to implement viewing site service status.
-
Viewing Site Service Status (Part 2)
After watching this video; you will be able to implement viewing site service status.
-
Weekly Tasks – Monitoring Site Health
After watching this video; you will be able to describe weekly tasks while monitoring site health.
-
What is Microsoft System Center?
After watching this video; you will be able to discuss Microsoft system center.
-
What is New in System Center 2012 R2
After watching this video; you will be able to describe what’s new in System Center 2012 R2.
-
What to Monitor
After watching this video; you will be able to describe what to monitor.
-
Where to Monitor
After watching this video; you will be able to describe where to monitor.
-
Windows Deployment Services
After watching this video; you will be able to discuss Windows Deployment Services.
-
Windows Intune and the Exchange Connector
After watching this video; you will be able to describe windows Intune and the exchange connector.
-
Working with Hotfixes
After watching this video; you will be able to discuss working with hotfixes.
-
Creating a Driver Package
After watching this video; you will be able to create a driver package.
-
Creating Task Sequences
After watching this video; you will be able to create task sequences.
-
Installing SCCM Client
After watching this video; you will be able to install SCCM Client.
-
Installing Server Roles
After watching this video; you will be able to install Server Roles.
-
Working with Alerts and Subscriptions
After watching this video; you will be able to use alerts and subscriptions.
-
Working with Discovery and Boundaries
After watching this video; you will be able to implement discovery and boundaries.
-
Working with Security Roles
After watching this video; you will be able to use security roles.
-
Adding an Update Server in Virtual Machine Manager
In this video; Aaron Sampson explains how to add an update server to System Center 2012 R2 Virtual Machine Manager.
-
Application Profiles
In System Center 2012 R2; application profiles provide the instructions for installing the applications to support a VMM managed service. In this video; Aaron Sampson demonstrates the functions and uses of application profiles in System Center.
-
Choosing a Cloud Model
In System Center 2012 R2; it is important to design cloud services according to what best meets the needs of the organization. One of the primary decisions is the choice of server infrastructure – choosing between the private cloud; the public cloud; and the hybrid cloud. In this video; Aaron Sampson discusses the features of each type of cloud service.
-
Cloud Services Process Pack
Microsoft System Center 2012 R2 provides Infrastructure as a service with the Cloud Services Process Pack; as well as cloud management to the organization. In this video; Aaron Sampson demonstrates the functions of the Cloud Services Process Pack to enhance the user experience by offering automation to the provisioning and management of your private cloud.
-
Cloud Services Process Pack Reporting
In this video; Aaron Sampson describes the reporting offerings of the cloud services process pack for Microsoft System Center 2012 R2.
-
Cloud Services Process Pack Request Offerings
In this video; Aaron Sampson describes the uses of Cloud Services Process Pack Request Offerings for Microsoft System Center 2012 R2.
-
Cloud Services Process Pack Terminology
In this video; Aaron Sampson describes Cloud Services Process Pack terminology for Microsoft System Center 2012 R2.
-
Configure Host Groups in Virtual Machine Manager
In this video; Aaron Sampson demonstrates how to set up host groups in System Center 2012 R2 Virtual Machine Manager.
-
Configure Orchestrator Integration Packs
In this video; Aaron Sampson explains how to configure Orchestrator integration packs.
-
Configure the Active Directory Connector
In this video; Aaron Sampson configures the Service Manager Active Directory connector in System Center 2012 R2.
-
Configure the Configuration Manager Connector
In this video; Aaron Sampson demonstrates how to configure the Service Manager Configuration Manager connector in System Center R2.
-
Configure the Operations Manager Connector
In this video; Aaron Sampson configures the Service Manager Operations Manager Alert connector in System Center 2012 R2.
-
Configure the Orchestrator Connector
In this video; Aaron Sampson configures the Service Manager Orchestrator connector in System Center 2012 R2.
-
Configure the Virtual Machine Manager Connector
In this video; Aaron Sampson configures the Service Manager Virtual Machine Manager; or VMM; connector in System Center 2012 R2.
-
Configure Virtual Machine Manager Dynamic Optimization
In this video; Aaron Sampson explains how to configure dynamic optimization in System Center 2012 R2 Virtual Machine Manager.
-
Configure Virtual Machine Manager Key Management
In this video; Aaron Sampson explains how to configure key management in System Center 2012 R2 Virtual Machine Manager.
-
Configure Virtual Machine Manager Service Accounts
In this video; Aaron Sampson demonstrates how to configure service accounts for System Center 2012 R2 Virtual Machine Manager.
-
Configure Virtual Machine Manager Virtual Networks
In this video; Aaron Sampson explains how to configure virtual networks in System Center 2012 R2 Virtual Machine Manager.
-
Configuring an Update Baseline in Virtual Machine Manager
In this video; Aaron Sampson demonstrates how to configure an update baseline in System Center 2012 R2 Virtual Machine Manager.
-
Configuring Guest OS Profiles
In this video; Aaron Sampson uses Microsoft System Center 2012 R2 Virtual Machine Manager to configure a guest OS profile.
-
Configuring Hardware Profiles
In this video; Aaron Sampson uses Microsoft System Center 2012 R2 Virtual Machine Manager to configure a hardware profile.
-
Configuring Self-Service Quotas
Self-service quotas limit what users can do within a specified cloud. In this video; Aaron Sampson implements user quotas using the Virtual Machine Manager; VMM; component of System Center 2012 R2.
-
Configuring Service Manager Basic Settings
Service Manager helps provide a robust and seamless IT service and can be configured and customized to meet the cloud's needs. In this video; Aaron Sampson performs basic configuration tasks for Service Manager in System Center 2012 R2.
-
Configuring SQL Server Protection
In this video; Aaron Sampson demonstrates how to configure SQL server protection using DPM.
-
Configuring storage pools for DPM
In this video; Aaron Sampson configures a storage pool for DPM in System Center R2.
-
Configuring the Operations Manager Web Part
In this video; Aaron Sampson configures the Operations Manager Web Part in System Center 2012 R2.
-
Configuring the PXE Server Role in Virtual Machine Manager
In this video; Aaron Sampson demonstrates how to add and configure the PXE Server Role in System Center 2012 R2 Virtual Machine Manager.
-
Create a VM Template
In this video; Aaron Sampson describes the process for creating a Virtual Machine template from a virtual hard disk using Microsoft System Center 2012 R2 Virtual Machine Manager.
-
Create an Orchestrator Runbook
In this video; Aaron Sampson demonstrates how to use System Center Orchestrator Runbook Designer.
-
Creating a Host Profile in Virtual Machine Manager
In this video; Aaron Sampson explains how to prepare for and create a host profile in System Center 2012 R2 Virtual Machine Manager.
-
Creating a Hyper-V Host Cluster in Virtual Machine Manager
In this video; Aaron Sampson demonstrates how to create a cluster in System Center 2012 R2 Virtual Machine Manager.
-
Creating a Self-Service User Role
User roles define who is able to do what; within what scope; and at what level of administrative ability; allowing users to do what they need to do while off-loading administrative tasks from a single person or group. In this video; Aaron Sampson creates a user role in the Virtual Machine Manager; or VMM; of System Center 2012 R2.
-
Creating a SQL Server Profile
In this video; Aaron Sampson describes the process for creating a SQL Server image and profile using Microsoft System Center 2012 R2 Virtual Machine Manager.
-
Creating a VM and Service Template for a SQL Server Deployment
In this video; Aaron Sampson describes the process in Microsoft System Center 2012 R2 Virtual Machine Manager for configuring Virtual Machine and Service templates used to complete an SQL Server deployment.
-
Creating an Application Profile
In this video; Aaron Sampson describes the process for creating an application profile using Microsoft System Center 2012 R2 Virtual Machine Manager.
-
Creating DPM Protection Groups
In this video; Aaron Sampson demonstrates how to create and configure a DPM protection group in System Center R2.
-
Creating Guest OS Profiles
In this video; Aaron Sampson uses Microsoft System Center 2012 R2 Virtual Machine Manager to create a guest OS profile.
-
Creating Hardware Profiles
In this video; Aaron Sampson uses Microsoft System Center 2012 R2 Virtual Machine Manager to create a hardware profile.
-
Deploy a Service Using App Controller
App Controller offers a self-service portal that allows defined self-service users to deploy any services that are required to support their environment without having to request permission. In this video; Aaron Sampson demonstrates how to deploy a service using the App Controller component of System Center 2012 R2.
-
Deploy a VM with Virtual Machine Manager
In this video; Aaron Sampson explains how to deploy a virtual machine with System Center 2012 R2 Virtual Machine Manager.
-
Deploying Agents
Operation Manager agents are installed on the target systems you want to be able to pull into your Operations Management server. In this video; Aaron Sampson demonstrates the process used to install Operations Manager agents in System Center 2012 R2.
-
Deploying an Application Profile
In this video; Aaron Sampson describes the process for deploying an application profile using Microsoft System Center 2012 R2 Virtual Machine Manager.
-
Deploying Bare-Metal Hyper-V hosts with Virtual Machine Manager and PXE
In deploying Bare-Metal Hyper-V hosts with Virtual Machine Manager (VMM) and PXE in Microsoft System Center 2012 R2; there are several key steps. The key components are the VMM server; the Windows Deployment Server (WDS); the Bare-Metal Server; and the library server. In this video; Aaron Sampson demonstrates the steps for using these components to deploy Bare-Metal Hyper-V hosts.
-
Deploying DPM Agents
In this video; Aaron Sampson demonstrates how to deploy DPM agents to domain and workgroup computers in System Center R2.
-
Deploying DPM Agents Using Certificate-based Authentication
In this video; Aaron Sampson demonstrates how to deploy DPM agents using certificate-based authentication in System Center R2.
-
Designing Private Clouds
In System Center 2012 R2; you can design a private cloud infrastructure to host data in-house to suit your needs. The private cloud can be based on your current data center; and the requirements that the existing center fulfils. In this video; Aaron Sampson provides a demonstration on how to design a private cloud.
-
Designing Runbooks
Microsoft System Center 2012 R2 has utilities that you can use to help automate the design of custom Runbooks in a private cloud environment. In this video; Aaron Sampson demonstrates how Runbooks can be designed effectively by first discussing the considerations you need to keep in mind before you get down to actually physically designing Runbooks.
-
Discovering and Deploying a Hyper-V Host in Virtual Machine Manager
In this video; Aaron Sampson explains how to discover and deploy a Hyper-V host using the Add Resource Wizard in System Center 2012 R2 Virtual Machine Manager.
-
DPM Backup Strategies
In Microsoft System Center 2012 R2; you can write backups directly to your Data Protection Manager (DPM) server. In this video; Aaron Sampson demonstrates the advantages and disadvantages of four different strategies for writing backups of protected information directly from the protected computer.
-
DPM Components
In Microsoft System Center 2012 R2; the Data Protection Manager (DPM) comprises different components that can be configured. In this video; Aaron Sampson demonstrates certain DPM components and their functions.
-
DPM Considerations
In Microsoft System Center 2012 R2; you can use the Data Protection Manager (DPM) to protect the private cloud. In this video; Aaron Sampson demonstrates how the DPM can be deployed by setting recovery point and recovery time objectives and defining protection parameters in the event of system failure.
-
DPM End-user File Protection
Microsoft System Center 2012 R2 allows users to recover their own files through the DPM end-user file protection infrastructure. In this video; Aaron Sampson demonstrates how to configure DPM end-user file protection options.
-
DPM In-place Upgrade
Microsoft System Center 2012 R2 presents a variety of options for users when they configure their DPM in-place upgrades. In this video; Aaron Sampson demonstrates how to do an in-place upgrade in DPM with System Center 2012 R2.
-
DPM Process
In Microsoft System Center 2012 R2; you can perform backups with Data Protection Manager (DPM) using the Volume Shadow Copy Service (VSS) process. In this video; Aaron Sampson demonstrates the requestor; provider and writer components of VSS and examines the seven-step process that is followed when backups are performed.
-
DPM Security Roles
In Microsoft System Center 2012 R2; you can assign and manage various security roles using Operations Manager. In this video; Aaron Sampson demonstrates how to use Operations Manager to assign tasks and level of access to various security roles in Data Protection Manager (DPM).
-
DPM Side-by-side Upgrade
Microsoft System Center 2012 R2 allows users who cannot do an in-place upgrade of DPM to do a side-by-side upgrade which keeps the original server secure while running the new server. In this video; Aaron Sampson demonstrates how to do a side-by-side upgrade of DPM and reconfigure each newly protected server.
-
DPM Storage Strategies
In Microsoft System Center 2012 R2; it is important that; when setting up a Data Protection Manager (DPM) infrastructure; you have enough storage capacity and the correct type of storage. In this video; Aaron Sampson demonstrates the different storage strategies for DPM.
-
DPM Upgrade Requirements
Microsoft System Center 2012 R2's Data Protection Manager (DPM) 2010 can be upgraded to the 2012 version; as long as specific infrastructural requirements are met. In this video; Aaron Sampson demonstrates the requirements to upgrade DPM.
-
Guest OS Profiles
In System Center 2012 R2; virtual machine templates and Guest Operating System profiles can be utilised to streamline configuration of multiple virtual machines. In this video; Aaron Sampson demonstrates the key elements of templates and Guest OS profiles in System Center.
-
Hardware Profiles
In System Center 2012 R2; hardware profiles are an essential component of virtual machine templates. In this video; Aaron Sampson demonstrates the function of hardware profiles and the role they play in the configuration of virtual machine templates.
-
Install and Configure an Orchestrator Management Server
In this video; Aaron Sampson installs and configures an Orchestrator Management server in System Center 2012 R2.
-
Installing App Controller
App Controller is fairly compatible with other System Center Components and as such can coexist with them. In this video; Aaron Sampson demonstrates how to install the App Controller component of System Center 2012 R2.
-
Installing DPM
In this video; Aaron Sampson discusses DPM hardware and software requirements and installation in System Center R2.
-
Installing Service Manager
In this video; Aaron Sampson explores the requirements for Service Manager and demonstrates how it is installed in System Center 2012 R2.
-
Installing the Operations Manager Web Part
In order to integrate Operations Manager with SharePoint; Web Part must first be configured and installed. In this video; Aaron Sampson explains how to install the Operations Manager Web Part in System Center 2012 R2.
-
Managing Server Updates Using Virtual Machine Manager
In System Center 2012; you can update virtual systems with ease using the Virtual Machine Manager (VMM) feature. In this video; Aaron Sampson demonstrates the process of updating virtual systems and explains how clusters are updated with minimal effect to the host.
-
Managing Updates in Virtual Machine Manager
In System Center 2012 R2; Virtual Machine Manager (VMM) which allows you to configure and manage virtual machines and services for private clouds. Like all software; VMM needs to be updated to ensure optimum performance. In this video; Aaron Sampson discusses how to manage updates in VMM.
-
Managing Virtual Machine Manager Update Settings
In this video; Aaron Sampson explains how to manage update settings in System Center 2012 R2 Virtual Machine Manager.
-
Migrating to Private Cloud
System Center 2012 R2 allows you to host a private cloud to manage your data in-house. Once you have determined the type of infrastructure you need; you can identify the services for migration. In this video; Aaron Sampson discusses aspects of migrating to a private cloud.
-
Operations Manager Active Directory Integration
The Configure Active Directory (AD) Integration wizard can be used in robust and dynamic environments to deploy agents to target systems. In this video; Aaron Sampson identifies agent security requirements and demonstrates the process used to integrate with Active Directory in the Operations Manager component of System Center 2012 R2.
-
Operations Manager and DPM Integration
In this video; Aaron Sampson explains how to integrate Operations Manager with Data Protection Manager; or DPM; in System Center 2012 R2.
-
Operations Manager and SharePoint Integration
Operations Manager is designed to monitor your environment. In this video; Aaron Sampson discusses Operations Manager and SharePoint.
-
Operations Manager and VMM Integration
Operations Manager can be integrated with Systems Center to monitor and maintain the private cloud. In this video; Aaron Sampson explains how to integrate Operations Manager with Virtual Machine Manager Server; or VMM; in System Center 2012 R2.
-
Operations Manager Architecture
In System Center 2012 R2; managing and monitoring the private cloud environment is made possible with the Operations Manager. In this video; Aaron Sampson demonstrates the components and uses of the Operations Manager architecture.
-
Operations Manager Configuring Subscriptions
In this video; Aaron Sampson demonstrates how to configure Operations Manager subscriptions in System Center 2012 R2.
-
Operations Manager Custom Management Packs
The Operations Manager is the data center and cloud monitoring component of System Center 2012 R2 suite and can be customized to meet the specific needs of your cloud. In this video; Aaron Sampson creates a custom management pack.
-
Operations Manager Distributed Topology Upgrade
In Operations Manager; on encountering with multiple management servers we can use distributed server upgrade process using Upgrade Helper Management pack. In this video; Aaron Sampson discusses distributed server upgrade process.
-
Operations Manager Installing and Configuring a Management Pack
In this video; Aaron Sampson reviews the process used to obtain and install management packs in System Center 2012 R2.
-
Operations Manager Management Packs
Management packs are largely what give Operations Manager its ability to monitor environments. In this video; Aaron Sampson identifies and explains the properties of Operations Manager management packs in System Center 2012 R2.
-
Operations Manager Monitoring Databases
In Microsoft System Center 2012 R2 Operations Manager; you can use the OLE DB Data Source Template that's provided to monitor databases via database connections; queries; and time to complete certain operations. In this video; Aaron Sampson demonstrates how the OLE DB Data Source Template is applied in database performance monitoring.
-
Operations Manager Monitoring Distributed Applications
Microsoft System Center 2012 R2 Operations Manager allows you to simultaneously monitor the multiple components of distributed applications to provide an overall view of the performance of the application. In this video; Aaron Sampson demonstrates how the Operation Manager services are applied in the monitoring of distributed applications.
-
Operations Manager Monitoring Templates
Operations Manager management packs can be used to monitor applications. In this video; Aaron Sampson discusses management pack templates.
-
Operations Manager Monitoring the Private Cloud Using Monitoring Templates
In this video; Aaron Sampson demonstrates the best practices for monitoring cloud infrastructure components with common Operations Manager monitoring templates in System Center 2012 R2.
-
Operations Manager Notification Channels and Subscribers
A key feature of Operations Manager is its ability to monitor your environment. However; information gained is useful only if you are aware of it. Notifications can be configured to inform Operations Manager of what is going on. In this video; Aaron Sampson explains the functions of Operations Manager notification channels and subscribers in System Center 2012 R2.
-
Operations Manager Side-by-Side Upgrade
The side-by-side upgrade process for Microsoft System Center 2012 can be a complex approach. In this video; Aaron Sampson discusses the side-by-side upgrade process.
-
Operations Manager Single Server Upgrades
A single-server System Center Operations Manager 2007 R2 environment can be upgraded to System Center 2012 – Operations Manager. In this video; Aaron Sampson explains how to perform both simple and complex single-server upgrades.
-
Operations Manager Upgrade Paths
In System Center 2012 R2; you have various paths that you can chose from when upgrading. In this video; Aaron Samson demonstrates how to choose an appropriate upgrade path for Operations Manager and how to use the Upgrade Helper Management Pack.
-
Operations Manager User Roles
Microsoft Operations Manager can be used to identify; define; and restrict users' abilities and place them into appropriate role. In this video; Aaron Sampson discusses Microsoft Operations Manager user roles.
-
Options for Creating a VM Template
The ability to consistently deploy virtual machines in greatly improved through the use of templates. In this video; Aaron Sampson explains options for creating a virtual machine template.
-
Orchestrator Architecture
Microsoft System Center 2012 R2 allows you to automate and standardize administrative tasks with Orchestrator Architecture. In this video; Aaron Sampson demonstrates how to install Orchestrator Architecture on the Management Server and what you can use it for.
-
Orchestrator Components
Microsoft System Center 2012 R2 implements various tasks and methods for passing information from task-to-task by using the Orchestrator Components tool. In this video; Aaron Sampson demonstrates how Runbooks is the key component of automation in Orchestrator; and that it's made up of Activities; Runbooks; and the Data bus.
-
Orchestrator Deployment Tasks
In Microsoft System Center 2012 R2; when implementing Orchestrator deployment tasks you have a fair number of components involved with getting it set up. In this video; Aaron Sampson demonstrates the components involved in the setting up of a management system.
-
Orchestrator Integration Packs
Microsoft System Center 2012 R2 allows monitoring of various types of applications using Orchestrator Integration Packs by extending the capabilities of your Runbooks. In this video; Aaron Sampson demonstrates how to obtain the correct integration pack so your Runbooks can include any kind of step and any kind of task or activity related to your applications.
-
Orchestrator Runbook Activities
In Microsoft System Center 2012 R2; there is a logical representation of various sequences and processes. In this video; Aaron Sampson demonstrates Orchestrator Runbooks Activities and the tools available such as utilities; monitoring options; e-mail; and notification types; as well as system based activities.
-
Orchestrator Security
Microsoft System Center 2012 R2 allows you to manage the Orchestrator Security and permissions of your users in Runbooks. In this video; Aaron Sampson demonstrates how to configure and modify the security settings in Orchestrator; and assign permissions to additional users or groups by modifying the access control list.
-
Plan a Service Manager Upgrade
When upgrading Microsoft System Center 2012 R2 Service Manager from previous versions it is important to plan your upgrade appropriately in terms of timing; management pack syncing; and connector definition. In this video; Aaron Sampson demonstrates how to include these features in your Service Manager upgrade plan.
-
Planning an Update Baseline in Virtual Machine Manager
System Center 2012 R2 allows you to plan and update baselines to set minimum levels using the Virtual Machine Manager (VMM) feature. In this video; Aaron Sampson demonstrates the creation of baselines for the purpose of streamlining server updates.
-
Preparing and Deploying a SQL Server Image
In this video; Aaron Sampson describes the process for installing and configuring a SQL Server instance using Microsoft System Center 2012 R2 Virtual Machine Manager.
-
Preparing iSCSI Storage For Hyper-V Host Clusters in Virtual Machine Manager
In this video; Aaron Sampson explains how to prepare iSCSI storage for Hyper-V host clusters in System Center 2012 R2 Virtual Machine Manager.
-
Private Clouds
In System Center 2012 R2; private clouds are flexible environments that offer certain benefits when compared to traditional environments. In this video; Aaron Sampson demonstrates private cloud environments and how they differ from tradition development environments.
-
Protecting Hyper-V Clusters Using DPM
In this video; Aaron Sampson demonstrates how to configure DPM protection for Hyper-V servers.
-
Protecting Hyper-V Using DPM
Microsoft System Center 2012 R2 allows you to support and protect virtual machines in your private cloud infrastructure by protecting Hyper-V using DPM. In this video; Aaron Sampson demonstrates how you can configure the agents within the guest system so they are supported and protected by DPM.
-
Remediating Update Non-Compliance in Virtual Machine Manager
In this video; Aaron Sampson uses Microsoft System Center 2012 R2 Virtual Machine Manager to remediate software update non-compliance.
-
Restoring SQL Server Data
In this video; Aaron Sampson explains how to restore SQL Server data using DPM.
-
Scanning for Compliance with Virtual Machine Manager
In this video; Aaron Sampson uses Microsoft System Center 2012 R2 Virtual Machine Manager to scan for server update compliance.
-
Self-service User Roles
In System Center 2012 R2; user roles can be used to manage which users have access and permissions to perform certain tasks. In this video; Aaron Sampson demonstrates the four different user roles and their specifications.
-
Service Level Management
In this video; Aaron Sampson describes Service Level Management for Microsoft System Center 2012 R2.
-
Service Level Management Calendar Items
In this video; Aaron Sampson describes Service Level Management calendar items for Microsoft System Center 2012 R2.
-
Service Manager Change Management
The Change Management feature in Microsoft System Center 2012 R2 Service Manager allows you to define repeatable templates for any change requests submitted by users. In this video; Aaron Sampson demonstrates how Service Manager Change Management is applied to improves w